IOC Report
FG_ShippingNotice_20250310_XDGF.exe

FilesProcessesURLsDomainsIPsMemdumps8642010010Label

Files

File Path
Type
Category
Malicious
Download
FG_ShippingNotice_20250310_XDGF.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\-2625100
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 9, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 9
dropped
C:\Users\user\AppData\Local\Temp\autD724.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\vehiculation
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FG_ShippingNotice_20250310_XDGF.exe
"C:\Users\user\Desktop\FG_ShippingNotice_20250310_XDGF.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\FG_ShippingNotice_20250310_XDGF.exe"
malicious
C:\Program Files (x86)\BqqNnqTGRQGtzEdqGnQXvbYITpBujlNebdoIksUAzabXHsMtpQpiWNFXyoFKZsIuxtihAkozsdsLxFUQ\iok21GQzqHb1Kd1qFUQz5Z.exe
"C:\Program Files (x86)\BqqNnqTGRQGtzEdqGnQXvbYITpBujlNebdoIksUAzabXHsMtpQpiWNFXyoFKZsIuxtihAkozsdsLxFUQ\QWetsbP3rd.exe"
malicious
C:\Windows\SysWOW64\cmmon32.exe
"C:\Windows\SysWOW64\cmmon32.exe"
malicious
C:\Program Files (x86)\BqqNnqTGRQGtzEdqGnQXvbYITpBujlNebdoIksUAzabXHsMtpQpiWNFXyoFKZsIuxtihAkozsdsLxFUQ\iok21GQzqHb1Kd1qFUQz5Z.exe
"C:\Program Files (x86)\BqqNnqTGRQGtzEdqGnQXvbYITpBujlNebdoIksUAzabXHsMtpQpiWNFXyoFKZsIuxtihAkozsdsLxFUQ\HsooXpBo3Bg.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.hypend.xyz/gu4r/?rhkX=ExrPfPleOhrtKMc4E0x1YdM8YAMhZXSaTb28nWCtMEFFPIdRGvA+QCfHxAnQ9bqX3pHXoQOtZA37KAHC0cnU+SyuNW7GFStUfQIc3nzuBELRAkEy78VvbjII0fgyoTxA2g==&aDLh1=afzX7ZqX
209.74.79.41
malicious
http://www.frenzyflight.buzz/hit3/
199.59.243.228
malicious
http://www.sobold.xyz/ogor/?rhkX=WZIjqjg3eqh3J1D0AB59yx2dvcUmKw7jFNGmaQP5xiTvJDm74vLR2eRfQqXkcK2VYbwnWGny6ZCbQmsWLTKewCzeRCsKjsPHb1gkWwjTd3cB9N3+f1wR6rnbtvLhbuMWOA==&aDLh1=afzX7ZqX
13.248.169.48
malicious
http://www.jicode.xyz/ums2/
13.248.169.48
malicious
http://www.mrguider.pics/xicx/?aDLh1=afzX7ZqX&rhkX=g7UaJs7P/ZYY/8n9FegM3xn/g/YfCUKH27bd3nvYOpm/Qvdq2MShVB0e5/FF6E6qSmqcO2IGTIvZaJg48IZDyo/jWZcs4B/LJptdvCx5mRRWymm+XMY7aUSlDCCG/gy05Q==
199.59.243.228
malicious
http://www.frenzyflight.buzz/hit3/?rhkX=LIH7Tz39j2yYeChDS2IIg/gMdMWprxgm/xEPg6QdH0MAmV61yxogfeG0/M6IznBOTyqOIGDciEgDUY2NfDFpugDVgisj/rGEk+11kmvDuXDrup5A8zHjECs1czAtUYGP4w==&aDLh1=afzX7ZqX
199.59.243.228
malicious
http://www.shiftvault.store/6s01/
84.32.84.32
malicious
http://www.hypend.xyz/gu4r/
209.74.79.41
malicious
http://www.mrguider.pics/xicx/
199.59.243.228
malicious
http://www.mrguider.pics
unknown
https://www.google.com
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
https://www.ecosia.org/newtab/v20
unknown
https://duckduckgo.com/ac/?q=
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://duckduckgo.com/chrome_newtabv209h
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ac.ecosia.org?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
There are 11 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.sobold.xyz
13.248.169.48
malicious
shiftvault.store
84.32.84.32
malicious
94950.bodis.com
199.59.243.228
www.jicode.xyz
13.248.169.48
www.hypend.xyz
209.74.79.41
www.shiftvault.store
unknown
www.frenzyflight.buzz
unknown
www.mrguider.pics
unknown
www.glorifyer.store
unknown

IPs

IP
Domain
Country
Malicious
84.32.84.32
shiftvault.store
Lithuania
malicious
13.248.169.48
www.sobold.xyz
United States
209.74.79.41
www.hypend.xyz
United States
199.59.243.228
94950.bodis.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
2DB0000
trusted library allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
3130000
unkown
page execute and read and write
malicious
A00000
system
page execute and read and write
malicious
46B0000
trusted library allocation
page read and write
malicious
3BA0000
unclassified section
page execute and read and write
malicious
4CF0000
system
page execute and read and write
malicious
3BF0000
unclassified section
page execute and read and write
malicious
2E2D000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
3E1D000
direct allocation
page read and write
7A22000
heap
page read and write
2EBE000
heap
page read and write
23AE5F0A000
trusted library allocation
page read and write
2C91000
heap
page read and write
3013000
heap
page read and write
3CF0000
direct allocation
page read and write
8B9000
unkown
page readonly
610000
unkown
page readonly
2C91000
heap
page read and write
4D47000
system
page execute and read and write
79E3000
heap
page read and write
2C91000
heap
page read and write
11A0000
heap
page read and write
2C91000
heap
page read and write
3E6D000
direct allocation
page read and write
2E3F000
heap
page read and write
C39000
stack
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
100F000
stack
page read and write
79E0000
heap
page read and write
3013000
heap
page read and write
B8C000
stack
page read and write
3E69000
direct allocation
page read and write
FFE000
stack
page read and write
2C91000
heap
page read and write
2E00000
heap
page read and write
3B42000
direct allocation
page execute and read and write
F80000
unkown
page readonly
820000
unkown
page read and write
3219000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
137F000
heap
page read and write
4E7C000
unclassified section
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
3AD1000
direct allocation
page execute and read and write
4A04000
heap
page read and write
620000
unkown
page readonly
23AE5D80000
trusted library allocation
page read and write
3013000
heap
page read and write
2C91000
heap
page read and write
798000
stack
page read and write
23AE5F03000
trusted library allocation
page read and write
2440000
heap
page read and write
FA0000
heap
page read and write
2C91000
heap
page read and write
23AE60AA000
trusted library allocation
page read and write
2ED1000
heap
page read and write
28BC000
unkown
page read and write
1350000
heap
page read and write
5748000
unclassified section
page read and write
3C73000
direct allocation
page read and write
4BAE000
direct allocation
page execute and read and write
3CC3000
direct allocation
page read and write
2E7E000
heap
page read and write
4D60000
system
page execute and read and write
1360000
heap
page read and write
FB0000
unkown
page read and write
2EBB000
heap
page read and write
7A36000
heap
page read and write
392D000
direct allocation
page execute and read and write
610000
unkown
page readonly
4B39000
direct allocation
page execute and read and write
7A19000
heap
page read and write
23AE60C4000
trusted library allocation
page read and write
3E19000
direct allocation
page read and write
2C91000
heap
page read and write
3B50000
direct allocation
page read and write
3E1D000
direct allocation
page read and write
C70000
direct allocation
page read and write
2C91000
heap
page read and write
24F0000
unkown
page readonly
2E33000
heap
page read and write
101B000
stack
page read and write
687000
unkown
page readonly
EB0000
unkown
page readonly
7730000
trusted library allocation
page read and write
2C91000
heap
page read and write
3013000
heap
page read and write
79FA000
heap
page read and write
A50000
heap
page read and write
BCB000
stack
page read and write
2C91000
heap
page read and write
2E90000
heap
page read and write
4866000
heap
page read and write
23AE5F00000
trusted library allocation
page read and write
3013000
heap
page read and write
23AE4560000
heap
page read and write
2C91000
heap
page read and write
8B9000
unkown
page readonly
1310000
unkown
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
3E8E000
direct allocation
page read and write
3013000
heap
page read and write
800000
unkown
page read and write
369C000
unkown
page execute and read and write
3601000
heap
page read and write
139E000
heap
page read and write
2444000
heap
page read and write
2C91000
heap
page read and write
8B9000
unkown
page readonly
4D52000
direct allocation
page execute and read and write
8A0000
unkown
page readonly
2C91000
heap
page read and write
600000
unkown
page readonly
1447000
heap
page read and write
2C91000
heap
page read and write
7A32000
heap
page read and write
4840000
trusted library allocation
page read and write
7A40000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
16C0000
unkown
page readonly
134B000
heap
page read and write
1301000
unkown
page readonly
2C91000
heap
page read and write
23AE45A0000
heap
page read and write
399E000
direct allocation
page execute and read and write
2E82000
heap
page read and write
37A0000
direct allocation
page read and write
23AE5F10000
trusted library allocation
page read and write
2E96000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
5E3000
unkown
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
CAE000
stack
page read and write
79BE000
heap
page read and write
75E000
stack
page read and write
2C91000
heap
page read and write
1364000
heap
page read and write
41C4000
unclassified section
page execute and read and write
8AF000
unkown
page readonly
2C91000
heap
page read and write
3BA0000
direct allocation
page read and write
2440000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
14CE000
stack
page read and write
3729000
heap
page read and write
2C91000
heap
page read and write
2E2D000
heap
page read and write
2C91000
heap
page read and write
4CE1000
direct allocation
page execute and read and write
3000000
heap
page read and write
811E000
stack
page read and write
2C91000
heap
page read and write
5C0000
unkown
page readonly
2C91000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
3D40000
direct allocation
page read and write
2E10000
heap
page read and write
2C91000
heap
page read and write
8A1000
unkown
page execute read
2C91000
heap
page read and write
13C9000
heap
page read and write
7D0000
heap
page read and write
6C54FFB000
stack
page read and write
5C0000
unkown
page readonly
498F000
heap
page read and write
3217000
heap
page read and write
32EC000
unkown
page read and write
630000
heap
page read and write
8AF000
unkown
page readonly
7BFD000
stack
page read and write
1333000
heap
page read and write
2CA000
stack
page read and write
1301000
unkown
page readonly
F3A000
stack
page read and write
4CDD000
direct allocation
page execute and read and write
2C91000
heap
page read and write
2E82000
heap
page read and write
2C91000
heap
page read and write
8A1000
unkown
page execute read
379E000
heap
page read and write
2C91000
heap
page read and write
8B6000
unkown
page read and write
2C91000
heap
page read and write
A0E000
stack
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
4F2C000
unkown
page read and write
2E2D000
heap
page read and write
3D40000
direct allocation
page read and write
809E000
stack
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
8AF000
unkown
page readonly
3040000
unkown
page readonly
3C73000
direct allocation
page read and write
2C91000
heap
page read and write
674000
unkown
page readonly
3B50000
direct allocation
page read and write
3CF0000
direct allocation
page read and write
800000
unkown
page read and write
ED0000
unkown
page readonly
3030000
heap
page read and write
79FE000
heap
page read and write
2C91000
heap
page read and write
34FE000
stack
page read and write
F70000
unkown
page readonly
2C91000
heap
page read and write
F70000
unkown
page readonly
3013000
heap
page read and write
7AB0000
trusted library allocation
page read and write
2C91000
heap
page read and write
79D6000
heap
page read and write
A5A000
heap
page read and write
1350000
heap
page read and write
3205000
heap
page read and write
3013000
heap
page read and write
2EA4000
heap
page read and write
7A04000
heap
page read and write
A79000
heap
page read and write
7D0000
heap
page read and write
C50000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
8B9000
unkown
page readonly
3EDE000
direct allocation
page read and write
2C91000
heap
page read and write
3013000
heap
page read and write
B70000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
139E000
heap
page read and write
770000
unkown
page read and write
23AE42B0000
system
page execute and read and write
FA0000
heap
page read and write
2C91000
heap
page read and write
2E96000
heap
page read and write
B84000
heap
page read and write
3D40000
direct allocation
page read and write
3BA0000
direct allocation
page read and write
F90000
unkown
page readonly
4D50000
system
page execute and read and write
2C91000
heap
page read and write
3800000
direct allocation
page execute and read and write
3E69000
direct allocation
page read and write
23EF000
stack
page read and write
2EDC000
heap
page read and write
75E000
stack
page read and write
3013000
heap
page read and write
5A6C000
unclassified section
page read and write
2C91000
heap
page read and write
1B0E000
stack
page read and write
3600000
heap
page read and write
2EB5000
heap
page read and write
A5E000
heap
page read and write
8AF000
unkown
page readonly
A5E000
heap
page read and write
2EC5000
heap
page read and write
2C91000
heap
page read and write
B50000
unkown
page readonly
23AE5E00000
trusted library allocation
page read and write
3CC3000
direct allocation
page read and write
3BA0000
direct allocation
page read and write
1A50000
unkown
page readonly
2C91000
heap
page read and write
2C91000
heap
page read and write
2EEB000
heap
page read and write
3040000
unkown
page readonly
35FF000
stack
page read and write
2C91000
heap
page read and write
8A0000
unkown
page readonly
146F000
heap
page read and write
7E0000
unkown
page readonly
64F000
unkown
page readonly
2C91000
heap
page read and write
620000
unkown
page readonly
2C91000
heap
page read and write
2C91000
heap
page read and write
79D1000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
137F000
heap
page read and write
1342000
heap
page read and write
2C91000
heap
page read and write
EC0000
unkown
page readonly
4840000
trusted library allocation
page read and write
8A0000
unkown
page readonly
2C91000
heap
page read and write
7C3E000
stack
page read and write
3013000
heap
page read and write
3BA0000
direct allocation
page read and write
23AE45AA000
heap
page read and write
674000
unkown
page readonly
8A1000
unkown
page execute read
49FC000
stack
page read and write
2EF6000
heap
page read and write
EC0000
unkown
page readonly
1350000
unkown
page read and write
761000
unkown
page readonly
B84000
heap
page read and write
2C91000
heap
page read and write
4DC3000
system
page execute and read and write
13C6000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
2E2D000
heap
page read and write
2C91000
heap
page read and write
770000
unkown
page read and write
2C91000
heap
page read and write
13C8000
heap
page read and write
240000
unkown
page readonly
2C91000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
2E29000
heap
page read and write
2C91000
heap
page read and write
4993000
heap
page read and write
2E2D000
heap
page read and write
4700000
trusted library allocation
page read and write
2CA4000
unkown
page read and write
1357000
heap
page read and write
3217000
heap
page read and write
1F0F000
stack
page read and write
810000
unkown
page read and write
2C91000
heap
page read and write
2E7E000
heap
page read and write
3E6D000
direct allocation
page read and write
2EFF000
heap
page read and write
630000
heap
page read and write
2C91000
heap
page read and write
24242000
system
page read and write
1342000
heap
page read and write
2C91000
heap
page read and write
2444000
heap
page read and write
B80000
heap
page read and write
1364000
heap
page read and write
134F000
heap
page execute and read and write
3704000
unkown
page execute and read and write
13E8000
heap
page read and write
139D000
heap
page read and write
14C1000
heap
page read and write
5BFE000
unclassified section
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
46B5000
heap
page read and write
815F000
stack
page read and write
2C91000
heap
page read and write
1310000
unkown
page read and write
79DB000
heap
page read and write
26FC000
unkown
page read and write
2C91000
heap
page read and write
415C000
unclassified section
page execute and read and write
2C91000
heap
page read and write
2CA000
stack
page read and write
2E24000
heap
page read and write
12FC000
stack
page read and write
23AE44C0000
heap
page read and write
16C0000
unkown
page readonly
139A000
heap
page read and write
79C6000
heap
page read and write
2C91000
heap
page read and write
3E1D000
direct allocation
page read and write
79D8000
heap
page read and write
1390000
heap
page read and write
2EE5000
heap
page read and write
2E17000
heap
page read and write
79F4000
heap
page read and write
1280000
heap
page read and write
24F0000
unkown
page readonly
2C91000
heap
page read and write
3E8E000
direct allocation
page read and write
2C91000
heap
page read and write
119E000
stack
page read and write
EE0000
unkown
page readonly
6C56FFE000
stack
page read and write
6C55FFE000
stack
page read and write
2C91000
heap
page read and write
3C73000
direct allocation
page read and write
6C557FE000
stack
page read and write
23AE45CF000
heap
page read and write
5424000
unclassified section
page read and write
67E000
unkown
page read and write
103C000
stack
page read and write
2C91000
heap
page read and write
CEE000
stack
page read and write
7A2E000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
23EF000
stack
page read and write
2C91000
heap
page read and write
FB0000
unkown
page read and write
79E3000
heap
page read and write
2C91000
heap
page read and write
16BF000
stack
page read and write
2E90000
heap
page read and write
9CF000
stack
page read and write
3212000
heap
page read and write
2C91000
heap
page read and write
3030000
heap
page read and write
4D6E000
system
page execute and read and write
687000
unkown
page readonly
7CE000
stack
page read and write
1343000
heap
page read and write
2C91000
heap
page read and write
4D6C000
system
page execute and read and write
2C91000
heap
page read and write
3002000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
5C1000
unkown
page execute read
2C91000
heap
page read and write
347E000
unkown
page read and write
4A10000
direct allocation
page execute and read and write
23AE6000000
trusted library allocation
page read and write
2E22000
heap
page read and write
2C91000
heap
page read and write
2E22000
heap
page read and write
1395000
heap
page read and write
2EAA000
heap
page read and write
A50000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
2C90000
heap
page read and write
2C91000
heap
page read and write
67E000
unkown
page write copy
2C91000
heap
page read and write
11F0000
heap
page read and write
3E19000
direct allocation
page read and write
47A0000
trusted library allocation
page execute and read and write
1330000
unkown
page readonly
2C91000
heap
page read and write
2C91000
heap
page read and write
24E0000
heap
page read and write
139E000
heap
page read and write
C60000
heap
page read and write
23AE60CE000
trusted library allocation
page read and write
2C91000
heap
page read and write
3013000
heap
page read and write
2C91000
heap
page read and write
ED0000
unkown
page readonly
2E36000
unkown
page read and write
1390000
heap
page read and write
87C000
unkown
page read and write
3013000
heap
page read and write
5E0000
unkown
page read and write
8A0000
unkown
page readonly
710000
unkown
page read and write
250000
unkown
page readonly
2C91000
heap
page read and write
260000
unkown
page readonly
3013000
heap
page read and write
2C91000
heap
page read and write
23AE45D2000
heap
page read and write
23AE45BC000
heap
page read and write
79E9000
heap
page read and write
2D90000
heap
page read and write
25E2000
unkown
page read and write
80DF000
stack
page read and write
8A1000
unkown
page execute read
3800000
heap
page read and write
3013000
heap
page read and write
13C8000
heap
page read and write
23AE5F21000
trusted library allocation
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
321A000
heap
page read and write
2C91000
heap
page read and write
3ACD000
direct allocation
page execute and read and write
3EDE000
direct allocation
page read and write
1356000
heap
page execute and read and write
2C91000
heap
page read and write
2451C000
system
page read and write
2EAF000
heap
page read and write
23AE5F17000
trusted library allocation
page read and write
3205000
heap
page read and write
2EA4000
heap
page read and write
7A28000
heap
page read and write
1330000
unkown
page readonly
2C91000
heap
page read and write
24E0000
heap
page read and write
7C90000
heap
page read and write
2C91000
heap
page read and write
23AE5F0E000
trusted library allocation
page read and write
682000
unkown
page write copy
2C91000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
3013000
heap
page read and write
47D8000
heap
page read and write
7C7F000
stack
page read and write
4E22000
unclassified section
page read and write
24302000
system
page read and write
75B000
stack
page read and write
2E24000
heap
page read and write
2C91000
heap
page read and write
55B6000
unclassified section
page read and write
7D6000
heap
page read and write
5C1000
unkown
page execute read
2C91000
heap
page read and write
8B6000
unkown
page read and write
8B6000
unkown
page read and write
48CE000
stack
page read and write
240000
unkown
page readonly
2C91000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
14E0000
heap
page read and write
26A2000
unkown
page read and write
2C91000
heap
page read and write
1080000
heap
page read and write
3B50000
direct allocation
page read and write
3200000
heap
page read and write
3013000
heap
page read and write
2C91000
heap
page read and write
7A3B000
heap
page read and write
7CE000
stack
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
250000
unkown
page readonly
2C91000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
805F000
stack
page read and write
79CC000
heap
page read and write
139D000
heap
page read and write
3013000
heap
page read and write
1318000
heap
page read and write
3E8E000
direct allocation
page read and write
3929000
direct allocation
page execute and read and write
11EE000
stack
page read and write
1357000
heap
page read and write
137F000
heap
page read and write
801E000
stack
page read and write
F80000
unkown
page readonly
F3A000
stack
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
25E2000
unkown
page read and write
2C91000
heap
page read and write
3E6D000
direct allocation
page read and write
23AE60BE000
trusted library allocation
page read and write
7AC0000
trusted library allocation
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
2FC8000
unkown
page read and write
136C000
heap
page read and write
64F000
unkown
page readonly
3E19000
direct allocation
page read and write
2C91000
heap
page read and write
2E8D000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
3400000
heap
page read and write
372D000
heap
page read and write
2F5F000
stack
page read and write
139E000
heap
page read and write
3523000
heap
page read and write
3013000
heap
page read and write
24904000
system
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
2EF0000
heap
page read and write
79C3000
heap
page read and write
3301000
heap
page read and write
1310000
heap
page read and write
23AE45CA000
heap
page read and write
4D62000
unclassified section
page read and write
2D90000
trusted library allocation
page read and write
79C6000
heap
page read and write
600000
unkown
page readonly
23AE6001000
trusted library allocation
page read and write
2C91000
heap
page read and write
761000
unkown
page readonly
2C91000
heap
page read and write
3CC3000
direct allocation
page read and write
2E8D000
heap
page read and write
503C000
unclassified section
page read and write
23AE5D80000
trusted library allocation
page read and write
14E0000
heap
page read and write
3BA0000
direct allocation
page read and write
2C91000
heap
page read and write
7A3E000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
536F000
stack
page read and write
1260000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
EB0000
unkown
page readonly
1350000
unkown
page read and write
490E000
stack
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
3EDE000
direct allocation
page read and write
2C91000
heap
page read and write
B50000
unkown
page readonly
23AE43D0000
heap
page read and write
3B50000
direct allocation
page read and write
C20000
heap
page read and write
9CF000
stack
page read and write
3E69000
direct allocation
page read and write
3BA0000
direct allocation
page read and write
2C91000
heap
page read and write
2E2D000
heap
page read and write
A50000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
6C567FE000
stack
page read and write
4840000
trusted library allocation
page read and write
139E000
heap
page read and write
2C91000
heap
page read and write
139A000
heap
page read and write
2E28000
heap
page read and write
8B6000
unkown
page read and write
3CC000
stack
page read and write
2C91000
heap
page read and write
FFF000
stack
page read and write
12FC000
stack
page read and write
2C91000
heap
page read and write
2435C000
system
page read and write
A5A000
heap
page read and write
79D8000
heap
page read and write
3CF0000
direct allocation
page read and write
28BC000
unkown
page read and write
23AE433C000
system
page execute and read and write
79DE000
heap
page read and write
C00000
heap
page read and write
2C91000
heap
page read and write
1A51000
unkown
page readonly
322C000
heap
page read and write
EE0000
unkown
page readonly
260000
unkown
page readonly
23AE44F0000
heap
page read and write
7E0000
unkown
page readonly
F90000
unkown
page readonly
2C91000
heap
page read and write
2C91000
heap
page read and write
3013000
heap
page read and write
4B3D000
direct allocation
page execute and read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
3804000
heap
page read and write
3CC000
stack
page read and write
2E28000
heap
page read and write
710000
unkown
page read and write
2E33000
heap
page read and write
B84000
heap
page read and write
2C91000
heap
page read and write
2C91000
heap
page read and write
1360000
heap
page read and write
2C91000
heap
page read and write
There are 665 hidden memdumps, click here to show them.