IOC Report
67AzzNNioP.exe

loading gif

Files

File Path
Type
Category
Malicious
67AzzNNioP.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\Desktop\AIO.exe
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\Desktop\download.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 236x213, frames 3
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\67AzzNNioP.exe
"C:\Users\user\Desktop\67AzzNNioP.exe"
malicious
C:\Users\user\Desktop\AIO.exe
"C:\Users\user\Desktop\AIO.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

IPs

IP
Domain
Country
Malicious
185.25.204.244
unknown
Italy

Memdumps

Base Address
Regiontype
Protect
Malicious
56DD000
trusted library allocation
page read and write
C1D0000
trusted library allocation
page read and write
EB627FE000
stack
page read and write
F30000
unkown
page readonly
56D9000
trusted library allocation
page read and write
C1D0000
trusted library allocation
page read and write
C1D2000
trusted library allocation
page read and write
B7C1000
trusted library allocation
page read and write
1EF36629000
heap
page read and write
12FE8AC0000
trusted library allocation
page read and write
5926000
trusted library allocation
page read and write
2A17B002000
trusted library allocation
page read and write
21E000
unkown
page write copy
12FE7053000
heap
page read and write
C000102000
direct allocation
page read and write
12FE7048000
heap
page read and write
189239E0000
trusted library allocation
page read and write
56D9000
trusted library allocation
page read and write
56E1000
trusted library allocation
page read and write
1668C478000
heap
page read and write
C1E1000
trusted library allocation
page read and write
ABAE000
stack
page read and write
1668C42A000
heap
page read and write
CFF1EFF000
stack
page read and write
1668C469000
heap
page read and write
C1B5000
trusted library allocation
page read and write
C00006E000
direct allocation
page read and write
C215000
trusted library allocation
page read and write
C1DF000
trusted library allocation
page read and write
EB629FF000
stack
page read and write
56F7000
trusted library allocation
page read and write
12FE7118000
heap
page read and write
C381C7D000
stack
page read and write
130C000
unkown
page write copy
56F5000
trusted library allocation
page read and write
19E5F313000
heap
page read and write
1E0000
unkown
page readonly
2DD5000
heap
page read and write
570D000
trusted library allocation
page read and write
26C3DA89000
heap
page read and write
482A7FB000
stack
page read and write
29E7000
stack
page read and write
C000035000
direct allocation
page read and write
1060000
unkown
page readonly
5706000
trusted library allocation
page read and write
C1C5000
trusted library allocation
page read and write
B883000
trusted library allocation
page read and write
C1E1000
trusted library allocation
page read and write
120A000
unkown
page readonly
2DF6000
heap
page read and write
F30000
unkown
page readonly
CFF21FF000
stack
page read and write
C1C5000
trusted library allocation
page read and write
C1D2000
trusted library allocation
page read and write
5924000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
B883000
trusted library allocation
page read and write
56D9000
trusted library allocation
page read and write
C1D0000
trusted library allocation
page read and write
2E42000
heap
page read and write
C1BA000
trusted library allocation
page read and write
520D000
stack
page read and write
2E3B000
heap
page read and write
11AC000
unkown
page read and write
C381D7E000
stack
page read and write
56E1000
trusted library allocation
page read and write
1668C450000
heap
page read and write
56DB000
trusted library allocation
page read and write
C1E1000
trusted library allocation
page read and write
2E4C000
heap
page read and write
B7C0000
trusted library allocation
page read and write
56ED000
trusted library allocation
page read and write
282DD7E000
stack
page read and write
C1CA000
trusted library allocation
page read and write
19E5F202000
heap
page read and write
C000027000
direct allocation
page read and write
C1B1000
trusted library allocation
page read and write
C1CA000
trusted library allocation
page read and write
56C0000
trusted library allocation
page read and write
B915000
trusted library allocation
page read and write
26C3D960000
trusted library allocation
page read and write
C00012A000
direct allocation
page read and write
26C3E302000
heap
page read and write
C1E1000
trusted library allocation
page read and write
56FE000
trusted library allocation
page read and write
50B7000
trusted library allocation
page read and write
C1D2000
trusted library allocation
page read and write
19E5F1F0000
heap
page read and write
31FE000
stack
page read and write
26C3DBE5000
heap
page read and write
CFF1B7B000
stack
page read and write
22F9918D000
direct allocation
page read and write
C48C000
trusted library allocation
page read and write
12FE8A70000
trusted library allocation
page read and write
2A17AA50000
heap
page read and write
56DE000
trusted library allocation
page read and write
2A17AB13000
heap
page read and write
2E24000
heap
page read and write
EA6C0FD000
stack
page read and write
56C0000
trusted library allocation
page read and write
C1D2000
trusted library allocation
page read and write
26C3DA50000
heap
page read and write
5526000
heap
page read and write
2E85000
heap
page read and write
C1D0000
trusted library allocation
page read and write
B917000
trusted library allocation
page read and write
22F98EC0000
heap
page read and write
1668C44A000
heap
page read and write
C1BA000
trusted library allocation
page read and write
263000
unkown
page readonly
CFF170B000
stack
page read and write
C1AB000
trusted library allocation
page read and write
26C3E430000
heap
page read and write
56D1000
trusted library allocation
page read and write
2E08000
heap
page read and write
EB62BFE000
stack
page read and write
2E5F000
heap
page read and write
282D96E000
stack
page read and write
CFF20FF000
stack
page read and write
C1B1000
trusted library allocation
page read and write
C1DF000
trusted library allocation
page read and write
12FE7113000
heap
page read and write
2E13000
heap
page read and write
2E68000
heap
page read and write
22F98F50000
heap
page read and write
282DE7E000
stack
page read and write
2EA0000
heap
page read and write
1668C1E0000
heap
page read and write
2E08000
heap
page read and write
213000
unkown
page readonly
C000004000
direct allocation
page read and write
339B000
heap
page read and write
2E62000
heap
page read and write
C1CA000
trusted library allocation
page read and write
2E32000
heap
page read and write
5060000
heap
page read and write
1EF366CA000
heap
page read and write
C1DF000
trusted library allocation
page read and write
C0000A8000
direct allocation
page read and write
2A17AA00000
heap
page read and write
56B2000
trusted library allocation
page read and write
C1D2000
trusted library allocation
page read and write
56C0000
trusted library allocation
page read and write
213000
unkown
page readonly
B883000
trusted library allocation
page read and write
2E24000
heap
page read and write
26C3DA29000
heap
page read and write
505A000
trusted library allocation
page read and write
12FE704D000
heap
page read and write
12FE7057000
heap
page read and write
CFF23FE000
stack
page read and write
26C3DA70000
heap
page read and write
56D1000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
56D9000
trusted library allocation
page read and write
C0000A0000
direct allocation
page read and write
C1DA000
trusted library allocation
page read and write
19E5FA02000
trusted library allocation
page read and write
12FE6F70000
heap
page read and write
C225000
trusted library allocation
page read and write
772E000
stack
page read and write
ADD2CFA000
stack
page read and write
56D5000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
2ADBDD02000
heap
page read and write
CFF1CFF000
stack
page read and write
C00000E000
direct allocation
page read and write
2E4F000
heap
page read and write
19E5F27B000
heap
page read and write
4F00000
trusted library allocation
page read and write
56DF000
trusted library allocation
page read and write
EA6C37D000
stack
page read and write
56B8000
trusted library allocation
page read and write
1EF366B9000
heap
page read and write
56D1000
trusted library allocation
page read and write
56C4000
trusted library allocation
page read and write
C000104000
direct allocation
page read and write
570E000
trusted library allocation
page read and write
C1D0000
trusted library allocation
page read and write
56D9000
trusted library allocation
page read and write
56D9000
trusted library allocation
page read and write
244000
unkown
page readonly
26C3E423000
heap
page read and write
56AB000
trusted library allocation
page read and write
C215000
trusted library allocation
page read and write
B8E5000
trusted library allocation
page read and write
C1DF000
trusted library allocation
page read and write
2ADBDBD0000
remote allocation
page read and write
2B71C7F000
stack
page read and write
C1CA000
trusted library allocation
page read and write
3398000
heap
page read and write
56E1000
trusted library allocation
page read and write
C1D0000
trusted library allocation
page read and write
548E000
stack
page read and write
C1D2000
trusted library allocation
page read and write
12FE7047000
heap
page read and write
C1CA000
trusted library allocation
page read and write
2E4D000
heap
page read and write
C1D7000
trusted library allocation
page read and write
2D90000
heap
page read and write
2E40000
heap
page read and write
C3F8000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
2DF9000
heap
page read and write
2E24000
heap
page read and write
12FE7058000
heap
page read and write
C1C5000
trusted library allocation
page read and write
2E87000
heap
page read and write
1EF36E02000
heap
page read and write
C000096000
direct allocation
page read and write
11AA000
unkown
page read and write
1EF3663D000
heap
page read and write
30BE000
stack
page read and write
2E87000
heap
page read and write
C1D2000
trusted library allocation
page read and write
C1DF000
trusted library allocation
page read and write
282D9EE000
stack
page read and write
2EA5000
heap
page read and write
56D9000
trusted library allocation
page read and write
26C3DB13000
heap
page read and write
120A000
unkown
page readonly
CFF1DFB000
stack
page read and write
1EF36F00000
heap
page read and write
19E5F200000
heap
page read and write
12FE706E000
heap
page read and write
C5E8000
trusted library allocation
page read and write
26C3DB98000
heap
page read and write
22F98FB0000
heap
page read and write
B821000
trusted library allocation
page read and write
12FE711C000
heap
page read and write
26C3DA43000
heap
page read and write
C1BF000
trusted library allocation
page read and write
56EF000
trusted library allocation
page read and write
C1E1000
trusted library allocation
page read and write
2E42000
heap
page read and write
B822000
trusted library allocation
page read and write
2E87000
heap
page read and write
56E4000
trusted library allocation
page read and write
56DD000
trusted library allocation
page read and write
2E24000
heap
page read and write
2E69000
heap
page read and write
2CCB000
stack
page read and write
56E1000
trusted library allocation
page read and write
1668C46D000
heap
page read and write
C270000
trusted library allocation
page read and write
C215000
trusted library allocation
page read and write
1668C448000
heap
page read and write
12FE7048000
heap
page read and write
C1DF000
trusted library allocation
page read and write
544E000
stack
page read and write
C1BF000
trusted library allocation
page read and write
C000020000
direct allocation
page read and write
18923A02000
heap
page read and write
C1DF000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
18923A46000
heap
page read and write
2E3F000
heap
page read and write
56DE000
trusted library allocation
page read and write
C000116000
direct allocation
page read and write
2A17AB02000
heap
page read and write
2B719FC000
stack
page read and write
C000018000
direct allocation
page read and write
C1E1000
trusted library allocation
page read and write
C1B1000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
26C3E300000
heap
page read and write
56E6000
trusted library allocation
page read and write
482A9FE000
stack
page read and write
56E8000
trusted library allocation
page read and write
2E3E000
heap
page read and write
570F000
trusted library allocation
page read and write
C000140000
direct allocation
page read and write
26C3E427000
heap
page read and write
EA6BC7F000
stack
page read and write
2E85000
heap
page read and write
56AB000
trusted library allocation
page read and write
1668C47F000
heap
page read and write
56D1000
trusted library allocation
page read and write
C000100000
direct allocation
page read and write
56D9000
trusted library allocation
page read and write
C1B1000
trusted library allocation
page read and write
26C3DA00000
heap
page read and write
ADD267B000
stack
page read and write
EA6BEFF000
stack
page read and write
56D9000
trusted library allocation
page read and write
2E00000
heap
page read and write
56E7000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
B7F0000
trusted library allocation
page read and write
1204000
unkown
page read and write
2ADBDC13000
heap
page read and write
C1B1000
trusted library allocation
page read and write
C1CB000
trusted library allocation
page read and write
2E5E000
heap
page read and write
6CC0000
trusted library allocation
page read and write
75F0000
heap
page read and write
26C3DA57000
heap
page read and write
2A17A9D0000
trusted library allocation
page read and write
26C3E202000
heap
page read and write
C1E1000
trusted library allocation
page read and write
56D5000
trusted library allocation
page read and write
C1D0000
trusted library allocation
page read and write
C2CE000
trusted library allocation
page read and write
2CF2000
stack
page read and write
C1C5000
trusted library allocation
page read and write
56CF000
trusted library allocation
page read and write
22F99180000
direct allocation
page read and write
56CE000
trusted library allocation
page read and write
2E46000
heap
page read and write
C1E5000
trusted library allocation
page read and write
C1E1000
trusted library allocation
page read and write
2E8C000
heap
page read and write
26C3E402000
heap
page read and write
5040000
trusted library allocation
page read and write
56D9000
trusted library allocation
page read and write
1668C447000
heap
page read and write
B7F1000
trusted library allocation
page read and write
56D9000
trusted library allocation
page read and write
EB62DFF000
stack
page read and write
2ADBDBA0000
trusted library allocation
page read and write
5684000
trusted library allocation
page read and write
22F98F60000
heap
page read and write
C1C5000
trusted library allocation
page read and write
56E5000
trusted library allocation
page read and write
C000060000
direct allocation
page read and write
2A17A7A0000
heap
page read and write
26C3DA5A000
heap
page read and write
11AB000
unkown
page write copy
12FE8B80000
remote allocation
page read and write
26C3E36D000
heap
page read and write
18923B02000
heap
page read and write
2DE5000
heap
page read and write
C280000
trusted library allocation
page read and write
2E30000
heap
page read and write
1E1000
unkown
page execute read
C38167B000
stack
page read and write
1668C502000
heap
page read and write
C67D000
trusted library allocation
page read and write
1668C466000
heap
page read and write
2E3D000
heap
page read and write
2CD8000
stack
page read and write
2E6D000
heap
page read and write
56D0000
trusted library allocation
page read and write
C1A3000
trusted library allocation
page read and write
C1B1000
trusted library allocation
page read and write
506B6AC000
stack
page read and write
C1C5000
trusted library allocation
page read and write
26C3E343000
heap
page read and write
2E6D000
heap
page read and write
56CD000
trusted library allocation
page read and write
56DE000
trusted library allocation
page read and write
C00005D000
direct allocation
page read and write
1060000
unkown
page readonly
2E4C000
heap
page read and write
2E87000
heap
page read and write
56AD000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
56E4000
trusted library allocation
page read and write
2E3D000
heap
page read and write
2ADBDB70000
heap
page read and write
2E51000
heap
page read and write
50BE000
stack
page read and write
C1D2000
trusted library allocation
page read and write
56D9000
trusted library allocation
page read and write
2E2D000
heap
page read and write
286000
unkown
page readonly
4D90000
heap
page read and write
2A17AA3D000
heap
page read and write
56DF000
trusted library allocation
page read and write
2E4D000
heap
page read and write
18923A13000
heap
page read and write
56E4000
trusted library allocation
page read and write
2E69000
heap
page read and write
C1D7000
trusted library allocation
page read and write
C1DF000
trusted library allocation
page read and write
18923A00000
heap
page read and write
56E4000
trusted library allocation
page read and write
2DC7000
heap
page read and write
56D5000
trusted library allocation
page read and write
2E2E000
heap
page read and write
56D1000
trusted library allocation
page read and write
26C3D8D0000
heap
page read and write
56DF000
trusted library allocation
page read and write
C218000
trusted library allocation
page read and write
C1E3000
trusted library allocation
page read and write
1EF36613000
heap
page read and write
C215000
trusted library allocation
page read and write
C00003A000
direct allocation
page read and write
19E5F268000
heap
page read and write
2E31000
heap
page read and write
56D5000
trusted library allocation
page read and write
50DA000
trusted library allocation
page read and write
C1AB000
trusted library allocation
page read and write
2E62000
heap
page read and write
C648000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
EA6C17E000
stack
page read and write
56B0000
trusted library allocation
page read and write
C1D2000
trusted library allocation
page read and write
C1D0000
trusted library allocation
page read and write
12FE7100000
heap
page read and write
1668C44F000
heap
page read and write
26C3E3D2000
heap
page read and write
56D9000
trusted library allocation
page read and write
56B5000
trusted library allocation
page read and write
56AD000
trusted library allocation
page read and write
2E3E000
heap
page read and write
12FE7089000
heap
page read and write
2D50000
trusted library allocation
page readonly
C1DF000
trusted library allocation
page read and write
2B715CB000
stack
page read and write
124E000
unkown
page readonly
2E51000
heap
page read and write
22F98FB8000
heap
page read and write
1668C475000
heap
page read and write
56E1000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
2A17AA73000
heap
page read and write
5670000
trusted library allocation
page read and write
2ADBDB00000
heap
page read and write
2A17AA70000
heap
page read and write
26C3E390000
heap
page read and write
C1DF000
trusted library allocation
page read and write
26C3DA2F000
heap
page read and write
2CCD000
stack
page read and write
56FE000
trusted library allocation
page read and write
2A17A790000
heap
page read and write
26C3DA13000
heap
page read and write
C161000
trusted library allocation
page read and write
570D000
trusted library allocation
page read and write
C38197E000
stack
page read and write
19E5F264000
heap
page read and write
26C3D980000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
2E00000
heap
page read and write
5696000
trusted library allocation
page read and write
1EF365C0000
trusted library allocation
page read and write
BBEF000
stack
page read and write
C1D2000
trusted library allocation
page read and write
1668C47C000
heap
page read and write
56DB000
trusted library allocation
page read and write
1668C47E000
heap
page read and write
26C3E322000
heap
page read and write
C00003C000
direct allocation
page read and write
ADD2AF9000
stack
page read and write
282DF7E000
stack
page read and write
1EF36688000
heap
page read and write
56C0000
trusted library allocation
page read and write
C381F7E000
stack
page read and write
56B8000
trusted library allocation
page read and write
2A17AA25000
heap
page read and write
5523000
heap
page read and write
2E24000
heap
page read and write
56DD000
trusted library allocation
page read and write
2E44000
heap
page read and write
56AB000
trusted library allocation
page read and write
19E5F213000
heap
page read and write
56D9000
trusted library allocation
page read and write
56D5000
trusted library allocation
page read and write
56DF000
trusted library allocation
page read and write
C1BA000
trusted library allocation
page read and write
56B8000
trusted library allocation
page read and write
1668C476000
heap
page read and write
56DB000
trusted library allocation
page read and write
2E89000
heap
page read and write
CFF22FF000
stack
page read and write
C000025000
direct allocation
page read and write
2A17AA13000
heap
page read and write
22F98F30000
heap
page read and write
EA6BFFF000
stack
page read and write
18923A43000
heap
page read and write
56D9000
trusted library allocation
page read and write
2DD1000
heap
page read and write
2E8C000
heap
page read and write
56D9000
trusted library allocation
page read and write
C224000
trusted library allocation
page read and write
12F9000
unkown
page readonly
22FBEBF0000
direct allocation
page read and write
12FE7000000
heap
page read and write
56DE000
trusted library allocation
page read and write
56DD000
trusted library allocation
page read and write
26C3E354000
heap
page read and write
1192000
unkown
page read and write
3390000
heap
page read and write
2E27000
heap
page read and write
C1E1000
trusted library allocation
page read and write
2E4C000
heap
page read and write
C00013E000
direct allocation
page read and write
C00009C000
direct allocation
page read and write
5050000
trusted library allocation
page read and write
C000022000
direct allocation
page read and write
C000002000
direct allocation
page read and write
56DD000
trusted library allocation
page read and write
26C3DA3D000
heap
page read and write
ADD297F000
stack
page read and write
2E6D000
heap
page read and write
263000
unkown
page readonly
1EF36520000
heap
page read and write
18923A29000
heap
page read and write
2E3D000
heap
page read and write
C225000
trusted library allocation
page read and write
2E4C000
heap
page read and write
1EF36665000
heap
page read and write
56CD000
trusted library allocation
page read and write
2B71F7D000
stack
page read and write
C1DF000
trusted library allocation
page read and write
C000016000
direct allocation
page read and write
2E62000
heap
page read and write
C000076000
direct allocation
page read and write
2E8C000
heap
page read and write
2ADBDC02000
heap
page read and write
22F98FBF000
heap
page read and write
2E6D000
heap
page read and write
1668C42E000
heap
page read and write
C00001A000
direct allocation
page read and write
C1C5000
trusted library allocation
page read and write
2DFA000
heap
page read and write
18923A30000
heap
page read and write
56D1000
trusted library allocation
page read and write
26C3E322000
heap
page read and write
19E5F25E000
heap
page read and write
56D9000
trusted library allocation
page read and write
56E1000
trusted library allocation
page read and write
C400000
trusted library allocation
page read and write
130D000
unkown
page readonly
1668C413000
heap
page read and write
2E40000
heap
page read and write
C000134000
direct allocation
page read and write
12FE8B00000
trusted library allocation
page read and write
505D000
trusted library allocation
page read and write
2E24000
heap
page read and write
19E5F302000
heap
page read and write
1EF36F32000
heap
page read and write
2DB8000
heap
page read and write
2ADBDC29000
heap
page read and write
C218000
trusted library allocation
page read and write
2DD1000
heap
page read and write
2E42000
heap
page read and write
C00011C000
direct allocation
page read and write
ADD287B000
stack
page read and write
56D1000
trusted library allocation
page read and write
56DE000
trusted library allocation
page read and write
B842000
trusted library allocation
page read and write
C1D0000
trusted library allocation
page read and write
2E8D000
heap
page read and write
56B4000
trusted library allocation
page read and write
570D000
trusted library allocation
page read and write
C000126000
direct allocation
page read and write
2DE3000
heap
page read and write
482AAFB000
stack
page read and write
30FD000
stack
page read and write
B8E4000
trusted library allocation
page read and write
2FBE000
stack
page read and write
12FE7013000
heap
page read and write
C1BF000
trusted library allocation
page read and write
C000050000
direct allocation
page read and write
19E5F180000
heap
page read and write
2ADBDB10000
heap
page read and write
12FE7002000
heap
page read and write
2E32000
heap
page read and write
C00012E000
direct allocation
page read and write
BD5D000
stack
page read and write
56DD000
trusted library allocation
page read and write
26C3E3BD000
heap
page read and write
19E5F228000
heap
page read and write
B8B3000
trusted library allocation
page read and write
7FE31000
trusted library allocation
page execute read
EA6B98C000
stack
page read and write
C000030000
direct allocation
page read and write
12FE8B80000
remote allocation
page read and write
C5F8000
trusted library allocation
page read and write
99FC000
stack
page read and write
2E32000
heap
page read and write
C00009A000
direct allocation
page read and write
C381AFD000
stack
page read and write
56D1000
trusted library allocation
page read and write
EB625FF000
stack
page read and write
18924002000
trusted library allocation
page read and write
189237C0000
heap
page read and write
26C3DA85000
heap
page read and write
506BCFE000
stack
page read and write
B840000
trusted library allocation
page read and write
56DE000
trusted library allocation
page read and write
242000
unkown
page read and write
C1BF000
trusted library allocation
page read and write
12FE8B80000
remote allocation
page read and write
C1BF000
trusted library allocation
page read and write
2E2E000
heap
page read and write
534C000
stack
page read and write
C1DF000
trusted library allocation
page read and write
56D5000
trusted library allocation
page read and write
26C3DA91000
heap
page read and write
56CD000
trusted library allocation
page read and write
482A2CB000
stack
page read and write
124E000
unkown
page readonly
C1DF000
trusted library allocation
page read and write
26C3E413000
heap
page read and write
C000037000
direct allocation
page read and write
56D1000
trusted library allocation
page read and write
26C3DA90000
heap
page read and write
22FBEAC8000
direct allocation
page read and write
C1BF000
trusted library allocation
page read and write
2E51000
heap
page read and write
2E44000
heap
page read and write
2E62000
heap
page read and write
2E44000
heap
page read and write
1668C484000
heap
page read and write
22FBEAE0000
direct allocation
page read and write
CFF24FF000
stack
page read and write
2E00000
heap
page read and write
5696000
trusted library allocation
page read and write
C000124000
direct allocation
page read and write
C1D0000
trusted library allocation
page read and write
5701000
trusted library allocation
page read and write
1668C441000
heap
page read and write
2E47000
heap
page read and write
2DF7000
heap
page read and write
B7C0000
trusted library allocation
page read and write
2E62000
heap
page read and write
26C3DA77000
heap
page read and write
56D1000
trusted library allocation
page read and write
18923A3C000
heap
page read and write
C1E1000
trusted library allocation
page read and write
22F98F54000
heap
page read and write
26C3DBB9000
heap
page read and write
EB621FD000
stack
page read and write
2ADBDBD0000
remote allocation
page read and write
2DCB000
heap
page read and write
56AE000
trusted library allocation
page read and write
C1D7000
trusted library allocation
page read and write
1EF3666D000
heap
page read and write
1EF366C4000
heap
page read and write
56D1000
trusted library allocation
page read and write
C0000AA000
direct allocation
page read and write
1668C446000
heap
page read and write
56D9000
trusted library allocation
page read and write
2E8C000
heap
page read and write
282E07F000
stack
page read and write
1192000
unkown
page write copy
2DE6000
heap
page read and write
2E6D000
heap
page read and write
1668CC02000
trusted library allocation
page read and write
C1D2000
trusted library allocation
page read and write
566F000
stack
page read and write
ABC4000
trusted library allocation
page read and write
C00010E000
direct allocation
page read and write
2E40000
heap
page read and write
26C3E3B1000
heap
page read and write
56DD000
trusted library allocation
page read and write
1668C42F000
heap
page read and write
B917000
trusted library allocation
page read and write
56ED000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
56E3000
trusted library allocation
page read and write
56DF000
trusted library allocation
page read and write
592F000
trusted library allocation
page read and write
2E42000
heap
page read and write
50DC000
trusted library allocation
page read and write
ADD2E7E000
stack
page read and write
C265000
trusted library allocation
page read and write
18923810000
heap
page read and write
1668C43B000
heap
page read and write
2A17A800000
heap
page read and write
2E00000
heap
page read and write
26C3E400000
heap
page read and write
56E0000
trusted library allocation
page read and write
2E87000
heap
page read and write
21E000
unkown
page read and write
1E0000
unkown
page readonly
4DF0000
heap
page read and write
4DF4000
heap
page read and write
1EF36624000
heap
page read and write
C000136000
direct allocation
page read and write
C160000
trusted library allocation
page read and write
2E4D000
heap
page read and write
EB623FF000
stack
page read and write
C5F5000
trusted library allocation
page read and write
56B8000
trusted library allocation
page read and write
56E1000
trusted library allocation
page read and write
2B71D7E000
stack
page read and write
C000054000
direct allocation
page read and write
288000
unkown
page readonly
130D000
unkown
page readonly
C1E1000
trusted library allocation
page read and write
130C000
unkown
page write copy
C00000C000
direct allocation
page read and write
56ED000
trusted library allocation
page read and write
1E1000
unkown
page execute read
11DD000
unkown
page read and write
2E42000
heap
page read and write
C00013A000
direct allocation
page read and write
1EF36702000
heap
page read and write
C1D7000
trusted library allocation
page read and write
C1C0000
trusted library allocation
page read and write
2E44000
heap
page read and write
2E30000
heap
page read and write
56D1000
trusted library allocation
page read and write
C1A8000
trusted library allocation
page read and write
2E30000
heap
page read and write
2E10000
heap
page read and write
12FE6F60000
heap
page read and write
1668C400000
heap
page read and write
12FE7062000
heap
page read and write
C407000
trusted library allocation
page read and write
12FE8A90000
trusted library allocation
page read and write
11A7000
unkown
page write copy
12FE702A000
heap
page read and write
26C3D930000
heap
page read and write
56D9000
trusted library allocation
page read and write
C161000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
1668C1F0000
heap
page read and write
19E5F240000
heap
page read and write
56AB000
trusted library allocation
page read and write
243000
unkown
page write copy
5673000
trusted library allocation
page read and write
19E5F190000
heap
page read and write
12FE6FD0000
heap
page read and write
B7F0000
trusted library allocation
page read and write
12FE7058000
heap
page read and write
56E1000
trusted library allocation
page read and write
56E4000
trusted library allocation
page read and write
56EE000
trusted library allocation
page read and write
1EF36713000
heap
page read and write
19E5F950000
trusted library allocation
page read and write
243000
unkown
page readonly
56B8000
trusted library allocation
page read and write
56E1000
trusted library allocation
page read and write
22F99189000
direct allocation
page read and write
C000108000
direct allocation
page read and write
2CDE000
stack
page read and write
26C3D8C0000
heap
page read and write
B853000
trusted library allocation
page read and write
2ADBDC3C000
heap
page read and write
2ADBDC51000
heap
page read and write
2E3B000
heap
page read and write
C000045000
direct allocation
page read and write
2B71B7F000
stack
page read and write
2E51000
heap
page read and write
C000012000
direct allocation
page read and write
506BDFF000
stack
page read and write
12FE8C02000
trusted library allocation
page read and write
56B5000
trusted library allocation
page read and write
56B8000
trusted library allocation
page read and write
2DCB000
heap
page read and write
C16D000
trusted library allocation
page read and write
288000
unkown
page readonly
2ADBDBD0000
remote allocation
page read and write
C1DF000
trusted library allocation
page read and write
56AD000
trusted library allocation
page read and write
2D60000
trusted library allocation
page read and write
7FE50000
trusted library allocation
page execute read
1668C46E000
heap
page read and write
22F99184000
direct allocation
page read and write
C000006000
direct allocation
page read and write
2E4C000
heap
page read and write
2980000
heap
page read and write
2A17AA29000
heap
page read and write
2DB5000
heap
page read and write
2E6D000
heap
page read and write
1668C470000
heap
page read and write
12FE703D000
heap
page read and write
56FE000
trusted library allocation
page read and write
2D97000
heap
page read and write
C19F000
trusted library allocation
page read and write
22F9918B000
direct allocation
page read and write
26C3DA79000
heap
page read and write
C260000
trusted library allocation
page read and write
F31000
unkown
page execute read
C290000
trusted library allocation
page read and write
56D9000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
BC5C000
stack
page read and write
2E6D000
heap
page read and write
2E8C000
heap
page read and write
C1E1000
trusted library allocation
page read and write
C1E1000
trusted library allocation
page read and write
2E00000
heap
page read and write
56DE000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
B8B4000
trusted library allocation
page read and write
C000112000
direct allocation
page read and write
2E6D000
heap
page read and write
ADD2A7C000
stack
page read and write
C403000
trusted library allocation
page read and write
C1E1000
trusted library allocation
page read and write
56E4000
trusted library allocation
page read and write
C38147C000
stack
page read and write
56D9000
trusted library allocation
page read and write
51BE000
stack
page read and write
C1B1000
trusted library allocation
page read and write
C1C5000
trusted library allocation
page read and write
11D6000
unkown
page read and write
ADD2DFE000
stack
page read and write
56E3000
trusted library allocation
page read and write
56D5000
trusted library allocation
page read and write
C1A8000
trusted library allocation
page read and write
C1BA000
trusted library allocation
page read and write
ABE2000
trusted library allocation
page read and write
56D9000
trusted library allocation
page read and write
C215000
trusted library allocation
page read and write
482A8FB000
stack
page read and write
2E4D000
heap
page read and write
56CE000
trusted library allocation
page read and write
ADD2F7E000
stack
page read and write
56FE000
trusted library allocation
page read and write
2B71E7C000
stack
page read and write
C1D0000
trusted library allocation
page read and write
1668C463000
heap
page read and write
C1DF000
trusted library allocation
page read and write
282D8EB000
stack
page read and write
2DB8000
heap
page read and write
C1AB000
trusted library allocation
page read and write
19E5F257000
heap
page read and write
26C3DA6D000
heap
page read and write
5520000
heap
page read and write
C160000
trusted library allocation
page read and write
26C3E3CD000
heap
page read and write
1668C44C000
heap
page read and write
570D000
trusted library allocation
page read and write
2E2D000
heap
page read and write
C000072000
direct allocation
page read and write
12FE7102000
heap
page read and write
1EF36600000
heap
page read and write
1EF36530000
heap
page read and write
12F9000
unkown
page readonly
1668C443000
heap
page read and write
C1A8000
trusted library allocation
page read and write
C3819FC000
stack
page read and write
506BBF9000
stack
page read and write
56D9000
trusted library allocation
page read and write
2E51000
heap
page read and write
C1CA000
trusted library allocation
page read and write
7608000
trusted library allocation
page read and write
C000010000
direct allocation
page read and write
F31000
unkown
page execute read
2E28000
heap
page read and write
2CF6000
stack
page read and write
56D1000
trusted library allocation
page read and write
C1CA000
trusted library allocation
page read and write
570E000
trusted library allocation
page read and write
C1BA000
trusted library allocation
page read and write
C000041000
direct allocation
page read and write
2E4D000
heap
page read and write
2ADBE402000
trusted library allocation
page read and write
C000148000
direct allocation
page read and write
18923A52000
heap
page read and write
2ADBDC00000
heap
page read and write
C225000
trusted library allocation
page read and write
C1BF000
trusted library allocation
page read and write
56B8000
trusted library allocation
page read and write
18923A2C000
heap
page read and write
5684000
trusted library allocation
page read and write
221000
unkown
page read and write
56E7000
trusted library allocation
page read and write
C215000
trusted library allocation
page read and write
2E3B000
heap
page read and write
2E30000
heap
page read and write
C1D0000
trusted library allocation
page read and write
56D9000
trusted library allocation
page read and write
56B8000
trusted library allocation
page read and write
56E4000
trusted library allocation
page read and write
B852000
trusted library allocation
page read and write
19E5F300000
heap
page read and write
2A17AA76000
heap
page read and write
C280000
trusted library allocation
page read and write
C381E7C000
stack
page read and write
56AD000
trusted library allocation
page read and write
C224000
trusted library allocation
page read and write
C1DF000
trusted library allocation
page read and write
11A6000
unkown
page read and write
1668C462000
heap
page read and write
26C3E3C5000
heap
page read and write
56D1000
trusted library allocation
page read and write
C1D7000
trusted library allocation
page read and write
C1D7000
trusted library allocation
page read and write
2A17AA6A000
heap
page read and write
EA6C27D000
stack
page read and write
56AB000
trusted library allocation
page read and write
C00001C000
direct allocation
page read and write
C1CA000
trusted library allocation
page read and write
C225000
trusted library allocation
page read and write
22FBEAC0000
direct allocation
page read and write
2E62000
heap
page read and write
1197000
unkown
page write copy
7FE41000
trusted library allocation
page execute read
2A17AA02000
heap
page read and write
56DF000
trusted library allocation
page read and write
2E51000
heap
page read and write
C38187E000
stack
page read and write
530D000
stack
page read and write
2B7207E000
stack
page read and write
56D9000
trusted library allocation
page read and write
1668C47B000
heap
page read and write
EA6BE7E000
stack
page read and write
1668C350000
trusted library allocation
page read and write
C1D7000
trusted library allocation
page read and write
5696000
trusted library allocation
page read and write
2E44000
heap
page read and write
189237B0000
heap
page read and write
B81D000
trusted library allocation
page read and write
56D5000
trusted library allocation
page read and write
1668C43A000
heap
page read and write
C1CA000
trusted library allocation
page read and write
26C3E3D0000
heap
page read and write
C1CA000
trusted library allocation
page read and write
C000086000
direct allocation
page read and write
C000098000
direct allocation
page read and write
C000128000
direct allocation
page read and write
1668C250000
heap
page read and write
CFF1FFD000
stack
page read and write
1EF36590000
heap
page read and write
C381B7B000
stack
page read and write
22FC0420000
direct allocation
page read and write
C1E1000
trusted library allocation
page read and write
C1D3000
trusted library allocation
page read and write
C1D0000
trusted library allocation
page read and write
C1B1000
trusted library allocation
page read and write
1668C431000
heap
page read and write
2E07000
heap
page read and write
ADD2BFF000
stack
page read and write
C1D2000
trusted library allocation
page read and write
C1D2000
trusted library allocation
page read and write
2E62000
heap
page read and write
56D5000
trusted library allocation
page read and write
C1CA000
trusted library allocation
page read and write
1199000
unkown
page write copy
22F98ED0000
direct allocation
page read and write
56E5000
trusted library allocation
page read and write
2A17AA62000
heap
page read and write
1198000
unkown
page read and write
286000
unkown
page readonly
C1E1000
trusted library allocation
page read and write
C1C5000
trusted library allocation
page read and write
1668C43E000
heap
page read and write
B884000
trusted library allocation
page read and write
56E4000
trusted library allocation
page read and write
2E08000
heap
page read and write
4D60000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
There are 930 hidden memdumps, click here to show them.