Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
jpgcamscanner_20240521_0072345_JPEG.bat.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\BgImage.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\nsDialogs.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Grundtvigianerens.Unr
|
Matlab v4 mat-file (little endian) \253, numeric, rows 33554432, columns 1572866
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Handrailing.cir
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Schweiziskes\Nonstationaries.pai
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Schweiziskes\Warmakers.fal
|
OpenPGP Public Key
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Schweiziskes\aniara.uns
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Schweiziskes\bekendelsesskriften.pro
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Schweiziskes\databehandlingsforeningers.sky
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Schweiziskes\tsetseflues\electrohomeopathies.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Shamponeringers\mildewy.jam
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Shamponeringers\natans.sma
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Shamponeringers\ovest.tho
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Shamponeringers\paksks.pre
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Shamponeringers\stttepartiets.mis
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Shamponeringers\utilidors.lok
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Shamponeringers\xenonet.mul
|
data
|
dropped
|
There are 9 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
|
"C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe"
|
||
C:\Windows\System32\dllhost.exe
|
C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
|
||
C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
|
"C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://veysiseker.com/FOB.bin
|
192.250.227.27
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://ip-api.com
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
||
veysiseker.com
|
192.250.227.27
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
192.250.227.27
|
veysiseker.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\scarman\overskudsamfund\dragsteren
|
omvurderende
|
||
HKEY_CURRENT_USER\prologers\fortegne
|
concurrently
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jpgcamscanner_20240521_0072345_JPEG_RASMANCS
|
FileDirectory
|
There are 7 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5951000
|
direct allocation
|
page execute and read and write
|
||
36040000
|
trusted library allocation
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
6D7000
|
heap
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
C5000
|
trusted library allocation
|
page execute and read and write
|
||
333C0000
|
trusted library allocation
|
page read and write
|
||
6DDA1000
|
unkown
|
page execute read
|
||
4BB0000
|
direct allocation
|
page read and write
|
||
6EE000
|
heap
|
page read and write
|
||
35970000
|
trusted library allocation
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
333C0000
|
trusted library allocation
|
page read and write
|
||
43D000
|
unkown
|
page readonly
|
||
43D000
|
unkown
|
page readonly
|
||
2E10000
|
heap
|
page read and write
|
||
190000
|
trusted library allocation
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
CB000
|
trusted library allocation
|
page execute and read and write
|
||
36030000
|
trusted library allocation
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
359A0000
|
trusted library allocation
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
359D0000
|
trusted library allocation
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
4B60000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
6CE000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
6D7000
|
heap
|
page read and write
|
||
305E000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
6CE000
|
heap
|
page read and write
|
||
35950000
|
trusted library allocation
|
page read and write
|
||
6E5000
|
heap
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
35986000
|
trusted library allocation
|
page read and write
|
||
585000
|
heap
|
page read and write
|
||
6D7000
|
heap
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
94000
|
trusted library allocation
|
page read and write
|
||
359A0000
|
trusted library allocation
|
page read and write
|
||
6C2000
|
heap
|
page read and write
|
||
359A0000
|
trusted library allocation
|
page read and write
|
||
6E5000
|
heap
|
page read and write
|
||
4BD0000
|
direct allocation
|
page read and write
|
||
28F3000
|
heap
|
page read and write
|
||
28FB000
|
heap
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
6E5000
|
heap
|
page read and write
|
||
180000
|
trusted library allocation
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
160000
|
heap
|
page read and write
|
||
359A0000
|
trusted library allocation
|
page read and write
|
||
44F000
|
unkown
|
page readonly
|
||
4BC0000
|
direct allocation
|
page read and write
|
||
333C0000
|
trusted library allocation
|
page read and write
|
||
35980000
|
trusted library allocation
|
page read and write
|
||
359B2000
|
trusted library allocation
|
page read and write
|
||
2F78000
|
heap
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
3700000
|
direct allocation
|
page read and write
|
||
33660000
|
heap
|
page read and write
|
||
6E5000
|
heap
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
6C2000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
3425000
|
heap
|
page read and write
|
||
35BE000
|
heap
|
page read and write
|
||
6C2000
|
heap
|
page read and write
|
||
35D48000
|
heap
|
page read and write
|
||
36F0000
|
direct allocation
|
page read and write
|
||
33830000
|
heap
|
page execute and read and write
|
||
333A0000
|
trusted library allocation
|
page read and write
|
||
28FB000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
332FA000
|
stack
|
page read and write
|
||
44F000
|
unkown
|
page readonly
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
335DF000
|
stack
|
page read and write
|
||
6EF46000
|
unkown
|
page readonly
|
||
65A2000
|
heap
|
page read and write
|
||
36A0000
|
direct allocation
|
page read and write
|
||
359C0000
|
trusted library allocation
|
page execute and read and write
|
||
190000
|
trusted library allocation
|
page read and write
|
||
359A0000
|
trusted library allocation
|
page read and write
|
||
6CE000
|
heap
|
page read and write
|
||
4BE0000
|
heap
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
6CE000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
430000
|
unkown
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
3670000
|
direct allocation
|
page read and write
|
||
35D45000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
6D7000
|
heap
|
page read and write
|
||
36040000
|
trusted library allocation
|
page read and write
|
||
35C2C000
|
stack
|
page read and write
|
||
337ED000
|
stack
|
page read and write
|
||
6EE000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
6D7000
|
heap
|
page read and write
|
||
6C2000
|
heap
|
page read and write
|
||
33875000
|
trusted library allocation
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
35950000
|
trusted library allocation
|
page read and write
|
||
316F000
|
stack
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
4BA0000
|
direct allocation
|
page read and write
|
||
6CE000
|
heap
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
A4F000
|
stack
|
page read and write
|
||
6603000
|
heap
|
page read and write
|
||
6E5000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
6CE000
|
heap
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
43B000
|
unkown
|
page read and write
|
||
B0000
|
trusted library allocation
|
page read and write
|
||
28F5000
|
heap
|
page read and write
|
||
458000
|
unkown
|
page readonly
|
||
6D3000
|
heap
|
page read and write
|
||
348AA000
|
trusted library allocation
|
page read and write
|
||
359A0000
|
trusted library allocation
|
page execute and read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
6CE000
|
heap
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
359D0000
|
trusted library allocation
|
page read and write
|
||
6685000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
B2000
|
trusted library allocation
|
page read and write
|
||
6EF31000
|
unkown
|
page execute read
|
||
3A50000
|
heap
|
page read and write
|
||
6E5000
|
heap
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
35841000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
2171000
|
remote allocation
|
page execute and read and write
|
||
359D0000
|
trusted library allocation
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
333C0000
|
trusted library allocation
|
page read and write
|
||
338C6000
|
trusted library allocation
|
page read and write
|
||
28F1000
|
heap
|
page read and write
|
||
359D0000
|
trusted library allocation
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
6D7000
|
heap
|
page read and write
|
||
2254000
|
heap
|
page read and write
|
||
333C0000
|
trusted library allocation
|
page read and write
|
||
35D7E000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
35990000
|
trusted library allocation
|
page read and write
|
||
35F6000
|
heap
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
6F1000
|
heap
|
page read and write
|
||
44D000
|
unkown
|
page readonly
|
||
6DE000
|
heap
|
page read and write
|
||
359D0000
|
trusted library allocation
|
page read and write
|
||
33770000
|
heap
|
page read and write
|
||
6EE000
|
heap
|
page read and write
|
||
6E5000
|
heap
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
6D7000
|
heap
|
page read and write
|
||
6CE000
|
heap
|
page read and write
|
||
6CE000
|
heap
|
page read and write
|
||
34869000
|
trusted library allocation
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
6D7000
|
heap
|
page read and write
|
||
359B1000
|
trusted library allocation
|
page read and write
|
||
6D7000
|
heap
|
page read and write
|
||
458000
|
unkown
|
page readonly
|
||
6E5000
|
heap
|
page read and write
|
||
35949000
|
trusted library allocation
|
page read and write
|
||
416000
|
unkown
|
page read and write
|
||
6EE000
|
heap
|
page read and write
|
||
6D7000
|
heap
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
3308F000
|
stack
|
page read and write
|
||
35990000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
401000
|
unkown
|
page execute read
|
||
27EF000
|
stack
|
page read and write
|
||
3001000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page write copy
|
||
6CE000
|
heap
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
229E000
|
stack
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
28F4000
|
heap
|
page read and write
|
||
1771000
|
remote allocation
|
page execute and read and write
|
||
44D000
|
unkown
|
page readonly
|
||
6C2000
|
heap
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
6F1000
|
heap
|
page read and write
|
||
43D000
|
unkown
|
page readonly
|
||
28FE000
|
heap
|
page read and write
|
||
425000
|
unkown
|
page read and write
|
||
34841000
|
trusted library allocation
|
page read and write
|
||
6E5000
|
heap
|
page read and write
|
||
35D30000
|
heap
|
page read and write
|
||
35970000
|
trusted library allocation
|
page read and write
|
||
36030000
|
trusted library allocation
|
page read and write
|
||
32F8E000
|
stack
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
36030000
|
trusted library allocation
|
page read and write
|
||
333C0000
|
trusted library allocation
|
page read and write
|
||
6C2000
|
heap
|
page read and write
|
||
3690000
|
direct allocation
|
page read and write
|
||
2FF5000
|
heap
|
page read and write
|
||
35950000
|
trusted library allocation
|
page read and write
|
||
23A0000
|
heap
|
page read and write
|
||
359A0000
|
trusted library allocation
|
page read and write
|
||
6D7000
|
heap
|
page read and write
|
||
190000
|
trusted library allocation
|
page read and write
|
||
6E5000
|
heap
|
page read and write
|
||
28FE000
|
heap
|
page read and write
|
||
35980000
|
trusted library allocation
|
page read and write
|
||
2B71000
|
remote allocation
|
page execute and read and write
|
||
407000
|
unkown
|
page readonly
|
||
3660000
|
direct allocation
|
page read and write
|
||
359C0000
|
trusted library allocation
|
page read and write
|
||
6D7000
|
heap
|
page read and write
|
||
2E00000
|
direct allocation
|
page read and write
|
||
698000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
359A0000
|
trusted library allocation
|
page read and write
|
||
57E000
|
stack
|
page read and write
|
||
44D000
|
unkown
|
page readonly
|
||
65C4000
|
heap
|
page read and write
|
||
4B70000
|
direct allocation
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
44F000
|
unkown
|
page readonly
|
||
359D0000
|
trusted library allocation
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
35F2F000
|
stack
|
page read and write
|
||
28EF000
|
stack
|
page read and write
|
||
6EB000
|
heap
|
page read and write
|
||
458000
|
unkown
|
page readonly
|
||
36D0000
|
direct allocation
|
page read and write
|
||
36B0000
|
direct allocation
|
page read and write
|
||
6CE000
|
heap
|
page read and write
|
||
6C2000
|
heap
|
page read and write
|
||
359D0000
|
trusted library allocation
|
page read and write
|
||
6C2000
|
heap
|
page read and write
|
||
9D000
|
trusted library allocation
|
page execute and read and write
|
||
35E4000
|
heap
|
page read and write
|
||
2F2C000
|
stack
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
44F000
|
unkown
|
page readonly
|
||
359B2000
|
trusted library allocation
|
page read and write
|
||
6EE000
|
heap
|
page read and write
|
||
4CF0000
|
heap
|
page read and write
|
||
44D000
|
unkown
|
page readonly
|
||
A0000
|
trusted library allocation
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
6C2000
|
heap
|
page read and write
|
||
6EF4D000
|
unkown
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
237E000
|
stack
|
page read and write
|
||
35990000
|
trusted library allocation
|
page read and write
|
||
3C4D000
|
stack
|
page read and write
|
||
6C2000
|
heap
|
page read and write
|
||
28F6000
|
heap
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
28F3000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
429000
|
unkown
|
page read and write
|
||
3361C000
|
stack
|
page read and write
|
||
3B4C000
|
stack
|
page read and write
|
||
338C8000
|
trusted library allocation
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
80000
|
trusted library allocation
|
page read and write
|
||
359D0000
|
trusted library allocation
|
page read and write
|
||
6CE000
|
heap
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
C7000
|
trusted library allocation
|
page execute and read and write
|
||
333C0000
|
trusted library allocation
|
page read and write
|
||
458000
|
unkown
|
page readonly
|
||
90000
|
trusted library allocation
|
page read and write
|
||
34B4000
|
heap
|
page read and write
|
||
6C2000
|
heap
|
page read and write
|
||
6EE000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
6CE000
|
heap
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
3376E000
|
stack
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
190000
|
trusted library allocation
|
page read and write
|
||
6C2000
|
heap
|
page read and write
|
||
65D6000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
32F40000
|
trusted library allocation
|
page read and write
|
||
6CE000
|
heap
|
page read and write
|
||
36030000
|
trusted library allocation
|
page read and write
|
||
8CF000
|
stack
|
page read and write
|
||
BA000
|
trusted library allocation
|
page execute and read and write
|
||
28FD000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
6C2000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
33841000
|
trusted library allocation
|
page read and write
|
||
330A0000
|
heap
|
page read and write
|
||
361D000
|
heap
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
333CD000
|
trusted library allocation
|
page read and write
|
||
36030000
|
trusted library allocation
|
page read and write
|
||
6EF30000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
6C2000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
359B1000
|
trusted library allocation
|
page read and write
|
||
6E5000
|
heap
|
page read and write
|
||
23A5000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
35D43000
|
heap
|
page read and write
|
||
35D37000
|
heap
|
page read and write
|
||
4B90000
|
direct allocation
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
333C0000
|
trusted library allocation
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
16D0000
|
remote allocation
|
page execute and read and write
|
||
6E5000
|
heap
|
page read and write
|
||
4CF7000
|
heap
|
page read and write
|
||
6CE000
|
heap
|
page read and write
|
||
300A000
|
heap
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
6D7000
|
heap
|
page read and write
|
||
B6000
|
trusted library allocation
|
page execute and read and write
|
||
6CE000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page write copy
|
||
359D0000
|
trusted library allocation
|
page read and write
|
||
359B3000
|
trusted library allocation
|
page read and write
|
||
3598E000
|
trusted library allocation
|
page read and write
|
||
6DDA3000
|
unkown
|
page readonly
|
||
6C2000
|
heap
|
page read and write
|
||
3556000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
359A0000
|
trusted library allocation
|
page read and write
|
||
93000
|
trusted library allocation
|
page execute and read and write
|
||
6D7000
|
heap
|
page read and write
|
||
28F5000
|
heap
|
page read and write
|
||
359A0000
|
trusted library allocation
|
page read and write
|
||
6EF4F000
|
unkown
|
page readonly
|
||
334D9000
|
stack
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
35970000
|
trusted library allocation
|
page read and write
|
||
10E000
|
stack
|
page read and write
|
||
2FD6000
|
heap
|
page read and write
|
||
302B000
|
heap
|
page read and write
|
||
359D0000
|
trusted library allocation
|
page read and write
|
||
14C000
|
stack
|
page read and write
|
||
6EE000
|
heap
|
page read and write
|
||
359E0000
|
heap
|
page execute and read and write
|
||
17D000
|
trusted library allocation
|
page read and write
|
||
3710000
|
direct allocation
|
page read and write
|
||
3680000
|
direct allocation
|
page read and write
|
||
359B3000
|
trusted library allocation
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
6351000
|
direct allocation
|
page execute and read and write
|
||
6D7000
|
heap
|
page read and write
|
||
359C000
|
heap
|
page read and write
|
||
6CE000
|
heap
|
page read and write
|
||
359D0000
|
trusted library allocation
|
page read and write
|
||
36E0000
|
direct allocation
|
page read and write
|
||
150000
|
trusted library allocation
|
page execute and read and write
|
||
35961000
|
trusted library allocation
|
page read and write
|
||
43D000
|
unkown
|
page readonly
|
||
35940000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2FB7000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
4F51000
|
direct allocation
|
page execute and read and write
|
||
6C2000
|
heap
|
page read and write
|
||
36C0000
|
direct allocation
|
page read and write
|
||
359A0000
|
trusted library allocation
|
page read and write
|
||
35D7D000
|
heap
|
page read and write
|
||
170000
|
trusted library allocation
|
page read and write
|
||
68F000
|
stack
|
page read and write
|
||
22C0000
|
heap
|
page read and write
|
||
28FB000
|
heap
|
page read and write
|
||
6CE000
|
heap
|
page read and write
|
||
28FB000
|
heap
|
page read and write
|
||
327A000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
35980000
|
trusted library allocation
|
page read and write
|
||
359D0000
|
trusted library allocation
|
page read and write
|
||
333D0000
|
heap
|
page read and write
|
||
333C0000
|
trusted library allocation
|
page read and write
|
||
359D0000
|
trusted library allocation
|
page read and write
|
||
6E5000
|
heap
|
page read and write
|
||
35960000
|
trusted library allocation
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
35960000
|
trusted library allocation
|
page read and write
|
||
6D7000
|
heap
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
421000
|
unkown
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
35950000
|
trusted library allocation
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
35D3B000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
6E5000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
6C2000
|
heap
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
34D4000
|
heap
|
page read and write
|
||
3460000
|
heap
|
page read and write
|
||
36030000
|
trusted library allocation
|
page read and write
|
||
6E5000
|
heap
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
28F9000
|
heap
|
page read and write
|
||
7FDF0000
|
trusted library allocation
|
page execute and read and write
|
||
30000
|
heap
|
page read and write
|
||
2E17000
|
heap
|
page read and write
|
||
4B80000
|
direct allocation
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
6643000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
35840000
|
heap
|
page read and write
|
||
6EE000
|
heap
|
page read and write
|
||
28FD000
|
heap
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page write copy
|
||
6DDA0000
|
unkown
|
page readonly
|
||
AD000
|
trusted library allocation
|
page execute and read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
333C0000
|
trusted library allocation
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
3003000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
28F4000
|
heap
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
C2000
|
trusted library allocation
|
page read and write
|
||
35960000
|
trusted library allocation
|
page read and write
|
||
332B0000
|
direct allocation
|
page read and write
|
||
28F7000
|
heap
|
page read and write
|
||
359B1000
|
trusted library allocation
|
page read and write
|
||
6DDA5000
|
unkown
|
page readonly
|
||
3567000
|
heap
|
page read and write
|
||
333C0000
|
trusted library allocation
|
page read and write
|
||
332A0000
|
direct allocation
|
page read and write
|
||
359B0000
|
trusted library allocation
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
6D7000
|
heap
|
page read and write
|
||
6D7000
|
heap
|
page read and write
|
||
6E5000
|
heap
|
page read and write
|
||
2250000
|
heap
|
page read and write
|
||
28F2000
|
heap
|
page read and write
|
||
6E5000
|
heap
|
page read and write
|
||
6E5000
|
heap
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
33308000
|
trusted library allocation
|
page read and write
|
||
359D0000
|
trusted library allocation
|
page read and write
|
||
3482000
|
heap
|
page read and write
|
||
35970000
|
trusted library allocation
|
page read and write
|
||
36040000
|
trusted library allocation
|
page read and write
|
||
2E15000
|
heap
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
358A000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
6EB000
|
heap
|
page read and write
|
||
35D5A000
|
heap
|
page read and write
|
There are 479 hidden memdumps, click here to show them.