IOC Report
Cm2GRjWK1C.exe

loading gif

Files

File Path
Type
Category
Malicious
Cm2GRjWK1C.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\dba1d\2dba1d
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\dba1d\gdjmoz
SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 2, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\dba1d\jw4wb168q
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\dba1d\ng4eus
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\dba1d\ozuaim
SQLite 3.x database, last written using SQLite version 3046000, file counter 6, database pages 41, 1st free page 29, free pages 1, cookie 0x25, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\dba1d\vaim7g
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\dba1d\w4wb168q1
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 2, database pages 20, cookie 0xc, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\dba1d\x4wbi5
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\dba1d\y58gl6
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\json[1].json
JSON data
dropped
Chrome Cache Entry: 67
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 68
ASCII text
downloaded
Chrome Cache Entry: 69
ASCII text, with very long lines (1437)
downloaded
Chrome Cache Entry: 70
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 71
ASCII text, with very long lines (2412)
downloaded
Chrome Cache Entry: 72
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 73
ASCII text, with very long lines (3052)
downloaded
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Cm2GRjWK1C.exe
"C:\Users\user\Desktop\Cm2GRjWK1C.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2348,i,6494542625534998801,13089621614096395101,262144 --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2452 /prefetch:3
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\dba1d" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 11

URLs

Name
IP
Malicious
https://95.217.30.53/
95.217.30.53
malicious
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://support.google.com/chrome/answer/6098869
unknown
https://mail.google.com/chat/download?usp=chrome_defaultfault
unknown
https://www.dvdfab.cn/player7.htm?soft=playerfab&ad=playerfab_client_update_old&platform=x64&v=
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
https://www.dvdfab.cn/thankyou.htm?s=streamfab&ad=streamfab_client_thankyou_r18&downloadmode=1&pid=r
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://blog.google/products/chrome/google-chrome-safe-browsing-real-time/
unknown
https://trkkn.com
unknown
https://support.google.com/chrome?p=desktop_tab_groups
unknown
http://dns-tunnel-check.googlezip.net/connect
unknown
https://95.217.30.53;
unknown
https://95.217.30.53MC
unknown
https://docs.google.com/document/:
unknown
https://mail.google.com/chat/
unknown
https://www.dvdfab.cn/thankyou.htm?s=streamfab&ad=streamfab_client_thankyou_crunchyroll&downloadmode
unknown
http://unisolated.invalid/
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
https://dl.dvdfab.cn/download/31_7051_c2b57a7c/playerfab_7051.exe
unknown
http://developer.chrome.com/docs/extensions/how-to/distribute/install-extensions)
unknown
https://www.dvdfab.cn/thankyou.htm?s=streamfab&ad=streamfab_client_thankyou_peacock&downloadmode=1&p
unknown
https://app-api-d1.dvdfab.cn/api/
unknown
https://finn.no
unknown
https://app-api-j1.dvdfab.cn/api/
unknown
https://dl.dvdfab.cn/download/12_7051_c2751989/playerfab_x64_
unknown
https://d17.dvdfab.cn/download/31_7051_c2b57a7c/playerfab_7051.exe
unknown
https://dr.dvdfab.cn/download/31_7051_c2b57a7c/playerfab_7051.exe
unknown
https://www.youtube.com/?feature=ytca
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://www.google.com/chrome/browser-tools/
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://www.dvdfab.cn/thankyou.htm?s=streamfab&ad=streamfab_client_thankyou_paravi&downloadmode=1&pi
unknown
https://www.dvdfab.cn/thankyou.htm?s=streamfab&ad=streamfab_client_thankyou_youtube-movies&downloadm
unknown
https://chrome.google.com/webstore
unknown
https://95.217.30.53/zD
unknown
https://dr.dvdfab.cn/download/12_7051_c2751989/playerfab_x64_7051.exe
unknown
https://sitescout.com
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://app-api-j1.dvdfab.cn/api/JPNhttps://app-api-c1.dvdfab.cn/api/ENUhttps://app-api-d1.dvdfab.cn
unknown
https://dl.dvdfab.cn/download/12_7051_c2751989/playerfab_x64_7051.exe
unknown
https://app-api-d1.dvdfab.cn/api/common_json_post/
unknown
https://www.dvdfab.cn/thankyou.htm?s=streamfab&ad=streamfab_client_thankyou_joyn&downloadmode=1&pid=
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://plus.google.com
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://steamcommunity.com/profiles/76561199829660832
https://t.me/l793oy
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
https://www.dvdfab.cn/thankyou.htm?s=streamfab&ad=streamfab_client_thankyou_disney-plus&downloadmode
unknown
https://d223.dvdfab.cn/download/12_7051_c2751989/playerfab_x64_7051.exe
unknown
https://chromewebstore.google.com/
unknown
https://app-api-j1.dvdfab.cn/api/common_json_post/https://app-api-d1.dvdfab.cn/api/common_json_post/
unknown
https://mail.google.com/chat/download?usp=chrome_defaultle
unknown
https://test-app-api.dvdfab.cn/api/
unknown
https://www.dvdfab.cn/thankyou.htm?s=playerfab&ad=playerfab_client_thankyou&v=
unknown
https://clients4.google.com/chrome-sync
unknown
https://gemini.google.com/app?q=
unknown
https://gemini.google.com/glic/intro?
unknown
https://d207.dvdfab.cn/download/12_7051_c2751989/playerfab_x64_7051.exe
unknown
https://tailtarget.com
unknown
https://docs.google.com/presentation/J
unknown
http://www.unicode.org/copyright.html
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
https://d171.dvdf
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://d18.dvdfab.cn/download/31_7051_c2b57a7c/playerfab_7051.exe
unknown
https://docs.google.com/presentation/:
unknown
https://www.dvdfab.cn/video-enhancer-ai.htm
unknown
https://lens.google.com/gen204
unknown
http://www.openssl.org/support/faq.html
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
https://95.217.30.53/)CMA
unknown
https://mail.google.com/mail/?tab=rm&ogbl
unknown
https://worldhistory.org
unknown
https://www.google.com/chrome/privacy/eula_text.htmlH&elpManaged
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherUrlList
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
https://policies.google.com/
unknown
https://seedtag.com
unknown
https://apis.google.com
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://www.dvdfab.cn/thankyou.htm?s=streamfab&ad=streamfab_client_thankyou_espn-plus&downloadmode=1
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyA2KlwBX3mkFo30om9LUFYQhpqLoa_BNhE
142.250.186.68
https://labs.google.com/search?source=ntp
unknown
http://www.dvdfab.cn/bad_package.htm?s=
unknown
https://95.217.30.53hellohttps://t.me/l793oyir7amMozilla/5.0
unknown
https://domains.google.com/suggest/flow
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://steamcommunity.com/profiles/76561199829660832ir7amMozilla/5.0
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
plus.l.google.com
142.250.185.142
play.google.com
142.250.185.206
www.google.com
142.250.186.68
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
95.217.30.53
unknown
Germany
malicious
192.168.2.4
unknown
unknown
malicious
142.250.186.68
www.google.com
United States
142.250.185.206
play.google.com
United States
142.250.185.142
plus.l.google.com
United States
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
3022000
heap
page read and write
malicious
10B6000
heap
page read and write
malicious
10B4000
heap
page read and write
malicious
10B0000
heap
page read and write
malicious
10B6000
heap
page read and write
malicious
10B0000
heap
page read and write
malicious
1ECC03850000
direct allocation
page read and write
BF4000
heap
page read and write
44B4000
heap
page read and write
1ECC040FC000
direct allocation
page read and write
B0C000
stack
page read and write
241C4A3D000
unclassified section
page read and write
EA107FE000
unkown
page readonly
1EC8000B0000
direct allocation
page read and write
1EC800434000
direct allocation
page read and write
EA0FFFD000
stack
page read and write
241BD18D000
heap
page read and write
5D4C000
stack
page read and write
1EC800018000
direct allocation
page read and write
767800068000
direct allocation
page read and write
7E4000
heap
page read and write
1ECC03C84000
direct allocation
page read and write
6F6000
unkown
page readonly
3C1C000
stack
page read and write
241C0E7D000
heap
page read and write
1ECC02558000
direct allocation
page read and write
1ECC03134000
direct allocation
page read and write
1EC800540000
direct allocation
page read and write
1ECC02470000
direct allocation
page read and write
1ECC024D0000
direct allocation
page read and write
241C3490000
heap
page read and write
1EC80059C000
direct allocation
page read and write
5FC000
unkown
page write copy
1ECC03FE4000
direct allocation
page read and write
1ECC02214000
direct allocation
page read and write
241C4EE0000
heap
page read and write
1EC800168000
direct allocation
page read and write
1D40000A8000
direct allocation
page read and write
35EE000
stack
page read and write
EA7CFFE000
stack
page read and write
EA7E7FE000
unkown
page readonly
1ECC033E8000
direct allocation
page read and write
1ECC02D38000
direct allocation
page read and write
EA65FFE000
unkown
page read and write
1ECC039AC000
direct allocation
page read and write
4619000
heap
page read and write
36EF000
stack
page read and write
241C3465000
heap
page read and write
136D000
stack
page read and write
1ECC022E8000
direct allocation
page read and write
1ECC02AA0000
direct allocation
page read and write
1ECC02434000
direct allocation
page read and write
241C6350000
unkown
page read and write
BF4000
heap
page read and write
1ECC041A9000
direct allocation
page read and write
1ECC034E0000
direct allocation
page read and write
767800034000
direct allocation
page read and write
1ECC03698000
direct allocation
page read and write
241C3404000
heap
page read and write
44BC000
heap
page read and write
241C5C40000
unclassified section
page read and write
2C41000
heap
page read and write
55B7000
heap
page read and write
1ECC03728000
direct allocation
page read and write
1EC800150000
direct allocation
page read and write
1D400006C000
direct allocation
page read and write
241BD1D2000
heap
page read and write
720000
heap
page read and write
1EC8000B8000
direct allocation
page read and write
1D40000A8000
direct allocation
page read and write
1ECC03CB0000
direct allocation
page read and write
241C33D0000
heap
page read and write
241C33BD000
heap
page read and write
241C348A000
heap
page read and write
1D4000029000
direct allocation
page read and write
241C2FE0000
unclassified section
page read and write
1ECC032C8000
direct allocation
page read and write
241C33F4000
heap
page read and write
241C34A1000
heap
page read and write
241C5410000
unclassified section
page read and write
241C53A1000
unclassified section
page read and write
559F000
heap
page read and write
4EE2000
heap
page read and write
71E000
stack
page read and write
2C41000
heap
page read and write
1ECC03A74000
direct allocation
page read and write
241C3490000
heap
page read and write
1ECC02B10000
direct allocation
page read and write
241C3404000
heap
page read and write
1ECC03888000
direct allocation
page read and write
BF4000
heap
page read and write
241C33D6000
heap
page read and write
7678000A4000
direct allocation
page read and write
1ECC03114000
direct allocation
page read and write
1ECC040A4000
direct allocation
page read and write
241C34C2000
heap
page read and write
241C3341000
heap
page read and write
1ECC03C78000
direct allocation
page read and write
1ECC0371E000
direct allocation
page read and write
55AC000
heap
page read and write
241C3404000
heap
page read and write
1D4000044000
direct allocation
page read and write
4570000
unkown
page readonly
1ECC03FE0000
direct allocation
page read and write
417B000
heap
page read and write
2C41000
heap
page read and write
241C5321000
unclassified section
page read and write
1ECC03454000
direct allocation
page read and write
1ECC038F4000
direct allocation
page read and write
86E000
unkown
page readonly
1EC8004F4000
direct allocation
page read and write
241BD211000
heap
page read and write
1EC800001000
direct allocation
page read and write
241BFF40000
unkown
page readonly
1ECC02404000
direct allocation
page read and write
1ECC036B8000
direct allocation
page read and write
1EC800204000
direct allocation
page read and write
7678000DC000
direct allocation
page read and write
241BD120000
heap
page read and write
1D40000B8000
direct allocation
page read and write
1ECC03C20000
direct allocation
page read and write
1ECC04114000
direct allocation
page read and write
1ECC03674000
direct allocation
page read and write
241C3480000
heap
page read and write
43A2000
heap
page read and write
241C3490000
heap
page read and write
241C48A7000
unclassified section
page read and write
79F000
unkown
page readonly
1ECC03C48000
direct allocation
page read and write
1ECC03510000
direct allocation
page read and write
1EC800504000
direct allocation
page read and write
30C8000
heap
page read and write
241C4A00000
unclassified section
page read and write
BF4000
heap
page read and write
76780007C000
direct allocation
page read and write
241C344F000
heap
page read and write
241BD4B0000
trusted library section
page readonly
1ECC03F5C000
direct allocation
page read and write
241C089C000
heap
page read and write
BF4000
heap
page read and write
241C0DFB000
heap
page read and write
241C3323000
heap
page read and write
1ECC03444000
direct allocation
page read and write
1ECC0370C000
direct allocation
page read and write
1ECC02454000
direct allocation
page read and write
241C3394000
heap
page read and write
241BFF30000
heap
page read and write
241C3490000
heap
page read and write
1ECC0408C000
direct allocation
page read and write
1EC8004CC000
direct allocation
page read and write
1EC800695000
direct allocation
page read and write
BF4000
heap
page read and write
1ECC02890000
direct allocation
page read and write
1ECC02768000
direct allocation
page read and write
241BD160000
heap
page read and write
1ECC02C4C000
direct allocation
page read and write
EA0E7FE000
unkown
page readonly
468B000
heap
page read and write
615000
unkown
page readonly
241C33BD000
heap
page read and write
10B6000
heap
page read and write
49DB000
heap
page read and write
1EC800568000
direct allocation
page read and write
241C53B3000
unclassified section
page read and write
1ECC03F80000
direct allocation
page read and write
1ECC03478000
direct allocation
page read and write
1ECC0242C000
direct allocation
page read and write
241C5310000
unclassified section
page read and write
241C0DC0000
heap
page read and write
1ECC02C74000
direct allocation
page read and write
7678000D4000
direct allocation
page read and write
1ECC03C90000
direct allocation
page read and write
BF4000
heap
page read and write
1ECC02278000
direct allocation
page read and write
2C41000
heap
page read and write
1D4000098000
direct allocation
page read and write
1ECC03730000
direct allocation
page read and write
7FFC81B81000
unkown
page execute read
1ECC02718000
direct allocation
page read and write
1EC800514000
direct allocation
page read and write
42D0000
heap
page read and write
EA697FE000
unkown
page readonly
EA037FE000
unkown
page readonly
10ED000
heap
page read and write
1ECC03B74000
direct allocation
page read and write
241C3490000
heap
page read and write
241BD233000
heap
page read and write
1ECC0264B000
direct allocation
page read and write
1ECC03D08000
direct allocation
page read and write
241C6451000
heap
page read and write
1EC8000FA000
direct allocation
page read and write
5597000
heap
page read and write
EA027FE000
unkown
page readonly
10A9000
heap
page read and write
241C3480000
heap
page read and write
1ECC03FF8000
direct allocation
page read and write
241BDFF6000
unkown
page readonly
EA0A7FE000
unkown
page readonly
241C4EB7000
unclassified section
page read and write
1EC800208000
direct allocation
page read and write
1ECC036EC000
direct allocation
page read and write
560C000
heap
page read and write
235C000
stack
page read and write
1EC800580000
direct allocation
page read and write
241C3404000
heap
page read and write
43A8000
heap
page read and write
1ECC038B8000
direct allocation
page read and write
1ECC02C74000
direct allocation
page read and write
241C496D000
unclassified section
page read and write
7E2000
heap
page read and write
1ECC02718000
direct allocation
page read and write
241C3485000
heap
page read and write
1ECC0265C000
direct allocation
page read and write
1D40000B8000
direct allocation
page read and write
241C685F000
heap
page read and write
1ECC02604000
direct allocation
page read and write
1ECC0391C000
direct allocation
page read and write
1ECC02658000
direct allocation
page read and write
1ECC02E30000
direct allocation
page read and write
241C3403000
heap
page read and write
4351000
heap
page read and write
EA74FFE000
stack
page read and write
1ECC041B4000
direct allocation
page read and write
1ECC041C0000
direct allocation
page read and write
1ECC039AC000
direct allocation
page read and write
1ECC02C80000
direct allocation
page read and write
EA157FE000
unkown
page readonly
241C0899000
heap
page read and write
1EC800528000
direct allocation
page read and write
1EC800544000
direct allocation
page read and write
1ECC02FEC000
direct allocation
page read and write
4741000
heap
page read and write
1ECC03528000
direct allocation
page read and write
241C0DE4000
heap
page read and write
5F2000
unkown
page write copy
1ECC03CA9000
direct allocation
page read and write
241C0870000
heap
page read and write
1ECC04194000
direct allocation
page read and write
1ECC02D88000
direct allocation
page read and write
1ECC025B8000
direct allocation
page read and write
1ECC030B4000
direct allocation
page read and write
4498000
heap
page read and write
1EC80057C000
direct allocation
page read and write
1ECC02680000
direct allocation
page read and write
1ECC03B24000
direct allocation
page read and write
1ECC0247C000
direct allocation
page read and write
241C34C7000
heap
page read and write
241C0F40000
unclassified section
page read and write
BF4000
heap
page read and write
1ECC03CE0000
direct allocation
page read and write
1ECC04088000
direct allocation
page read and write
2C41000
heap
page read and write
1ECC036C4000
direct allocation
page read and write
43BA000
heap
page read and write
1ECC02D98000
direct allocation
page read and write
1EC8004D0000
direct allocation
page read and write
241C0EB3000
heap
page read and write
100E000
stack
page read and write
1ECC03978000
direct allocation
page read and write
1ECC0233C000
direct allocation
page read and write
40B0000
heap
page read and write
241C33F4000
heap
page read and write
1ECC03E04000
direct allocation
page read and write
EA067FE000
unkown
page readonly
1ECC036EC000
direct allocation
page read and write
EA6CFFB000
stack
page read and write
241C3453000
heap
page read and write
1ECC03C78000
direct allocation
page read and write
44AC000
heap
page read and write
1D4000054000
direct allocation
page read and write
2D67000
direct allocation
page readonly
1ECC02418000
direct allocation
page read and write
1EC800534000
direct allocation
page read and write
1EC800144000
direct allocation
page read and write
241C33E2000
heap
page read and write
1ECC03F7C000
direct allocation
page read and write
1EC800141000
direct allocation
page read and write
1EC800098000
direct allocation
page read and write
EA79FFE000
stack
page read and write
1D40000D0000
direct allocation
page read and write
241C0889000
heap
page read and write
1ECC025C3000
direct allocation
page read and write
1ECC03E58000
direct allocation
page read and write
BF4000
heap
page read and write
1ECC03401000
direct allocation
page read and write
1ECC03A01000
direct allocation
page read and write
4AB4000
heap
page read and write
EA7F7FE000
unkown
page readonly
1ECC02460000
direct allocation
page read and write
241C48C7000
unclassified section
page read and write
4FC1000
heap
page read and write
EA7BFFE000
stack
page read and write
1ECC0391C000
direct allocation
page read and write
241C5940000
unclassified section
page read and write
241BD22E000
heap
page read and write
1ECC02C90000
direct allocation
page read and write
241C348E000
heap
page read and write
1ECC038F4000
direct allocation
page read and write
1ECC027C8000
direct allocation
page read and write
1D40000EC000
direct allocation
page read and write
4A2C000
heap
page read and write
767800028000
direct allocation
page read and write
1ECC02BAC000
direct allocation
page read and write
75F000
unkown
page readonly
241BD150000
trusted library allocation
page read and write
241C33C5000
heap
page read and write
7678000DC000
direct allocation
page read and write
1ECC02700000
direct allocation
page read and write
281000
unkown
page execute read
1ECC0403C000
direct allocation
page read and write
241C0890000
heap
page read and write
EA787FE000
unkown
page readonly
1ECC03C19000
direct allocation
page read and write
1ECC03604000
direct allocation
page read and write
1ECC040E8000
direct allocation
page read and write
1ECC030A4000
direct allocation
page read and write
1ECC034C0000
direct allocation
page read and write
1010000
direct allocation
page execute read
1ECC0385C000
direct allocation
page read and write
1ECC02594000
direct allocation
page read and write
1ECC033B8000
direct allocation
page read and write
1ECC0387C000
direct allocation
page read and write
1EC80052C000
direct allocation
page read and write
1ECC023B0000
direct allocation
page read and write
1ECC03E01000
direct allocation
page read and write
241C33CE000
heap
page read and write
1ECC039BC000
direct allocation
page read and write
1ECC02420000
direct allocation
page read and write
1ECC04078000
direct allocation
page read and write
241C3477000
heap
page read and write
2C41000
heap
page read and write
EA127FE000
unkown
page readonly
1EC800224000
direct allocation
page read and write
241C4A37000
unclassified section
page read and write
1ECC02674000
direct allocation
page read and write
1ECC03998000
direct allocation
page read and write
1ECC02408000
direct allocation
page read and write
1ECC03D60000
direct allocation
page read and write
241C33D5000
heap
page read and write
1ECC02408000
direct allocation
page read and write
2D80000
trusted library allocation
page read and write
1ECC02428000
direct allocation
page read and write
43F9000
heap
page read and write
1ECC025C0000
direct allocation
page read and write
241C5710000
unclassified section
page read and write
1ECC040EC000
direct allocation
page read and write
146F000
stack
page read and write
241C3465000
heap
page read and write
241C0898000
heap
page read and write
6C8000
unkown
page readonly
241BD360000
unkown
page readonly
1ECC04004000
direct allocation
page read and write
612000
unkown
page read and write
1ECC0232C000
direct allocation
page read and write
1EC800138000
direct allocation
page read and write
1ECC040A0000
direct allocation
page read and write
30B7000
heap
page read and write
1D40000B4000
direct allocation
page read and write
1ECC02BD4000
direct allocation
page read and write
1ECC02864000
direct allocation
page read and write
241C0860000
heap
page read and write
241C6450000
heap
page read and write
EA67FFE000
stack
page read and write
EA747FE000
unkown
page readonly
1ECC02430000
direct allocation
page read and write
241C347B000
heap
page read and write
1EC8000F8000
direct allocation
page read and write
6C8000
unkown
page readonly
241C3395000
heap
page read and write
241C3403000
heap
page read and write
1ECC026B4000
direct allocation
page read and write
241C3490000
heap
page read and write
2C41000
heap
page read and write
2C41000
heap
page read and write
1ECC022A0000
direct allocation
page read and write
1D400003C000
direct allocation
page read and write
241BF9B0000
unkown
page read and write
241C33D6000
heap
page read and write
416F000
heap
page read and write
1ECC02464000
direct allocation
page read and write
EA7FFFC000
stack
page read and write
1ECC02A04000
direct allocation
page read and write
EA05FFD000
stack
page read and write
45EC000
heap
page read and write
1ECC02B58000
direct allocation
page read and write
2D78000
heap
page read and write
4633000
heap
page read and write
241C3395000
heap
page read and write
5781000
heap
page read and write
1EC8000C8000
direct allocation
page read and write
1ECC02648000
direct allocation
page read and write
1ECC034DC000
direct allocation
page read and write
10B0000
heap
page read and write
49D5000
heap
page read and write
EA06FFC000
stack
page read and write
1ECC030EC000
direct allocation
page read and write
BF4000
heap
page read and write
1ECC026F0000
direct allocation
page read and write
1ECC02874000
direct allocation
page read and write
1ECC02BB4000
direct allocation
page read and write
1ECC024F0000
direct allocation
page read and write
241C33B0000
heap
page read and write
1ECC04058000
direct allocation
page read and write
241C3465000
heap
page read and write
1ECC02BCC000
direct allocation
page read and write
1ECC02474000
direct allocation
page read and write
EA68FFE000
stack
page read and write
241C089C000
heap
page read and write
1ECC040AC000
direct allocation
page read and write
3F50000
trusted library allocation
page read and write
1ECC02A15000
direct allocation
page read and write
1ECC04100000
direct allocation
page read and write
1ECC023E8000
direct allocation
page read and write
4681000
heap
page read and write
1ECC02774000
direct allocation
page read and write
EA147FE000
unkown
page readonly
241C34C0000
heap
page read and write
241C33BD000
heap
page read and write
7C0000
heap
page read and write
2C41000
heap
page read and write
1ECC02300000
direct allocation
page read and write
1ECC03BA8000
direct allocation
page read and write
1ECC03054000
direct allocation
page read and write
3EFF000
stack
page read and write
2C41000
heap
page read and write
241C3463000
heap
page read and write
241C0890000
heap
page read and write
EA767FE000
unkown
page readonly
1ECC03300000
direct allocation
page read and write
6F6000
unkown
page readonly
241C6451000
heap
page read and write
760000
heap
page read and write
241C0E24000
heap
page read and write
2C41000
heap
page read and write
1EC800184000
direct allocation
page read and write
767800048000
direct allocation
page read and write
1D4000068000
direct allocation
page read and write
2C41000
heap
page read and write
241C0E28000
heap
page read and write
241C3383000
heap
page read and write
1ECC040CC000
direct allocation
page read and write
241C5930000
unclassified section
page read and write
446F000
heap
page read and write
1EC800100000
direct allocation
page read and write
1ECC024E0000
direct allocation
page read and write
EA03FFC000
stack
page read and write
EA077FE000
unkown
page readonly
EA08FFE000
stack
page read and write
1ECC03BB0000
direct allocation
page read and write
79F000
unkown
page readonly
241C4F71000
unclassified section
page read and write
76780008C000
direct allocation
page read and write
EA0CFFD000
stack
page read and write
1ECC02544000
direct allocation
page read and write
4581000
unkown
page readonly
1ECC0419C000
direct allocation
page read and write
1D40000B4000
direct allocation
page read and write
7678000C8000
direct allocation
page read and write
1ECC02700000
direct allocation
page read and write
1ECC02444000
direct allocation
page read and write
1ECC02C04000
direct allocation
page read and write
2C41000
heap
page read and write
1ECC02594000
direct allocation
page read and write
241C3490000
heap
page read and write
1ECC02F38000
direct allocation
page read and write
767800104000
direct allocation
page read and write
1EC800070000
direct allocation
page read and write
10ED000
heap
page read and write
10A3000
heap
page read and write
241C34C0000
heap
page read and write
1ECC02584000
direct allocation
page read and write
1ECC03FC4000
direct allocation
page read and write
1ECC03998000
direct allocation
page read and write
4604000
heap
page read and write
241C5390000
unclassified section
page read and write
7678000C8000
direct allocation
page read and write
1ECC04124000
direct allocation
page read and write
2C41000
heap
page read and write
965000
unkown
page readonly
1ECC035A4000
direct allocation
page read and write
1ECC02438000
direct allocation
page read and write
1ECC02518000
direct allocation
page read and write
2C41000
heap
page read and write
4FEC000
heap
page read and write
4400000
heap
page read and write
1ECC038CC000
direct allocation
page read and write
2D41000
direct allocation
page execute read
1D40000A8000
direct allocation
page read and write
2C41000
heap
page read and write
EA77FFE000
stack
page read and write
1ECC03801000
direct allocation
page read and write
1ECC035E0000
direct allocation
page read and write
6FF000
unkown
page readonly
1ECC02718000
direct allocation
page read and write
1ECC03ACC000
direct allocation
page read and write
1ECC03C04000
direct allocation
page read and write
1ECC035AC000
direct allocation
page read and write
43DC000
heap
page read and write
1ECC0376C000
direct allocation
page read and write
1ECC02728000
direct allocation
page read and write
66E000
unkown
page readonly
74B000
unkown
page readonly
85A000
unkown
page readonly
241C0C70000
trusted library section
page read and write
56A1000
heap
page read and write
1ECC040DC000
direct allocation
page read and write
1ECC03A6C000
direct allocation
page read and write
1ECC0232C000
direct allocation
page read and write
1ECC03068000
direct allocation
page read and write
7CC000
heap
page read and write
1ECC027C8000
direct allocation
page read and write
1ECC034EC000
direct allocation
page read and write
1ECC0391C000
direct allocation
page read and write
1ECC02378000
direct allocation
page read and write
767800018000
direct allocation
page read and write
2810000
heap
page read and write
241C3465000
heap
page read and write
1EC80020C000
direct allocation
page read and write
1ECC03978000
direct allocation
page read and write
1ECC03C38000
direct allocation
page read and write
1EC8000E8000
direct allocation
page read and write
1ECC0298C000
direct allocation
page read and write
241C3465000
heap
page read and write
1EC800428000
direct allocation
page read and write
2C41000
heap
page read and write
1ECC023B0000
direct allocation
page read and write
1D4000080000
direct allocation
page read and write
241BD4C0000
heap
page read and write
1ECC0231C000
direct allocation
page read and write
241C5E41000
unclassified section
page read and write
1ECC02401000
direct allocation
page read and write
1ECC02B1D000
direct allocation
page read and write
40F1000
heap
page read and write
1ECC03C14000
direct allocation
page read and write
43BF000
heap
page read and write
EA6B7FE000
unkown
page readonly
EA64FF1000
stack
page read and write
EA0F7FE000
unkown
page readonly
1ECC02204000
direct allocation
page read and write
53A000
unkown
page readonly
1ECC02500000
direct allocation
page read and write
241C338D000
heap
page read and write
241C34C7000
heap
page read and write
1ECC03601000
direct allocation
page read and write
45E9000
heap
page read and write
1ECC027C8000
direct allocation
page read and write
1EC800698000
direct allocation
page read and write
435F000
heap
page read and write
BF4000
heap
page read and write
2C41000
heap
page read and write
2C41000
heap
page read and write
1ECC04118000
direct allocation
page read and write
EA007FE000
unkown
page readonly
241BD430000
unkown
page readonly
7678000D4000
direct allocation
page read and write
1ECC0245C000
direct allocation
page read and write
241C3465000
heap
page read and write
241C347B000
heap
page read and write
1ECC02268000
direct allocation
page read and write
1ECC024F8000
direct allocation
page read and write
241C0E7D000
heap
page read and write
241C3404000
heap
page read and write
241C347B000
heap
page read and write
EFD000
stack
page read and write
1EC80069C000
direct allocation
page read and write
1ECC02B2D000
direct allocation
page read and write
241C33C5000
heap
page read and write
241C34C8000
heap
page read and write
1ECC02398000
direct allocation
page read and write
1ECC0268E000
direct allocation
page read and write
1EC800410000
direct allocation
page read and write
1EC800218000
direct allocation
page read and write
EA64FED000
stack
page read and write
241C34C8000
heap
page read and write
1EC8004A0000
direct allocation
page read and write
1ECC041DC000
direct allocation
page read and write
241BD810000
unkown
page readonly
2C41000
heap
page read and write
1ECC03AEC000
direct allocation
page read and write
241C3490000
heap
page read and write
1EC8000C0000
direct allocation
page read and write
1ECC03310000
direct allocation
page read and write
1ECC01001000
direct allocation
page read and write
23C0000
heap
page read and write
241BFF33000
heap
page read and write
BCE000
stack
page read and write
5081000
heap
page read and write
1EC800508000
direct allocation
page read and write
2D5E000
direct allocation
page readonly
241C49A0000
unclassified section
page read and write
1ECC03AE4000
direct allocation
page read and write
42D4000
heap
page read and write
4190000
trusted library allocation
page read and write
1ECC027C0000
direct allocation
page read and write
1ECC03BC8000
direct allocation
page read and write
4799000
heap
page read and write
1ECC00201000
direct allocation
page read and write
1ECC023DF000
direct allocation
page read and write
1EC800178000
direct allocation
page read and write
1ECC039C8000
direct allocation
page read and write
1ECC03C58000
direct allocation
page read and write
2C41000
heap
page read and write
EA10FFE000
stack
page read and write
1ECC027D8000
direct allocation
page read and write
EA00FFB000
stack
page read and write
1ECC03814000
direct allocation
page read and write
241C6451000
heap
page read and write
241C32FA000
unclassified section
page read and write
7678000A0000
direct allocation
page read and write
241C3465000
heap
page read and write
1ECC03414000
direct allocation
page read and write
1EC800046000
direct allocation
page read and write
43C4000
heap
page read and write
1EC8004AC000
direct allocation
page read and write
1EC800530000
direct allocation
page read and write
1ECC03AA4000
direct allocation
page read and write
1ECC02B2F000
direct allocation
page read and write
1ECC02544000
direct allocation
page read and write
241C4950000
unclassified section
page read and write
1EC800050000
direct allocation
page read and write
241BD16A000
heap
page read and write
1ECC040D8000
direct allocation
page read and write
1ECC03FF4000
direct allocation
page read and write
241C33D6000
heap
page read and write
2C41000
heap
page read and write
241C3404000
heap
page read and write
1ECC0388C000
direct allocation
page read and write
1ECC023A4000
direct allocation
page read and write
EA0D7FE000
unkown
page readonly
3F10000
heap
page read and write
2C41000
heap
page read and write
5DFA000
heap
page read and write
40D1000
heap
page read and write
241C6451000
heap
page read and write
241C3403000
heap
page read and write
382F000
stack
page read and write
241C347B000
heap
page read and write
1ECC03FC0000
direct allocation
page read and write
1ECC0404C000
direct allocation
page read and write
1ECC03B04000
direct allocation
page read and write
1ECC02480000
direct allocation
page read and write
30B7000
heap
page read and write
241C347B000
heap
page read and write
1ECC03B20000
direct allocation
page read and write
1ECC041D0000
direct allocation
page read and write
1ECC02E04000
direct allocation
page read and write
4641000
heap
page read and write
1ECC00401000
direct allocation
page read and write
3ACF000
stack
page read and write
1D4000098000
direct allocation
page read and write
1ECC0406C000
direct allocation
page read and write
1EC80058C000
direct allocation
page read and write
EA17FFE000
stack
page read and write
BF4000
heap
page read and write
1ECC03AD0000
direct allocation
page read and write
EA737FE000
unkown
page readonly
1ECC03C9C000
direct allocation
page read and write
1ECC0257C000
direct allocation
page read and write
1ECC03088000
direct allocation
page read and write
241BD4C5000
heap
page read and write
EA07FFD000
stack
page read and write
1EC8004C8000
direct allocation
page read and write
1ECC025E4000
direct allocation
page read and write
241C3403000
heap
page read and write
55D7000
heap
page read and write
1ECC03BB8000
direct allocation
page read and write
2C41000
heap
page read and write
EA69FFE000
stack
page read and write
1ECC03044000
direct allocation
page read and write
86E000
unkown
page readonly
241C0886000
heap
page read and write
1039000
heap
page read and write
1ECC02774000
direct allocation
page read and write
1ECC025B8000
direct allocation
page read and write
1ECC02DC8000
direct allocation
page read and write
1ECC03FB0000
direct allocation
page read and write
241C3485000
heap
page read and write
EA137FE000
unkown
page readonly
10F4000
heap
page read and write
1EC800144000
direct allocation
page read and write
241C2FB0000
unclassified section
page read and write
1ECC03344000
direct allocation
page read and write
241C4A9C000
unclassified section
page read and write
1ECC037BC000
direct allocation
page read and write
241C2FF7000
unclassified section
page read and write
241C346C000
heap
page read and write
241C3490000
heap
page read and write
241C0E09000
heap
page read and write
1ECC03404000
direct allocation
page read and write
1ECC032E0000
direct allocation
page read and write
4FF7000
heap
page read and write
1ECC025C0000
direct allocation
page read and write
1EC80003C000
direct allocation
page read and write
2C41000
heap
page read and write
4331000
heap
page read and write
BF4000
heap
page read and write
1ECC02C5C000
direct allocation
page read and write
1ECC03A3C000
direct allocation
page read and write
43AD000
heap
page read and write
1ECC00A01000
direct allocation
page read and write
1ECC02B34000
direct allocation
page read and write
1ECC0234C000
direct allocation
page read and write
1ECC03A04000
direct allocation
page read and write
3DC0000
remote allocation
page read and write
1ECC02E7C000
direct allocation
page read and write
241C0E66000
heap
page read and write
372E000
stack
page read and write
1ECC031E4000
direct allocation
page read and write
1ECC031F8000
direct allocation
page read and write
43D3000
heap
page read and write
3053000
heap
page read and write
1ECC02FF8000
direct allocation
page read and write
EA6FFFB000
stack
page read and write
241BFDB0000
unkown
page readonly
6BE000
unkown
page readonly
1ECC0243C000
direct allocation
page read and write
1ECC02EB0000
direct allocation
page read and write
4491000
heap
page read and write
241C6451000
heap
page read and write
9BF000
unkown
page read and write
241C0EAD000
heap
page read and write
122E000
stack
page read and write
241C4EA0000
unclassified section
page read and write
6DE000
unkown
page read and write
241C49C1000
unclassified section
page read and write
EA7A7FE000
unkown
page readonly
241C3490000
heap
page read and write
1ECC032CC000
direct allocation
page read and write
241BD140000
heap
page readonly
1ECC031F0000
direct allocation
page read and write
7FFC82F81000
unkown
page execute read
BF4000
heap
page read and write
5001000
heap
page read and write
EA057FE000
unkown
page readonly
1ECC02C24000
direct allocation
page read and write
1030000
heap
page read and write
241C5470000
unclassified section
page read and write
1ECC036A8000
direct allocation
page read and write
241C4E97000
unclassified section
page read and write
241C347E000
heap
page read and write
1ECC02F94000
direct allocation
page read and write
1ECC03B40000
direct allocation
page read and write
3B1B000
stack
page read and write
1EC800418000
direct allocation
page read and write
EA71FFA000
stack
page read and write
304A000
heap
page read and write
4187000
heap
page read and write
1ECC03638000
direct allocation
page read and write
1ECC02201000
direct allocation
page read and write
767800104000
direct allocation
page read and write
1ECC02296000
direct allocation
page read and write
1ECC02758000
direct allocation
page read and write
1EC800498000
direct allocation
page read and write
1D40000B4000
direct allocation
page read and write
767800058000
direct allocation
page read and write
EA167FE000
unkown
page readonly
1ECC025D0000
direct allocation
page read and write
241C5400000
unclassified section
page read and write
1ECC040BC000
direct allocation
page read and write
EA6C7FE000
unkown
page readonly
4622000
heap
page read and write
1ECC02440000
direct allocation
page read and write
1EC800601000
direct allocation
page read and write
55C1000
heap
page read and write
1ECC03F74000
direct allocation
page read and write
1EC800448000
direct allocation
page read and write
1D40000B4000
direct allocation
page read and write
1ECC0241C000
direct allocation
page read and write
1ECC02FC0000
direct allocation
page read and write
BF4000
heap
page read and write
BF4000
heap
page read and write
241C6451000
heap
page read and write
241C33C5000
heap
page read and write
3000000
heap
page read and write
1ECC02B8C000
direct allocation
page read and write
1ECC023BC000
direct allocation
page read and write
241C3404000
heap
page read and write
1ECC039F0000
direct allocation
page read and write
241C33CE000
heap
page read and write
42F0000
heap
page read and write
241C34C7000
heap
page read and write
241C33F8000
heap
page read and write
1EC800404000
direct allocation
page read and write
1ECC040E0000
direct allocation
page read and write
1ECC041E4000
direct allocation
page read and write
1ECC0224C000
direct allocation
page read and write
85A000
unkown
page readonly
1ECC0353E000
direct allocation
page read and write
BF4000
heap
page read and write
3DC0000
remote allocation
page read and write
1ECC03FA8000
direct allocation
page read and write
ABF000
stack
page read and write
241C53F0000
unclassified section
page read and write
1ECC03A68000
direct allocation
page read and write
241C33E2000
heap
page read and write
241C4A20000
unclassified section
page read and write
1ECC022F0000
direct allocation
page read and write
45F6000
heap
page read and write
1D40000F0000
direct allocation
page read and write
241C3465000
heap
page read and write
45D000
stack
page read and write
1ECC03C40000
direct allocation
page read and write
44C4000
heap
page read and write
1EC8000D8000
direct allocation
page read and write
1ECC00001000
direct allocation
page read and write
1ECC02368000
direct allocation
page read and write
241C348E000
heap
page read and write
241C3383000
heap
page read and write
1EC8004B8000
direct allocation
page read and write
1ECC0261C000
direct allocation
page read and write
241C3465000
heap
page read and write
241C3485000
heap
page read and write
3DC0000
remote allocation
page read and write
2C41000
heap
page read and write
1ECC036E0000
direct allocation
page read and write
EA117FE000
unkown
page readonly
2C41000
heap
page read and write
1ECC02D7C000
direct allocation
page read and write
241C3441000
heap
page read and write
85F000
unkown
page readonly
2C50000
heap
page read and write
1ECC035D0000
direct allocation
page read and write
2D70000
heap
page read and write
4B44000
heap
page read and write
6BE000
unkown
page readonly
4784000
heap
page read and write
1ECC04064000
direct allocation
page read and write
1ECC02424000
direct allocation
page read and write
1ECC03201000
direct allocation
page read and write
241C51B0000
unkown
page readonly
1D4000064000
direct allocation
page read and write
241C5147000
unclassified section
page read and write
1ECC0361C000
direct allocation
page read and write
4AA4000
heap
page read and write
1ECC023B7000
direct allocation
page read and write
2C41000
heap
page read and write
75F000
unkown
page readonly
1D40000E8000
direct allocation
page read and write
1ECC03D60000
direct allocation
page read and write
71A000
unkown
page readonly
3001000
heap
page read and write
1ECC0256C000
direct allocation
page read and write
2C41000
heap
page read and write
1EC800248000
direct allocation
page read and write
241C338D000
heap
page read and write
1ECC038B8000
direct allocation
page read and write
2D62000
direct allocation
page read and write
1ECC035B0000
direct allocation
page read and write
EA70FFC000
stack
page read and write
4411000
heap
page read and write
1ECC0232C000
direct allocation
page read and write
241C6451000
heap
page read and write
1ECC02E24000
direct allocation
page read and write
4150000
heap
page read and write
43EB000
heap
page read and write
241C4A40000
unclassified section
page read and write
965000
unkown
page readonly
56C1000
heap
page read and write
44A5000
heap
page read and write