IOC Report
PJ-0020241013_setup.exe

loading gif

Files

File Path
Type
Category
Malicious
PJ-0020241013_setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\z.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
dropped
malicious
C:\Users\user\Documents\czrdnq8b.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Documents\conf.ini
ASCII text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PJ-0020241013_setup.exe
"C:\Users\user\Desktop\PJ-0020241013_setup.exe"
malicious
C:\Users\user\Documents\czrdnq8b.exe
"C:\Users\user\Documents\czrdnq8b.exe"
malicious

URLs

Name
IP
Malicious
https://www.wps.com/eula
unknown
https://drive.wps.com/filecollect/
unknown
https://github.com/ldcsaa/HP-SocketF
unknown
http://wps-community.org/download/dicts/Zip
unknown
https://www.wps.com/support
unknown
https://get.wps.cn/feedback/pc?product_id=1000099&detail=Open_print_service_kso_Printer_ConnectTimeo
unknown
http://203.107.1.33/100000/d?host=www.aliyun.comKeep-Alivei
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://www.winimage.com/zLibDll-incompatible
unknown
https://2023.ipchaxun.com/
unknown
http://wps-community.org/download.html
unknown
http://wdl1.cache.wps.cn/per-plugin/dl/onlineshapes/
unknown
https://searchplugin.csdn.net/api/v1/ip/get
unknown
https://f.wps.cn/
unknown
https://privacy.wps.cn/policies/eula/wps-pdf-Windows
unknown
https://www.wps.cn/learning/
unknown
http://Mpr.dllWNetAddConnection2Wnamelist/wps/jsaddons/jsaddinblockhost.ini/wps/jsaddons/authaddin.j
unknown
https://vip.wps.cn/pay/member/%1/?csource=docerpersonclientNewInstallTime1onFinished(QNetworkReply
unknown
http://203.107.1.33/100000/d?host=www.aliyun.com
unknown
http://www.baidu.com/robots.txt
unknown
http://ic.wps.cn/wpsv6internet/infos.adsICLimitElapsedICForTestICPercentCTICPercentProofreadBottomIC
unknown
http://switch.pcfg.cache.wpscdn.cn/platform_lmt/BackStageCfgPreCheck
unknown
https://f.wps.cn/https://www.wps.cn/learning/https://get.wps.cn/PrintPreview/ControlTitleFeedback&ap
unknown
http://info.wps.cn/wpsv6internet/infos.ads56drive_improvenew_slide_btnjm_function/2019/wps/client/ap
unknown
https://www.wps.com/supporthttps://get.wps.cn/feedback/pcPreview
unknown
https://switch.pcfg.cache.wpscdn.cn/wps_assets/cfg/ad/switch/
unknown
https://get.wps.cn/feedback/pc?product_id=1000099&detail=Trouble_shooting
unknown
https://get.wps.cn/
unknown
http://switch.pcfg.cache.wpscdn.cn/platform_lmt/
unknown
http://203.107.1.33/100000/d?host=www.aliyun.comKeep-Alive
unknown
https://drive.wps.com/filecollect/pc_filecollectDisableFileCollectfeature_filecollectDateSkewedInval
unknown
https://searchplugin.csdn.net/api/v1/ip/geth
unknown
https://www.google.com/search?q=%1
unknown
https://qa.wps.cn/feedback/front?wpsid=%1&product_name=%2
unknown
https://get.wps.cn/feedback/pc?product_id=1000099&detail=Trouble_shooting_kso_Printer_QueryTimeout_M
unknown
https://switch.pcfg.cache.wpscdn.cn/wps_assets/cfg/ad/switch/h
unknown
https://get.wps.cn/feedback/pc
unknown
https://127.0.0.1:58891/transferEcho/runParams
unknown
https://vip.wps.cn/pay/member/%1/?csource=docerpersonclient
unknown
https://2023.ipchaxun.com/ip#
unknown
http://203.107.1.33/7
unknown
https://vipapi.wps.cn/skin/api/upgrade_skin?snact=1?snact=01onRequestUrlSuccess(TASKID
unknown
http://127.0.0.1:58890/transferEcho/runParamshttps://127.0.0.1:58891/transferEcho/runParams);xhr.sen
unknown
https://vipapi.wps.cn/skin/api/upgrade_skin
unknown
http://www.baidu.com/robots.txtdefaultValue
unknown
https://qing.wps.cn
unknown
https://www.wps.cn/privacy/full_pdfproEnableEULAPageSetup/CustomInstitutionsetup/CustomPlatformsetup
unknown
http://127.0.0.1:58890/transferEcho/runParams
unknown
http://spinfo.wps.cn/subproduct/infos.adsSoftware
unknown
https://www.google.com/search?q=%1p
unknown
http://203.107.1.33/100000/d?host=www.aliyun.comO
unknown
http://root/CertEnroll/kingsoft%20root.crl02
unknown
http://root/CertEnroll/root_kingsoft%20root.crt0=
unknown
https://qing.wps.cn/api/ping1onNetworkRequestFinished(QNetworkReply
unknown
http://wps-community.org/download/dicts/
unknown
https://get.wps.cn/feedback/pc?product_id=1000099&detail=Open_print_service
unknown
https://home.wps.cn/topic/10224
unknown
http://203.107.1.33/100000/d?host=www.aliyun.comr/
unknown
https://vip.wps.cn/privilege_page/privilege_detail?id=%1
unknown
https://www.wps.cn/privacy/full_pdfpro
unknown
http://203.107.1.33/
unknown
http://www.winimage.com/zLibDll
unknown
https://vip.wps.cn/privilege_page/privilege_detail?id=%1border-radiusKArrowToolTipWidgetshadow-width
unknown
http://info.wps.cn/wpsv6internet/infos.adswps_safep0p1p2p3p4p5p6p7dm=%1&action=%1&guid=%1&hdid=%1&uu
unknown
https://privacy.wps.cn/policies/eula/wps_forB
unknown
http://info.wps.cn/wpsv6internet/infos.ads
unknown
There are 56 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
203.107.1.33
unknown
China
58.49.151.131
unknown
China

Memdumps

Base Address
Regiontype
Protect
Malicious
14EC000
stack
page read and write
1FD4000
heap
page read and write
1F60000
unkown
page readonly
1FD4000
heap
page read and write
FB1000
unkown
page execute and read and write
1FD4000
heap
page read and write
12ED000
heap
page read and write
444F000
stack
page read and write
1D6F000
unkown
page readonly
19BB000
unkown
page readonly
1200000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
38C0000
remote allocation
page read and write
3450000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
5E60000
heap
page read and write
34EA000
heap
page read and write
1FD4000
heap
page read and write
379E000
direct allocation
page readonly
1FD4000
heap
page read and write
1FD4000
heap
page read and write
3449000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1D6F000
unkown
page readonly
1FD4000
heap
page read and write
1FD4000
heap
page read and write
2E74000
heap
page read and write
3C20000
trusted library allocation
page read and write
3C20000
trusted library allocation
page read and write
410D000
stack
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
34DC000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
2FEC000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
346F000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
BA0000
heap
page read and write
1DC6000
unkown
page readonly
1FD4000
heap
page read and write
1238000
heap
page read and write
4D4000
unkown
page readonly
3421000
heap
page read and write
19B3000
unkown
page readonly
3C20000
trusted library allocation
page read and write
4271000
heap
page read and write
34FD000
heap
page read and write
3423000
heap
page read and write
F00000
trusted library allocation
page read and write
346F000
heap
page read and write
1199000
unkown
page read and write
FB6000
unkown
page execute read
2FCE000
stack
page read and write
3CF0000
heap
page execute and read and write
3459000
heap
page read and write
1FD4000
heap
page read and write
2F27000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
38AE000
stack
page read and write
1FD4000
heap
page read and write
399E000
stack
page read and write
3459000
heap
page read and write
1FD4000
heap
page read and write
FC6000
unkown
page execute read
34AA000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
13E7000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
345D000
heap
page read and write
119B000
unkown
page write copy
19AC000
unkown
page readonly
395E000
stack
page read and write
F00000
trusted library allocation
page read and write
1FD4000
heap
page read and write
4D4000
unkown
page readonly
1FD4000
heap
page read and write
3459000
heap
page read and write
20D6000
heap
page read and write
FB1000
unkown
page execute read
39A0000
heap
page read and write
3423000
heap
page read and write
1FCE000
stack
page read and write
1FD4000
heap
page read and write
4271000
heap
page read and write
1FD4000
heap
page read and write
635E000
stack
page read and write
3E30000
heap
page read and write
1255000
heap
page read and write
1FD4000
heap
page read and write
4550000
heap
page read and write
3DD0000
trusted library allocation
page read and write
5EBF000
heap
page read and write
98000
stack
page read and write
19AC000
unkown
page readonly
1FD4000
heap
page read and write
4550000
trusted library allocation
page read and write
1FD4000
heap
page read and write
3AAE000
stack
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
34A8000
heap
page read and write
437D000
heap
page read and write
585E000
heap
page read and write
1FD4000
heap
page read and write
FB0000
unkown
page readonly
1FD4000
heap
page read and write
126A000
heap
page read and write
3459000
heap
page read and write
1FD5000
heap
page read and write
19C8000
unkown
page readonly
1FD4000
heap
page read and write
3420000
heap
page read and write
585A000
heap
page read and write
1FD4000
heap
page read and write
400000
unkown
page readonly
F00000
trusted library allocation
page read and write
19B9000
unkown
page readonly
13E7000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
5A60000
heap
page read and write
3825000
direct allocation
page read and write
124C000
heap
page read and write
F00000
trusted library allocation
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
19B3000
unkown
page readonly
346F000
heap
page read and write
129D000
heap
page read and write
1EFF000
unkown
page read and write
F00000
trusted library allocation
page read and write
1F00000
unkown
page write copy
1FD4000
heap
page read and write
1FD4000
heap
page read and write
4550000
trusted library allocation
page read and write
4271000
heap
page read and write
34EA000
heap
page read and write
5A6E000
heap
page read and write
4651000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
5851000
heap
page read and write
344D000
heap
page read and write
34A7000
heap
page read and write
F00000
trusted library allocation
page read and write
346F000
heap
page read and write
3C70000
heap
page read and write
1FD4000
heap
page read and write
FA4000
direct allocation
page execute and read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
400000
unkown
page readonly
10012000
unkown
page execute and write copy
1FD4000
heap
page read and write
1FD5000
heap
page read and write
201E000
stack
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
345D000
heap
page read and write
118C000
unkown
page write copy
1FD5000
heap
page read and write
1FD5000
heap
page read and write
3C20000
trusted library allocation
page read and write
1FD5000
heap
page read and write
3E0F000
stack
page read and write
1FD4000
heap
page read and write
3459000
heap
page read and write
1FD4000
heap
page read and write
3721000
direct allocation
page execute read
FCA000
unkown
page execute and read and write
3DC0000
heap
page read and write
391E000
stack
page read and write
F00000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
1FD4000
heap
page read and write
3521000
heap
page read and write
3720000
direct allocation
page read and write
19A9000
unkown
page readonly
1FD4000
heap
page read and write
1FD4000
heap
page read and write
3421000
heap
page read and write
20C6000
heap
page read and write
1FD4000
heap
page read and write
FBD000
unkown
page execute and read and write
434E000
stack
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1FD5000
heap
page read and write
20F8000
heap
page read and write
1FD4000
heap
page read and write
3471000
heap
page read and write
3D00000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
34E8000
heap
page read and write
10013000
unkown
page read and write
18D4000
unkown
page readonly
F00000
trusted library allocation
page read and write
1FD5000
heap
page read and write
1FD5000
heap
page read and write
208A000
heap
page read and write
1234000
heap
page read and write
20C2000
heap
page read and write
1FD4000
heap
page read and write
12BE000
heap
page read and write
1FD5000
heap
page read and write
346F000
heap
page read and write
400E000
stack
page read and write
2F20000
direct allocation
page execute and read and write
1190000
unkown
page write copy
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1FD5000
heap
page read and write
FB0000
unkown
page readonly
1EFD000
unkown
page write copy
3C20000
trusted library allocation
page read and write
3450000
heap
page read and write
1FD5000
heap
page read and write
3444000
heap
page read and write
19B1000
unkown
page readonly
11D4000
unkown
page read and write
1FD4000
heap
page read and write
F00000
trusted library allocation
page read and write
1DC6000
unkown
page readonly
1FD4000
heap
page read and write
125F000
heap
page read and write
20D6000
heap
page read and write
1FD4000
heap
page read and write
244F000
stack
page read and write
FC3000
unkown
page execute read
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
621E000
stack
page read and write
13E0000
heap
page read and write
1FD4000
heap
page read and write
1FD5000
heap
page read and write
34EB000
heap
page read and write
3C20000
trusted library allocation
page read and write
1FD4000
heap
page read and write
F00000
trusted library allocation
page read and write
1FD4000
heap
page read and write
3444000
heap
page read and write
126E000
heap
page read and write
1F70000
heap
page read and write
1FD4000
heap
page read and write
4651000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1F58000
unkown
page read and write
FBE000
unkown
page execute read
34DE000
heap
page read and write
3AFE000
stack
page read and write
B3A000
stack
page read and write
10A8000
unkown
page readonly
1FD4000
heap
page read and write
1FD4000
heap
page read and write
F00000
trusted library allocation
page read and write
1FD5000
heap
page read and write
1FD4000
heap
page read and write
38C0000
remote allocation
page read and write
2F10000
heap
page read and write
1EFD000
unkown
page write copy
1FD4000
heap
page read and write
19A000
stack
page read and write
19B3000
unkown
page readonly
38D0000
heap
page read and write
3450000
heap
page read and write
1FD4000
heap
page read and write
61DF000
stack
page read and write
1FD4000
heap
page read and write
234E000
stack
page read and write
34DF000
heap
page read and write
F00000
trusted library allocation
page read and write
19A2000
unkown
page readonly
3451000
heap
page read and write
1234000
heap
page read and write
13E5000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
34A8000
heap
page read and write
1FD4000
heap
page read and write
3C20000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
1FD4000
heap
page read and write
3C20000
trusted library allocation
page read and write
1FD4000
heap
page read and write
1F20000
unkown
page read and write
1FD4000
heap
page read and write
3DD0000
trusted library allocation
page read and write
1FD4000
heap
page read and write
1234000
heap
page read and write
1FD4000
heap
page read and write
BFC000
stack
page read and write
1FD4000
heap
page read and write
20B9000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
19C8000
unkown
page readonly
1FD4000
heap
page read and write
3427000
heap
page read and write
F00000
trusted library allocation
page read and write
3450000
heap
page read and write
1FD4000
heap
page read and write
19BB000
unkown
page readonly
1FD4000
heap
page read and write
3E27000
heap
page read and write
6077000
heap
page read and write
FC1000
unkown
page execute and read and write
1FD4000
heap
page read and write
4270000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
4280000
heap
page read and write
345B000
heap
page read and write
19AC000
unkown
page readonly
1FD4000
heap
page read and write
1FD4000
heap
page read and write
FE5000
unkown
page execute read
1FD4000
heap
page read and write
1FD4000
heap
page read and write
37AE000
direct allocation
page read and write
19B1000
unkown
page readonly
65DC000
stack
page read and write
4271000
heap
page read and write
1FD4000
heap
page read and write
344D000
heap
page read and write
586D000
heap
page read and write
1FD4000
heap
page read and write
3423000
heap
page read and write
13E7000
heap
page read and write
1FD4000
heap
page read and write
342A000
heap
page read and write
3427000
heap
page read and write
4D4000
unkown
page readonly
3421000
heap
page read and write
5856000
heap
page read and write
118E000
unkown
page read and write
3C0F000
stack
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
3450000
heap
page read and write
3429000
heap
page read and write
1FD4000
heap
page read and write
10001000
unkown
page execute and read and write
1FD0000
heap
page read and write
1FD4000
heap
page read and write
584F000
heap
page read and write
1250000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
4271000
heap
page read and write
3C20000
trusted library allocation
page read and write
1FD4000
heap
page read and write
5C75000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
454E000
stack
page read and write
1243000
heap
page read and write
4D7D000
heap
page read and write
4651000
heap
page read and write
5E1E000
stack
page read and write
346F000
heap
page read and write
3601000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1269000
heap
page read and write
1FD4000
heap
page read and write
5C97000
heap
page read and write
3520000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
126E000
heap
page read and write
ED4000
unkown
page readonly
12AA000
heap
page read and write
1FD4000
heap
page read and write
20AF000
heap
page read and write
4650000
heap
page read and write
19B1000
unkown
page readonly
1FD4000
heap
page read and write
1FD4000
heap
page read and write
34AF000
heap
page read and write
1FD4000
heap
page read and write
F90000
direct allocation
page execute and read and write
11D6000
unkown
page read and write
1FD4000
heap
page read and write
2E7A000
heap
page read and write
FCE000
unkown
page execute read
F00000
trusted library allocation
page read and write
1FD4000
heap
page read and write
2070000
heap
page read and write
1FD5000
heap
page read and write
FE2000
unkown
page execute and read and write
3449000
heap
page read and write
1FD4000
heap
page read and write
11DD000
unkown
page readonly
1FD4000
heap
page read and write
344D000
heap
page read and write
FB7000
unkown
page execute and read and write
659F000
stack
page read and write
3B00000
heap
page read and write
3C70000
heap
page read and write
1F60000
unkown
page readonly
3C20000
trusted library allocation
page read and write
1FD5000
heap
page read and write
60CE000
heap
page read and write
2EAE000
stack
page read and write
128C000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
20C6000
heap
page read and write
649E000
stack
page read and write
20C6000
heap
page read and write
5C7D000
heap
page read and write
1FD4000
heap
page read and write
19B9000
unkown
page readonly
126A000
heap
page read and write
128D000
heap
page read and write
34A8000
heap
page read and write
5865000
heap
page read and write
37C0000
direct allocation
page read and write
1FD4000
heap
page read and write
FC5000
unkown
page execute and read and write
16C0000
heap
page read and write
18D4000
unkown
page readonly
EFC000
stack
page read and write
1FD4000
heap
page read and write
358E000
heap
page read and write
1FD4000
heap
page read and write
5E5E000
stack
page read and write
3521000
heap
page read and write
11AE000
unkown
page read and write
1FD4000
heap
page read and write
3463000
heap
page read and write
1FD4000
heap
page read and write
2FB7000
heap
page read and write
19A9000
unkown
page readonly
2EEB000
stack
page read and write
34AA000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1FD5000
heap
page read and write
3E20000
heap
page read and write
2528000
heap
page read and write
11DD000
unkown
page readonly
19A2000
unkown
page readonly
13E7000
heap
page read and write
18D4000
unkown
page readonly
3421000
heap
page read and write
1209000
heap
page read and write
2F22000
heap
page read and write
37E0000
direct allocation
page read and write
1FD4000
heap
page read and write
19A2000
unkown
page readonly
34F3000
heap
page read and write
3421000
heap
page read and write
1FD4000
heap
page read and write
3423000
heap
page read and write
1242000
heap
page read and write
4750000
trusted library allocation
page read and write
20F9000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1234000
heap
page read and write
1288000
heap
page read and write
19C0000
unkown
page readonly
345E000
heap
page read and write
3421000
heap
page read and write
1FD5000
heap
page read and write
1FD5000
heap
page read and write
3C20000
trusted library allocation
page read and write
1F12000
unkown
page read and write
5A60000
trusted library allocation
page read and write
1FD4000
heap
page read and write
20D6000
heap
page read and write
3459000
heap
page read and write
1FD4000
heap
page read and write
19C8000
unkown
page readonly
1FD4000
heap
page read and write
1234000
heap
page read and write
1F80000
heap
page read and write
1FD4000
heap
page read and write
34DE000
heap
page read and write
346F000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
5E4F000
heap
page read and write
1FD4000
heap
page read and write
343D000
heap
page read and write
F00000
trusted library allocation
page read and write
5A60000
trusted library allocation
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
3451000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
20C3000
heap
page read and write
1FD4000
heap
page read and write
2F08000
heap
page read and write
118C000
unkown
page write copy
5847000
heap
page read and write
1FD5000
heap
page read and write
34EA000
heap
page read and write
3421000
heap
page read and write
1FD4000
heap
page read and write
3449000
heap
page read and write
1FD4000
heap
page read and write
3521000
heap
page read and write
20B8000
heap
page read and write
5860000
heap
page read and write
BB0000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
2F7A000
direct allocation
page execute and read and write
2510000
heap
page read and write
1FD5000
heap
page read and write
15B0000
heap
page read and write
1FD4000
heap
page read and write
4930000
heap
page read and write
3461000
heap
page read and write
208E000
heap
page read and write
37D8000
direct allocation
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
19C0000
unkown
page readonly
1FD5000
heap
page read and write
1FD5000
heap
page read and write
ED4000
unkown
page readonly
1FD5000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
F00000
trusted library allocation
page read and write
4651000
heap
page read and write
2060000
heap
page read and write
F00000
trusted library allocation
page read and write
37BC000
direct allocation
page read and write
34AE000
heap
page read and write
2064000
heap
page read and write
5C26000
heap
page read and write
5A60000
trusted library allocation
page read and write
1FD4000
heap
page read and write
2E70000
heap
page read and write
16A0000
heap
page read and write
19A9000
unkown
page readonly
1FD4000
heap
page read and write
10AC000
unkown
page readonly
1FD4000
heap
page read and write
1FD4000
heap
page read and write
3459000
heap
page read and write
ED4000
unkown
page readonly
1234000
heap
page read and write
10A8000
unkown
page readonly
342D000
heap
page read and write
120E000
heap
page read and write
10000000
unkown
page readonly
3930000
trusted library allocation
page read and write
20B2000
heap
page read and write
1FD4000
heap
page read and write
3824000
direct allocation
page readonly
5C1E000
heap
page read and write
2F23000
heap
page read and write
1F3C000
unkown
page read and write
4651000
heap
page read and write
10011000
unkown
page execute and read and write
5A60000
trusted library allocation
page read and write
F9F000
direct allocation
page execute and read and write
1FD4000
heap
page read and write
1234000
heap
page read and write
401000
unkown
page execute read
2E78000
heap
page read and write
5EA6000
heap
page read and write
125B000
heap
page read and write
577D000
heap
page read and write
13E7000
heap
page read and write
119F000
unkown
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
38C0000
remote allocation
page read and write
1FD4000
heap
page read and write
1FD5000
heap
page read and write
1FD4000
heap
page read and write
2080000
heap
page read and write
3423000
heap
page read and write
1FD4000
heap
page read and write
3427000
heap
page read and write
5D1E000
stack
page read and write
10AB000
unkown
page execute and read and write
1291000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
2F04000
heap
page read and write
5A66000
heap
page read and write
1510000
heap
page read and write
3C20000
trusted library allocation
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
3421000
heap
page read and write
1FD4000
heap
page read and write
631F000
stack
page read and write
1FD4000
heap
page read and write
1F5E000
unkown
page read and write
346F000
heap
page read and write
645F000
stack
page read and write
19B9000
unkown
page readonly
1FD4000
heap
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
5A60000
trusted library allocation
page read and write
1FD4000
heap
page read and write
1FD4000
heap
page read and write
401000
unkown
page execute read
1FD4000
heap
page read and write
1FD4000
heap
page read and write
3470000
heap
page read and write
1FD4000
heap
page read and write
19C0000
unkown
page readonly
2520000
heap
page read and write
66DC000
stack
page read and write
344B000
heap
page read and write
1FD4000
heap
page read and write
344D000
heap
page read and write
34DE000
heap
page read and write
1FD4000
heap
page read and write
4750000
trusted library allocation
page read and write
1FD4000
heap
page read and write
342C000
heap
page read and write
2FE0000
heap
page read and write
4750000
trusted library allocation
page read and write
19BB000
unkown
page readonly
FBB000
unkown
page execute read
1FD4000
heap
page read and write
There are 650 hidden memdumps, click here to show them.