Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.21079.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\CYKELPARKERINGENS.ini
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\GL-1.0.typelib
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\HERMAPHRODEITY.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ThrottlePlugin.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\applications-other.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\folder-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nscCF70.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rt64win7.inf
|
Windows setup INFormation, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\trompetens.Pim9
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\user-not-tracked-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\video-joined-displays-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
There are 2 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.21079.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.21079.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://artist151sh.com/paralikgroup%20ori%204_vJdEAWVzP17.bin
|
|||
http://creativecommons.org/ns#DerivativeWorks
|
unknown
|
||
http://creativecommons.org/ns#ShareAlike
|
unknown
|
||
http://creativecommons.org/licenses/by-sa/4.0/
|
unknown
|
||
http://creativecommons.org/ns#Distribution
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://creativecommons.org/ns#Notice
|
unknown
|
||
http://creativecommons.org/ns#Reproduction
|
unknown
|
||
http://creativecommons.org/ns#Attribution
|
unknown
|
||
http://creativecommons.org/ns#
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\medtag\Erethitic
|
enregistration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Bastille56\Skrivebordsskuffe50
|
Expand String Value
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\reclothing\Taxifly
|
NDRAAB
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
33A1000
|
direct allocation
|
page execute and read and write
|
||
1C90A83D000
|
heap
|
page read and write
|
||
1F5A0A4A000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1C910040000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
531000
|
heap
|
page read and write
|
||
1C910000000
|
heap
|
page read and write
|
||
2272DAE1000
|
heap
|
page read and write
|
||
28E28702000
|
heap
|
page read and write
|
||
74B9A7B000
|
stack
|
page read and write
|
||
31AB000
|
stack
|
page read and write
|
||
2272DA3E000
|
heap
|
page read and write
|
||
1C90B710000
|
trusted library allocation
|
page read and write
|
||
1F5A0A41000
|
heap
|
page read and write
|
||
2314645B000
|
heap
|
page read and write
|
||
1C83C120000
|
heap
|
page read and write
|
||
1F5A0A55000
|
heap
|
page read and write
|
||
5CC000
|
heap
|
page read and write
|
||
574000
|
heap
|
page read and write
|
||
552000
|
heap
|
page read and write
|
||
1C90A829000
|
heap
|
page read and write
|
||
555000
|
heap
|
page read and write
|
||
1F5A0A3E000
|
heap
|
page read and write
|
||
38F0000
|
trusted library allocation
|
page read and write
|
||
C9F5C7D000
|
stack
|
page read and write
|
||
5830000
|
trusted library allocation
|
page read and write
|
||
1C9100AA000
|
heap
|
page read and write
|
||
62912FB000
|
stack
|
page read and write
|
||
E8CB7DB000
|
stack
|
page read and write
|
||
C9F5F7F000
|
stack
|
page read and write
|
||
26283220000
|
heap
|
page read and write
|
||
1C910036000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
1C91001C000
|
heap
|
page read and write
|
||
734E1000
|
unkown
|
page execute read
|
||
435000
|
unkown
|
page read and write
|
||
1F5A0A69000
|
heap
|
page read and write
|
||
E8CC3FF000
|
stack
|
page read and write
|
||
1C90FF20000
|
trusted library allocation
|
page read and write
|
||
1C90BCA0000
|
trusted library allocation
|
page read and write
|
||
26283468000
|
heap
|
page read and write
|
||
23146402000
|
heap
|
page read and write
|
||
26283500000
|
heap
|
page read and write
|
||
1F5A0A30000
|
heap
|
page read and write
|
||
2272DAD0000
|
heap
|
page read and write
|
||
23146513000
|
heap
|
page read and write
|
||
74B9B7E000
|
stack
|
page read and write
|
||
1C90FE30000
|
trusted library allocation
|
page read and write
|
||
1C910260000
|
trusted library allocation
|
page read and write
|
||
2272DA66000
|
heap
|
page read and write
|
||
1C83CF50000
|
trusted library allocation
|
page read and write
|
||
1C83CF30000
|
trusted library allocation
|
page read and write
|
||
227C000
|
stack
|
page read and write
|
||
1C83C1AA000
|
heap
|
page read and write
|
||
52C000
|
heap
|
page read and write
|
||
28E28560000
|
trusted library allocation
|
page read and write
|
||
1C83C18B000
|
heap
|
page read and write
|
||
1F5A0A71000
|
heap
|
page read and write
|
||
1C83C2D5000
|
heap
|
page read and write
|
||
1F5A0A80000
|
heap
|
page read and write
|
||
1C90FE1E000
|
trusted library allocation
|
page read and write
|
||
1F5A0A4F000
|
heap
|
page read and write
|
||
38E1000
|
trusted library allocation
|
page read and write
|
||
1C90A86E000
|
heap
|
page read and write
|
||
9DE000
|
heap
|
page read and write
|
||
553000
|
heap
|
page read and write
|
||
E8CBCFF000
|
stack
|
page read and write
|
||
1C9100AC000
|
heap
|
page read and write
|
||
452000
|
unkown
|
page readonly
|
||
2272D9B0000
|
heap
|
page read and write
|
||
5A3000
|
heap
|
page read and write
|
||
1C83C2D0000
|
heap
|
page read and write
|
||
557000
|
heap
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
1C90A877000
|
heap
|
page read and write
|
||
57C000
|
heap
|
page read and write
|
||
E8CC2FF000
|
stack
|
page read and write
|
||
5BF000
|
heap
|
page read and write
|
||
62916FE000
|
stack
|
page read and write
|
||
1F5A0A3A000
|
heap
|
page read and write
|
||
23146458000
|
heap
|
page read and write
|
||
5DC000
|
heap
|
page read and write
|
||
5A5000
|
heap
|
page read and write
|
||
1C83CCF0000
|
trusted library allocation
|
page read and write
|
||
1C9100E1000
|
heap
|
page read and write
|
||
5EB000
|
heap
|
page read and write
|
||
21BC000
|
stack
|
page read and write
|
||
5CC000
|
heap
|
page read and write
|
||
59A000
|
heap
|
page read and write
|
||
1C90FF70000
|
remote allocation
|
page read and write
|
||
1F5A0A66000
|
heap
|
page read and write
|
||
28E28613000
|
heap
|
page read and write
|
||
38F0000
|
trusted library allocation
|
page read and write
|
||
1C90A7B0000
|
heap
|
page read and write
|
||
5849000
|
trusted library allocation
|
page read and write
|
||
1C83C1B2000
|
heap
|
page read and write
|
||
1F5A0A6F000
|
heap
|
page read and write
|
||
734E6000
|
unkown
|
page readonly
|
||
99000
|
stack
|
page read and write
|
||
1C83C140000
|
heap
|
page read and write
|
||
27DD000
|
stack
|
page read and write
|
||
1F5A0A7F000
|
heap
|
page read and write
|
||
26283502000
|
heap
|
page read and write
|
||
1C90A914000
|
heap
|
page read and write
|
||
C9F5CFE000
|
stack
|
page read and write
|
||
50ADFF000
|
stack
|
page read and write
|
||
50A8FB000
|
stack
|
page read and write
|
||
5DB000
|
heap
|
page read and write
|
||
5BF000
|
heap
|
page read and write
|
||
E8CC4FF000
|
stack
|
page read and write
|
||
2628343E000
|
heap
|
page read and write
|
||
1C83C1A0000
|
heap
|
page read and write
|
||
1C90FF60000
|
trusted library allocation
|
page read and write
|
||
5841000
|
trusted library allocation
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
5AC000
|
heap
|
page read and write
|
||
1C90B700000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
4F8000
|
heap
|
page read and write
|
||
28E28602000
|
heap
|
page read and write
|
||
1C83C1C1000
|
heap
|
page read and write
|
||
1C910109000
|
heap
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
557000
|
heap
|
page read and write
|
||
1C83C18C000
|
heap
|
page read and write
|
||
5EC000
|
heap
|
page read and write
|
||
1F5A0A48000
|
heap
|
page read and write
|
||
1C83C1B9000
|
heap
|
page read and write
|
||
1C83C2D9000
|
heap
|
page read and write
|
||
5BF000
|
heap
|
page read and write
|
||
2804000
|
trusted library allocation
|
page read and write
|
||
6290C7B000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
5841000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
7204EFF000
|
stack
|
page read and write
|
||
1F5A0B02000
|
heap
|
page read and write
|
||
5DC000
|
heap
|
page read and write
|
||
1C910054000
|
heap
|
page read and write
|
||
1F5A0A45000
|
heap
|
page read and write
|
||
26283402000
|
heap
|
page read and write
|
||
26283380000
|
trusted library allocation
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
5B6000
|
heap
|
page read and write
|
||
1C90B104000
|
heap
|
page read and write
|
||
734E0000
|
unkown
|
page readonly
|
||
1C91004D000
|
heap
|
page read and write
|
||
629127D000
|
stack
|
page read and write
|
||
74B9E7E000
|
stack
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
50A6FE000
|
stack
|
page read and write
|
||
1C83CF60000
|
trusted library allocation
|
page read and write
|
||
1C90B703000
|
trusted library allocation
|
page read and write
|
||
543000
|
heap
|
page read and write
|
||
1C83CF40000
|
heap
|
page readonly
|
||
1F5A1202000
|
trusted library allocation
|
page read and write
|
||
2290000
|
heap
|
page read and write
|
||
1C910102000
|
heap
|
page read and write
|
||
E8CBBFB000
|
stack
|
page read and write
|
||
E8CBFFE000
|
stack
|
page read and write
|
||
26283428000
|
heap
|
page read and write
|
||
582A000
|
trusted library allocation
|
page read and write
|
||
1F5A0A4C000
|
heap
|
page read and write
|
||
1C90A8A5000
|
heap
|
page read and write
|
||
27EC000
|
trusted library allocation
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
1C90B159000
|
heap
|
page read and write
|
||
5C6000
|
heap
|
page read and write
|
||
5820000
|
trusted library allocation
|
page read and write
|
||
7204DFB000
|
stack
|
page read and write
|
||
1C83C1C1000
|
heap
|
page read and write
|
||
1C910014000
|
heap
|
page read and write
|
||
28E28655000
|
heap
|
page read and write
|
||
26283280000
|
heap
|
page read and write
|
||
1C90A7E0000
|
trusted library allocation
|
page read and write
|
||
2272DA87000
|
heap
|
page read and write
|
||
74B9AFE000
|
stack
|
page read and write
|
||
509FEB000
|
stack
|
page read and write
|
||
2272E300000
|
heap
|
page read and write
|
||
1F5A0A43000
|
heap
|
page read and write
|
||
572000
|
heap
|
page read and write
|
||
5DC000
|
heap
|
page read and write
|
||
C9F551B000
|
stack
|
page read and write
|
||
5841000
|
trusted library allocation
|
page read and write
|
||
5B7000
|
heap
|
page read and write
|
||
1C90FF00000
|
trusted library allocation
|
page read and write
|
||
1C83C1B9000
|
heap
|
page read and write
|
||
1C83C1C1000
|
heap
|
page read and write
|
||
6290FFE000
|
stack
|
page read and write
|
||
5849000
|
trusted library allocation
|
page read and write
|
||
1C90A900000
|
heap
|
page read and write
|
||
23146413000
|
heap
|
page read and write
|
||
1C910108000
|
heap
|
page read and write
|
||
57E000
|
heap
|
page read and write
|
||
5833000
|
trusted library allocation
|
page read and write
|
||
AA94579000
|
stack
|
page read and write
|
||
74B9D7E000
|
stack
|
page read and write
|
||
1C83C19C000
|
heap
|
page read and write
|
||
72046BB000
|
stack
|
page read and write
|
||
1C83C1B9000
|
heap
|
page read and write
|
||
1F5A0A13000
|
heap
|
page read and write
|
||
38E0000
|
trusted library allocation
|
page read and write
|
||
9D6000
|
heap
|
page read and write
|
||
1F5A0A00000
|
heap
|
page read and write
|
||
1C90A750000
|
heap
|
page read and write
|
||
1C90B113000
|
heap
|
page read and write
|
||
1C90A740000
|
heap
|
page read and write
|
||
2272DB02000
|
heap
|
page read and write
|
||
1F5A0A6B000
|
heap
|
page read and write
|
||
1C90B015000
|
heap
|
page read and write
|
||
1C90FE10000
|
trusted library allocation
|
page read and write
|
||
3590000
|
heap
|
page read and write
|
||
C9F5A7C000
|
stack
|
page read and write
|
||
1C83C2C0000
|
trusted library allocation
|
page read and write
|
||
E8CC0FD000
|
stack
|
page read and write
|
||
1C90FF70000
|
remote allocation
|
page read and write
|
||
1C83C1B2000
|
heap
|
page read and write
|
||
5BF000
|
heap
|
page read and write
|
||
62910FF000
|
stack
|
page read and write
|
||
1C910061000
|
heap
|
page read and write
|
||
38EE000
|
trusted library allocation
|
page read and write
|
||
1C9100E9000
|
heap
|
page read and write
|
||
50A4FA000
|
stack
|
page read and write
|
||
5BF000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
57E000
|
heap
|
page read and write
|
||
1C90A900000
|
heap
|
page read and write
|
||
1C83C2C0000
|
trusted library allocation
|
page read and write
|
||
26283210000
|
heap
|
page read and write
|
||
C9F59FF000
|
stack
|
page read and write
|
||
59A000
|
heap
|
page read and write
|
||
452000
|
unkown
|
page readonly
|
||
28E28600000
|
heap
|
page read and write
|
||
1C83C148000
|
heap
|
page read and write
|
||
2272DA6E000
|
heap
|
page read and write
|
||
35B0000
|
trusted library allocation
|
page read and write
|
||
5AB000
|
heap
|
page read and write
|
||
1F5A0A49000
|
heap
|
page read and write
|
||
1F5A0A42000
|
heap
|
page read and write
|
||
23146475000
|
heap
|
page read and write
|
||
1C910103000
|
heap
|
page read and write
|
||
5CC000
|
heap
|
page read and write
|
||
5BF000
|
heap
|
page read and write
|
||
1F5A0A46000
|
heap
|
page read and write
|
||
57E000
|
heap
|
page read and write
|
||
5CC000
|
heap
|
page read and write
|
||
1C90FF70000
|
remote allocation
|
page read and write
|
||
7204CFB000
|
stack
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
5BF000
|
heap
|
page read and write
|
||
1C83C1C3000
|
heap
|
page read and write
|
||
53C000
|
heap
|
page read and write
|
||
21E4000
|
heap
|
page read and write
|
||
1C90FF50000
|
trusted library allocation
|
page read and write
|
||
5833000
|
trusted library allocation
|
page read and write
|
||
1C910100000
|
heap
|
page read and write
|
||
1C90FE34000
|
trusted library allocation
|
page read and write
|
||
2272DAC7000
|
heap
|
page read and write
|
||
26283400000
|
heap
|
page read and write
|
||
2272DA00000
|
heap
|
page read and write
|
||
1F5A0A53000
|
heap
|
page read and write
|
||
1C90B118000
|
heap
|
page read and write
|
||
1C83CFB0000
|
trusted library allocation
|
page read and write
|
||
1F5A0940000
|
heap
|
page read and write
|
||
5AB000
|
heap
|
page read and write
|
||
1C90B820000
|
trusted library allocation
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
2272D940000
|
heap
|
page read and write
|
||
1C9100F3000
|
heap
|
page read and write
|
||
1C90FE10000
|
trusted library allocation
|
page read and write
|
||
5BF000
|
heap
|
page read and write
|
||
26283454000
|
heap
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
AA94479000
|
stack
|
page read and write
|
||
1C83C18D000
|
heap
|
page read and write
|
||
1C83CCE0000
|
trusted library allocation
|
page read and write
|
||
1C90B159000
|
heap
|
page read and write
|
||
1C83BFE0000
|
heap
|
page read and write
|
||
E8CC5FF000
|
stack
|
page read and write
|
||
28E28590000
|
remote allocation
|
page read and write
|
||
1C90FD00000
|
trusted library allocation
|
page read and write
|
||
1C90FEE0000
|
trusted library allocation
|
page read and write
|
||
1C90FE40000
|
trusted library allocation
|
page read and write
|
||
50A7FB000
|
stack
|
page read and write
|
||
28E28590000
|
remote allocation
|
page read and write
|
||
5851000
|
trusted library allocation
|
page read and write
|
||
5B6000
|
heap
|
page read and write
|
||
59A000
|
heap
|
page read and write
|
||
28E284C0000
|
heap
|
page read and write
|
||
1C90FEE0000
|
trusted library allocation
|
page read and write
|
||
38F0000
|
trusted library allocation
|
page read and write
|
||
2272DA29000
|
heap
|
page read and write
|
||
1C83C2B0000
|
trusted library allocation
|
page read and write
|
||
E8CBDFD000
|
stack
|
page read and write
|
||
1C9100EF000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
5DC000
|
heap
|
page read and write
|
||
1C90A857000
|
heap
|
page read and write
|
||
5AB000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
26283464000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
5849000
|
trusted library allocation
|
page read and write
|
||
1C90A898000
|
heap
|
page read and write
|
||
2272E202000
|
heap
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
1C90A893000
|
heap
|
page read and write
|
||
1F5A0A29000
|
heap
|
page read and write
|
||
1C83C240000
|
heap
|
page read and write
|
||
38EE000
|
trusted library allocation
|
page read and write
|
||
1C83C2E0000
|
trusted library allocation
|
page read and write
|
||
5833000
|
trusted library allocation
|
page read and write
|
||
231461C0000
|
heap
|
page read and write
|
||
AA944FE000
|
stack
|
page read and write
|
||
23146A02000
|
trusted library allocation
|
page read and write
|
||
578000
|
heap
|
page read and write
|
||
C9F5DFD000
|
stack
|
page read and write
|
||
1C90FE54000
|
trusted library allocation
|
page read and write
|
||
629117C000
|
stack
|
page read and write
|
||
1F5A0A7D000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1C90B102000
|
heap
|
page read and write
|
||
2272DA68000
|
heap
|
page read and write
|
||
1C90FF40000
|
trusted library allocation
|
page read and write
|
||
5B7000
|
heap
|
page read and write
|
||
1C90A813000
|
heap
|
page read and write
|
||
1C90A88E000
|
heap
|
page read and write
|
||
1F5A0A54000
|
heap
|
page read and write
|
||
5B7000
|
heap
|
page read and write
|
||
5DC000
|
heap
|
page read and write
|
||
28E28E02000
|
trusted library allocation
|
page read and write
|
||
1F5A0A77000
|
heap
|
page read and write
|
||
1C83C1B2000
|
heap
|
page read and write
|
||
23146429000
|
heap
|
page read and write
|
||
74B9F7F000
|
stack
|
page read and write
|
||
1C90A874000
|
heap
|
page read and write
|
||
28E28640000
|
heap
|
page read and write
|
||
5DC000
|
heap
|
page read and write
|
||
231463F0000
|
trusted library allocation
|
page read and write
|
||
1F5A0A47000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
1C90B002000
|
heap
|
page read and write
|
||
23146220000
|
heap
|
page read and write
|
||
2272DABF000
|
heap
|
page read and write
|
||
1C83C18C000
|
heap
|
page read and write
|
||
582F000
|
trusted library allocation
|
page read and write
|
||
1C90B720000
|
trusted library allocation
|
page read and write
|
||
231461B0000
|
heap
|
page read and write
|
||
2272DA13000
|
heap
|
page read and write
|
||
1F5A0A6D000
|
heap
|
page read and write
|
||
5BF000
|
heap
|
page read and write
|
||
50A3F7000
|
stack
|
page read and write
|
||
1C910104000
|
heap
|
page read and write
|
||
5CC000
|
heap
|
page read and write
|
||
26283C02000
|
trusted library allocation
|
page read and write
|
||
376E000
|
stack
|
page read and write
|
||
1C90A902000
|
heap
|
page read and write
|
||
1C90FF70000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1C90B000000
|
heap
|
page read and write
|
||
2230000
|
trusted library allocation
|
page read and write
|
||
1C90B118000
|
heap
|
page read and write
|
||
5849000
|
trusted library allocation
|
page read and write
|
||
28E284D0000
|
heap
|
page read and write
|
||
7204BFB000
|
stack
|
page read and write
|
||
1C90FCF0000
|
trusted library allocation
|
page read and write
|
||
1F5A0950000
|
heap
|
page read and write
|
||
E8CC1FE000
|
stack
|
page read and write
|
||
1C910280000
|
trusted library allocation
|
page read and write
|
||
38E0000
|
trusted library allocation
|
page read and write
|
||
553000
|
heap
|
page read and write
|
||
1F5A0A51000
|
heap
|
page read and write
|
||
23146441000
|
heap
|
page read and write
|
||
23146502000
|
heap
|
page read and write
|
||
28E28590000
|
remote allocation
|
page read and write
|
||
1C90FE18000
|
trusted library allocation
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
5920000
|
trusted library allocation
|
page read and write
|
||
1F5A0A76000
|
heap
|
page read and write
|
||
1C90A800000
|
heap
|
page read and write
|
||
28E28530000
|
heap
|
page read and write
|
||
50A5FA000
|
stack
|
page read and write
|
||
28E2865C000
|
heap
|
page read and write
|
||
38F0000
|
trusted library allocation
|
page read and write
|
||
1F5A0A52000
|
heap
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
1C90FE50000
|
trusted library allocation
|
page read and write
|
||
26DF000
|
stack
|
page read and write
|
||
1C83C1A1000
|
heap
|
page read and write
|
||
62915FD000
|
stack
|
page read and write
|
||
578000
|
heap
|
page read and write
|
||
1C90A907000
|
heap
|
page read and write
|
||
23146400000
|
heap
|
page read and write
|
||
1F5A09E0000
|
trusted library allocation
|
page read and write
|
||
57E000
|
heap
|
page read and write
|
||
572000
|
heap
|
page read and write
|
||
1C90A902000
|
heap
|
page read and write
|
||
62914FF000
|
stack
|
page read and write
|
||
386F000
|
stack
|
page read and write
|
||
5100000
|
heap
|
page read and write
|
||
1C90FE31000
|
trusted library allocation
|
page read and write
|
||
572000
|
heap
|
page read and write
|
||
59A000
|
heap
|
page read and write
|
||
1C90A891000
|
heap
|
page read and write
|
||
2272D9E0000
|
trusted library allocation
|
page read and write
|
||
1F5A0A86000
|
heap
|
page read and write
|
||
26283413000
|
heap
|
page read and write
|
||
5A4000
|
heap
|
page read and write
|
||
2272D950000
|
heap
|
page read and write
|
||
571000
|
heap
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
62913FD000
|
stack
|
page read and write
|
||
578000
|
heap
|
page read and write
|
||
59A000
|
heap
|
page read and write
|
||
38E1000
|
trusted library allocation
|
page read and write
|
||
1C91002B000
|
heap
|
page read and write
|
||
1C90A8B3000
|
heap
|
page read and write
|
||
1C83CFB0000
|
trusted library allocation
|
page read and write
|
||
582D000
|
trusted library allocation
|
page read and write
|
||
2272DB13000
|
heap
|
page read and write
|
||
6290E7C000
|
stack
|
page read and write
|
||
1F5A0A50000
|
heap
|
page read and write
|
||
1C83C185000
|
heap
|
page read and write
|
||
28E28629000
|
heap
|
page read and write
|
||
26283479000
|
heap
|
page read and write
|
||
1C90FF30000
|
trusted library allocation
|
page read and write
|
||
1C90B100000
|
heap
|
page read and write
|
||
4C0000
|
trusted library allocation
|
page read and write
|
||
1C83BFF0000
|
trusted library allocation
|
page read and write
|
||
AA93FEB000
|
stack
|
page read and write
|
||
1F5A09B0000
|
heap
|
page read and write
|
||
1C90FE40000
|
trusted library allocation
|
page read and write
|
||
26283440000
|
heap
|
page read and write
|
||
426000
|
unkown
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
734E4000
|
unkown
|
page readonly
|
||
557000
|
heap
|
page read and write
|
||
26283513000
|
heap
|
page read and write
|
||
1C90FEE0000
|
trusted library allocation
|
page read and write
|
||
AA943FC000
|
stack
|
page read and write
|
There are 432 hidden memdumps, click here to show them.