IOC Report
jpgcamscanner_20240521_0072345_JPEG.bat.exe

loading gif

Files

File Path
Type
Category
Malicious
jpgcamscanner_20240521_0072345_JPEG.bat.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\BgImage.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\nsDialogs.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Grundtvigianerens.Unr
Matlab v4 mat-file (little endian) \253, numeric, rows 33554432, columns 1572866
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Handrailing.cir
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Schweiziskes\Nonstationaries.pai
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Schweiziskes\Warmakers.fal
OpenPGP Public Key
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Schweiziskes\aniara.uns
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Schweiziskes\bekendelsesskriften.pro
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Schweiziskes\databehandlingsforeningers.sky
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Schweiziskes\tsetseflues\electrohomeopathies.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Shamponeringers\mildewy.jam
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Shamponeringers\natans.sma
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Shamponeringers\ovest.tho
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Shamponeringers\paksks.pre
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Shamponeringers\stttepartiets.mis
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Shamponeringers\utilidors.lok
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Shamponeringers\xenonet.mul
data
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
"C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe"
malicious
C:\Windows\System32\dllhost.exe
C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
malicious
C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
"C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe"
malicious

URLs

Name
IP
Malicious
http://nsis.sf.net/NSIS_Error
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://veysiseker.com/FOB.bin
192.250.227.27
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious
veysiseker.com
192.250.227.27

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
192.250.227.27
veysiseker.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\scarman\overskudsamfund\dragsteren
omvurderende
HKEY_CURRENT_USER\prologers\fortegne
concurrently
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASMANCS
FileDirectory
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5951000
direct allocation
page execute and read and write
malicious
36040000
trusted library allocation
page read and write
6D3000
heap
page read and write
3034000
heap
page read and write
359B0000
trusted library allocation
page read and write
6DE000
heap
page read and write
6D7000
heap
page read and write
6D3000
heap
page read and write
C5000
trusted library allocation
page execute and read and write
333C0000
trusted library allocation
page read and write
6DDA1000
unkown
page execute read
4BB0000
direct allocation
page read and write
6EE000
heap
page read and write
35970000
trusted library allocation
page read and write
6D3000
heap
page read and write
333C0000
trusted library allocation
page read and write
43D000
unkown
page readonly
43D000
unkown
page readonly
2E10000
heap
page read and write
190000
trusted library allocation
page read and write
440000
unkown
page readonly
CB000
trusted library allocation
page execute and read and write
36030000
trusted library allocation
page read and write
359B0000
trusted library allocation
page read and write
359A0000
trusted library allocation
page read and write
6D3000
heap
page read and write
359D0000
trusted library allocation
page read and write
440000
unkown
page readonly
4B60000
direct allocation
page read and write
400000
unkown
page readonly
6CE000
heap
page read and write
8D0000
heap
page read and write
6D7000
heap
page read and write
305E000
heap
page read and write
359B0000
trusted library allocation
page read and write
30000
heap
page read and write
359B0000
trusted library allocation
page read and write
6CE000
heap
page read and write
35950000
trusted library allocation
page read and write
6E5000
heap
page read and write
6DE000
heap
page read and write
6DE000
heap
page read and write
359B0000
trusted library allocation
page read and write
35986000
trusted library allocation
page read and write
585000
heap
page read and write
6D7000
heap
page read and write
6D3000
heap
page read and write
94000
trusted library allocation
page read and write
359A0000
trusted library allocation
page read and write
6C2000
heap
page read and write
359A0000
trusted library allocation
page read and write
6E5000
heap
page read and write
4BD0000
direct allocation
page read and write
28F3000
heap
page read and write
28FB000
heap
page read and write
6D3000
heap
page read and write
6E5000
heap
page read and write
180000
trusted library allocation
page read and write
359B0000
trusted library allocation
page read and write
160000
heap
page read and write
359A0000
trusted library allocation
page read and write
44F000
unkown
page readonly
4BC0000
direct allocation
page read and write
333C0000
trusted library allocation
page read and write
35980000
trusted library allocation
page read and write
359B2000
trusted library allocation
page read and write
2F78000
heap
page read and write
6DE000
heap
page read and write
359B0000
trusted library allocation
page read and write
3700000
direct allocation
page read and write
33660000
heap
page read and write
6E5000
heap
page read and write
6D3000
heap
page read and write
6C2000
heap
page read and write
359B0000
trusted library allocation
page read and write
3425000
heap
page read and write
35BE000
heap
page read and write
6C2000
heap
page read and write
35D48000
heap
page read and write
36F0000
direct allocation
page read and write
33830000
heap
page execute and read and write
333A0000
trusted library allocation
page read and write
28FB000
heap
page read and write
359B0000
trusted library allocation
page read and write
332FA000
stack
page read and write
44F000
unkown
page readonly
359B0000
trusted library allocation
page read and write
335DF000
stack
page read and write
6EF46000
unkown
page readonly
65A2000
heap
page read and write
36A0000
direct allocation
page read and write
359C0000
trusted library allocation
page execute and read and write
190000
trusted library allocation
page read and write
359A0000
trusted library allocation
page read and write
6CE000
heap
page read and write
4BE0000
heap
page read and write
407000
unkown
page readonly
6CE000
heap
page read and write
440000
unkown
page readonly
430000
unkown
page read and write
690000
heap
page read and write
3670000
direct allocation
page read and write
35D45000
heap
page read and write
359B0000
trusted library allocation
page read and write
6D7000
heap
page read and write
36040000
trusted library allocation
page read and write
35C2C000
stack
page read and write
337ED000
stack
page read and write
6EE000
heap
page read and write
359B0000
trusted library allocation
page read and write
6D7000
heap
page read and write
6C2000
heap
page read and write
33875000
trusted library allocation
page read and write
359B0000
trusted library allocation
page read and write
35950000
trusted library allocation
page read and write
316F000
stack
page read and write
98000
stack
page read and write
4BA0000
direct allocation
page read and write
6CE000
heap
page read and write
6DE000
heap
page read and write
3220000
heap
page read and write
A4F000
stack
page read and write
6603000
heap
page read and write
6E5000
heap
page read and write
440000
unkown
page readonly
6CE000
heap
page read and write
3504000
heap
page read and write
43B000
unkown
page read and write
B0000
trusted library allocation
page read and write
28F5000
heap
page read and write
458000
unkown
page readonly
6D3000
heap
page read and write
348AA000
trusted library allocation
page read and write
359A0000
trusted library allocation
page execute and read and write
359B0000
trusted library allocation
page read and write
6CE000
heap
page read and write
3260000
heap
page read and write
94E000
stack
page read and write
359B0000
trusted library allocation
page read and write
359D0000
trusted library allocation
page read and write
6685000
heap
page read and write
359B0000
trusted library allocation
page read and write
B2000
trusted library allocation
page read and write
6EF31000
unkown
page execute read
3A50000
heap
page read and write
6E5000
heap
page read and write
2F70000
heap
page read and write
35841000
heap
page read and write
359B0000
trusted library allocation
page read and write
2171000
remote allocation
page execute and read and write
359D0000
trusted library allocation
page read and write
359B0000
trusted library allocation
page read and write
333C0000
trusted library allocation
page read and write
338C6000
trusted library allocation
page read and write
28F1000
heap
page read and write
359D0000
trusted library allocation
page read and write
359B0000
trusted library allocation
page read and write
6D7000
heap
page read and write
2254000
heap
page read and write
333C0000
trusted library allocation
page read and write
35D7E000
heap
page read and write
401000
unkown
page execute read
35990000
trusted library allocation
page read and write
35F6000
heap
page read and write
6DE000
heap
page read and write
6F1000
heap
page read and write
44D000
unkown
page readonly
6DE000
heap
page read and write
359D0000
trusted library allocation
page read and write
33770000
heap
page read and write
6EE000
heap
page read and write
6E5000
heap
page read and write
6DE000
heap
page read and write
6D7000
heap
page read and write
6CE000
heap
page read and write
6CE000
heap
page read and write
34869000
trusted library allocation
page read and write
359B0000
trusted library allocation
page read and write
6D7000
heap
page read and write
359B1000
trusted library allocation
page read and write
6D7000
heap
page read and write
458000
unkown
page readonly
6E5000
heap
page read and write
35949000
trusted library allocation
page read and write
416000
unkown
page read and write
6EE000
heap
page read and write
6D7000
heap
page read and write
6580000
heap
page read and write
3308F000
stack
page read and write
35990000
trusted library allocation
page read and write
401000
unkown
page execute read
401000
unkown
page execute read
27EF000
stack
page read and write
3001000
heap
page read and write
409000
unkown
page write copy
6CE000
heap
page read and write
6D3000
heap
page read and write
229E000
stack
page read and write
359B0000
trusted library allocation
page read and write
28F4000
heap
page read and write
1771000
remote allocation
page execute and read and write
44D000
unkown
page readonly
6C2000
heap
page read and write
6DE000
heap
page read and write
6F1000
heap
page read and write
43D000
unkown
page readonly
28FE000
heap
page read and write
425000
unkown
page read and write
34841000
trusted library allocation
page read and write
6E5000
heap
page read and write
35D30000
heap
page read and write
35970000
trusted library allocation
page read and write
36030000
trusted library allocation
page read and write
32F8E000
stack
page read and write
6DE000
heap
page read and write
359B0000
trusted library allocation
page read and write
359B0000
trusted library allocation
page read and write
36030000
trusted library allocation
page read and write
333C0000
trusted library allocation
page read and write
6C2000
heap
page read and write
3690000
direct allocation
page read and write
2FF5000
heap
page read and write
35950000
trusted library allocation
page read and write
23A0000
heap
page read and write
359A0000
trusted library allocation
page read and write
6D7000
heap
page read and write
190000
trusted library allocation
page read and write
6E5000
heap
page read and write
28FE000
heap
page read and write
35980000
trusted library allocation
page read and write
2B71000
remote allocation
page execute and read and write
407000
unkown
page readonly
3660000
direct allocation
page read and write
359C0000
trusted library allocation
page read and write
6D7000
heap
page read and write
2E00000
direct allocation
page read and write
698000
heap
page read and write
359B0000
trusted library allocation
page read and write
359A0000
trusted library allocation
page read and write
57E000
stack
page read and write
44D000
unkown
page readonly
65C4000
heap
page read and write
4B70000
direct allocation
page read and write
6D3000
heap
page read and write
359B0000
trusted library allocation
page read and write
44F000
unkown
page readonly
359D0000
trusted library allocation
page read and write
6D3000
heap
page read and write
359B0000
trusted library allocation
page read and write
35F2F000
stack
page read and write
28EF000
stack
page read and write
6EB000
heap
page read and write
458000
unkown
page readonly
36D0000
direct allocation
page read and write
36B0000
direct allocation
page read and write
6CE000
heap
page read and write
6C2000
heap
page read and write
359D0000
trusted library allocation
page read and write
6C2000
heap
page read and write
9D000
trusted library allocation
page execute and read and write
35E4000
heap
page read and write
2F2C000
stack
page read and write
6DE000
heap
page read and write
44F000
unkown
page readonly
359B2000
trusted library allocation
page read and write
6EE000
heap
page read and write
4CF0000
heap
page read and write
44D000
unkown
page readonly
A0000
trusted library allocation
page read and write
359B0000
trusted library allocation
page read and write
6C2000
heap
page read and write
6EF4D000
unkown
page read and write
359B0000
trusted library allocation
page read and write
359B0000
trusted library allocation
page read and write
237E000
stack
page read and write
35990000
trusted library allocation
page read and write
3C4D000
stack
page read and write
6C2000
heap
page read and write
28F6000
heap
page read and write
407000
unkown
page readonly
28F3000
heap
page read and write
359B0000
trusted library allocation
page read and write
429000
unkown
page read and write
3361C000
stack
page read and write
3B4C000
stack
page read and write
338C8000
trusted library allocation
page read and write
22D0000
heap
page read and write
80000
trusted library allocation
page read and write
359D0000
trusted library allocation
page read and write
6CE000
heap
page read and write
326E000
stack
page read and write
6DE000
heap
page read and write
C7000
trusted library allocation
page execute and read and write
333C0000
trusted library allocation
page read and write
458000
unkown
page readonly
90000
trusted library allocation
page read and write
34B4000
heap
page read and write
6C2000
heap
page read and write
6EE000
heap
page read and write
359B0000
trusted library allocation
page read and write
6CE000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
359B0000
trusted library allocation
page read and write
6D3000
heap
page read and write
3376E000
stack
page read and write
6D3000
heap
page read and write
190000
trusted library allocation
page read and write
6C2000
heap
page read and write
65D6000
heap
page read and write
359B0000
trusted library allocation
page read and write
32F40000
trusted library allocation
page read and write
6CE000
heap
page read and write
36030000
trusted library allocation
page read and write
8CF000
stack
page read and write
BA000
trusted library allocation
page execute and read and write
28FD000
heap
page read and write
359B0000
trusted library allocation
page read and write
6C2000
heap
page read and write
400000
unkown
page readonly
359B0000
trusted library allocation
page read and write
33841000
trusted library allocation
page read and write
330A0000
heap
page read and write
361D000
heap
page read and write
3270000
heap
page read and write
333CD000
trusted library allocation
page read and write
36030000
trusted library allocation
page read and write
6EF30000
unkown
page readonly
400000
unkown
page readonly
6C2000
heap
page read and write
359B0000
trusted library allocation
page read and write
359B1000
trusted library allocation
page read and write
6E5000
heap
page read and write
23A5000
heap
page read and write
400000
unkown
page readonly
35D43000
heap
page read and write
35D37000
heap
page read and write
4B90000
direct allocation
page read and write
359B0000
trusted library allocation
page read and write
359B0000
trusted library allocation
page read and write
580000
heap
page read and write
333C0000
trusted library allocation
page read and write
6DE000
heap
page read and write
359B0000
trusted library allocation
page read and write
16D0000
remote allocation
page execute and read and write
6E5000
heap
page read and write
4CF7000
heap
page read and write
6CE000
heap
page read and write
300A000
heap
page read and write
6DE000
heap
page read and write
6D7000
heap
page read and write
B6000
trusted library allocation
page execute and read and write
6CE000
heap
page read and write
409000
unkown
page write copy
359D0000
trusted library allocation
page read and write
359B3000
trusted library allocation
page read and write
3598E000
trusted library allocation
page read and write
6DDA3000
unkown
page readonly
6C2000
heap
page read and write
3556000
heap
page read and write
359B0000
trusted library allocation
page read and write
359A0000
trusted library allocation
page read and write
93000
trusted library allocation
page execute and read and write
6D7000
heap
page read and write
28F5000
heap
page read and write
359A0000
trusted library allocation
page read and write
6EF4F000
unkown
page readonly
334D9000
stack
page read and write
6D3000
heap
page read and write
35970000
trusted library allocation
page read and write
10E000
stack
page read and write
2FD6000
heap
page read and write
302B000
heap
page read and write
359D0000
trusted library allocation
page read and write
14C000
stack
page read and write
6EE000
heap
page read and write
359E0000
heap
page execute and read and write
17D000
trusted library allocation
page read and write
3710000
direct allocation
page read and write
3680000
direct allocation
page read and write
359B3000
trusted library allocation
page read and write
6DE000
heap
page read and write
6351000
direct allocation
page execute and read and write
6D7000
heap
page read and write
359C000
heap
page read and write
6CE000
heap
page read and write
359D0000
trusted library allocation
page read and write
36E0000
direct allocation
page read and write
150000
trusted library allocation
page execute and read and write
35961000
trusted library allocation
page read and write
43D000
unkown
page readonly
35940000
trusted library allocation
page read and write
401000
unkown
page execute read
2FB7000
heap
page read and write
359B0000
trusted library allocation
page read and write
4F51000
direct allocation
page execute and read and write
6C2000
heap
page read and write
36C0000
direct allocation
page read and write
359A0000
trusted library allocation
page read and write
35D7D000
heap
page read and write
170000
trusted library allocation
page read and write
68F000
stack
page read and write
22C0000
heap
page read and write
28FB000
heap
page read and write
6CE000
heap
page read and write
28FB000
heap
page read and write
327A000
heap
page read and write
359B0000
trusted library allocation
page read and write
35980000
trusted library allocation
page read and write
359D0000
trusted library allocation
page read and write
333D0000
heap
page read and write
333C0000
trusted library allocation
page read and write
359D0000
trusted library allocation
page read and write
6E5000
heap
page read and write
35960000
trusted library allocation
page read and write
359B0000
trusted library allocation
page read and write
35960000
trusted library allocation
page read and write
6D7000
heap
page read and write
3360000
heap
page read and write
421000
unkown
page read and write
6D3000
heap
page read and write
2F30000
heap
page read and write
35950000
trusted library allocation
page read and write
359B0000
trusted library allocation
page read and write
35D3B000
heap
page read and write
359B0000
trusted library allocation
page read and write
6E5000
heap
page read and write
19A000
stack
page read and write
6C2000
heap
page read and write
407000
unkown
page readonly
34D4000
heap
page read and write
3460000
heap
page read and write
36030000
trusted library allocation
page read and write
6E5000
heap
page read and write
6DE000
heap
page read and write
28F9000
heap
page read and write
7FDF0000
trusted library allocation
page execute and read and write
30000
heap
page read and write
2E17000
heap
page read and write
4B80000
direct allocation
page read and write
6D3000
heap
page read and write
6643000
heap
page read and write
359B0000
trusted library allocation
page read and write
35840000
heap
page read and write
6EE000
heap
page read and write
28FD000
heap
page read and write
6D3000
heap
page read and write
409000
unkown
page write copy
6DDA0000
unkown
page readonly
AD000
trusted library allocation
page execute and read and write
359B0000
trusted library allocation
page read and write
359B0000
trusted library allocation
page read and write
333C0000
trusted library allocation
page read and write
7CE000
stack
page read and write
3003000
heap
page read and write
359B0000
trusted library allocation
page read and write
28F4000
heap
page read and write
359B0000
trusted library allocation
page read and write
C2000
trusted library allocation
page read and write
35960000
trusted library allocation
page read and write
332B0000
direct allocation
page read and write
28F7000
heap
page read and write
359B1000
trusted library allocation
page read and write
6DDA5000
unkown
page readonly
3567000
heap
page read and write
333C0000
trusted library allocation
page read and write
332A0000
direct allocation
page read and write
359B0000
trusted library allocation
page read and write
2DDE000
stack
page read and write
6D7000
heap
page read and write
6D7000
heap
page read and write
6E5000
heap
page read and write
2250000
heap
page read and write
28F2000
heap
page read and write
6E5000
heap
page read and write
6E5000
heap
page read and write
6DE000
heap
page read and write
33308000
trusted library allocation
page read and write
359D0000
trusted library allocation
page read and write
3482000
heap
page read and write
35970000
trusted library allocation
page read and write
36040000
trusted library allocation
page read and write
2E15000
heap
page read and write
6D3000
heap
page read and write
6DE000
heap
page read and write
358A000
heap
page read and write
409000
unkown
page read and write
4B50000
direct allocation
page read and write
6EB000
heap
page read and write
35D5A000
heap
page read and write
There are 479 hidden memdumps, click here to show them.