IOC Report
FACTURA.cmd

loading gif

Files

File Path
Type
Category
Malicious
FACTURA.cmd
ISO-8859 text, with very long lines (956), with CRLF line terminators
initial sample
malicious
C:\Users\Public\Libraries\Host.COM
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Host.GIF
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\alpha.exe
PE32+ executable (console) x86-64, for MS Windows
modified
C:\Users\Public\kn.exe
PE32+ executable (console) x86-64, for MS Windows
modified
\Device\Null
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\FACTURA.cmd" "
malicious
C:\Windows\System32\extrac32.exe
C:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
malicious
C:\Windows\System32\extrac32.exe
extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\FACTURA.cmd" "C:\\Users\\Public\\Host.GIF" 3
malicious
C:\Users\Public\kn.exe
C:\\Users\\Public\\kn -decodehex -F "C:\Users\user\Desktop\FACTURA.cmd" "C:\\Users\\Public\\Host.GIF" 3
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Host.GIF" "C:\\Users\\Public\\Libraries\\Host.COM" 10
malicious
C:\Users\Public\kn.exe
C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Host.GIF" "C:\\Users\\Public\\Libraries\\Host.COM" 10
malicious
C:\Users\Public\Libraries\Host.COM
C:\Users\Public\Libraries\Host.COM
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S
malicious
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\Host.GIF" / A / F / Q / S
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://taksonsdfg.co.in/34243456dfgd/255_ZnrgbbhcbyxV/K$
unknown
malicious
https://taksonsdfg.co.in/34243456dfgd/255_Znrgbbhcbyx~
unknown
malicious
https://taksonsdfg.co.in/./
unknown
malicious
https://taksonsdfg.co.in/Z
unknown
malicious
https://taksonsdfg.co.in/f/
unknown
malicious
https://taksonsdfg.co.in/34243456dfgd/255_ZnrgbbhcbyxN/c$
unknown
malicious
https://taksonsdfg.co.in/H
unknown
malicious
https://taksonsdfg.co.in/34243456dfgd/255_Znrgbbhcbyx
108.170.55.202
malicious
https://taksonsdfg.co.in/34243456dfgd/255_Znrgbbhcbyx&/
unknown
malicious
https://taksonsdfg.co.in/x
unknown
malicious
https://taksonsdfg.co.in/
unknown
malicious
https://taksonsdfg.co.in/34243456dfgd/255_Znrgbbhcbyx/;
unknown
malicious
https://taksonsdfg.co.in/~
unknown
malicious
https://taksonsdfg.co.in/34243456dfgd/255_ZnrgbbhcbyxB8
unknown
malicious
https://taksonsdfg.co.in/34243456dfgd/255_Znrgbbhcbyxv/
unknown
malicious
https://taksonsdfg.co.in:443/34243456dfgd/255_Znrgbbhcbyx;
unknown
malicious
https://taksonsdfg.co.in/34243456dfgd/255_ZnrgbbhcbyxV
unknown
malicious
https://taksonsdfg.co.in/34243456dfgd/255_Znrgbbhcbyxo/
unknown
malicious
https://taksonsdfg.co.in/n/C$
unknown
malicious
https://taksonsdfg.co.in/34243456dfgd/25
unknown
malicious
https://taksonsdfg.co.in/6/
unknown
malicious
https://%ws/%ws_%ws_%ws/service.svc/%wsADPolicyProviderSCEP
unknown
https://login.microsoftonline.com/%s/oauth2/authorize
unknown
https://login.microsoftonline.com/%s/oauth2/token
unknown
https://enterpriseregistration.windows.net/EnrollmentServer/key/
unknown
https://login.microsoftonline.com/%s/oauth2/authorizeJoinStatusStorage::SetDefaultDiscoveryMetadatah
unknown
https://enterpriseregistration.windows.net/EnrollmentServer/DeviceEnrollmentWebService.svc
unknown
http://www.pmail.com
unknown
https://%ws/%ws_%ws_%ws/service.svc/%ws
unknown
https://enterpriseregistration.windows.net/EnrollmentServer/device/
unknown
There are 20 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
taksonsdfg.co.in
108.170.55.202
malicious

IPs

IP
Domain
Country
Malicious
108.170.55.202
taksonsdfg.co.in
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.1!7
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.2!7
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.3!7
Name

Memdumps

Base Address
Regiontype
Protect
Malicious
8A8000
heap
page read and write
21775880000
heap
page read and write
48D49CE000
stack
page read and write
877000
heap
page read and write
7FF7E08AE000
unkown
page readonly
878000
heap
page read and write
7FF793740000
unkown
page readonly
7FF793772000
unkown
page readonly
895000
heap
page read and write
7F020000
direct allocation
page read and write
18C3DC80000
heap
page read and write
7FC20000
direct allocation
page read and write
8AA000
heap
page read and write
7FF7E0790000
unkown
page readonly
8C8000
heap
page read and write
8E4000
heap
page read and write
7FF79379C000
unkown
page write copy
21775990000
heap
page read and write
88B000
heap
page read and write
20D2E7B000
stack
page read and write
2B0247C7000
heap
page read and write
21466020000
heap
page read and write
2955000
heap
page read and write
7FF79377D000
unkown
page read and write
217776B0000
heap
page read and write
7FF793799000
unkown
page readonly
8AE000
heap
page read and write
18C3BE9C000
heap
page read and write
7FF793799000
unkown
page readonly
2559E000
stack
page read and write
7FF793740000
unkown
page readonly
8AE000
heap
page read and write
877000
heap
page read and write
1F21CDC0000
heap
page read and write
8A7000
heap
page read and write
8A0000
heap
page read and write
88D000
heap
page read and write
2503A000
direct allocation
page read and write
877000
heap
page read and write
7F840000
direct allocation
page read and write
7FF7E090A000
unkown
page write copy
864000
heap
page read and write
7FF79379D000
unkown
page readonly
7F7C0000
direct allocation
page read and write
E9036FE000
stack
page read and write
21775889000
heap
page read and write
2956000
heap
page read and write
8B2000
heap
page read and write
217776D2000
heap
page read and write
1F21CDE0000
heap
page read and write
892000
heap
page read and write
869000
heap
page read and write
88B000
heap
page read and write
892000
heap
page read and write
8BD000
heap
page read and write
8AA000
heap
page read and write
7FF79379D000
unkown
page readonly
87B000
heap
page read and write
2518A000
stack
page read and write
7FF793799000
unkown
page readonly
7F650000
direct allocation
page read and write
7FF793781000
unkown
page read and write
8E4000
heap
page read and write
8D4000
heap
page read and write
7FF793740000
unkown
page readonly
21466024000
heap
page read and write
8A8000
heap
page read and write
877000
heap
page read and write
69688FE000
stack
page read and write
8A7000
heap
page read and write
884000
heap
page read and write
25A80000
remote allocation
page read and write
217776C0000
heap
page read and write
7FF793772000
unkown
page readonly
484000
unkown
page read and write
2350000
direct allocation
page execute and read and write
25C0E000
stack
page read and write
25DBC000
heap
page read and write
7FC6F000
direct allocation
page read and write
7FF7E090A000
unkown
page write copy
7FF793740000
unkown
page readonly
8C8000
heap
page read and write
22FC000
direct allocation
page read and write
25930000
heap
page read and write
2F6E000
direct allocation
page execute and read and write
7FF7E0918000
unkown
page read and write
22F074F7000
heap
page read and write
2B0247EC000
heap
page read and write
8AA000
heap
page read and write
86C000
heap
page read and write
2E1E000
direct allocation
page read and write
28F886E8000
heap
page read and write
25D0F000
stack
page read and write
895000
heap
page read and write
2340000
heap
page read and write
21775780000
heap
page read and write
870000
heap
page read and write
7EEB0000
direct allocation
page read and write
1F21CE35000
heap
page read and write
7FF793799000
unkown
page readonly
884000
heap
page read and write
18C3E5A0000
heap
page read and write
8B2000
heap
page read and write
2892000
heap
page read and write
8A0000
heap
page read and write
8CF000
heap
page read and write
7FF79377D000
unkown
page read and write
B2EB5FE000
stack
page read and write
26095708000
heap
page read and write
7FF793799000
unkown
page readonly
E90367B000
stack
page read and write
1F21CDB0000
heap
page read and write
7FF79379D000
unkown
page readonly
650000
heap
page read and write
25DD9000
heap
page read and write
881000
heap
page read and write
7EEB0000
direct allocation
page read and write
881000
heap
page read and write
1A3C6A40000
heap
page read and write
895000
heap
page read and write
2518E000
stack
page execute and read and write
E9037FE000
stack
page read and write
7FF793772000
unkown
page readonly
869000
heap
page read and write
869000
heap
page read and write
28F88670000
heap
page read and write
7FF000
heap
page read and write
2311000
direct allocation
page read and write
87D000
heap
page read and write
2B0247BB000
heap
page read and write
7FA30000
direct allocation
page read and write
18C3BE9C000
heap
page read and write
22F07610000
heap
page read and write
21466160000
heap
page read and write
2B024724000
heap
page read and write
864000
heap
page read and write
21466025000
heap
page read and write
8D2000
heap
page read and write
21466040000
heap
page read and write
877000
heap
page read and write
2DF1000
direct allocation
page execute read
2303000
direct allocation
page read and write
25ABE000
stack
page read and write
7FF7E090A000
unkown
page write copy
217759C0000
heap
page read and write
88D000
heap
page read and write
8CC000
heap
page read and write
578CE7D000
stack
page read and write
48D4C7E000
stack
page read and write
2B0247E8000
heap
page read and write
7F4E0000
direct allocation
page read and write
2B0265A0000
trusted library allocation
page read and write
8D3000
heap
page read and write
8AD000
heap
page read and write
21777E06000
heap
page read and write
7FF79379C000
unkown
page write copy
48D494C000
stack
page read and write
7FF793799000
unkown
page readonly
876000
heap
page read and write
25008000
direct allocation
page read and write
2B024770000
heap
page read and write
288E000
heap
page read and write
8AA000
heap
page read and write
1A3C6A54000
heap
page read and write
892000
heap
page read and write
18C3BE9C000
heap
page read and write
2518F000
stack
page read and write
7FF793772000
unkown
page readonly
8E7000
heap
page read and write
7FC90000
direct allocation
page read and write
2B0246C0000
heap
page read and write
5DA63FF000
stack
page read and write
5DA64FF000
stack
page read and write
88B000
heap
page read and write
7FB000
heap
page read and write
2B0247C8000
heap
page read and write
864000
heap
page read and write
872000
heap
page read and write
48F000
unkown
page readonly
8C1000
heap
page read and write
8CE000
heap
page read and write
877000
heap
page read and write
1F21CE60000
heap
page read and write
88D000
heap
page read and write
8A0000
heap
page read and write
7F210000
direct allocation
page read and write
871000
heap
page read and write
260956E7000
heap
page read and write
2B0247E9000
heap
page read and write
89D000
heap
page read and write
7F7C0000
direct allocation
page read and write
7FF7E0913000
unkown
page read and write
25BBD000
stack
page read and write
28F88650000
heap
page read and write
8BD000
heap
page read and write
8E4000
heap
page read and write
2318000
direct allocation
page read and write
2540F000
stack
page read and write
7FF793772000
unkown
page readonly
2483000
heap
page read and write
8CE000
heap
page read and write
8E4000
heap
page read and write
7FA50000
direct allocation
page read and write
7FF7E0791000
unkown
page execute read
578CBBC000
stack
page read and write
8D7000
heap
page read and write
8BD000
heap
page read and write
2DF0000
direct allocation
page readonly
8CF000
heap
page read and write
8C0000
heap
page read and write
8BB000
heap
page read and write
88B000
heap
page read and write
895000
heap
page read and write
7FF7E090A000
unkown
page write copy
7FF7E0791000
unkown
page execute read
1A3C4CF0000
heap
page read and write
8AA000
heap
page read and write
7FF7E0926000
unkown
page readonly
18C3BE38000
heap
page read and write
7FF793772000
unkown
page readonly
8AF000
heap
page read and write
25DB2000
heap
page read and write
7FF793741000
unkown
page execute read
25960000
heap
page read and write
2B0247B7000
heap
page read and write
2B0246E0000
heap
page read and write
2B0247B7000
heap
page read and write
7FF793772000
unkown
page readonly
7F0000
heap
page read and write
7FF79377D000
unkown
page read and write
260955F0000
heap
page read and write
892000
heap
page read and write
870000
heap
page read and write
7FF793741000
unkown
page execute read
8E6000
heap
page read and write
7FF79378F000
unkown
page read and write
2895000
heap
page read and write
8BE000
heap
page read and write
18C3D843000
heap
page read and write
FB2359C000
stack
page read and write
25DBA000
heap
page read and write
2B0247CC000
heap
page read and write
2320000
heap
page read and write
7FF79379C000
unkown
page write copy
22F074F7000
heap
page read and write
7FF79378F000
unkown
page read and write
2569F000
stack
page read and write
7F0A0000
direct allocation
page read and write
7FF7E0913000
unkown
page read and write
8BD000
heap
page read and write
86E000
heap
page read and write
28F887E0000
heap
page read and write
20D2FFF000
stack
page read and write
8E8000
heap
page read and write
27F0000
heap
page read and write
89B000
heap
page read and write
8BD000
heap
page read and write
2B0247E8000
heap
page read and write
884000
heap
page read and write
22D0000
direct allocation
page read and write
88D000
heap
page read and write
7FF793740000
unkown
page readonly
8BD000
heap
page read and write
869000
heap
page read and write
5DA62FC000
stack
page read and write
881000
heap
page read and write
2899000
heap
page read and write
2582E000
stack
page read and write
7F930000
direct allocation
page read and write
26095708000
heap
page read and write
895000
heap
page read and write
18C3BED1000
heap
page read and write
22F074F7000
heap
page read and write
8C8000
heap
page read and write
7FF793789000
unkown
page read and write
7FC00000
direct allocation
page read and write
7FABF000
direct allocation
page read and write
8A7000
heap
page read and write
25DD3000
heap
page read and write
7FF7E091D000
unkown
page readonly
7FF7E0790000
unkown
page readonly
1F0000
heap
page read and write
8A8000
heap
page read and write
7F930000
direct allocation
page read and write
25016000
direct allocation
page read and write
286A000
heap
page read and write
7FF793789000
unkown
page read and write
877000
heap
page read and write
A0AF4FF000
stack
page read and write
22F4000
direct allocation
page read and write
B2EB10C000
stack
page read and write
2B0247BB000
heap
page read and write
7FF79378F000
unkown
page read and write
864000
heap
page read and write
7FF793741000
unkown
page execute read
22ED000
direct allocation
page read and write
1A3C4AB0000
heap
page read and write
26095704000
heap
page read and write
88B000
heap
page read and write
25024000
direct allocation
page read and write
27F7000
heap
page read and write
7FF79379C000
unkown
page write copy
21465FF0000
heap
page read and write
48A000
unkown
page read and write
884000
heap
page read and write
22B5000
direct allocation
page read and write
660000
heap
page read and write
864000
heap
page read and write
18C3BE34000
heap
page read and write
7FF793741000
unkown
page execute read
7FF793781000
unkown
page read and write
88B000
heap
page read and write
7F740000
direct allocation
page read and write
8C3000
heap
page read and write
22F075D0000
heap
page read and write
21D0000
heap
page read and write
8AF000
heap
page read and write
7F650000
direct allocation
page read and write
8A6000
heap
page read and write
2592E000
stack
page read and write
864000
heap
page read and write
2146604B000
heap
page read and write
7F020000
direct allocation
page read and write
8A4000
heap
page read and write
18C3BE3D000
heap
page read and write
2871000
heap
page read and write
7FF7E0928000
unkown
page readonly
7FF7E0790000
unkown
page readonly
22F074F7000
heap
page read and write
22F074D7000
heap
page read and write
2266000
direct allocation
page read and write
7E3D0000
direct allocation
page read and write
25A80000
remote allocation
page read and write
1A3C4E34000
heap
page read and write
2530E000
stack
page read and write
7FF793799000
unkown
page readonly
22F074F7000
heap
page read and write
1A3C4E03000
heap
page read and write
879000
heap
page read and write
8E6000
heap
page read and write
18C3BE10000
heap
page read and write
401000
unkown
page execute read
18C3BE8C000
heap
page read and write
8C9000
heap
page read and write
18C3BECB000
heap
page read and write
7FF793740000
unkown
page readonly
89A000
heap
page read and write
7FF79377D000
unkown
page write copy
400000
unkown
page readonly
8A0000
heap
page read and write
7FF793781000
unkown
page read and write
7F7C0000
direct allocation
page read and write
7FF793741000
unkown
page execute read
22F074F7000
heap
page read and write
881000
heap
page read and write
7FF793785000
unkown
page read and write
FB239FE000
stack
page read and write
7FF7E0925000
unkown
page write copy
8C9000
heap
page read and write
881000
heap
page read and write
8D2000
heap
page read and write
88B000
heap
page read and write
8B2000
heap
page read and write
2B0247A0000
heap
page read and write
895000
heap
page read and write
8A8000
heap
page read and write
22F074F7000
heap
page read and write
25048000
direct allocation
page read and write
257EE000
stack
page read and write
28F889B0000
heap
page read and write
877000
heap
page read and write
22F074D0000
heap
page read and write
18C3D840000
heap
page read and write
260959A0000
heap
page read and write
8A0000
heap
page read and write
217776C3000
heap
page read and write
1F21CE89000
heap
page read and write
7FF793741000
unkown
page execute read
7F930000
direct allocation
page read and write
28F886E0000
heap
page read and write
872000
heap
page read and write
8D2000
heap
page read and write
888000
heap
page read and write
7FF79379D000
unkown
page readonly
1A3C4E36000
heap
page read and write
7FF793741000
unkown
page execute read
8A6000
heap
page read and write
20D2EFE000
stack
page read and write
7FF7E0791000
unkown
page execute read
696854C000
stack
page read and write
8D7000
heap
page read and write
2B0247B4000
heap
page read and write
7FF7E0928000
unkown
page readonly
18C3BECE000
heap
page read and write
18C3BEAE000
heap
page read and write
1F21CE34000
heap
page read and write
864000
heap
page read and write
7FF79377D000
unkown
page write copy
885000
heap
page read and write
869000
heap
page read and write
8BD000
heap
page read and write
84D000
heap
page read and write
8C9000
heap
page read and write
892000
heap
page read and write
25DB4000
heap
page read and write
28F889B4000
heap
page read and write
25DD0000
heap
page read and write
666000
heap
page read and write
8A4000
heap
page read and write
7FF79379C000
unkown
page write copy
7FF79377D000
unkown
page write copy
7F190000
direct allocation
page read and write
260956E0000
heap
page read and write
7FD70000
direct allocation
page read and write
7FBC0000
direct allocation
page read and write
2B0247E8000
heap
page read and write
7EF30000
direct allocation
page read and write
7FF793781000
unkown
page read and write
21466065000
heap
page read and write
7F8EF000
direct allocation
page read and write
888000
heap
page read and write
7FF79377D000
unkown
page write copy
895000
heap
page read and write
7FF79377D000
unkown
page write copy
2CDA000
heap
page read and write
2B026DA0000
heap
page read and write
22F077B0000
heap
page read and write
1A3C4BA9000
heap
page read and write
7FF7E0926000
unkown
page readonly
8E8000
heap
page read and write
88D000
heap
page read and write
25DB0000
heap
page read and write
7FF793794000
unkown
page read and write
69689FF000
stack
page read and write
8C8000
heap
page read and write
7FF7E0914000
unkown
page write copy
2B026150000
heap
page read and write
7FF7E08AE000
unkown
page readonly
8D8000
heap
page read and write
7E810000
direct allocation
page read and write
7F460000
direct allocation
page read and write
8E2000
heap
page read and write
8E6000
heap
page read and write
7FF79378F000
unkown
page read and write
8BF000
heap
page read and write
8C9000
heap
page read and write
888000
heap
page read and write
2B0247EC000
heap
page read and write
884000
heap
page read and write
28F88708000
heap
page read and write
7FF7E0928000
unkown
page readonly
8AE000
heap
page read and write
8AA000
heap
page read and write
B2EB4FE000
stack
page read and write
884000
heap
page read and write
892000
heap
page read and write
88B000
heap
page read and write
7FF793772000
unkown
page readonly
88D000
heap
page read and write
7FF7E091D000
unkown
page readonly
26095800000
heap
page read and write
8A4000
heap
page read and write
881000
heap
page read and write
7F460000
direct allocation
page read and write
260957E0000
heap
page read and write
25950000
heap
page read and write
18C3BEE6000
heap
page read and write
892000
heap
page read and write
7FF793741000
unkown
page execute read
869000
heap
page read and write
89B000
heap
page read and write
1A3C4E30000
heap
page read and write
8BD000
heap
page read and write
892000
heap
page read and write
18C3BECE000
heap
page read and write
892000
heap
page read and write
7F7C0000
direct allocation
page read and write
25DDC000
heap
page read and write
1F21CE67000
heap
page read and write
881000
heap
page read and write
7FF79379D000
unkown
page readonly
2B024720000
heap
page read and write
7FF7E0918000
unkown
page read and write
18C3BECE000
heap
page read and write
21775A80000
heap
page read and write
20D2F7E000
stack
page read and write
2B024728000
heap
page read and write
7F7C0000
direct allocation
page read and write
1A3C6F57000
heap
page read and write
8A0000
heap
page read and write
7F9B0000
direct allocation
page read and write
89B000
heap
page read and write
25A80000
remote allocation
page read and write
18C3BE95000
heap
page read and write
18C3BE98000
heap
page read and write
895000
heap
page read and write
21465F10000
heap
page read and write
7F930000
direct allocation
page read and write
8AA000
heap
page read and write
8C8000
heap
page read and write
578CEFE000
stack
page read and write
888000
heap
page read and write
8A0000
heap
page read and write
2E77000
direct allocation
page execute and read and write
870000
heap
page read and write
230A000
direct allocation
page read and write
7FF7E091D000
unkown
page readonly
8C9000
heap
page read and write
8AB000
heap
page read and write
8A0000
heap
page read and write
28F88570000
heap
page read and write
7FF793781000
unkown
page read and write
864000
heap
page read and write
2B0247EC000
heap
page read and write
1F21CE84000
heap
page read and write
2508C000
stack
page read and write
18C3DDA0000
trusted library allocation
page read and write
2B02472D000
heap
page read and write
26095820000
heap
page read and write
7FF7E0791000
unkown
page execute read
478000
unkown
page read and write
28F88704000
heap
page read and write
2502C000
direct allocation
page read and write
885000
heap
page read and write
7FF7E0925000
unkown
page write copy
2F6C000
direct allocation
page execute and read and write
22F074F5000
heap
page read and write
25DBE000
heap
page read and write
892000
heap
page read and write
7FF7E0914000
unkown
page write copy
2B11000
heap
page read and write
256EE000
stack
page read and write
18C3BE98000
heap
page read and write
2B0247BB000
heap
page read and write
88D000
heap
page read and write
18C3BE87000
heap
page read and write
2B026153000
heap
page read and write
86C000
heap
page read and write
7F5D0000
direct allocation
page read and write
8BD000
heap
page read and write
895000
heap
page read and write
8A7000
heap
page read and write
7FC10000
direct allocation
page read and write
25DB6000
heap
page read and write
7FF793799000
unkown
page readonly
18C3BECE000
heap
page read and write
888000
heap
page read and write
88B000
heap
page read and write
1A3C4CC0000
heap
page read and write
1A3C4BA0000
heap
page read and write
2554F000
stack
page read and write
864000
heap
page read and write
2501D000
direct allocation
page read and write
25DDF000
heap
page read and write
870000
heap
page read and write
260959A5000
heap
page read and write
22F075F0000
heap
page read and write
7FF7E08AE000
unkown
page readonly
260959A4000
heap
page read and write
8AA000
heap
page read and write
87C000
heap
page read and write
18C3BE30000
heap
page read and write
8AE000
heap
page read and write
22F077B4000
heap
page read and write
E90377E000
stack
page read and write
864000
heap
page read and write
7FF793740000
unkown
page readonly
25DB8000
heap
page read and write
888000
heap
page read and write
877000
heap
page read and write
8E8000
heap
page read and write
25041000
direct allocation
page read and write
7E790000
direct allocation
page read and write
7FF793772000
unkown
page readonly
19D000
stack
page read and write
8A4000
heap
page read and write
1F21CE30000
heap
page read and write
7FF793772000
unkown
page readonly
2544E000
stack
page read and write
7FF7E0790000
unkown
page readonly
A0AF3FF000
stack
page read and write
8C8000
heap
page read and write
FB238FE000
stack
page read and write
21775A84000
heap
page read and write
7FF793740000
unkown
page readonly
9B000
stack
page read and write
88D000
heap
page read and write
7FF793741000
unkown
page execute read
7FF793794000
unkown
page read and write
1F21CE89000
heap
page read and write
8E6000
heap
page read and write
7FC5F000
direct allocation
page read and write
7FF79378F000
unkown
page read and write
1A3C4E00000
heap
page read and write
881000
heap
page read and write
24FEA000
direct allocation
page read and write
88D000
heap
page read and write
18C3BEAE000
heap
page read and write
1A3C4CA0000
heap
page read and write
7FF793741000
unkown
page execute read
18C3BEA9000
heap
page read and write
869000
heap
page read and write
7FF79377D000
unkown
page read and write
888000
heap
page read and write
A0AF2FC000
stack
page read and write
884000
heap
page read and write
18C3BE40000
heap
page read and write
21775A86000
heap
page read and write
7FF793799000
unkown
page readonly
22F073F0000
heap
page read and write
8BD000
heap
page read and write
7F930000
direct allocation
page read and write
7FF793799000
unkown
page readonly
2480000
heap
page read and write
881000
heap
page read and write
870000
heap
page read and write
8CB000
heap
page read and write
869000
heap
page read and write
1F21D030000
heap
page read and write
8CB000
heap
page read and write
7FF793740000
unkown
page readonly
28F889B5000
heap
page read and write
21466140000
heap
page read and write
881000
heap
page read and write
885000
heap
page read and write
2B0245E0000
heap
page read and write
7FF7E0928000
unkown
page readonly
7FF7E08AE000
unkown
page readonly
8A0000
heap
page read and write
21775860000
heap
page read and write
2370000
heap
page read and write
18C3BE00000
heap
page read and write
18C3BE80000
heap
page read and write
48A000
unkown
page write copy
7FF793740000
unkown
page readonly
22F077B5000
heap
page read and write
7FAE0000
direct allocation
page read and write
8BD000
heap
page read and write
2376000
heap
page read and write
8D2000
heap
page read and write
870000
heap
page read and write
870000
heap
page read and write
25DD5000
heap
page read and write
7FF79377D000
unkown
page read and write
2B0247CC000
heap
page read and write
25DD2000
heap
page read and write
89A000
heap
page read and write
8CF000
heap
page read and write
25000000
direct allocation
page read and write
89F000
heap
page read and write
478000
unkown
page write copy
25DDF000
heap
page read and write
26095704000
heap
page read and write
870000
heap
page read and write
260956F1000
heap
page read and write
2B0247A9000
heap
page read and write
8D2000
heap
page read and write
25DDA000
heap
page read and write
7FF7E091D000
unkown
page readonly
7F8A0000
direct allocation
page read and write
There are 650 hidden memdumps, click here to show them.