IOC Report
SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.17738.8895

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.17738.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\fusionstilladelsen.non
data
modified
C:\Users\user\AppData\Local\Temp\nsj528F.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.17738.exe
"C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.17738.exe"
malicious

URLs

Name
IP
Malicious
http://185.236.228.217/private/Spread.bin
malicious
http://nsis.sf.net/NSIS_ErrorError
unknown
http://crl.mesince.com/ms.crl0
unknown
http://aia.mesince.com/ms.cer0
unknown
http://ocsp.mesince.com0)
unknown
http://aia.mesince.com/ms-tsa.cer02
unknown
http://crl.mesince.com/ms-tsa.crl0F
unknown
http://ocsp.mesince.com0-
unknown
http://www.mesince.com/policy/0
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
3221000
direct allocation
page execute and read and write
malicious
1F36DD00000
heap
page read and write
1B9215BD000
heap
page read and write
9C3347F000
stack
page read and write
6FD64000
unkown
page readonly
277E819B000
heap
page read and write
22215B18000
trusted library allocation
page read and write
1F36D647000
heap
page read and write
C5D14FE000
stack
page read and write
1A710C02000
heap
page read and write
1F36DD13000
heap
page read and write
286A2BA0000
heap
page read and write
74B72FE000
stack
page read and write
60E000
heap
page read and write
370157E000
stack
page read and write
277E8590000
remote allocation
page read and write
22210702000
heap
page read and write
199F9320000
heap
page read and write
199F944C000
heap
page read and write
1D80485C000
heap
page read and write
1D804800000
heap
page read and write
1ECE6267000
heap
page read and write
286A29F6000
heap
page read and write
1FA8324F000
heap
page read and write
1D804802000
heap
page read and write
61C000
heap
page read and write
2034EA3C000
heap
page read and write
1FA8324C000
heap
page read and write
286A3780000
trusted library allocation
page read and write
22215BE0000
trusted library allocation
page read and write
1ECE623C000
heap
page read and write
C5D12FC000
stack
page read and write
277E7B08000
heap
page read and write
222159F0000
trusted library allocation
page read and write
401000
unkown
page execute read
22215C3C000
heap
page read and write
277E8602000
heap
page read and write
22215CA8000
heap
page read and write
87DC8FF000
stack
page read and write
222105B0000
trusted library allocation
page read and write
22210F59000
heap
page read and write
1FA83213000
heap
page read and write
C01B6F9000
stack
page read and write
150F4613000
heap
page read and write
199F93C0000
trusted library allocation
page read and write
277E8173000
heap
page read and write
277E8179000
heap
page read and write
F4DD27C000
stack
page read and write
199F9483000
heap
page read and write
277E8193000
heap
page read and write
3691DFF000
stack
page read and write
1D804F50000
remote allocation
page read and write
277E81B3000
heap
page read and write
150F46CE000
heap
page read and write
286A2BA9000
heap
page read and write
277E7AEA000
heap
page read and write
20AE58B000
stack
page read and write
1F36D63D000
heap
page read and write
20AEAFB000
stack
page read and write
1A710C37000
heap
page read and write
199F9502000
heap
page read and write
277E819B000
heap
page read and write
22215D00000
heap
page read and write
2123C344000
heap
page read and write
277E7A5B000
heap
page read and write
614000
heap
page read and write
1B921591000
heap
page read and write
277E8193000
heap
page read and write
277E8603000
heap
page read and write
22215F60000
trusted library allocation
page read and write
22215C22000
heap
page read and write
1FA83266000
heap
page read and write
1220FDF0000
heap
page read and write
22215D02000
heap
page read and write
1F36E500000
heap
page read and write
222106AC000
heap
page read and write
2221068D000
heap
page read and write
1F36E51B000
heap
page read and write
C5D0DEB000
stack
page read and write
2221067B000
heap
page read and write
1FA83269000
heap
page read and write
227C95D0000
heap
page read and write
22215CF3000
heap
page read and write
74B75FE000
stack
page read and write
277E819B000
heap
page read and write
1FA8327C000
heap
page read and write
277E815E000
heap
page read and write
1B9215A8000
heap
page read and write
277E7A4A000
heap
page read and write
57AEAFF000
stack
page read and write
277E8162000
heap
page read and write
1F36D6C0000
heap
page read and write
2034EA4C000
heap
page read and write
22215E30000
trusted library allocation
page read and write
6FD60000
unkown
page readonly
1220FE3C000
heap
page read and write
1F36D410000
heap
page read and write
40A000
unkown
page read and write
277E8602000
heap
page read and write
1F36D64E000
heap
page read and write
1ECE6260000
heap
page read and write
2123C342000
heap
page read and write
CFC147E000
stack
page read and write
1FA83246000
heap
page read and write
2123C505000
heap
page read and write
F4DC977000
stack
page read and write
277E8602000
heap
page read and write
277E814E000
heap
page read and write
277E8002000
heap
page read and write
1FA8327B000
heap
page read and write
150F46E1000
heap
page read and write
277E8600000
heap
page read and write
277E7AEC000
heap
page read and write
9C3387E000
stack
page read and write
277E8193000
heap
page read and write
22215970000
trusted library allocation
page read and write
F4DC58F000
stack
page read and write
1220FE7A000
heap
page read and write
22215C2E000
heap
page read and write
277E7AE7000
heap
page read and write
1B921573000
heap
page read and write
1FA830A0000
heap
page read and write
2221063E000
heap
page read and write
1FA83100000
heap
page read and write
227C94FA000
heap
page read and write
227C94A0000
heap
page read and write
199F9C02000
trusted library allocation
page read and write
277E7A53000
heap
page read and write
1B9215BD000
heap
page read and write
1FA83090000
heap
page read and write
1D804840000
heap
page read and write
1F36E41D000
heap
page read and write
277E8162000
heap
page read and write
512617E000
stack
page read and write
150F466C000
heap
page read and write
20AECFE000
stack
page read and write
1B921631000
heap
page read and write
277E7A56000
heap
page read and write
1FA83249000
heap
page read and write
22215B40000
trusted library allocation
page read and write
277E811C000
heap
page read and write
5125B7B000
stack
page read and write
277E8193000
heap
page read and write
22210E02000
heap
page read and write
CFC117F000
stack
page read and write
57AECFF000
stack
page read and write
22215B34000
trusted library allocation
page read and write
1FA83248000
heap
page read and write
1ECE6261000
heap
page read and write
277E8179000
heap
page read and write
277E8621000
heap
page read and write
1F36E46F000
heap
page read and write
277E8163000
heap
page read and write
28BF000
stack
page read and write
1D804760000
heap
page read and write
286A29FD000
heap
page read and write
277E7A4E000
heap
page read and write
1B921E82000
heap
page read and write
150F4664000
heap
page read and write
1B9215CF000
heap
page read and write
22215B50000
trusted library allocation
page read and write
1A710C68000
heap
page read and write
20AEDFB000
stack
page read and write
2A9D57F000
stack
page read and write
286A3540000
trusted library allocation
page read and write
286A29DB000
heap
page read and write
199F943C000
heap
page read and write
1ECE626A000
heap
page read and write
1F36DBB0000
trusted library allocation
page read and write
93B58FF000
stack
page read and write
22215C49000
heap
page read and write
1F36D6A6000
heap
page read and write
1ECE6313000
heap
page read and write
1ECE6308000
heap
page read and write
277E81AC000
heap
page read and write
3190000
trusted library allocation
page read and write
277E8164000
heap
page read and write
99000
stack
page read and write
1F36D600000
heap
page read and write
1ECE6265000
heap
page read and write
22215C13000
heap
page read and write
1FA83302000
heap
page read and write
22215B31000
trusted library allocation
page read and write
1B921573000
heap
page read and write
27BF000
stack
page read and write
277E8162000
heap
page read and write
1F36D62E000
heap
page read and write
1F36DD0C000
heap
page read and write
277E819B000
heap
page read and write
2123C34E000
heap
page read and write
1FA83285000
heap
page read and write
277E8123000
heap
page read and write
286A29F3000
heap
page read and write
1F36D629000
heap
page read and write
277E8162000
heap
page read and write
277E8602000
heap
page read and write
286A2BA5000
heap
page read and write
1F36DC02000
heap
page read and write
277E8193000
heap
page read and write
150F46CC000
heap
page read and write
22215B30000
trusted library allocation
page read and write
1FA83276000
heap
page read and write
87DC27B000
stack
page read and write
2123C336000
heap
page read and write
22210613000
heap
page read and write
CFC167A000
stack
page read and write
277E8173000
heap
page read and write
277E815E000
heap
page read and write
5125C7F000
stack
page read and write
277E817A000
heap
page read and write
277E7A3C000
heap
page read and write
36916FF000
stack
page read and write
22215BF0000
trusted library allocation
page read and write
5125D7B000
stack
page read and write
1B9215A8000
heap
page read and write
227C9360000
heap
page read and write
222106A2000
heap
page read and write
277E8590000
remote allocation
page read and write
87DC2FE000
stack
page read and write
199F9400000
heap
page read and write
22215B54000
trusted library allocation
page read and write
1B921576000
heap
page read and write
1FA8323A000
heap
page read and write
1ECE6252000
heap
page read and write
150F4F13000
heap
page read and write
1F36D5E0000
trusted library allocation
page read and write
22210450000
heap
page read and write
286A2A90000
heap
page read and write
2123C331000
heap
page read and write
277E8602000
heap
page read and write
2123C346000
heap
page read and write
40A000
unkown
page write copy
3691BFE000
stack
page read and write
277E8179000
heap
page read and write
2034EA51000
heap
page read and write
9C3377E000
stack
page read and write
1A710C40000
heap
page read and write
277E8168000
heap
page read and write
22215B10000
trusted library allocation
page read and write
150F46E7000
heap
page read and write
277E7A4B000
heap
page read and write
286A29F8000
heap
page read and write
277E8162000
heap
page read and write
1ECE6286000
heap
page read and write
2A9D47F000
stack
page read and write
277E815B000
heap
page read and write
1D804750000
heap
page read and write
BD6000
heap
page read and write
277E81D0000
heap
page read and write
277E8165000
heap
page read and write
B10000
heap
page read and write
277E8179000
heap
page read and write
222106FF000
heap
page read and write
22210440000
heap
page read and write
370127C000
stack
page read and write
22210672000
heap
page read and write
FB33DF9000
stack
page read and write
277E81BC000
heap
page read and write
1B921E81000
heap
page read and write
277E811A000
heap
page read and write
277E816A000
heap
page read and write
277E817E000
heap
page read and write
277E8162000
heap
page read and write
277E8590000
remote allocation
page read and write
1ECE6190000
heap
page read and write
277E8168000
heap
page read and write
199F9450000
heap
page read and write
1FA83247000
heap
page read and write
2A9D5F8000
stack
page read and write
1B921640000
heap
page read and write
1F36D68C000
heap
page read and write
28CB000
trusted library allocation
page read and write
4D0000
trusted library allocation
page read and write
277E8179000
heap
page read and write
2034EB13000
heap
page read and write
BD0000
heap
page read and write
9C3367C000
stack
page read and write
22210691000
heap
page read and write
C01B17D000
stack
page read and write
1D804902000
heap
page read and write
277E8162000
heap
page read and write
1B921610000
heap
page read and write
1B9215B0000
heap
page read and write
9C32EDC000
stack
page read and write
22215F80000
trusted library allocation
page read and write
C5D127F000
stack
page read and write
C5D167D000
stack
page read and write
408000
unkown
page readonly
512657F000
stack
page read and write
277E7AF9000
heap
page read and write
277E8193000
heap
page read and write
604000
heap
page read and write
2123C347000
heap
page read and write
1F36D66A000
heap
page read and write
277E7A29000
heap
page read and write
22215EA0000
remote allocation
page read and write
369187C000
stack
page read and write
277E7830000
heap
page read and write
2034EA13000
heap
page read and write
C01B87F000
unkown
page read and write
1D804F50000
remote allocation
page read and write
199F9478000
heap
page read and write
1B921581000
heap
page read and write
1B921595000
heap
page read and write
9C333FB000
stack
page read and write
2034F202000
trusted library allocation
page read and write
277E7B16000
heap
page read and write
1ECE6263000
heap
page read and write
199F9513000
heap
page read and write
199F9330000
heap
page read and write
277E81B3000
heap
page read and write
1220FE65000
heap
page read and write
FB33CF9000
stack
page read and write
93B577B000
stack
page read and write
1B921E85000
heap
page read and write
150F4E02000
heap
page read and write
1B921585000
heap
page read and write
277E819B000
heap
page read and write
1FA83243000
heap
page read and write
2123C2C0000
heap
page read and write
22215E20000
trusted library allocation
page read and write
408000
unkown
page readonly
22210F18000
heap
page read and write
1B921E80000
heap
page read and write
277E7A4F000
heap
page read and write
22215E50000
trusted library allocation
page read and write
22210F04000
heap
page read and write
1ECE6290000
heap
page read and write
199F9390000
heap
page read and write
1FA83231000
heap
page read and write
150F4510000
heap
page read and write
36919FB000
stack
page read and write
277E8179000
heap
page read and write
277E819D000
heap
page read and write
1220FD90000
heap
page read and write
286A29D3000
heap
page read and write
222114E0000
trusted library allocation
page read and write
22215B50000
trusted library allocation
page read and write
87DC5FB000
stack
page read and write
1FA83268000
heap
page read and write
150F4713000
heap
page read and write
1FA83277000
heap
page read and write
1FA83245000
heap
page read and write
512647F000
stack
page read and write
1ECE61C0000
trusted library allocation
page read and write
22210E00000
heap
page read and write
286A2BB0000
trusted library allocation
page read and write
1FA83242000
heap
page read and write
1B9215CF000
heap
page read and write
1A710C13000
heap
page read and write
277E8602000
heap
page read and write
2A9D67F000
stack
page read and write
2123C34E000
heap
page read and write
22210702000
heap
page read and write
400000
unkown
page readonly
1FA8323E000
heap
page read and write
277E81C5000
heap
page read and write
427000
unkown
page read and write
87DC7FF000
stack
page read and write
1F36D64C000
heap
page read and write
5125F7D000
stack
page read and write
2034EA4E000
heap
page read and write
22210F58000
heap
page read and write
222106FF000
heap
page read and write
1FA83279000
heap
page read and write
F4DCE7B000
stack
page read and write
5C0000
heap
page read and write
277E814B000
heap
page read and write
2034E890000
heap
page read and write
1A710C71000
heap
page read and write
6FD61000
unkown
page execute read
1F36D7FC000
heap
page read and write
93B57FC000
stack
page read and write
1F36D696000
heap
page read and write
369197D000
stack
page read and write
1B921770000
remote allocation
page read and write
1F36D613000
heap
page read and write
1ECE6120000
heap
page read and write
44B000
unkown
page readonly
1FA83241000
heap
page read and write
150F4600000
heap
page read and write
1F36E402000
heap
page read and write
277E8161000
heap
page read and write
1B92155A000
heap
page read and write
277E815B000
heap
page read and write
286A2970000
heap
page read and write
57AE87B000
stack
page read and write
199F9413000
heap
page read and write
286A37B0000
trusted library allocation
page read and write
57AE8FF000
stack
page read and write
1A710C5C000
heap
page read and write
369157B000
stack
page read and write
2034EB00000
heap
page read and write
1F36E513000
heap
page read and write
22210F18000
heap
page read and write
2034E8A0000
heap
page read and write
277E815D000
heap
page read and write
277E8191000
heap
page read and write
74B74FF000
stack
page read and write
277E8166000
heap
page read and write
277E7A8B000
heap
page read and write
2034EA8C000
heap
page read and write
1F36E400000
heap
page read and write
C01B07B000
stack
page read and write
B14000
heap
page read and write
F4DCD7A000
stack
page read and write
2034EB08000
heap
page read and write
277E81AD000
heap
page read and write
1B921612000
heap
page read and write
199F944A000
heap
page read and write
277E7F90000
trusted library allocation
page read and write
1FA83252000
heap
page read and write
1ECE626B000
heap
page read and write
22215BF0000
trusted library allocation
page read and write
22210E15000
heap
page read and write
1FA83860000
trusted library allocation
page read and write
1FA8326B000
heap
page read and write
22215CA3000
heap
page read and write
2123C320000
heap
page read and write
B40000
heap
page read and write
74B73FE000
stack
page read and write
374D000
stack
page read and write
2034E900000
heap
page read and write
C01B5FE000
stack
page read and write
1ECE6300000
heap
page read and write
2034EB02000
heap
page read and write
1B921581000
heap
page read and write
22215CDD000
heap
page read and write
87DC6F7000
stack
page read and write
57AE38E000
stack
page read and write
22215C70000
trusted library allocation
page read and write
C01B4F7000
stack
page read and write
2123C190000
heap
page read and write
277E819B000
heap
page read and write
1F36D79D000
heap
page read and write
22215CA1000
heap
page read and write
22215C61000
heap
page read and write
286A2830000
heap
page read and write
286A34D0000
trusted library allocation
page read and write
227C94DB000
heap
page read and write
1A710C61000
heap
page read and write
1FA83250000
heap
page read and write
1B921612000
heap
page read and write
277E81AC000
heap
page read and write
277E8100000
heap
page read and write
22210DE1000
trusted library allocation
page read and write
277E8191000
heap
page read and write
1ECE625A000
heap
page read and write
1B9215AB000
heap
page read and write
3691AFD000
stack
page read and write
435000
unkown
page read and write
9C32F5E000
stack
page read and write
1220FF02000
heap
page read and write
22210696000
heap
page read and write
277E819A000
heap
page read and write
22215CAA000
heap
page read and write
57AE30B000
stack
page read and write
1A710D13000
heap
page read and write
4F0000
heap
page read and write
286A29DB000
heap
page read and write
1F36E402000
heap
page read and write
19A000
stack
page read and write
277E8166000
heap
page read and write
93B56FE000
stack
page read and write
1F36D6A9000
heap
page read and write
600000
heap
page read and write
87DC4FE000
stack
page read and write
57AE9F7000
stack
page read and write
1A710BA0000
trusted library allocation
page read and write
ACE000
stack
page read and write
1B921540000
heap
page read and write
286A29DD000
heap
page read and write
22215D04000
heap
page read and write
222104B0000
heap
page read and write
277E8160000
heap
page read and write
74B70FE000
stack
page read and write
74B717E000
stack
page read and write
22211970000
trusted library allocation
page read and write
2034EA53000
heap
page read and write
277E7AB7000
heap
page read and write
1ECE625C000
heap
page read and write
277E7A4C000
heap
page read and write
277E8602000
heap
page read and write
199F944E000
heap
page read and write
1A710C00000
heap
page read and write
C01B2FF000
stack
page read and write
286A2840000
trusted library allocation
page read and write
150F4666000
heap
page read and write
150F4C70000
trusted library allocation
page read and write
2A9D6FC000
stack
page read and write
1F36D6DA000
heap
page read and write
2034EA29000
heap
page read and write
1F36D6B1000
heap
page read and write
277E8191000
heap
page read and write
277E815D000
heap
page read and write
1F36D688000
heap
page read and write
1ECE6264000
heap
page read and write
22215CE2000
heap
page read and write
277E7AA6000
heap
page read and write
512576B000
stack
page read and write
277E7A5A000
heap
page read and write
1FA83255000
heap
page read and write
22215EA0000
remote allocation
page read and write
1B921770000
remote allocation
page read and write
1B921770000
remote allocation
page read and write
F4DC50B000
stack
page read and write
277E81A4000
heap
page read and write
1ECE6A02000
trusted library allocation
page read and write
384E000
stack
page read and write
22215980000
trusted library allocation
page read and write
FB33D7F000
stack
page read and write
1FA8324A000
heap
page read and write
2A9D4FF000
stack
page read and write
277E81AC000
heap
page read and write
277E81BD000
heap
page read and write
CFC177F000
stack
page read and write
22215B40000
trusted library allocation
page read and write
286A3790000
heap
page readonly
1F36DD0A000
heap
page read and write
150F4686000
heap
page read and write
1F36D6BA000
heap
page read and write
150F4642000
heap
page read and write
277E81BE000
heap
page read and write
286A2990000
heap
page read and write
277E7AC5000
heap
page read and write
93B567F000
stack
page read and write
22215A00000
trusted library allocation
page read and write
1B921585000
heap
page read and write
2034EA81000
heap
page read and write
150F4629000
heap
page read and write
1ECE625E000
heap
page read and write
36917FF000
stack
page read and write
C5D157E000
stack
page read and write
1FA83A02000
trusted library allocation
page read and write
277E7A71000
heap
page read and write
1B921790000
heap
page read and write
286A29DB000
heap
page read and write
1B921612000
heap
page read and write
22210F00000
heap
page read and write
150F4F00000
heap
page read and write
28E1000
trusted library allocation
page read and write
1ECE625B000
heap
page read and write
277E77D0000
heap
page read and write
1D804813000
heap
page read and write
2A9D1AA000
stack
page read and write
22210707000
heap
page read and write
1F36D3B0000
heap
page read and write
2123C500000
heap
page read and write
5C8000
heap
page read and write
150F44A0000
heap
page read and write
150F4F3A000
heap
page read and write
5FB000
heap
page read and write
1F36D637000
heap
page read and write
277E7ACC000
heap
page read and write
199F9471000
heap
page read and write
277E816E000
heap
page read and write
1D804F50000
remote allocation
page read and write
1F36E40C000
heap
page read and write
1ECE625D000
heap
page read and write
1F36D650000
heap
page read and write
FB33C7D000
stack
page read and write
1D8047F0000
trusted library allocation
page read and write
277E8162000
heap
page read and write
FB338CB000
stack
page read and write
12210602000
trusted library allocation
page read and write
2034F060000
trusted library allocation
page read and write
277E81BC000
heap
page read and write
1B92162D000
heap
page read and write
277E815C000
heap
page read and write
1220FE28000
heap
page read and write
1B921591000
heap
page read and write
286A3530000
trusted library allocation
page read and write
277E8175000
heap
page read and write
401000
unkown
page execute read
222106AF000
heap
page read and write
9C33577000
stack
page read and write
93B538A000
stack
page read and write
87DC37D000
stack
page read and write
2034EA83000
heap
page read and write
1220FE02000
heap
page read and write
227C96B5000
heap
page read and write
93B587D000
stack
page read and write
1F36D67B000
heap
page read and write
277E7A13000
heap
page read and write
1B921575000
heap
page read and write
1F36D3C0000
heap
page read and write
22210F02000
heap
page read and write
277E8163000
heap
page read and write
1A711402000
trusted library allocation
page read and write
1220FD80000
heap
page read and write
1ECE6213000
heap
page read and write
277E77C0000
heap
page read and write
1220FF00000
heap
page read and write
1FA83253000
heap
page read and write
1F36D7E0000
heap
page read and write
1220FE13000
heap
page read and write
BB0000
trusted library allocation
page read and write
CFC137A000
stack
page read and write
1F36D6CB000
heap
page read and write
57AEBFD000
stack
page read and write
277E8173000
heap
page read and write
C5D10FE000
stack
page read and write
F4DCB7A000
stack
page read and write
1B921548000
heap
page read and write
512607D000
stack
page read and write
512627F000
stack
page read and write
277E819D000
heap
page read and write
277E7B13000
heap
page read and write
277E8162000
heap
page read and write
22215E00000
trusted library allocation
page read and write
277E8602000
heap
page read and write
20AEBFF000
stack
page read and write
286A37A0000
trusted library allocation
page read and write
199F9508000
heap
page read and write
1FA83229000
heap
page read and write
1220FE69000
heap
page read and write
277E81AC000
heap
page read and write
1B921571000
heap
page read and write
1ECE6130000
heap
page read and write
1A710D02000
heap
page read and write
30000
heap
page read and write
74B707C000
stack
page read and write
C01B0FE000
stack
page read and write
1B921510000
heap
page read and write
22211963000
trusted library allocation
page read and write
277E8194000
heap
page read and write
1A710C74000
heap
page read and write
22210714000
heap
page read and write
22215E40000
trusted library allocation
page read and write
277E8191000
heap
page read and write
C01B7F8000
stack
page read and write
1F36DDEF000
heap
page read and write
1B9215BD000
heap
page read and write
369115B000
stack
page read and write
22210678000
heap
page read and write
2034EA71000
heap
page read and write
286A34C0000
trusted library allocation
page read and write
93B597F000
stack
page read and write
F4DCA79000
stack
page read and write
199F9500000
heap
page read and write
277E8188000
heap
page read and write
277E7A58000
heap
page read and write
22215C54000
heap
page read and write
1FA83254000
heap
page read and write
57AE67E000
stack
page read and write
3691CFC000
stack
page read and write
22211960000
trusted library allocation
page read and write
400000
unkown
page readonly
1F36D69E000
heap
page read and write
2123C360000
heap
page read and write
150F46C4000
heap
page read and write
1220FF13000
heap
page read and write
277E7B02000
heap
page read and write
1B921631000
heap
page read and write
F4DCC7F000
stack
page read and write
199F9429000
heap
page read and write
1D805002000
trusted library allocation
page read and write
1D8047C0000
heap
page read and write
277E81A4000
heap
page read and write
1F36E454000
heap
page read and write
1B921610000
heap
page read and write
277E7A00000
heap
page read and write
512637F000
stack
page read and write
277E7A54000
heap
page read and write
277E7AB3000
heap
page read and write
CFC0D4C000
stack
page read and write
1B921795000
heap
page read and write
1220FE7F000
heap
page read and write
22215C60000
trusted library allocation
page read and write
B0E000
stack
page read and write
2123C35F000
heap
page read and write
1B921610000
heap
page read and write
277E81B2000
heap
page read and write
1F36D6E4000
heap
page read and write
277E81AC000
heap
page read and write
1D804829000
heap
page read and write
1FA83280000
heap
page read and write
22210F13000
heap
page read and write
1A710B10000
heap
page read and write
BA0000
trusted library allocation
page read and write
2123C336000
heap
page read and write
1A710B00000
heap
page read and write
22210600000
heap
page read and write
1F36D7B7000
heap
page read and write
1220FE55000
heap
page read and write
199F9448000
heap
page read and write
22210657000
heap
page read and write
1A710B70000
heap
page read and write
1F36DDD2000
heap
page read and write
22215B10000
trusted library allocation
page read and write
2123C34E000
heap
page read and write
1FA8327D000
heap
page read and write
1ECE6302000
heap
page read and write
150F44B0000
heap
page read and write
1F36D654000
heap
page read and write
150F46BD000
heap
page read and write
1220FE00000
heap
page read and write
1ECE6229000
heap
page read and write
286A29F9000
heap
page read and write
1B921595000
heap
page read and write
22215CF9000
heap
page read and write
12210550000
trusted library allocation
page read and write
2123C2E0000
heap
page read and write
1F36D6C9000
heap
page read and write
150F4702000
heap
page read and write
44B000
unkown
page readonly
277E8174000
heap
page read and write
1F36DD5A000
heap
page read and write
37014FB000
stack
page read and write
1B9215CF000
heap
page read and write
C01B3F7000
stack
page read and write
22215EA0000
remote allocation
page read and write
1B921632000
heap
page read and write
2034EA00000
heap
page read and write
6FD66000
unkown
page readonly
370147F000
stack
page read and write
286A2998000
heap
page read and write
87DC47C000
stack
page read and write
227C94D0000
heap
page read and write
9C32FDE000
stack
page read and write
1FA83251000
heap
page read and write
1B92156C000
heap
page read and write
1ECE6200000
heap
page read and write
F4DD47F000
stack
page read and write
1F36E502000
heap
page read and write
CFC127C000
stack
page read and write
1FA83200000
heap
page read and write
1A710C29000
heap
page read and write
227C96B0000
heap
page read and write
1F36D674000
heap
page read and write
277E7AAD000
heap
page read and write
286A3800000
trusted library allocation
page read and write
277E7A85000
heap
page read and write
22210629000
heap
page read and write
CFC157D000
stack
page read and write
22215C00000
heap
page read and write
1F36E443000
heap
page read and write
1B9213D0000
heap
page read and write
22215B1E000
trusted library allocation
page read and write
1F36D713000
heap
page read and write
277E817F000
heap
page read and write
There are 731 hidden memdumps, click here to show them.