IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\GamesManager.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\GamesManager\20000009\msnstreaming.ico
MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\channel.ico
MS Windows icon resource - 6 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\downloads.dat
SQLite 3.x database, last written using SQLite version 3007014, page size 1024, file counter 1, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\downloads.dat-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\webdata\Application Cache\Cache\data_0
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\webdata\Application Cache\Cache\data_1
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\webdata\Application Cache\Cache\data_2
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\webdata\Application Cache\Cache\data_3
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\webdata\Application Cache\Cache\f_000001
HTML document, ASCII text, with very long lines (32783)
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\webdata\Application Cache\Cache\f_000002
HTML document, ASCII text, with very long lines (32777)
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\webdata\Application Cache\Cache\f_000003
HTML document, ASCII text, with very long lines (32783)
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\webdata\Application Cache\Cache\f_000004
HTML document, ASCII text, with very long lines (64789)
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\webdata\Application Cache\Cache\index
FoxPro FPT, blocks size 512, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\webdata\Cache\data_0
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\webdata\Cache\data_1
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\webdata\Cache\data_2
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\webdata\Cache\data_3
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\webdata\Cache\f_000001
HTML document, ASCII text, with very long lines (32783)
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\webdata\Cache\f_000002
HTML document, ASCII text, with very long lines (32777)
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\webdata\Cache\f_000003
HTML document, ASCII text, with very long lines (32783)
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\webdata\Cache\f_000004
HTML document, ASCII text, with very long lines (64789)
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\webdata\Cache\index
FoxPro FPT, blocks size 512, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\webdata\Cookies
SQLite 3.x database, last written using SQLite version 3020000, file counter 4, database pages 7, cookie 0x4, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\webdata\Visited Links
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\webdata\ugmCacheData.dat
SQLite 3.x database, last written using SQLite version 3007014, page size 1024, file counter 2, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\20000009\webdata\ugmCacheData.dat-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\Firewall.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\Uninstaller.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\browser_cef_dll.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\browser_cef_exe.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\cef.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\cef_100_percent.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\cef_200_percent.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\cef_extensions.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\chrome_elf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\d3dcompiler_47.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\debug.log
CSV text
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\iWinInstaller.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\iWinLauncher.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\iWinPrerequisitesAdmin.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\iWinPrerequisitesUser.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\iWinUpgrader.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\icudtl.dat
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\languagestrings.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\libcef.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\am.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\ar.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\bg.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\bn.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\ca.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\cs.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\da.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\de.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\el.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\en-GB.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\en-US.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\es-419.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\es.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\et.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\fa.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\fi.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\fil.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\fr.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\gu.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\he.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\hi.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\hr.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\hu.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\id.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\it.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\ja.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\kn.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\ko.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\lt.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\lv.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\ml.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\mr.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\ms.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\nb.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\nl.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\pl.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\pt-BR.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\pt-PT.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\ro.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\ru.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\sk.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\sl.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\sr.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\sv.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\sw.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\ta.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\te.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\th.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\tr.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\uk.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\vi.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\zh-CN.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\locales\zh-TW.pak
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\natives_blob.bin
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\pepflashplayer.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\snapshot_blob.bin
data
dropped
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\toasterinstaller.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\LICENSE.electron.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\LICENSES.chromium.html
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\MSN Games Notifier.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\Uninstall MSN Games Notifier.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\blink_image_resources_200_percent.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\content_resources_200_percent.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\content_shell.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\d3dcompiler_47.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\ffmpeg.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\icudtl.dat
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\am.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\ar.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\bg.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\bn.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\ca.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\cs.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\da.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\de.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\el.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\en-GB.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\en-US.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\es-419.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\es.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\et.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\fa.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\fake-bidi.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\fi.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\fil.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\fr.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\gu.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\he.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\hi.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\hr.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\hu.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\id.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\it.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\ja.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\kn.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\ko.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\lt.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\lv.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\ml.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\mr.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\ms.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\nb.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\nl.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\pl.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\pt-BR.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\pt-PT.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\ro.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\ru.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\sk.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\sl.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\sr.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\sv.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\sw.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\ta.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\te.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\th.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\tr.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\uk.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\vi.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\zh-CN.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\locales\zh-TW.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\natives_blob.bin
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\node.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\resources\app.asar
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\resources\app.asar.unpacked\node_modules\active-win\index.js
ASCII text
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\resources\app.asar.unpacked\node_modules\active-win\license
ASCII text
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\resources\app.asar.unpacked\node_modules\active-win\main
Mach-O 64-bit x86_64 executable, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|PIE>
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\resources\app.asar.unpacked\node_modules\active-win\package.json
JSON data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\resources\app.asar.unpacked\node_modules\active-win\windows.js
ASCII text
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\resources\electron.asar
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\snapshot_blob.bin
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\ui_resources_200_percent.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\views_resources_200_percent.pak
data
dropped
C:\Users\user\AppData\Local\Programs\MSN-Games-Notifier\xinput1_3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\GMInstaller\GamesManagerInstaller.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
C:\Users\user\AppData\Local\Temp\gm.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\gm_installation_inner.log
ASCII text, with very long lines (306), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsjAA08.tmp\GamesManagerInstaller.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsjAA08.tmp\NSISdl.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsjAA08.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsjAA08.tmp\ftdownload.dat
ASCII text, with very long lines (512), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsk1D3F.tmp\StdUtils.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsk1D3F.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsk1D3F.tmp\WinShell.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsk1D3F.tmp\app-32.7z
7-zip archive data, version 0.4
dropped
C:\Users\user\AppData\Local\Temp\nsk1D3F.tmp\nsProcess.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsk1D3F.tmp\nsis7z.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nskAA62.tmp\INetC.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nskAA62.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nskAA62.tmp\nsProcess.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsoA80F.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nsv9448.tmp\INetC.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\MSN Games Notifier\installer.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\MSN Games Manager\MSN Games Manager.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Mon Jun 28 15:36:18 2021, mtime=Mon Sep 30 12:50:06 2024, atime=Mon Jun 28 15:36:18 2021, length=3865352, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\MSN Games Notifier.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Mon Sep 30 12:49:53 2024, mtime=Mon Sep 30 12:49:55 2024, atime=Tue Feb 19 11:33:04 2019, length=57142920, window=hide
dropped
C:\Users\user\Desktop\MSN Games Manager.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Mon Jun 28 15:36:18 2021, mtime=Mon Sep 30 12:50:07 2024, atime=Mon Jun 28 15:36:18 2021, length=3865352, window=hide
dropped
There are 197 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\GamesManager.exe
"C:\Users\user\AppData\Local\GamesManager_iWin_MSN\GamesManager.exe" -config.uri=https://ugm3-msn.iwin.com/ -config.channel="20000009" -config.sku="FIRST_INSTALL" -config.iwinrequest="PF/1735198334008948550/zengems/51/0"
malicious
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\GamesManager.exe
"C:\Users\user\AppData\Local\GamesManager_iWin_MSN\GamesManager.exe" --type=renderer --no-sandbox --service-pipe-token=97A7B1777A421674542AF2780F1B6D7A --lang=en-US --lang=en-US --log-file="C:\Users\user\AppData\Local\GamesManager_iWin_MSN\debug.log" --user-agent="Mozilla/5.0 (Windows NT 10.0; Win32; x86) Chromium/61.0.0.0 Chrome/61.0.0.0 Version/3.9.6.635 GamesManager/3.9.6.635 20000009 WinVer/10.0 [x64] CEF/3.3163.1651.gf229796 UAPI" --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553 --disable-accelerated-video-decode --disable-gpu-compositing --enable-gpu-async-worker-context --service-request-channel-token=97A7B1777A421674542AF2780F1B6D7A --renderer-client-id=2 --mojo-platform-channel-handle=2712 /prefetch:1
malicious
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\GamesManager.exe
"C:\Users\user\AppData\Local\GamesManager_iWin_MSN\GamesManager.exe" --type=renderer --no-sandbox --service-pipe-token=4AB44524C71BE879F241E5F9C60EF896 --lang=en-US --lang=en-US --log-file="C:\Users\user\AppData\Local\GamesManager_iWin_MSN\debug.log" --user-agent="Mozilla/5.0 (Windows NT 10.0; Win32; x86) Chromium/61.0.0.0 Chrome/61.0.0.0 Version/3.9.6.635 GamesManager/3.9.6.635 20000009 WinVer/10.0 [x64] CEF/3.3163.1651.gf229796 UAPI" --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553 --disable-accelerated-video-decode --disable-gpu-compositing --enable-gpu-async-worker-context --service-request-channel-token=4AB44524C71BE879F241E5F9C60EF896 --renderer-client-id=3 --mojo-platform-channel-handle=3168 /prefetch:1
malicious
C:\Users\user\AppData\Local\Temp\nsjAA08.tmp\GamesManagerInstaller.exe
"C:\Users\user\AppData\Local\Temp\nsjAA08.tmp\GamesManagerInstaller.exe" -installer.createiwinshortcuts=yes -config.channel=20000009 -config.uri=https://ugm3-msn.iwin.com/ -config.channelName=MsnStreaming -config.iwinrequest="PF/1735198334008948550/zengems/51/0"
C:\Users\user\AppData\Local\Temp\GMInstaller\GamesManagerInstaller.exe
"C:\Users\user\AppData\Local\Temp\GMInstaller\GamesManagerInstaller.exe" -installer.logstartsent=true -config.channel=20000009 -config.uri="https://ugm3-msn.iwin.com/" -config.channelName="iWin" -config.sku=FIRST_INSTALL -installer.createshortcutswithname="MSN Games Manager" -autoupdate=1 -config.iwinrequest="PF/1735198334008948550/zengems/51/0"
C:\Users\user\AppData\Local\GamesManager_iWin_MSN\toasterinstaller.exe
"C:\Users\user\AppData\Local\GamesManager_iWin_MSN\toasterinstaller.exe" /S --no-desktop-shortcut

URLs

Name
IP
Malicious
https://ugm3-msn.iwin.com/
107.23.182.116
malicious
https://ugm3-msn.iwin.com
unknown
malicious
http://download.iwincdn.com/premium/unifiedgs/unifiedgames/download/win32/gamescom/2.1.30/GamesManag
unknown
https://ct.startssl.com/
unknown
http://www.startssl.com/policy.pdf04
unknown
https://tobiassachs.report-uri.io/r/default/staple/reportOnly
unknown
https://ugm3-msn.iwin.com/ugm.appcache
107.23.182.116
http://developer.chrome.com/extensions/manifest.html#permissionshttp://developer.chrome.com/apps/dec
unknown
http://ocsp.starfieldtech.com/08
unknown
https://www.baidu.com/favicon.ico
unknown
https://play.iwincdn.com/assets/site/ajax-loader-2-62916463ab77e7f2aea4f13eee7b21c1801a6997cd15f90dd18135539bbc414d.gif
68.232.35.54
http://developer.chrome.com/extensions/manifest.html#permissions
unknown
http://ocsp.starfieldtech.com/0;
unknown
http://repository.swisssign.com/0
unknown
https://co.search.yahoo.com/search?ei=
unknown
https://crashpad.chromium.org/https://crashpad.chromium.org/bug/new
unknown
http://www.color.org
unknown
https://play.iwincdn.com/assets/ugm3-msn_iwin_com/logo-loading-c6983a12a93990ab7e6d5224d41eea343f518
unknown
https://play.iwincdn.com/assets/ugm3-msn_iwin_com/logo-loading-c6983a12a93990ab7e6d5224d41eea343f5188fdb4649e36bb1c2a43b0e8b5d9.png
68.232.35.54
http://dev.chromium.org/throttling
unknown
https://ugm3-msn.iwin.com/newesflow
unknown
https://sabre.ct.comodo.com/
unknown
https://support.google.com/chrome/?p=plugin_real
unknown
http://repository.certum.pl/ca.cer09
unknown
https://github.com/Polymer/polymer/issues/3669
unknown
http://gm.iwin.com/
unknown
https://ca.search.yahoo.com/favicon.ico
unknown
https://play.iwincdn.com/assets/ugm3-msn_iwin_com/logo-header-c6983a12a93990ab7e6d5224d41eea343f5188
unknown
https://ugm3-msn.iwin.com/privacy-policye
unknown
https://ugm3-msn.iwin.com/offlineell
unknown
https://www.google.com/cloudprint
unknown
http://clients3.google.com/cert_upload_jsonT
unknown
http://getbootstrap.com)
unknown
https://p.iwin.com/gm/autoupdate/$
unknown
https://clients3.google.com/ct_upload
unknown
https://ugm3-msn.iwin.com/kO
unknown
https://ugm3-msn.iwin.com/homel/flow%
unknown
https://cl.search.yahoo.com/favicon.icohttps://cl.search.yahoo.com/search?ei=
unknown
https://dk.search.yahoo.com/favicon.icohttps://dk.search.yahoo.com/search?ei=
unknown
http://www.certum.pl/CPS0
unknown
https://play.iwincdn.com/assets/ugm3-msn_iwin_com/offline-94e0c02b76a422b1c94ca5ad97c852ca577079edb6
unknown
https://chromium.googlesource.com/chromium/src/
unknown
https://www.najdi.si/assets/PROD-1.5.16/ctx/images/favicon.ico
unknown
http://www.anf.es/es/address-direccion.html
unknown
http://l.twimg.com/i/hpkp_report
unknown
https://crashpad.chromium.org/
unknown
https://ugm3-msn.iwin.com/:q
unknown
https://ro.search.yahoo.com/search?ei=
unknown
https://chrome.google.com/webstore
unknown
http://szukaj.onet.pl/wyniki.html?qt=
unknown
http://wpad/wpad.datFindProxyForURLWPAD
unknown
http://certs.godaddy.com/repository/1301
unknown
https://lh3.googleusercontent.com
unknown
https://www.alphassl.com/repository/03
unknown
https://ct2.digicert-ct.com/log/
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
http://www.startssl.com/policy0
unknown
https://certs.godaddy.com/repository/0
unknown
http://certificates.godaddy.com/repository/gd_intermediate.crt0
unknown
http://www.symauth.com/cps0(
unknown
https://www.thawte.com/cps0
unknown
https://yastatic.net/lego/_/pDu9OWAQKB0s2J9IojKpiS_Eho.ico
unknown
https://go.imgsmail.ru/favicon.ico
unknown
https://www.google.com/favicon.ico
unknown
https://ugm3-msn.iwin.com/offliner
unknown
https://wicg.github.io/reporting.
unknown
http://crl.godaddy.com/gdroot-g2.crl0F
unknown
http://crl.rootg2.amazontrust.com/rootg2.crl0
unknown
http://pesquisa.sapo.pt/?q=
unknown
http://www.symauth.com/rpa0)
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://ugm3-msn.iwin.com/offlinep
unknown
https://support.google.com/chrome/?p=plugin_shockwave
unknown
http://www.startssl.com/sfsca.crl0
unknown
http://www.symauth.com/rpa00
unknown
https://ctlog.wosign.com/
unknown
https://ugm3-msn.iwin.com/subscribe/start-membership
unknown
http://search.incredibar.com/favicon.icohttp://search.incredibar.com/search.php?q=
unknown
https://www.google.com/accounts/OAuthLogin
unknown
http://developer.chrome.com/apps/declare_permissions.html
unknown
https://ugm3-msn.iwin.com/exit-upsell
unknown
https://ugm3-msn.iwin.com/offlinei
unknown
https://www.google.TLD
unknown
http://aia.startssl.com/certs/ca.crt02
unknown
https://github.com/twbs/bootstrap/blob/master/LICENSE)
unknown
https://cl.search.yahoo.com/favicon.ico
unknown
https://iwin.zendesk.com/hc/en-us
unknown
https://www.iwin.com/
unknown
http://certs.oaticerts.com/repository/OATICA2.crl
unknown
https://ugm3-msn.iwin.com/~
unknown
http://certs.oati.net/repository/OATICA2.crt0
unknown
http://events.iwin.com/
unknown
https://tobiassachs.report-uri.io/r/default/ct/reportOnly
unknown
http://crl.entrust.net/2048ca.crl0;
unknown
https://dl.iwin.com/
unknown
https://ugm3-msn.iwin.com/publisher
unknown
https://ugm3-msn.iwin.com/offlinew
unknown
https://www.baidu.com/favicon.icohttps://www.baidu.com/#ie=
unknown
https://ugm3-msn.iwin.com/favicon.ico
unknown
http://html4/loose.dtd
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
d370k74vusd53r.cloudfront.net
18.245.31.40
malicious
p.iwin.com
unknown

IPs

IP
Domain
Country
Malicious
18.245.31.40
d370k74vusd53r.cloudfront.net
United States
malicious
107.23.182.116
unknown
United States
68.232.35.54
unknown
United States
52.2.184.42
unknown
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_CURRENT_USER\SOFTWARE\Oberon Media\GamesManager\20000009
Exe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MSN Games Manager
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MSN Games Manager
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MSN Games Manager
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MSN Games Manager
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MSN Games Manager
QuietUninstallString
HKEY_CURRENT_USER\SOFTWARE\Oberon Media\GamesManagerInstaller
Installer Language
HKEY_CURRENT_USER\SOFTWARE\Oberon Media\GamesManager\20000009
ChannelLanguage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MSN Games Manager
EstimatedSize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MSN Games Manager
DisplayIcon
HKEY_CURRENT_USER\SOFTWARE\Oberon Media\GamesManager\20000009\shortcuts3
DesktopShortcut
HKEY_CURRENT_USER\SOFTWARE\Oberon Media\GamesManager\20000009\shortcuts3
StartMenuShortcut
HKEY_CURRENT_USER\SOFTWARE\7a0d73ab-e51e-567f-8ccd-0dcc75c9699a
InstallLocation
HKEY_CURRENT_USER\SOFTWARE\7a0d73ab-e51e-567f-8ccd-0dcc75c9699a
KeepShortcuts
HKEY_CURRENT_USER\SOFTWARE\7a0d73ab-e51e-567f-8ccd-0dcc75c9699a
ShortcutName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\7a0d73ab-e51e-567f-8ccd-0dcc75c9699a
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\7a0d73ab-e51e-567f-8ccd-0dcc75c9699a
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\7a0d73ab-e51e-567f-8ccd-0dcc75c9699a
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\7a0d73ab-e51e-567f-8ccd-0dcc75c9699a
DisplayIcon
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\7a0d73ab-e51e-567f-8ccd-0dcc75c9699a
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\7a0d73ab-e51e-567f-8ccd-0dcc75c9699a
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\7a0d73ab-e51e-567f-8ccd-0dcc75c9699a
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\7a0d73ab-e51e-567f-8ccd-0dcc75c9699a
EstimatedSize
HKEY_CURRENT_USER\SOFTWARE\Oberon Media\Toaster\20000001
Uninstall
HKEY_CURRENT_USER\SOFTWARE\Oberon Media\Toaster\20000001
GUID
HKEY_CURRENT_USER\SOFTWARE\Oberon Media\GamesManager\20000009\Settings
launchFailureCounter
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
Blob
There are 22 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6C302000
unkown
page read and write
A40000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
57CE000
stack
page read and write
480A000
heap
page read and write
4813000
heap
page read and write
61C000
unkown
page readonly
6CEB8000
unkown
page read and write
D81000
unkown
page readonly
2AAC000
heap
page read and write
2B7F0000
direct allocation
page read and write
4814000
heap
page read and write
6A4000
heap
page read and write
53B40000
direct allocation
page read and write
6A4000
heap
page read and write
2B47000
heap
page read and write
725000
heap
page read and write
6ABD1000
unkown
page execute read
4CF000
unkown
page read and write
480F000
heap
page read and write
724000
heap
page read and write
480D000
heap
page read and write
632E000
unclassified section
page read and write
53944000
direct allocation
page read and write
4815000
heap
page read and write
9460000
heap
page read and write
D1B000
unkown
page readonly
6A4000
heap
page read and write
659E000
stack
page read and write
6A4000
heap
page read and write
2B7E4000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
A1F000
stack
page read and write
724000
heap
page read and write
480C000
heap
page read and write
2B860000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
9920000
unclassified section
page read and write
480F000
heap
page read and write
724000
heap
page read and write
76B000
heap
page read and write
2B898000
direct allocation
page read and write
4E86000
direct allocation
page execute and read and write
F45000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
41A3000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
2B7D8000
direct allocation
page read and write
6B862000
unkown
page readonly
724000
heap
page read and write
6A5000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
568F000
stack
page read and write
6340000
heap
page read and write
2E0E000
heap
page read and write
41C3000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
19A000
stack
page read and write
6A4000
heap
page read and write
589000
unkown
page readonly
53ABC000
direct allocation
page read and write
724000
heap
page read and write
FD0000
heap
page read and write
6A4000
heap
page read and write
9505000
heap
page read and write
480D000
heap
page read and write
538F4000
direct allocation
page read and write
2B704000
direct allocation
page read and write
950E000
heap
page read and write
538B4000
direct allocation
page read and write
70D000
heap
page read and write
53944000
direct allocation
page read and write
41C3000
heap
page read and write
356C000
heap
page read and write
6C13D000
unkown
page read and write
52BE000
stack
page read and write
2B6E0000
direct allocation
page read and write
41A0000
heap
page read and write
2FBE000
stack
page read and write
724000
heap
page read and write
37C0000
unkown
page readonly
53910000
direct allocation
page read and write
767000
heap
page read and write
503E000
stack
page read and write
6A4000
heap
page read and write
2115000
heap
page read and write
4814000
heap
page read and write
6A4000
heap
page read and write
652A000
heap
page read and write
4A1E000
stack
page read and write
522F000
stack
page read and write
2E3D000
stack
page read and write
6A4000
heap
page read and write
6C131000
unkown
page read and write
53B94000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
53944000
direct allocation
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
4814000
heap
page read and write
2B704000
direct allocation
page read and write
5D821000
direct allocation
page read and write
2B6E0000
direct allocation
page read and write
2B76C000
direct allocation
page read and write
724000
heap
page read and write
4CEF000
stack
page read and write
26004000
direct allocation
page read and write
41BC000
heap
page read and write
6A4000
heap
page read and write
2B684000
direct allocation
page read and write
A0E000
stack
page read and write
53944000
direct allocation
page read and write
724000
heap
page read and write
520000
heap
page read and write
480C000
heap
page read and write
2B794000
direct allocation
page read and write
440000
heap
page read and write
6BD91000
unkown
page readonly
5396C000
direct allocation
page read and write
5394C000
direct allocation
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
9EAE000
unclassified section
page read and write
538E4000
direct allocation
page read and write
6A4000
heap
page read and write
2B7CC000
direct allocation
page read and write
5E4B000
stack
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
2B6B8000
direct allocation
page read and write
2606C000
direct allocation
page read and write
353D000
heap
page read and write
7B1000
heap
page read and write
6C169000
unkown
page read and write
538E4000
direct allocation
page read and write
50CB000
stack
page read and write
724000
heap
page read and write
25AD000
stack
page read and write
5395C000
direct allocation
page read and write
6A4000
heap
page read and write
26064000
direct allocation
page read and write
6A4000
heap
page read and write
53A80000
direct allocation
page read and write
5394C000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
30C0000
heap
page read and write
480D000
heap
page read and write
582E000
stack
page read and write
6360000
unclassified section
page read and write
3FB14000
direct allocation
page read and write
4815000
heap
page read and write
480F000
heap
page read and write
724000
heap
page read and write
718000
heap
page read and write
41BA000
heap
page read and write
2B85C000
direct allocation
page read and write
724000
heap
page read and write
2B81C000
direct allocation
page read and write
3557000
heap
page read and write
6A4000
heap
page read and write
31F7000
heap
page read and write
5678000
heap
page read and write
6A4000
heap
page read and write
418F000
stack
page read and write
5D8000
unkown
page readonly
6A4000
heap
page read and write
539A0000
direct allocation
page read and write
41BF000
heap
page read and write
3FB3C000
direct allocation
page read and write
6C302000
unkown
page read and write
724000
heap
page read and write
4EB000
unkown
page read and write
4815000
heap
page read and write
4813000
heap
page read and write
2B76C000
direct allocation
page read and write
621E000
unclassified section
page read and write
2B7C0000
direct allocation
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
2B7B4000
direct allocation
page read and write
8A0000
heap
page read and write
53B50000
direct allocation
page read and write
53AAC000
direct allocation
page read and write
5395C000
direct allocation
page read and write
28B6000
heap
page read and write
53ABC000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
5617000
heap
page read and write
6C312000
unkown
page read and write
6A4000
heap
page read and write
6A5000
heap
page read and write
53A94000
direct allocation
page read and write
53944000
direct allocation
page read and write
3670000
direct allocation
page read and write
6CEBE000
unkown
page readonly
53B20000
direct allocation
page read and write
480F000
heap
page read and write
6A4000
heap
page read and write
4BA60000
direct allocation
page read and write
2B788000
direct allocation
page read and write
539EC000
direct allocation
page read and write
2B8A8000
direct allocation
page read and write
2B794000
direct allocation
page read and write
407000
unkown
page readonly
2607C000
direct allocation
page read and write
3C5C1000
direct allocation
page read and write
63BA000
unclassified section
page read and write
3710000
heap
page read and write
95C9000
heap
page read and write
6A4000
heap
page read and write
2B6B8000
direct allocation
page read and write
8F9000
heap
page read and write
53AAC000
direct allocation
page read and write
724000
heap
page read and write
4BEF000
stack
page read and write
4815000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
9500000
heap
page read and write
6C14C000
unkown
page read and write
2B76C000
direct allocation
page read and write
724000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
625E000
unclassified section
page read and write
53A78000
direct allocation
page read and write
4C5F000
stack
page read and write
2B8C0000
direct allocation
page read and write
2B878000
direct allocation
page read and write
2E39000
heap
page read and write
7A9000
heap
page read and write
2B7E4000
direct allocation
page read and write
2DD4000
heap
page read and write
409000
unkown
page readonly
6A4000
heap
page read and write
53810000
direct allocation
page read and write
6A4000
heap
page read and write
2B720000
direct allocation
page read and write
42B0000
unkown
page readonly
4815000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
4B8F000
stack
page read and write
6A4000
heap
page read and write
9529000
heap
page read and write
55C000
unkown
page readonly
724000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
53ABC000
direct allocation
page read and write
353D000
heap
page read and write
2B754000
direct allocation
page read and write
1EF86000
direct allocation
page execute and read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
4801000
heap
page read and write
724000
heap
page read and write
353D000
heap
page read and write
5650000
heap
page read and write
2DE9000
heap
page read and write
3FB54000
direct allocation
page read and write
6A4000
heap
page read and write
539B8000
direct allocation
page read and write
61DE000
stack
page read and write
6B8AF000
unkown
page readonly
6A4000
heap
page read and write
2B838000
direct allocation
page read and write
2B720000
direct allocation
page read and write
683D0000
unkown
page readonly
480F000
heap
page read and write
2B76C000
direct allocation
page read and write
538D8000
direct allocation
page read and write
480D000
heap
page read and write
724000
heap
page read and write
2B8E8000
direct allocation
page read and write
2B7B4000
direct allocation
page read and write
724000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
2EC0000
unkown
page readonly
724000
heap
page read and write
77E000
stack
page read and write
5395C000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
4815000
heap
page read and write
724000
heap
page read and write
736E000
stack
page read and write
6C04A000
unkown
page readonly
6FE000
heap
page read and write
2B8D0000
direct allocation
page read and write
480F000
heap
page read and write
2E60000
heap
page read and write
2B81C000
direct allocation
page read and write
2B6F4000
direct allocation
page read and write
6A5000
heap
page read and write
6A4000
heap
page read and write
353D000
heap
page read and write
724000
heap
page read and write
2B794000
direct allocation
page read and write
5BCE000
stack
page read and write
480F000
heap
page read and write
4C30000
trusted library allocation
page read and write
434E000
stack
page read and write
41BC000
heap
page read and write
2B660000
direct allocation
page read and write
539E4000
direct allocation
page read and write
2B50000
heap
page read and write
3FB28000
direct allocation
page read and write
6A4000
heap
page read and write
3A55000
unkown
page readonly
724000
heap
page read and write
40F000
unkown
page read and write
592E000
stack
page read and write
6A4000
heap
page read and write
4813000
heap
page read and write
4815000
heap
page read and write
5397C000
direct allocation
page read and write
2B6F8000
direct allocation
page read and write
918F000
stack
page read and write
725000
heap
page read and write
2B7CC000
direct allocation
page read and write
31D6000
heap
page read and write
791000
heap
page read and write
51321000
direct allocation
page read and write
314F000
stack
page read and write
53A40000
direct allocation
page read and write
562F000
heap
page read and write
2B704000
direct allocation
page read and write
29F3000
heap
page read and write
2E07000
heap
page read and write
724000
heap
page read and write
9481000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
4813000
heap
page read and write
41BD000
heap
page read and write
2606C000
direct allocation
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
53A6C000
direct allocation
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
4CBE000
stack
page read and write
53AC8000
direct allocation
page read and write
683D1000
unkown
page execute read
62EE000
unclassified section
page read and write
539B0000
direct allocation
page read and write
5396C000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
2B6F4000
direct allocation
page read and write
EC0000
heap
page read and write
53AE8000
direct allocation
page read and write
41BC000
heap
page read and write
353D000
heap
page read and write
6A4000
heap
page read and write
2B7D8000
direct allocation
page read and write
6A4000
heap
page read and write
6BD7C000
unkown
page readonly
6A4000
heap
page read and write
539B8000
direct allocation
page read and write
1365000
heap
page read and write
6A4000
heap
page read and write
77B000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
6C161000
unkown
page read and write
4FFD000
stack
page read and write
6A5000
heap
page read and write
4BA50000
direct allocation
page read and write
724000
heap
page read and write
6CEBC000
unkown
page readonly
6C329000
unkown
page readonly
7570000
trusted library allocation
page read and write
526E000
stack
page read and write
2B7F0000
direct allocation
page read and write
2B888000
direct allocation
page read and write
71BE000
stack
page read and write
F70000
direct allocation
page execute read
32C1000
heap
page read and write
6CEA0000
unkown
page readonly
2CC8000
heap
page read and write
4807000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
561A000
heap
page read and write
6A4000
heap
page read and write
53B40000
direct allocation
page read and write
FE0000
direct allocation
page execute read
68DD1000
unkown
page execute read
53A94000
direct allocation
page read and write
6C035000
unkown
page readonly
F584000
direct allocation
page read and write
6A4000
heap
page read and write
7B1000
heap
page read and write
6A4000
heap
page read and write
4814000
heap
page read and write
2EB0000
heap
page read and write
2DAE000
stack
page read and write
414000
unkown
page read and write
47F4000
heap
page read and write
2B710000
direct allocation
page read and write
6A4000
heap
page read and write
2B76C000
direct allocation
page read and write
5394C000
direct allocation
page read and write
2603C000
direct allocation
page read and write
2B878000
direct allocation
page read and write
82B000
heap
page read and write
8CE000
stack
page read and write
CD84000
direct allocation
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
480F000
heap
page read and write
41BD000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
29D3000
heap
page read and write
2CDF000
stack
page read and write
41BD000
heap
page read and write
26014000
direct allocation
page read and write
2B7CC000
direct allocation
page read and write
6A4000
heap
page read and write
775000
heap
page read and write
5B5000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
6A5000
heap
page read and write
4FBE000
stack
page read and write
6A5000
heap
page read and write
725000
heap
page read and write
6A4000
heap
page read and write
47F3000
heap
page read and write
6A4000
heap
page read and write
4815000
heap
page read and write
4BB80000
direct allocation
page read and write
724000
heap
page read and write
1370000
unkown
page readonly
269F000
stack
page read and write
41C3000
heap
page read and write
538D8000
direct allocation
page read and write
6A4000
heap
page read and write
6CEB5000
unkown
page read and write
590E000
stack
page read and write
320F000
heap
page read and write
9502000
heap
page read and write
9EB0000
unclassified section
page read and write
5D0000
heap
page read and write
2B7D8000
direct allocation
page read and write
724000
heap
page read and write
3FAF4000
direct allocation
page read and write
126F000
stack
page read and write
724000
heap
page read and write
42C000
unkown
page readonly
724000
heap
page read and write
3630000
direct allocation
page read and write
538F4000
direct allocation
page read and write
6A4000
heap
page read and write
5AAD000
heap
page read and write
401000
unkown
page execute read
4BA0C000
direct allocation
page read and write
94F7000
heap
page read and write
2B7A8000
direct allocation
page read and write
6E5000
heap
page read and write
4C9E000
stack
page read and write
6429000
unclassified section
page read and write
6E7000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
6A5000
heap
page read and write
6A4000
heap
page read and write
4BA0000
heap
page read and write
2B64C000
direct allocation
page read and write
6A4000
heap
page read and write
2B804000
direct allocation
page read and write
94AB000
heap
page read and write
53900000
direct allocation
page read and write
26058000
direct allocation
page read and write
41B2000
heap
page read and write
4C3000
unkown
page read and write
6A4000
heap
page read and write
26DF000
stack
page read and write
6A4000
heap
page read and write
5385C000
direct allocation
page read and write
6B6E5000
unkown
page readonly
53910000
direct allocation
page read and write
4813000
heap
page read and write
4D00000
heap
page read and write
53A6C000
direct allocation
page read and write
4813000
heap
page read and write
53830000
direct allocation
page read and write
3430000
heap
page read and write
54F000
unkown
page read and write
623B000
stack
page read and write
2B720000
direct allocation
page read and write
5CCE000
stack
page read and write
480F000
heap
page read and write
4815000
heap
page read and write
3FA2C000
direct allocation
page read and write
724000
heap
page read and write
19A000
stack
page read and write
409000
unkown
page readonly
539DC000
direct allocation
page read and write
41BD000
heap
page read and write
53AAC000
direct allocation
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
78D000
heap
page read and write
26A4000
heap
page read and write
6A4000
heap
page read and write
6C198000
unkown
page read and write
6C158000
unkown
page read and write
6A4000
heap
page read and write
3FB08000
direct allocation
page read and write
6A4000
heap
page read and write
41C5000
heap
page read and write
53ABC000
direct allocation
page read and write
2B6AC000
direct allocation
page read and write
949A000
heap
page read and write
6A4000
heap
page read and write
5384C000
direct allocation
page read and write
2B610000
direct allocation
page read and write
6CEBC000
unkown
page readonly
2B678000
direct allocation
page read and write
41C5000
heap
page read and write
2B6C4000
direct allocation
page read and write
53870000
direct allocation
page read and write
1C9000
stack
page read and write
736000
heap
page read and write
6A4000
heap
page read and write
467C000
unkown
page readonly
5635000
heap
page read and write
6A4000
heap
page read and write
353D000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
6C184000
unkown
page read and write
49DE000
stack
page read and write
2B6A0000
direct allocation
page read and write
6A4000
heap
page read and write
41BB000
heap
page read and write
53AD4000
direct allocation
page read and write
2604C000
direct allocation
page read and write
2B75C000
direct allocation
page read and write
5680000
heap
page read and write
408000
unkown
page readonly
2B690000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
6467000
unclassified section
page read and write
7D4000
heap
page read and write
3224000
heap
page read and write
10002000
unkown
page readonly
41FF000
heap
page read and write
2B860000
direct allocation
page read and write
6B6E5000
unkown
page readonly
41BB000
heap
page read and write
2B7CC000
direct allocation
page read and write
669E000
stack
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
539B0000
direct allocation
page read and write
408000
unkown
page readonly
480F000
heap
page read and write
820000
heap
page read and write
3FA94000
direct allocation
page read and write
68DD1000
unkown
page execute read
6A4000
heap
page read and write
724000
heap
page read and write
946F000
heap
page read and write
53A20000
direct allocation
page read and write
A50000
heap
page read and write
53ADC000
direct allocation
page read and write
53B50000
direct allocation
page read and write
725000
heap
page read and write
724000
heap
page read and write
2FF0000
heap
page read and write
2B76C000
direct allocation
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
62F0000
unclassified section
page read and write
6A4000
heap
page read and write
53AE8000
direct allocation
page read and write
4E4E000
stack
page read and write
724000
heap
page read and write
2B754000
direct allocation
page read and write
53ABC000
direct allocation
page read and write
2B75C000
direct allocation
page read and write
2B7A8000
direct allocation
page read and write
2D301000
direct allocation
page read and write
46B000
unkown
page read and write
480F000
heap
page read and write
6B62A000
unkown
page readonly
41BB000
heap
page read and write
41C3000
heap
page read and write
6C13E000
unkown
page write copy
5AE000
stack
page read and write
2607C000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
4814000
heap
page read and write
4813000
heap
page read and write
78D000
heap
page read and write
480D000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
98D0000
unclassified section
page read and write
53AD000
stack
page read and write
2B710000
direct allocation
page read and write
353D000
heap
page read and write
2B824000
direct allocation
page read and write
724000
heap
page read and write
480B000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
5395C000
direct allocation
page read and write
2B7F0000
direct allocation
page read and write
9957000
unclassified section
page read and write
53BC000
stack
page read and write
6A4000
heap
page read and write
420000
unkown
page read and write
29A1000
heap
page read and write
6C152000
unkown
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
6C184000
unkown
page read and write
724000
heap
page read and write
539E4000
direct allocation
page read and write
5C7000
unkown
page readonly
2B99000
heap
page read and write
94AB000
heap
page read and write
5C5000
heap
page read and write
62A000
unkown
page readonly
2B7A8000
direct allocation
page read and write
724000
heap
page read and write
53AD4000
direct allocation
page read and write
53FE000
stack
page read and write
94FB000
heap
page read and write
724000
heap
page read and write
4814000
heap
page read and write
2B7D8000
direct allocation
page read and write
421000
unkown
page read and write
4814000
heap
page read and write
480F000
heap
page read and write
4813000
heap
page read and write
56E5000
heap
page read and write
41BA000
heap
page read and write
9E6E000
unclassified section
page read and write
41BB000
heap
page read and write
480D000
heap
page read and write
480F000
heap
page read and write
5C2000
unkown
page readonly
480D000
heap
page read and write
724000
heap
page read and write
4B90000
heap
page read and write
6A4000
heap
page read and write
2B854000
direct allocation
page read and write
4BA04000
direct allocation
page read and write
6A4000
heap
page read and write
94FB000
heap
page read and write
75D000
heap
page read and write
53870000
direct allocation
page read and write
724000
heap
page read and write
724000
heap
page read and write
53B50000
direct allocation
page read and write
2BD0000
heap
page read and write
2B7D8000
direct allocation
page read and write
6330000
unclassified section
page read and write
480B000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
5518000
heap
page read and write
276C000
stack
page read and write
480F000
heap
page read and write
5AA4000
trusted library allocation
page read and write
724000
heap
page read and write
740000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
6C16B000
unkown
page write copy
6A4000
heap
page read and write
6C137000
unkown
page write copy
565D000
heap
page read and write
4813000
heap
page read and write
53A78000
direct allocation
page read and write
6A4000
heap
page read and write
4815000
heap
page read and write
6CEBE000
unkown
page readonly
4815000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
F95000
heap
page read and write
539C4000
direct allocation
page read and write
538C0000
direct allocation
page read and write
6C13D000
unkown
page read and write
53900000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
2B76C000
direct allocation
page read and write
7470000
heap
page read and write
9466000
heap
page read and write
725000
heap
page read and write
6A4000
heap
page read and write
353D000
heap
page read and write
6A4000
heap
page read and write
538F4000
direct allocation
page read and write
53A78000
direct allocation
page read and write
94F7000
heap
page read and write
6A4000
heap
page read and write
376F000
stack
page read and write
2B7B4000
direct allocation
page read and write
4BA70000
direct allocation
page read and write
6A4000
heap
page read and write
6CE51000
unkown
page execute read
41BB000
heap
page read and write
2B7D8000
direct allocation
page read and write
1141000
heap
page read and write
79E000
heap
page read and write
719000
heap
page read and write
2B624000
direct allocation
page read and write
6A4000
heap
page read and write
53830000
direct allocation
page read and write
480F000
heap
page read and write
724000
heap
page read and write
7E1000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
53B40000
direct allocation
page read and write
6A4000
heap
page read and write
480F000
heap
page read and write
725000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
5396C000
direct allocation
page read and write
94AB000
heap
page read and write
724000
heap
page read and write
480B000
heap
page read and write
6A4000
heap
page read and write
2B690000
direct allocation
page read and write
6A5000
heap
page read and write
53AD4000
direct allocation
page read and write
41BF000
heap
page read and write
539CC000
direct allocation
page read and write
5576000
heap
page read and write
53910000
direct allocation
page read and write
2B5C000
heap
page read and write
6F0000
heap
page read and write
2B7F0000
direct allocation
page read and write
6A4000
heap
page read and write
3FA08000
direct allocation
page read and write
719000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
53910000
direct allocation
page read and write
6A4000
heap
page read and write
31E5000
heap
page read and write
480D000
heap
page read and write
41C5000
heap
page read and write
539EC000
direct allocation
page read and write
53B40000
direct allocation
page read and write
2B7CC000
direct allocation
page read and write
7A9000
heap
page read and write
6A4000
heap
page read and write
5A4F000
stack
page read and write
724000
heap
page read and write
544D000
stack
page read and write
6A4000
heap
page read and write
7A9000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
14C4000
heap
page read and write
724000
heap
page read and write
FC0000
heap
page read and write
538A8000
direct allocation
page read and write
53860000
direct allocation
page read and write
724000
heap
page read and write
2B7D8000
direct allocation
page read and write
6BF000
stack
page read and write
6A4000
heap
page read and write
52021000
direct allocation
page read and write
2B7B4000
direct allocation
page read and write
2B7B4000
direct allocation
page read and write
724000
heap
page read and write
41BF000
heap
page read and write
6A4000
heap
page read and write
534C000
stack
page read and write
724000
heap
page read and write
480F000
heap
page read and write
461000
unkown
page read and write
724000
heap
page read and write
A70000
unkown
page readonly
6A4000
heap
page read and write
988E000
unclassified section
page read and write
47F4000
heap
page read and write
19A000
stack
page read and write
13F9000
heap
page read and write
53820000
direct allocation
page read and write
563C000
heap
page read and write
6A4000
heap
page read and write
53A80000
direct allocation
page read and write
2B6AC000
direct allocation
page read and write
53A34000
direct allocation
page read and write
539DC000
direct allocation
page read and write
41BF000
heap
page read and write
6A4000
heap
page read and write
29C4000
heap
page read and write
991A000
unclassified section
page read and write
2B7F0000
direct allocation
page read and write
6A4000
heap
page read and write
2B720000
direct allocation
page read and write
2891000
heap
page read and write
6A4000
heap
page read and write
7A9000
heap
page read and write
53A80000
direct allocation
page read and write
2B8B0000
direct allocation
page read and write
41BD000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
53AC8000
direct allocation
page read and write
4815000
heap
page read and write
353D000
heap
page read and write
21BD000
stack
page read and write
725000
heap
page read and write
35B0000
direct allocation
page read and write
A70000
unkown
page readonly
2B8B0000
direct allocation
page read and write
2B75C000
direct allocation
page read and write
480D000
heap
page read and write
6C15A000
unkown
page write copy
539B8000
direct allocation
page read and write
480000
heap
page read and write
6A4000
heap
page read and write
725000
heap
page read and write
4BB14000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
6C13E000
unkown
page write copy
6DE000
stack
page read and write
6A4000
heap
page read and write
41C3000
heap
page read and write
A70000
unkown
page readonly
480D000
heap
page read and write
4815000
heap
page read and write
6A4000
heap
page read and write
6CEB5000
unkown
page read and write
4BB80000
direct allocation
page read and write
16B04000
direct allocation
page read and write
401000
unkown
page execute read
6A4000
heap
page read and write
480D000
heap
page read and write
2B6E8000
direct allocation
page read and write
36DA000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
6491000
heap
page read and write
9521000
heap
page read and write
2B898000
direct allocation
page read and write
724000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
7A9000
heap
page read and write
6A4000
heap
page read and write
6BD7C000
unkown
page readonly
724000
heap
page read and write
73E000
heap
page read and write
6A4000
heap
page read and write
9457000
heap
page read and write
353D000
heap
page read and write
480F000
heap
page read and write
6A4000
heap
page read and write
2B814000
direct allocation
page read and write
2601C000
direct allocation
page read and write
4814000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
31CA000
heap
page read and write
53AFC000
direct allocation
page read and write
724000
heap
page read and write
539A0000
direct allocation
page read and write
508000
heap
page read and write
4BB64000
direct allocation
page read and write
41BB000
heap
page read and write
6CEBC000
unkown
page readonly
4BB38000
direct allocation
page read and write
6C161000
unkown
page read and write
539CC000
direct allocation
page read and write
2B7CC000
direct allocation
page read and write
2B788000
direct allocation
page read and write
538B4000
direct allocation
page read and write
D66000
unkown
page read and write
304E000
stack
page read and write
2B7A8000
direct allocation
page read and write
41BF000
heap
page read and write
5396C000
direct allocation
page read and write
995E000
unclassified section
page read and write
31F5000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
82E000
heap
page read and write
356C000
heap
page read and write
6A4000
heap
page read and write
53B6C000
direct allocation
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
508E000
stack
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
725000
heap
page read and write
7C4000
heap
page read and write
6C330000
unkown
page readonly
5AE000
unkown
page readonly
78D000
heap
page read and write
6A4000
heap
page read and write
E6E000
stack
page read and write
2B82C000
direct allocation
page read and write
46B0000
unkown
page readonly
6A4000
heap
page read and write
6A4000
heap
page read and write
2B75C000
direct allocation
page read and write
587000
unkown
page readonly
2B75C000
direct allocation
page read and write
2A10000
unkown
page readonly
754000
heap
page read and write
2B660000
direct allocation
page read and write
480D000
heap
page read and write
4814000
heap
page read and write
2B630000
direct allocation
page read and write
5D8000
unkown
page readonly
6A4000
heap
page read and write
6A4000
heap
page read and write
565D000
heap
page read and write
6A4000
heap
page read and write
480D000
heap
page read and write
6A5000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
6A5000
heap
page read and write
2DFF000
stack
page read and write
480D000
heap
page read and write
20F4000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
3FAC8000
direct allocation
page read and write
41C5000
heap
page read and write
2B7CC000
direct allocation
page read and write
6A4000
heap
page read and write
473000
unkown
page read and write
408000
unkown
page readonly
3770000
trusted library allocation
page read and write
4815000
heap
page read and write
78D000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
2990000
trusted library allocation
page read and write
2B878000
direct allocation
page read and write
6A4000
heap
page read and write
5396C000
direct allocation
page read and write
724000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
480F000
heap
page read and write
9D9000
stack
page read and write
6A4000
heap
page read and write
320F000
heap
page read and write
480F000
heap
page read and write
6A4000
heap
page read and write
5F9C000
stack
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
2B8B0000
direct allocation
page read and write
722E000
stack
page read and write
9456000
heap
page read and write
6C060000
unkown
page readonly
94FC000
heap
page read and write
6A5000
heap
page read and write
2090000
heap
page read and write
26F0000
heap
page read and write
6A4000
heap
page read and write
2E02000
heap
page read and write
28B0000
heap
page read and write
724000
heap
page read and write
41C5000
heap
page read and write
4815000
heap
page read and write
724000
heap
page read and write
6C12F000
unkown
page write copy
5647000
heap
page read and write
F10000
heap
page read and write
353D000
heap
page read and write
2B7F0000
direct allocation
page read and write
4BB7C000
direct allocation
page read and write
6C143000
unkown
page write copy
53B40000
direct allocation
page read and write
DAE000
unkown
page readonly
6BFBF000
unkown
page readonly
724000
heap
page read and write
6A4000
heap
page read and write
41C5000
heap
page read and write
9910000
unclassified section
page read and write
53AAC000
direct allocation
page read and write
6B5D1000
unkown
page execute read
F40000
heap
page read and write
2E83000
heap
page read and write
53B50000
direct allocation
page read and write
94FB000
heap
page read and write
41C5000
heap
page read and write
724000
heap
page read and write
89B000
heap
page read and write
6C191000
unkown
page read and write
6A4000
heap
page read and write
53AFC000
direct allocation
page read and write
6A4000
heap
page read and write
2B8A8000
direct allocation
page read and write
2B76C000
direct allocation
page read and write
47F2000
heap
page read and write
725000
heap
page read and write
6C13B000
unkown
page write copy
E90000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
480F000
heap
page read and write
2BFF000
stack
page read and write
724000
heap
page read and write
724000
heap
page read and write
2B888000
direct allocation
page read and write
3119000
heap
page read and write
3542000
heap
page read and write
2891000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
589000
unkown
page readonly
724000
heap
page read and write
6A5000
heap
page read and write
6A4000
heap
page read and write
2B7B4000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
3F1C000
unkown
page readonly
6A4000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
95CB000
heap
page read and write
2280000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
2B794000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
538D0000
direct allocation
page read and write
41F000
unkown
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
24A0000
heap
page read and write
6A4000
heap
page read and write
2B710000
direct allocation
page read and write
725000
heap
page read and write
29D6000
heap
page read and write
480D000
heap
page read and write
6A4000
heap
page read and write
720000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
6A5000
heap
page read and write
53B50000
direct allocation
page read and write
777000
heap
page read and write
A30000
heap
page read and write
6A4000
heap
page read and write
41BF000
heap
page read and write
79E000
heap
page read and write
41BF000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
480A000
heap
page read and write
724000
heap
page read and write
480F000
heap
page read and write
2B7A8000
direct allocation
page read and write
563C000
heap
page read and write
2B860000
direct allocation
page read and write
417000
unkown
page read and write
10004000
unkown
page readonly
54F000
unkown
page read and write
724000
heap
page read and write
641E000
unclassified section
page read and write
6A5000
heap
page read and write
724000
heap
page read and write
4812000
heap
page read and write
5395C000
direct allocation
page read and write
724000
heap
page read and write
53884000
direct allocation
page read and write
4814000
heap
page read and write
2B7A8000
direct allocation
page read and write
6A4000
heap
page read and write
40C000
unkown
page write copy
6A4000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
487000
unkown
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
53A6C000
direct allocation
page read and write
594D000
stack
page read and write
480F000
heap
page read and write
2B844000
direct allocation
page read and write
2B898000
direct allocation
page read and write
4815000
heap
page read and write
724000
heap
page read and write
53850000
direct allocation
page read and write
2E90000
heap
page read and write
6A4000
heap
page read and write
6C169000
unkown
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
5395C000
direct allocation
page read and write
2B788000
direct allocation
page read and write
4815000
heap
page read and write
2B75C000
direct allocation
page read and write
116A000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
6C330000
unkown
page readonly
480F000
heap
page read and write
2B794000
direct allocation
page read and write
4814000
heap
page read and write
6A4000
heap
page read and write
41BD000
heap
page read and write
517E000
stack
page read and write
539A0000
direct allocation
page read and write
47F6000
heap
page read and write
2B8DC000
direct allocation
page read and write
2B7E4000
direct allocation
page read and write
53ADC000
direct allocation
page read and write
6C329000
unkown
page readonly
538D0000
direct allocation
page read and write
6A4000
heap
page read and write
53AC8000
direct allocation
page read and write
6A5000
heap
page read and write
6A4000
heap
page read and write
587000
unkown
page readonly
724000
heap
page read and write
2B868000
direct allocation
page read and write
6A4000
heap
page read and write
20EE000
stack
page read and write
53AE8000
direct allocation
page read and write
29CE000
heap
page read and write
6CE51000
unkown
page execute read
9DFA000
unclassified section
page read and write
53AFC000
direct allocation
page read and write
6A4000
heap
page read and write
2B7CC000
direct allocation
page read and write
4815000
heap
page read and write
480F000
heap
page read and write
4BAAC000
direct allocation
page read and write
26201000
direct allocation
page read and write
6A4000
heap
page read and write
12484000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
3FAE4000
direct allocation
page read and write
539EC000
direct allocation
page read and write
4BB6C000
direct allocation
page read and write
6A4000
heap
page read and write
2B7E4000
direct allocation
page read and write
5382C000
direct allocation
page read and write
6A4000
heap
page read and write
6C190000
unkown
page read and write
538A8000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
480D000
heap
page read and write
41C5000
heap
page read and write
6A4000
heap
page read and write
2B7C0000
direct allocation
page read and write
53ADC000
direct allocation
page read and write
2B814000
direct allocation
page read and write
D1B000
unkown
page readonly
757000
heap
page read and write
4813000
heap
page read and write
6C141000
unkown
page read and write
5380C000
direct allocation
page read and write
480D000
heap
page read and write
401000
unkown
page execute read
4813000
heap
page read and write
4815000
heap
page read and write
609E000
stack
page read and write
770000
heap
page read and write
53AFC000
direct allocation
page read and write
6A4000
heap
page read and write
480D000
heap
page read and write
6A4000
heap
page read and write
725000
heap
page read and write
4BA01000
direct allocation
page read and write
53988000
direct allocation
page read and write
6A4000
heap
page read and write
4815000
heap
page read and write
2B6D0000
direct allocation
page read and write
2B754000
direct allocation
page read and write
6ABD1000
unkown
page execute read
480D000
heap
page read and write
2B6D0000
direct allocation
page read and write
4D9F000
stack
page read and write
6A4000
heap
page read and write
539C4000
direct allocation
page read and write
5394C000
direct allocation
page read and write
53ADC000
direct allocation
page read and write
2B670000
direct allocation
page read and write
724000
heap
page read and write
53840000
direct allocation
page read and write
4815000
heap
page read and write
6A5000
heap
page read and write
10000000
unkown
page readonly
2BED000
heap
page read and write
66DE000
stack
page read and write
99D1000
unclassified section
page read and write
64A1000
unclassified section
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
400000
unkown
page readonly
3710000
trusted library allocation
page read and write
76E000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
9E1E000
unclassified section
page read and write
53A08000
direct allocation
page read and write
2F40000
unkown
page readonly
725000
heap
page read and write
2B6D0000
direct allocation
page read and write
2891000
heap
page read and write
3080000
heap
page read and write
6A4000
heap
page read and write
2B64000
heap
page read and write
4806000
heap
page read and write
4BAB8000
direct allocation
page read and write
724000
heap
page read and write
DAE000
unkown
page readonly
6A4000
heap
page read and write
2AA9000
unclassified section
page read and write
724000
heap
page read and write
41A2000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
53878000
direct allocation
page read and write
724000
heap
page read and write
47F0000
heap
page read and write
2B7F0000
direct allocation
page read and write
724000
heap
page read and write
5F601000
direct allocation
page read and write
5F50000
heap
page read and write
2B44000
heap
page read and write
6A4000
heap
page read and write
2BED000
heap
page read and write
34B0000
direct allocation
page read and write
41BC000
heap
page read and write
6A4000
heap
page read and write
7CD000
stack
page read and write
724000
heap
page read and write
4BA2C000
direct allocation
page read and write
2B720000
direct allocation
page read and write
6B5D1000
unkown
page execute read
724000
heap
page read and write
480F000
heap
page read and write
1070000
heap
page read and write
6A4000
heap
page read and write
660000
heap
page read and write
F10000
unkown
page readonly
724000
heap
page read and write
24E84000
direct allocation
page read and write
8C3000
heap
page read and write
6CEB8000
unkown
page read and write
6A4000
heap
page read and write
53A4C000
direct allocation
page read and write
61A000
unkown
page readonly
724000
heap
page read and write
539A0000
direct allocation
page read and write
6C312000
unkown
page read and write
724000
heap
page read and write
19A000
stack
page read and write
724000
heap
page read and write
480D000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
3770000
unkown
page readonly
2B6E8000
direct allocation
page read and write
5AE000
unkown
page readonly
3FB48000
direct allocation
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
480B000
heap
page read and write
53988000
direct allocation
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
41C5000
heap
page read and write
4813000
heap
page read and write
2B7B4000
direct allocation
page read and write
6A5000
heap
page read and write
2B6B8000
direct allocation
page read and write
6A4000
heap
page read and write
6FA000
heap
page read and write
41BB000
heap
page read and write
724000
heap
page read and write
6D0000
heap
page read and write
6C132000
unkown
page write copy
4815000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
41C3000
heap
page read and write
2B8DC000
direct allocation
page read and write
2B6E8000
direct allocation
page read and write
3A50000
heap
page read and write
A70000
unkown
page readonly
539A0000
direct allocation
page read and write
6A4000
heap
page read and write
6C14B000
unkown
page write copy
3C700000
direct allocation
page read and write
6A4000
heap
page read and write
41C3000
heap
page read and write
724000
heap
page read and write
6C12F000
unkown
page write copy
640000
heap
page read and write
353D000
heap
page read and write
94FB000
heap
page read and write
480B000
heap
page read and write
3530000
direct allocation
page read and write
5667000
heap
page read and write
353D000
heap
page read and write
538C0000
direct allocation
page read and write
22CE1000
direct allocation
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
2B8A8000
direct allocation
page read and write
580C000
stack
page read and write
564C000
heap
page read and write
6C15A000
unkown
page write copy
736000
heap
page read and write
2D1C000
stack
page read and write
6A5000
heap
page read and write
683D0000
unkown
page readonly
53AE8000
direct allocation
page read and write
47F000
unkown
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
3FA70000
direct allocation
page read and write
480F000
heap
page read and write
6A4000
heap
page read and write
53890000
direct allocation
page read and write
730000
heap
page read and write
6C32D000
unkown
page readonly
D8B000
unkown
page readonly
8AB000
heap
page read and write
9A000
stack
page read and write
6A4000
heap
page read and write
13F0000
heap
page read and write
6C135000
unkown
page read and write
41C5000
heap
page read and write
2FE0000
unkown
page readonly
6A4000
heap
page read and write
62A0000
unclassified section
page read and write
3740000
heap
page read and write
41A4000
heap
page read and write
2B628000
direct allocation
page read and write
6A4000
heap
page read and write
6C133000
unkown
page write copy
6A4000
heap
page read and write
539EC000
direct allocation
page read and write
4BB48000
direct allocation
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
4804000
heap
page read and write
2B7B4000
direct allocation
page read and write
2A186000
direct allocation
page execute and read and write
9990000
unclassified section
page read and write
9481000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
94EF000
heap
page read and write
4815000
heap
page read and write
3210000
heap
page read and write
6A4000
heap
page read and write
6C13B000
unkown
page write copy
724000
heap
page read and write
3431000
heap
page read and write
53ADC000
direct allocation
page read and write
53AC8000
direct allocation
page read and write
6A4000
heap
page read and write
3539000
heap
page read and write
6A4000
heap
page read and write
6C133000
unkown
page write copy
6A4000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
6BE59000
unkown
page readonly
2B824000
direct allocation
page read and write
6A4000
heap
page read and write
6C188000
unkown
page read and write
D81000
unkown
page readonly
6A4000
heap
page read and write
6A4000
heap
page read and write
32C0000
heap
page read and write
480B000
heap
page read and write
4BA34000
direct allocation
page read and write
2B7A8000
direct allocation
page read and write
53840000
direct allocation
page read and write
746000
heap
page read and write
56CE000
stack
page read and write
6A4000
heap
page read and write
53B20000
direct allocation
page read and write
98000
stack
page read and write
6A4000
heap
page read and write
2B6B8000
direct allocation
page read and write
724000
heap
page read and write
724000
heap
page read and write
2B794000
direct allocation
page read and write
41C5000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
7A9000
heap
page read and write
3FA04000
direct allocation
page read and write
6C141000
unkown
page read and write
3D50000
unkown
page readonly
6A4000
heap
page read and write
53840000
direct allocation
page read and write
78A000
heap
page read and write
725000
heap
page read and write
2B720000
direct allocation
page read and write
539CC000
direct allocation
page read and write
53AD4000
direct allocation
page read and write
D8B000
unkown
page readonly
2B640000
direct allocation
page read and write
8FB000
heap
page read and write
8AB000
heap
page read and write
42C000
unkown
page readonly
538D0000
direct allocation
page read and write
642E000
unclassified section
page read and write
53A94000
direct allocation
page read and write
3660000
unkown
page readonly
724000
heap
page read and write
539DC000
direct allocation
page read and write
770000
heap
page read and write
5663000
heap
page read and write
6C138000
unkown
page read and write
6A4000
heap
page read and write
A50000
heap
page read and write
9E3E000
unclassified section
page read and write
6A4000
heap
page read and write
538D8000
direct allocation
page read and write
6A4000
heap
page read and write
3FA4C000
direct allocation
page read and write
480B000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
62A000
unkown
page readonly
565D000
heap
page read and write
41BF000
heap
page read and write
9E5E000
unclassified section
page read and write
724000
heap
page read and write
2B794000
direct allocation
page read and write
4815000
heap
page read and write
6A0000
heap
page read and write
36AE000
stack
page read and write
583E000
stack
page read and write
6A4000
heap
page read and write
2B710000
direct allocation
page read and write
7D3000
heap
page read and write
53878000
direct allocation
page read and write
6A4000
heap
page read and write
41A0000
heap
page read and write
7A9000
heap
page read and write
4BA3C000
direct allocation
page read and write
53944000
direct allocation
page read and write
6A4000
heap
page read and write
490000
heap
page read and write
6BE59000
unkown
page readonly
6C144000
unkown
page read and write
1040000
heap
page read and write
6A4000
heap
page read and write
2B6D0000
direct allocation
page read and write
6CEBE000
unkown
page readonly
2B6E0000
direct allocation
page read and write
6A4000
heap
page read and write
60DE000
stack
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
5B3B000
heap
page read and write
41C3000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
2807000
heap
page read and write
6A4000
heap
page read and write
2B6E8000
direct allocation
page read and write
6A4000
heap
page read and write
D8B000
unkown
page readonly
41BD000
heap
page read and write
5AA1000
heap
page read and write
6B851000
unkown
page readonly
6A4000
heap
page read and write
2FD4000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
3FB6E000
direct allocation
page read and write
47F3000
heap
page read and write
724000
heap
page read and write
41BF000
heap
page read and write
6A4000
heap
page read and write
565D000
heap
page read and write
6A4000
heap
page read and write
2B754000
direct allocation
page read and write
61E000
stack
page read and write
480D000
heap
page read and write
D81000
unkown
page readonly
53AC8000
direct allocation
page read and write
2B7C0000
direct allocation
page read and write
4815000
heap
page read and write
2AD9000
heap
page read and write
75F000
heap
page read and write
53AAC000
direct allocation
page read and write
EA0000
trusted library section
page readonly
6A4000
heap
page read and write
2B76C000
direct allocation
page read and write
5FA000
heap
page read and write
259E000
stack
page read and write
4BB54000
direct allocation
page read and write
6BFBF000
unkown
page readonly
79E000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
2B834000
direct allocation
page read and write
5A0000
unkown
page readonly
4814000
heap
page read and write
480D000
heap
page read and write
6A4000
heap
page read and write
5674000
heap
page read and write
6A4000
heap
page read and write
6C190000
unkown
page read and write
6A4000
heap
page read and write
1300000
unkown
page readonly
538B4000
direct allocation
page read and write
2B7E4000
direct allocation
page read and write
480F000
heap
page read and write
FD0000
unkown
page readonly
94F0000
heap
page read and write
6A4000
heap
page read and write
41C3000
heap
page read and write
2B75C000
direct allocation
page read and write
6A4000
heap
page read and write
1136000
heap
page read and write
4815000
heap
page read and write
2B650000
direct allocation
page read and write
480D000
heap
page read and write
480D000
heap
page read and write
6A4000
heap
page read and write
6CEB8000
unkown
page read and write
5E1000
unkown
page readonly
724000
heap
page read and write
4CB000
unkown
page read and write
53A28000
direct allocation
page read and write
2B7B4000
direct allocation
page read and write
4813000
heap
page read and write
6A4000
heap
page read and write
53A50000
direct allocation
page read and write
5394C000
direct allocation
page read and write
5389C000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
3FAA0000
direct allocation
page read and write
520E000
stack
page read and write
2DF41000
direct allocation
page read and write
6A4000
heap
page read and write
4815000
heap
page read and write
2B754000
direct allocation
page read and write
6A4000
heap
page read and write
6A5000
heap
page read and write
4813000
heap
page read and write
6A4000
heap
page read and write
2B8DC000
direct allocation
page read and write
6A4000
heap
page read and write
483000
unkown
page read and write
480F000
heap
page read and write
4815000
heap
page read and write
480D000
heap
page read and write
6B999000
unkown
page readonly
724000
heap
page read and write
4350000
heap
page read and write
3431000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
2B710000
direct allocation
page read and write
2B21000
unclassified section
page read and write
2B720000
direct allocation
page read and write
6A4000
heap
page read and write
6C165000
unkown
page write copy
4E6F000
stack
page read and write
41BF000
heap
page read and write
2B8B0000
direct allocation
page read and write
724000
heap
page read and write
2B76C000
direct allocation
page read and write
6A4000
heap
page read and write
D66000
unkown
page write copy
480D000
heap
page read and write
2E2E000
heap
page read and write
746F000
stack
page read and write
90E000
stack
page read and write
724000
heap
page read and write
725000
heap
page read and write
6A4000
heap
page read and write
770000
heap
page read and write
539B0000
direct allocation
page read and write
724000
heap
page read and write
6F8000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
22FE000
stack
page read and write
5397C000
direct allocation
page read and write
416000
unkown
page read and write
480F000
heap
page read and write
ABF000
stack
page read and write
6A4000
heap
page read and write
53A80000
direct allocation
page read and write
480F000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
629F000
unclassified section
page read and write
2B704000
direct allocation
page read and write
480D000
heap
page read and write
6B999000
unkown
page readonly
5396C000
direct allocation
page read and write
3FB6C000
direct allocation
page read and write
412000
unkown
page read and write
5637000
heap
page read and write
539C4000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
53A01000
direct allocation
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
6C138000
unkown
page read and write
6A4000
heap
page read and write
2E0B000
heap
page read and write
6A4000
heap
page read and write
2B6AC000
direct allocation
page read and write
5A6E000
stack
page read and write
4B1E000
stack
page read and write
6A4000
heap
page read and write
6C144000
unkown
page read and write
538E4000
direct allocation
page read and write
724000
heap
page read and write
2B720000
direct allocation
page read and write
2B42000
heap
page read and write
5635000
heap
page read and write
2B75C000
direct allocation
page read and write
6CE50000
unkown
page readonly
683D0000
unkown
page readonly
41BB000
heap
page read and write
78D000
heap
page read and write
5E0D000
stack
page read and write
2890000
heap
page read and write
6A4000
heap
page read and write
2E05000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
A70000
unkown
page readonly
480D000
heap
page read and write
725000
heap
page read and write
2B7B4000
direct allocation
page read and write
2AAE000
heap
page read and write
2B7F0000
direct allocation
page read and write
E6E000
stack
page read and write
536C000
stack
page read and write
2B7C0000
direct allocation
page read and write
3FA01000
direct allocation
page read and write
67DF000
stack
page read and write
5512000
heap
page read and write
356C000
heap
page read and write
6A4000
heap
page read and write
6C13E000
unkown
page write copy
353D000
heap
page read and write
480F000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
777000
heap
page read and write
537000
unkown
page read and write
31EE000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
6508000
heap
page read and write
724000
heap
page read and write
DAE000
unkown
page readonly
2B75C000
direct allocation
page read and write
3440000
heap
page read and write
708000
heap
page read and write
2AFE000
stack
page read and write
724000
heap
page read and write
4B5E000
stack
page read and write
61A000
unkown
page readonly
6A4000
heap
page read and write
41AD000
heap
page read and write
724000
heap
page read and write
2B7D8000
direct allocation
page read and write
6A4000
heap
page read and write
53988000
direct allocation
page read and write
2B7E4000
direct allocation
page read and write
4FFE000
stack
page read and write
724000
heap
page read and write
32EF000
heap
page read and write
41C3000
heap
page read and write
480F000
heap
page read and write
480F000
heap
page read and write
53988000
direct allocation
page read and write
538A8000
direct allocation
page read and write
3FA3C000
direct allocation
page read and write
2B860000
direct allocation
page read and write
78D000
heap
page read and write
6537000
heap
page read and write
6A4000
heap
page read and write
79E000
heap
page read and write
6A4000
heap
page read and write
55241000
direct allocation
page read and write
6B62A000
unkown
page readonly
53910000
direct allocation
page read and write
6A4000
heap
page read and write
2B678000
direct allocation
page read and write
2B7C0000
direct allocation
page read and write
4813000
heap
page read and write
41BF000
heap
page read and write
53B78000
direct allocation
page read and write
2B754000
direct allocation
page read and write
9456000
heap
page read and write
5622000
heap
page read and write
41B4000
heap
page read and write
6A4000
heap
page read and write
3556000
heap
page read and write
401000
unkown
page execute read
724000
heap
page read and write
3FB18000
direct allocation
page read and write
4BB08000
direct allocation
page read and write
724000
heap
page read and write
2B6F4000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
53A6C000
direct allocation
page read and write
5394C000
direct allocation
page read and write
6C12F000
unkown
page write copy
538D0000
direct allocation
page read and write
538E4000
direct allocation
page read and write
2B64C000
direct allocation
page read and write
5394C000
direct allocation
page read and write
41C3000
heap
page read and write
4EBF000
stack
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
2B81C000
direct allocation
page read and write
538D8000
direct allocation
page read and write
6B862000
unkown
page readonly
724000
heap
page read and write
558E000
stack
page read and write
527C000
stack
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
53AFC000
direct allocation
page read and write
2B8D0000
direct allocation
page read and write
6430000
unclassified section
page read and write
4BA5000
heap
page read and write
6A4000
heap
page read and write
41BF000
heap
page read and write
6A4000
heap
page read and write
2B7F0000
direct allocation
page read and write
2B7F0000
direct allocation
page read and write
6A4000
heap
page read and write
4465000
unkown
page readonly
726000
heap
page read and write
2B824000
direct allocation
page read and write
6A4000
heap
page read and write
4814000
heap
page read and write
724000
heap
page read and write
77B000
heap
page read and write
36804000
direct allocation
page read and write
724000
heap
page read and write
47E0000
heap
page read and write
53900000
direct allocation
page read and write
539B0000
direct allocation
page read and write
41C5000
heap
page read and write
1DE84000
direct allocation
page read and write
53AD4000
direct allocation
page read and write
D66000
unkown
page read and write
724000
heap
page read and write
419D000
heap
page read and write
5646000
heap
page read and write
2B7C0000
direct allocation
page read and write
6A4000
heap
page read and write
53AC8000
direct allocation
page read and write
4815000
heap
page read and write
2B6E0000
direct allocation
page read and write
47FA000
heap
page read and write
1079000
heap
page read and write
53B50000
direct allocation
page read and write
5A0000
unkown
page readonly
724000
heap
page read and write
4DBE000
stack
page read and write
480F000
heap
page read and write
725000
heap
page read and write
724000
heap
page read and write
564E000
heap
page read and write
6A4000
heap
page read and write
9466000
heap
page read and write
47F6000
heap
page read and write
3743000
heap
page read and write
480B000
heap
page read and write
353D000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
DAE000
unkown
page readonly
2D921000
direct allocation
page read and write
2B710000
direct allocation
page read and write
53900000
direct allocation
page read and write
6A4000
heap
page read and write
4BAD8000
direct allocation
page read and write
5384C000
direct allocation
page read and write
41B4000
heap
page read and write
400000
unkown
page readonly
480D000
heap
page read and write
6A5000
heap
page read and write
480B000
heap
page read and write
3260000
heap
page read and write
539B8000
direct allocation
page read and write
5C6000
heap
page read and write
2BB4000
heap
page read and write
6A4000
heap
page read and write
53A78000
direct allocation
page read and write
724000
heap
page read and write
4815000
heap
page read and write
2B6AC000
direct allocation
page read and write
480C000
heap
page read and write
4815000
heap
page read and write
480D000
heap
page read and write
4814000
heap
page read and write
36EB000
heap
page read and write
63DE000
unclassified section
page read and write
40B000
unkown
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
FF0000
heap
page read and write
53A10000
direct allocation
page read and write
6A4000
heap
page read and write
6BD75000
unkown
page readonly
75C000
heap
page read and write
29C4000
heap
page read and write
3FA7C000
direct allocation
page read and write
6A4000
heap
page read and write
41BB000
heap
page read and write
539B8000
direct allocation
page read and write
3542000
heap
page read and write
5C701000
direct allocation
page read and write
6A4000
heap
page read and write
2B794000
direct allocation
page read and write
4813000
heap
page read and write
6C137000
unkown
page write copy
75E000
heap
page read and write
6C035000
unkown
page readonly
353D000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
4815000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
3B50000
unkown
page readonly
6A4000
heap
page read and write
6B62A000
unkown
page readonly
2CB0000
unkown
page readonly
539DC000
direct allocation
page read and write
41C3000
heap
page read and write
53AFC000
direct allocation
page read and write
25DE000
stack
page read and write
55C000
unkown
page readonly
724000
heap
page read and write
6A4000
heap
page read and write
323C000
heap
page read and write
5394C000
direct allocation
page read and write
353D000
heap
page read and write
61C000
unkown
page readonly
54FF000
stack
page read and write
724000
heap
page read and write
4814000
heap
page read and write
6C146000
unkown
page write copy
480D000
heap
page read and write
5660000
heap
page read and write
41C5000
heap
page read and write
7D4000
heap
page read and write
724000
heap
page read and write
2B678000
direct allocation
page read and write
5622000
heap
page read and write
2E06000
heap
page read and write
7C4000
heap
page read and write
6A4000
heap
page read and write
573E000
stack
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
3FA18000
direct allocation
page read and write
A40000
heap
page read and write
2B684000
direct allocation
page read and write
D1B000
unkown
page readonly
2FD0000
heap
page read and write
2B7C0000
direct allocation
page read and write
89F000
heap
page read and write
2B7D8000
direct allocation
page read and write
51CD000
stack
page read and write
53988000
direct allocation
page read and write
2B7CC000
direct allocation
page read and write
4D8C000
stack
page read and write
6A4000
heap
page read and write
29CA000
heap
page read and write
41BF000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
41B8000
heap
page read and write
724000
heap
page read and write
353D000
heap
page read and write
53944000
direct allocation
page read and write
53ABC000
direct allocation
page read and write
2B7CC000
direct allocation
page read and write
5389C000
direct allocation
page read and write
35EA1000
direct allocation
page read and write
3542000
heap
page read and write
3FAAC000
direct allocation
page read and write
95CB000
heap
page read and write
6A4000
heap
page read and write
24A5000
heap
page read and write
6A4000
heap
page read and write
53B20000
direct allocation
page read and write
6A4000
heap
page read and write
9466000
heap
page read and write
4815000
heap
page read and write
6B851000
unkown
page readonly
6A4000
heap
page read and write
D8B000
unkown
page readonly
4815000
heap
page read and write
2E0F000
heap
page read and write
539CC000
direct allocation
page read and write
5CB000
unkown
page read and write
2BF2000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
53988000
direct allocation
page read and write
6A4000
heap
page read and write
2B704000
direct allocation
page read and write
6A4000
heap
page read and write
5A90000
heap
page read and write
6A4000
heap
page read and write
9481000
heap
page read and write
6A4000
heap
page read and write
36EB000
heap
page read and write
724000
heap
page read and write
538D8000
direct allocation
page read and write
777000
heap
page read and write
2B8C0000
direct allocation
page read and write
42CE000
stack
page read and write
41C5000
heap
page read and write
53804000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
480D000
heap
page read and write
4DD000
stack
page read and write
6A4000
heap
page read and write
4815000
heap
page read and write
53944000
direct allocation
page read and write
4815000
heap
page read and write
724000
heap
page read and write
6531000
heap
page read and write
41F000
unkown
page read and write
53AD4000
direct allocation
page read and write
2B888000
direct allocation
page read and write
539B8000
direct allocation
page read and write
718000
heap
page read and write
724000
heap
page read and write
6C188000
unkown
page read and write
6A4000
heap
page read and write
2B7A8000
direct allocation
page read and write
2B6C4000
direct allocation
page read and write
409000
unkown
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
4813000
heap
page read and write
2B794000
direct allocation
page read and write
53900000
direct allocation
page read and write
724000
heap
page read and write
8C0000
heap
page read and write
2BDE000
stack
page read and write
41C3000
heap
page read and write
724000
heap
page read and write
4815000
heap
page read and write
6E0000
heap
page read and write
4BA08000
direct allocation
page read and write
6C131000
unkown
page read and write
6E2000
heap
page read and write
724000
heap
page read and write
94AC000
heap
page read and write
8B7000
heap
page read and write
23FE000
stack
page read and write
78D000
heap
page read and write
2B7E4000
direct allocation
page read and write
6A4000
heap
page read and write
430E000
stack
page read and write
538D0000
direct allocation
page read and write
2B7E4000
direct allocation
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
480F000
heap
page read and write
53AAC000
direct allocation
page read and write
6A4000
heap
page read and write
41BF000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
2B60C000
direct allocation
page read and write
539B8000
direct allocation
page read and write
53B60000
direct allocation
page read and write
20204000
direct allocation
page read and write
539C4000
direct allocation
page read and write
4BA18000
direct allocation
page read and write
6A4000
heap
page read and write
400000
unkown
page readonly
724000
heap
page read and write
4815000
heap
page read and write
724000
heap
page read and write
4813000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
5A8D000
stack
page read and write
4813000
heap
page read and write
725000
heap
page read and write
356C000
heap
page read and write
724000
heap
page read and write
530C000
stack
page read and write
6A4000
heap
page read and write
2B684000
direct allocation
page read and write
2B690000
direct allocation
page read and write
724000
heap
page read and write
53944000
direct allocation
page read and write
5396C000
direct allocation
page read and write
9960000
unclassified section
page read and write
945D000
heap
page read and write
2B834000
direct allocation
page read and write
401000
unkown
page execute read
354A000
heap
page read and write
733000
heap
page read and write
53AE8000
direct allocation
page read and write
5C0000
heap
page read and write
5395C000
direct allocation
page read and write
724000
heap
page read and write
538D0000
direct allocation
page read and write
4815000
heap
page read and write
7A9000
heap
page read and write
6A4000
heap
page read and write
6C198000
unkown
page read and write
47F000
unkown
page read and write
2B9A000
heap
page read and write
9E60000
unclassified section
page read and write
724000
heap
page read and write
6C134000
unkown
page read and write
724000
heap
page read and write
2B7C0000
direct allocation
page read and write
3FE0000
unkown
page readonly
6A4000
heap
page read and write
5381C000
direct allocation
page read and write
6A4000
heap
page read and write
6A5000
heap
page read and write
2602C000
direct allocation
page read and write
6A4000
heap
page read and write
6C137000
unkown
page write copy
41C3000
heap
page read and write
6A4000
heap
page read and write
41BD000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
223C1000
direct allocation
page read and write
401000
unkown
page execute read
6A4000
heap
page read and write
2B788000
direct allocation
page read and write
10001000
unkown
page execute read
6B999000
unkown
page readonly
724000
heap
page read and write
36EE000
heap
page read and write
4813000
heap
page read and write
10786000
direct allocation
page execute and read and write
717E000
stack
page read and write
4813000
heap
page read and write
30AD000
stack
page read and write
724000
heap
page read and write
6C329000
unkown
page readonly
724000
heap
page read and write
539EC000
direct allocation
page read and write
724000
heap
page read and write
41BD000
heap
page read and write
4814000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
946E000
heap
page read and write
6BD91000
unkown
page readonly
8DB000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
2AD0000
heap
page read and write
4815000
heap
page read and write
73A000
heap
page read and write
43BB000
heap
page read and write
53A04000
direct allocation
page read and write
2E1D000
stack
page read and write
6A4000
heap
page read and write
4815000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
2D90000
heap
page read and write
41B1000
heap
page read and write
777000
heap
page read and write
303E000
stack
page read and write
55F0000
heap
page read and write
6A4000
heap
page read and write
26F0000
heap
page read and write
78D000
heap
page read and write
2B6AC000
direct allocation
page read and write
353D000
heap
page read and write
62E0000
unclassified section
page read and write
724000
heap
page read and write
41BF000
heap
page read and write
724000
heap
page read and write
59801000
direct allocation
page read and write
6A4000
heap
page read and write
480B000
heap
page read and write
286C000
stack
page read and write
2B7D8000
direct allocation
page read and write
724000
heap
page read and write
6C184000
unkown
page read and write
9495000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
539DC000
direct allocation
page read and write
2B844000
direct allocation
page read and write
724000
heap
page read and write
2B710000
direct allocation
page read and write
53A94000
direct allocation
page read and write
724000
heap
page read and write
4802000
heap
page read and write
13DE000
stack
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
41C3000
heap
page read and write
2B7E4000
direct allocation
page read and write
2EAF000
stack
page read and write
538C0000
direct allocation
page read and write
14B9000
heap
page read and write
356C000
heap
page read and write
4180000
unkown
page readonly
41C5000
heap
page read and write
724000
heap
page read and write
2C8E000
stack
page read and write
2B854000
direct allocation
page read and write
991E000
unclassified section
page read and write
724000
heap
page read and write
2BB0000
direct allocation
page read and write
F0E000
stack
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
353D000
heap
page read and write
697D1000
unkown
page execute read
2B7CC000
direct allocation
page read and write
480D000
heap
page read and write
2B7F0000
direct allocation
page read and write
9460000
heap
page read and write
2B7D8000
direct allocation
page read and write
724000
heap
page read and write
2B604000
direct allocation
page read and write
6A4000
heap
page read and write
2B6E8000
direct allocation
page read and write
6A4000
heap
page read and write
47D000
stack
page read and write
6A4000
heap
page read and write
725000
heap
page read and write
7B1000
heap
page read and write
725000
heap
page read and write
94FE000
heap
page read and write
53828000
direct allocation
page read and write
53988000
direct allocation
page read and write
2B8C0000
direct allocation
page read and write
53850000
direct allocation
page read and write
6A4000
heap
page read and write
D1B000
unkown
page readonly
4815000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
41C5000
heap
page read and write
619F000
stack
page read and write
2B6C4000
direct allocation
page read and write
551B000
heap
page read and write
6A4000
heap
page read and write
41C3000
heap
page read and write
53878000
direct allocation
page read and write
4815000
heap
page read and write
4BB28000
direct allocation
page read and write
6B6E5000
unkown
page readonly
725000
heap
page read and write
53B40000
direct allocation
page read and write
32C1000
heap
page read and write
5382C000
direct allocation
page read and write
3FA34000
direct allocation
page read and write
6B851000
unkown
page readonly
3CA0000
unkown
page readonly
6A4000
heap
page read and write
6A4000
heap
page read and write
EB6000
heap
page read and write
513F000
stack
page read and write
480F000
heap
page read and write
2B720000
direct allocation
page read and write
739000
heap
page read and write
5389C000
direct allocation
page read and write
6C04A000
unkown
page readonly
53A60000
direct allocation
page read and write
6A5000
heap
page read and write
2B710000
direct allocation
page read and write
6A4000
heap
page read and write
2B788000
direct allocation
page read and write
4815000
heap
page read and write
6A4000
heap
page read and write
2B6C4000
direct allocation
page read and write
5678000
heap
page read and write
61E2000
unclassified section
page read and write
2B601000
direct allocation
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
53850000
direct allocation
page read and write
6BFBF000
unkown
page readonly
53A10000
direct allocation
page read and write
6A4000
heap
page read and write
413000
unkown
page read and write
21F0000
heap
page read and write
5600000
heap
page read and write
724000
heap
page read and write
53A34000
direct allocation
page read and write
6A4000
heap
page read and write
59E000
unkown
page readonly
47F6000
heap
page read and write
2B834000
direct allocation
page read and write
41BF000
heap
page read and write
538F4000
direct allocation
page read and write
4815000
heap
page read and write
73D000
heap
page read and write
6A4000
heap
page read and write
53B60000
direct allocation
page read and write
2BB2000
heap
page read and write
724000
heap
page read and write
4804000
heap
page read and write
3D90000
unkown
page readonly
469000
unkown
page read and write
480B000
heap
page read and write
4814000
heap
page read and write
2B868000
direct allocation
page read and write
6CE50000
unkown
page readonly
5397C000
direct allocation
page read and write
53900000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
4813000
heap
page read and write
4BA48000
direct allocation
page read and write
2B6D0000
direct allocation
page read and write
4808000
heap
page read and write
6A4000
heap
page read and write
4815000
heap
page read and write
496000
heap
page read and write
6CE50000
unkown
page readonly
6A4000
heap
page read and write
53988000
direct allocation
page read and write
2B6F4000
direct allocation
page read and write
724000
heap
page read and write
A71000
unkown
page execute read
697D1000
unkown
page execute read
31E7000
heap
page read and write
539C4000
direct allocation
page read and write
3559000
heap
page read and write
724000
heap
page read and write
41C5000
heap
page read and write
6A4000
heap
page read and write
2B81C000
direct allocation
page read and write
6C166000
unkown
page write copy
2B650000
direct allocation
page read and write
2B7CC000
direct allocation
page read and write
715000
heap
page read and write
400000
unkown
page readonly
430000
heap
page read and write
538F4000
direct allocation
page read and write
4FF000
unkown
page read and write
4814000
heap
page read and write
98CF000
unclassified section
page read and write
28BE000
heap
page read and write
5395C000
direct allocation
page read and write
6A4000
heap
page read and write
6C161000
unkown
page read and write
53ADC000
direct allocation
page read and write
480C000
heap
page read and write
6A4000
heap
page read and write
355C000
heap
page read and write
6A4000
heap
page read and write
4815000
heap
page read and write
539D0000
direct allocation
page read and write
2B868000
direct allocation
page read and write
724000
heap
page read and write
4BB7C000
direct allocation
page read and write
6A4000
heap
page read and write
950E000
heap
page read and write
8ED000
heap
page read and write
6A4000
heap
page read and write
6327000
unclassified section
page read and write
6A4000
heap
page read and write
55F7000
heap
page read and write
2B690000
direct allocation
page read and write
8DB000
heap
page read and write
4808000
heap
page read and write
A71000
unkown
page execute read
6A4000
heap
page read and write
4815000
heap
page read and write
5AC2000
trusted library allocation
page read and write
53ADC000
direct allocation
page read and write
6A4000
heap
page read and write
4815000
heap
page read and write
6C312000
unkown
page read and write
732F000
stack
page read and write
6A4000
heap
page read and write
2B690000
direct allocation
page read and write
2B794000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
2B704000
direct allocation
page read and write
6CA000
heap
page read and write
4BB3C000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
944E000
unclassified section
page read and write
53B40000
direct allocation
page read and write
4BAA0000
direct allocation
page read and write
A2E000
stack
page read and write
2B898000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
3213000
heap
page read and write
6A4000
heap
page read and write
2CA8000
heap
page read and write
724000
heap
page read and write
6C14E000
unkown
page write copy
7DB000
heap
page read and write
2B7C0000
direct allocation
page read and write
6A4000
heap
page read and write
4813000
heap
page read and write
6A4000
heap
page read and write
2B684000
direct allocation
page read and write
538C0000
direct allocation
page read and write
53A4C000
direct allocation
page read and write
480D000
heap
page read and write
724000
heap
page read and write
539EC000
direct allocation
page read and write
724000
heap
page read and write
2B6F4000
direct allocation
page read and write
425000
unkown
page read and write
6A4000
heap
page read and write
53910000
direct allocation
page read and write
5B0000
heap
page read and write
4BAF4000
direct allocation
page read and write
41B6000
heap
page read and write
36C0000
heap
page read and write
53B20000
direct allocation
page read and write
27CE000
stack
page read and write
2B61C000
direct allocation
page read and write
6BD75000
unkown
page readonly
725000
heap
page read and write
2B704000
direct allocation
page read and write
538C0000
direct allocation
page read and write
2B630000
direct allocation
page read and write
512D000
stack
page read and write
6A4000
heap
page read and write
41BD000
heap
page read and write
5F4F000
stack
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
5B8C1000
direct allocation
page read and write
2B7C0000
direct allocation
page read and write
590000
unkown
page readonly
53900000
direct allocation
page read and write
53AE8000
direct allocation
page read and write
724000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
41BD000
heap
page read and write
6C32D000
unkown
page readonly
6A4000
heap
page read and write
4806000
heap
page read and write
6A4000
heap
page read and write
6A5000
heap
page read and write
6527000
heap
page read and write
480A000
heap
page read and write
40A000
unkown
page read and write
41C3000
heap
page read and write
94F3000
heap
page read and write
8BF000
stack
page read and write
41C5000
heap
page read and write
2B710000
direct allocation
page read and write
353D000
heap
page read and write
6A4000
heap
page read and write
2B754000
direct allocation
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
4BAC8000
direct allocation
page read and write
4815000
heap
page read and write
2B640000
direct allocation
page read and write
41C5000
heap
page read and write
6A4000
heap
page read and write
480D000
heap
page read and write
480F000
heap
page read and write
3FAD8000
direct allocation
page read and write
2B704000
direct allocation
page read and write
6A4000
heap
page read and write
40C000
unkown
page read and write
538D8000
direct allocation
page read and write
41C3000
heap
page read and write
6A4000
heap
page read and write
6C158000
unkown
page read and write
32D0000
heap
page read and write
6A4000
heap
page read and write
2B704000
direct allocation
page read and write
28A0000
trusted library allocation
page read and write
480F000
heap
page read and write
77B000
heap
page read and write
724000
heap
page read and write
400000
unkown
page readonly
3A100000
direct allocation
page read and write
3312000
heap
page read and write
791000
heap
page read and write
724000
heap
page read and write
429000
unkown
page read and write
480D000
heap
page read and write
320C1000
direct allocation
page read and write
6A1D1000
unkown
page execute read
53B20000
direct allocation
page read and write
3205000
heap
page read and write
5679000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
6BD75000
unkown
page readonly
6A4000
heap
page read and write
724000
heap
page read and write
538A8000
direct allocation
page read and write
6A5000
heap
page read and write
41AA000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
6A5000
heap
page read and write
9EA7000
unclassified section
page read and write
6A4000
heap
page read and write
FC0000
heap
page read and write
53ADC000
direct allocation
page read and write
3D961000
direct allocation
page read and write
41AA000
heap
page read and write
6A4000
heap
page read and write
791000
heap
page read and write
4BA94000
direct allocation
page read and write
6A4000
heap
page read and write
6A5000
heap
page read and write
539B0000
direct allocation
page read and write
6A4000
heap
page read and write
480D000
heap
page read and write
243D000
stack
page read and write
41C3000
heap
page read and write
724000
heap
page read and write
41C3000
heap
page read and write
539DC000
direct allocation
page read and write
6A4000
heap
page read and write
4A50000
heap
page read and write
6420000
unclassified section
page read and write
53B20000
direct allocation
page read and write
949F000
heap
page read and write
724000
heap
page read and write
6A5000
heap
page read and write
53801000
direct allocation
page read and write
1360000
heap
page read and write
3FAB8000
direct allocation
page read and write
724000
heap
page read and write
5394C000
direct allocation
page read and write
53824000
direct allocation
page read and write
651E000
heap
page read and write
94C7000
heap
page read and write
4089000
unclassified section
page read and write
6ABD1000
unkown
page execute read
53A28000
direct allocation
page read and write
2B7E4000
direct allocation
page read and write
6C166000
unkown
page write copy
3BDE1000
direct allocation
page read and write
2B62C000
direct allocation
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
3F50000
unkown
page readonly
6A4000
heap
page read and write
538B4000
direct allocation
page read and write
4BB54000
direct allocation
page read and write
5395C000
direct allocation
page read and write
6A4000
heap
page read and write
2B704000
direct allocation
page read and write
3559000
heap
page read and write
2B678000
direct allocation
page read and write
3200000
heap
page read and write
724000
heap
page read and write
D81000
unkown
page readonly
480D000
heap
page read and write
8DB000
stack
page read and write
370E000
stack
page read and write
2B6F4000
direct allocation
page read and write
6A4000
heap
page read and write
6C148000
unkown
page read and write
A71000
unkown
page execute read
9475000
heap
page read and write
78D000
heap
page read and write
4814000
heap
page read and write
D1B000
unkown
page readonly
2B854000
direct allocation
page read and write
255E000
stack
page read and write
2B7B4000
direct allocation
page read and write
53A6C000
direct allocation
page read and write
480B000
heap
page read and write
724000
heap
page read and write
2B6AC000
direct allocation
page read and write
6A4000
heap
page read and write
6C155000
unkown
page write copy
724000
heap
page read and write
401000
unkown
page execute read
724000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
409000
unkown
page write copy
2B8B0000
direct allocation
page read and write
40E000
unkown
page read and write
6A4000
heap
page read and write
697D1000
unkown
page execute read
538F4000
direct allocation
page read and write
2B75C000
direct allocation
page read and write
6A4000
heap
page read and write
2FF0000
direct allocation
page read and write
6B862000
unkown
page readonly
53B40000
direct allocation
page read and write
400000
unkown
page readonly
77B000
heap
page read and write
53AD4000
direct allocation
page read and write
2B75C000
direct allocation
page read and write
3280000
unkown
page readonly
37184000
direct allocation
page read and write
480F000
heap
page read and write
98000
stack
page read and write
353D000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
F6E000
stack
page read and write
6A4000
heap
page read and write
26704000
direct allocation
page read and write
4806000
heap
page read and write
15EF000
stack
page read and write
724000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
41BF000
heap
page read and write
6A4000
heap
page read and write
53B20000
direct allocation
page read and write
355C000
heap
page read and write
6C131000
unkown
page read and write
2B888000
direct allocation
page read and write
353D000
heap
page read and write
9500000
heap
page read and write
2B854000
direct allocation
page read and write
2B801000
direct allocation
page read and write
538E4000
direct allocation
page read and write
480D000
heap
page read and write
6A4000
heap
page read and write
725000
heap
page read and write
322F000
heap
page read and write
2C4E000
stack
page read and write
4BA8C000
direct allocation
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
5394C000
direct allocation
page read and write
6C32D000
unkown
page readonly
480F000
heap
page read and write
724000
heap
page read and write
948B000
heap
page read and write
70D000
heap
page read and write
724000
heap
page read and write
2B6A0000
direct allocation
page read and write
724000
heap
page read and write
724000
heap
page read and write
4BA4C000
direct allocation
page read and write
7D3000
heap
page read and write
5A41000
unclassified section
page read and write
563F000
heap
page read and write
5384C000
direct allocation
page read and write
EB0000
heap
page read and write
2B754000
direct allocation
page read and write
6CEA0000
unkown
page readonly
6A4000
heap
page read and write
6A4000
heap
page read and write
4814000
heap
page read and write
2F3C000
stack
page read and write
2B7C0000
direct allocation
page read and write
2B788000
direct allocation
page read and write
F80000
heap
page read and write
6A4000
heap
page read and write
4806000
heap
page read and write
480F000
heap
page read and write
590000
unkown
page readonly
6A4000
heap
page read and write
4813000
heap
page read and write
DAE000
unkown
page readonly
4813000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
2E58000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
68DD1000
unkown
page execute read
DAE000
unkown
page readonly
D1B000
unkown
page readonly
724000
heap
page read and write
6460000
unclassified section
page read and write
6A4000
heap
page read and write
2B7C0000
direct allocation
page read and write
6C155000
unkown
page write copy
53830000
direct allocation
page read and write
53A80000
direct allocation
page read and write
683D1000
unkown
page execute read
6C152000
unkown
page read and write
6A4000
heap
page read and write
41B6000
heap
page read and write
6A4000
heap
page read and write
7A9000
heap
page read and write
708000
heap
page read and write
53B60000
direct allocation
page read and write
724000
heap
page read and write
C8000
stack
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
500000
heap
page read and write
A30000
heap
page read and write
41BB000
heap
page read and write
53B20000
direct allocation
page read and write
41B6000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
D66000
unkown
page write copy
47FD000
heap
page read and write
539DC000
direct allocation
page read and write
41C3000
heap
page read and write
724000
heap
page read and write
EAE000
stack
page read and write
3232000
heap
page read and write
6CEB5000
unkown
page read and write
353D000
heap
page read and write
7A9000
heap
page read and write
6A4000
heap
page read and write
2B65C000
direct allocation
page read and write
3FA48000
direct allocation
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
53B50000
direct allocation
page read and write
480F000
heap
page read and write
53AE8000
direct allocation
page read and write
41C5000
heap
page read and write
725000
heap
page read and write
724000
heap
page read and write
2B788000
direct allocation
page read and write
724000
heap
page read and write
2B754000
direct allocation
page read and write
54B000
unkown
page read and write
400000
unkown
page readonly
4814000
heap
page read and write
565D000
heap
page read and write
6C330000
unkown
page readonly
D66000
unkown
page read and write
2D4F000
stack
page read and write
6320000
unclassified section
page read and write
2B7E4000
direct allocation
page read and write
6A4000
heap
page read and write
940E000
unclassified section
page read and write
2B6B8000
direct allocation
page read and write
53B60000
direct allocation
page read and write
724000
heap
page read and write
724000
heap
page read and write
5622000
heap
page read and write
538F4000
direct allocation
page read and write
6A4000
heap
page read and write
D66000
unkown
page write copy
D81000
unkown
page readonly
2110000
heap
page read and write
4813000
heap
page read and write
6CEA0000
unkown
page readonly
54EE000
stack
page read and write
20F0000
heap
page read and write
724000
heap
page read and write
41BD000
heap
page read and write
6A4000
heap
page read and write
2DD21000
direct allocation
page read and write
5397C000
direct allocation
page read and write
9E70000
unclassified section
page read and write
2B40000
heap
page read and write
6C16B000
unkown
page write copy
27F3000
heap
page read and write
5654000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
6C0000
heap
page read and write
2B868000
direct allocation
page read and write
B1F000
stack
page read and write
979000
stack
page read and write
724000
heap
page read and write
53B20000
direct allocation
page read and write
62EA000
unclassified section
page read and write
724000
heap
page read and write
5D0000
heap
page read and write
6A4000
heap
page read and write
307E000
stack
page read and write
5E1000
unkown
page readonly
6C134000
unkown
page read and write
6A4000
heap
page read and write
32C5000
heap
page read and write
4815000
heap
page read and write
6A4000
heap
page read and write
9579000
heap
page read and write
633E000
stack
page read and write
1E186000
direct allocation
page execute and read and write
9E0000
heap
page read and write
4FB000
unkown
page read and write
4815000
heap
page read and write
40B000
unkown
page write copy
5674000
heap
page read and write
41B7000
heap
page read and write
41BD000
heap
page read and write
6A5000
heap
page read and write
3FA0C000
direct allocation
page read and write
9522000
heap
page read and write
41BF000
heap
page read and write
4813000
heap
page read and write
41C3000
heap
page read and write
2B720000
direct allocation
page read and write
6C060000
unkown
page readonly
2B7C0000
direct allocation
page read and write
353D000
heap
page read and write
41BF000
heap
page read and write
2B7A8000
direct allocation
page read and write
724000
heap
page read and write
538A8000
direct allocation
page read and write
6A4000
heap
page read and write
53AFC000
direct allocation
page read and write
401000
unkown
page execute read
6A4000
heap
page read and write
4815000
heap
page read and write
D8B000
unkown
page readonly
2B801000
direct allocation
page read and write
FC6000
heap
page read and write
724000
heap
page read and write
2AAE000
heap
page read and write
6A4000
heap
page read and write
5B8E000
stack
page read and write
48B000
unkown
page read and write
480F000
heap
page read and write
724000
heap
page read and write
2B6C4000
direct allocation
page read and write
2B6E0000
direct allocation
page read and write
2B620000
direct allocation
page read and write
596C1000
direct allocation
page read and write
3A9A1000
direct allocation
page read and write
724000
heap
page read and write
269C1000
direct allocation
page read and write
539CC000
direct allocation
page read and write
2B670000
direct allocation
page read and write
724000
heap
page read and write
5C7000
unkown
page readonly
6B5D1000
unkown
page execute read
4815000
heap
page read and write
2B6E0000
direct allocation
page read and write
A70000
unkown
page readonly
724000
heap
page read and write
480D000
heap
page read and write
2B788000
direct allocation
page read and write
40481000
direct allocation
page read and write
6A4000
heap
page read and write
6C301000
unkown
page read and write
6A4000
heap
page read and write
4813000
heap
page read and write
28CD000
stack
page read and write
6A4000
heap
page read and write
6C148000
unkown
page read and write
41BD000
heap
page read and write
538E8000
direct allocation
page read and write
6A4000
heap
page read and write
539A0000
direct allocation
page read and write
7CF000
heap
page read and write
6A4000
heap
page read and write
53900000
direct allocation
page read and write
2B794000
direct allocation
page read and write
6A4000
heap
page read and write
565000
unkown
page readonly
41C5000
heap
page read and write
41BA000
heap
page read and write
6A4000
heap
page read and write
480D000
heap
page read and write
6A4000
heap
page read and write
6C14B000
unkown
page write copy
724000
heap
page read and write
6C04A000
unkown
page readonly
78B000
heap
page read and write
4814000
heap
page read and write
95C9000
heap
page read and write
47DF000
stack
page read and write
4815000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
539C4000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
6C035000
unkown
page readonly
4813000
heap
page read and write
53B40000
direct allocation
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
2B6F4000
direct allocation
page read and write
53910000
direct allocation
page read and write
724000
heap
page read and write
718000
heap
page read and write
480D000
heap
page read and write
6A4000
heap
page read and write
2B838000
direct allocation
page read and write
41BB000
heap
page read and write
480F000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
6540000
unkown
page readonly
724000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
5D0D000
stack
page read and write
6A4000
heap
page read and write
2B720000
direct allocation
page read and write
776000
heap
page read and write
6BE59000
unkown
page readonly
724000
heap
page read and write
2B838000
direct allocation
page read and write
2B754000
direct allocation
page read and write
727000
heap
page read and write
6A4000
heap
page read and write
2B7C0000
direct allocation
page read and write
61DE000
unclassified section
page read and write
6BD7C000
unkown
page readonly
2B6F4000
direct allocation
page read and write
78D000
heap
page read and write
2B704000
direct allocation
page read and write
724000
heap
page read and write
6C317000
unkown
page read and write
6A4000
heap
page read and write
6A5000
heap
page read and write
53AE8000
direct allocation
page read and write
6A4000
heap
page read and write
5607000
heap
page read and write
480D000
heap
page read and write
724000
heap
page read and write
4813000
heap
page read and write
724000
heap
page read and write
5AF0000
heap
page read and write
6A4000
heap
page read and write
2E32000
heap
page read and write
4813000
heap
page read and write
480D000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
732000
heap
page read and write
43B000
unkown
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
3330000
heap
page read and write
6A4000
heap
page read and write
5389C000
direct allocation
page read and write
4BB34000
direct allocation
page read and write
539CC000
direct allocation
page read and write
3FA8C000
direct allocation
page read and write
3556000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
2FF9000
heap
page read and write
724000
heap
page read and write
2B6F4000
direct allocation
page read and write
724000
heap
page read and write
6CE000
heap
page read and write
41BD000
heap
page read and write
480F000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
63FE000
unclassified section
page read and write
41E000
unkown
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
4813000
heap
page read and write
6A4000
heap
page read and write
2B6C4000
direct allocation
page read and write
483000
unkown
page read and write
53A40000
direct allocation
page read and write
538B4000
direct allocation
page read and write
F90000
heap
page read and write
5C2000
unkown
page readonly
47F6000
heap
page read and write
6A4000
heap
page read and write
2B814000
direct allocation
page read and write
2B660000
direct allocation
page read and write
40A000
unkown
page write copy
6A4000
heap
page read and write
41C5000
heap
page read and write
4815000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
725000
heap
page read and write
5540000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
2B788000
direct allocation
page read and write
2B788000
direct allocation
page read and write
2B7CC000
direct allocation
page read and write
4815000
heap
page read and write
41BD000
heap
page read and write
4DDE000
stack
page read and write
355C000
heap
page read and write
957A000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
9BF000
stack
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
29C4000
heap
page read and write
6A4000
heap
page read and write
4814000
heap
page read and write
53A80000
direct allocation
page read and write
9950000
unclassified section
page read and write
5396C000
direct allocation
page read and write
2B7F0000
direct allocation
page read and write
6A4000
heap
page read and write
7DE000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
94AC000
heap
page read and write
2B7D8000
direct allocation
page read and write
724000
heap
page read and write
4190000
heap
page read and write
2B8A000
heap
page read and write
56E000
stack
page read and write
724000
heap
page read and write
563B000
heap
page read and write
27EC000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
53B50000
direct allocation
page read and write
6C14E000
unkown
page write copy
2B804000
direct allocation
page read and write
5FA000
heap
page read and write
41BF000
heap
page read and write
2B7D8000
direct allocation
page read and write
53910000
direct allocation
page read and write
480A000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
53AE8000
direct allocation
page read and write
53B60000
direct allocation
page read and write
6A5000
heap
page read and write
2B6B8000
direct allocation
page read and write
480F000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
538E4000
direct allocation
page read and write
539CC000
direct allocation
page read and write
6A4000
heap
page read and write
5396C000
direct allocation
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
75C000
heap
page read and write
2B6E8000
direct allocation
page read and write
2B8C0000
direct allocation
page read and write
620000
heap
page read and write
2B75C000
direct allocation
page read and write
6A4000
heap
page read and write
538F4000
direct allocation
page read and write
946E000
heap
page read and write
6A4000
heap
page read and write
4814000
heap
page read and write
928F000
stack
page read and write
539B0000
direct allocation
page read and write
724000
heap
page read and write
724000
heap
page read and write
5500000
heap
page read and write
6A4000
heap
page read and write
4815000
heap
page read and write
724000
heap
page read and write
3B45000
heap
page read and write
4C3000
unkown
page read and write
6C146000
unkown
page write copy
6A4000
heap
page read and write
2E01000
heap
page read and write
724000
heap
page read and write
29C4000
heap
page read and write
4815000
heap
page read and write
4F8E000
stack
page read and write
64F7000
heap
page read and write
4815000
heap
page read and write
5657000
heap
page read and write
2D9C000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
2B1E000
stack
page read and write
77B000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
408000
unkown
page readonly
6A4000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
5389C000
direct allocation
page read and write
55EE000
stack
page read and write
87A000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
53B60000
direct allocation
page read and write
724000
heap
page read and write
2B754000
direct allocation
page read and write
1010000
unkown
page readonly
4D6E000
stack
page read and write
41BB000
heap
page read and write
6A1D1000
unkown
page execute read
6C14C000
unkown
page read and write
5B04000
trusted library allocation
page read and write
54B000
unkown
page read and write
2B788000
direct allocation
page read and write
41BD000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
1F884000
direct allocation
page read and write
2B6D0000
direct allocation
page read and write
6C198000
unkown
page read and write
41C5000
heap
page read and write
41C5000
heap
page read and write
5382C000
direct allocation
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
791000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
6F0000
heap
page read and write
4550000
unkown
page readonly
6A4000
heap
page read and write
724000
heap
page read and write
D8B000
unkown
page readonly
3FA50000
direct allocation
page read and write
6A4000
heap
page read and write
2B7D8000
direct allocation
page read and write
41C3000
heap
page read and write
53AFC000
direct allocation
page read and write
724000
heap
page read and write
53A78000
direct allocation
page read and write
9451000
heap
page read and write
6C307000
unkown
page read and write
480F000
heap
page read and write
353D000
heap
page read and write
4815000
heap
page read and write
47FA000
heap
page read and write
4815000
heap
page read and write
6C196000
unkown
page read and write
2B710000
direct allocation
page read and write
4806000
heap
page read and write
6A4000
heap
page read and write
480F000
heap
page read and write
724000
heap
page read and write
2B6E8000
direct allocation
page read and write
5395C000
direct allocation
page read and write
4815000
heap
page read and write
7A9000
heap
page read and write
6C13C000
unkown
page read and write
41BB000
heap
page read and write
53884000
direct allocation
page read and write
6A4000
heap
page read and write
9E69000
unclassified section
page read and write
2B7E4000
direct allocation
page read and write
5658000
heap
page read and write
4813000
heap
page read and write
6A4000
heap
page read and write
2B76C000
direct allocation
page read and write
3090000
unkown
page readonly
724000
heap
page read and write
480B000
heap
page read and write
6A4000
heap
page read and write
3530000
heap
page read and write
4BA7C000
direct allocation
page read and write
26A0000
heap
page read and write
724000
heap
page read and write
41BC000
heap
page read and write
2B7A8000
direct allocation
page read and write
4BB48000
direct allocation
page read and write
7E2000
heap
page read and write
53884000
direct allocation
page read and write
480F000
heap
page read and write
4F4F000
stack
page read and write
724000
heap
page read and write
539C4000
direct allocation
page read and write
33041000
direct allocation
page read and write
87B000
stack
page read and write
53B20000
direct allocation
page read and write
59E000
unkown
page readonly
565000
unkown
page readonly
6A4000
heap
page read and write
9EA0000
unclassified section
page read and write
6A4000
heap
page read and write
4813000
heap
page read and write
3D05000
unkown
page readonly
539A0000
direct allocation
page read and write
4814000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
41BD000
heap
page read and write
480F000
heap
page read and write
29CF000
heap
page read and write
6A4000
heap
page read and write
480D000
heap
page read and write
E98000
heap
page read and write
407000
unkown
page readonly
2B878000
direct allocation
page read and write
2B7C0000
direct allocation
page read and write
539A0000
direct allocation
page read and write
6A4000
heap
page read and write
6BD91000
unkown
page readonly
724000
heap
page read and write
6A4000
heap
page read and write
41C5000
heap
page read and write
6A4000
heap
page read and write
6C317000
unkown
page read and write
A71000
unkown
page execute read
53944000
direct allocation
page read and write
6A4000
heap
page read and write
2B710000
direct allocation
page read and write
6A4000
heap
page read and write
2119000
heap
page read and write
9B000
stack
page read and write
6A4000
heap
page read and write
6C138000
unkown
page read and write
480B000
heap
page read and write
53AD4000
direct allocation
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
4BB18000
direct allocation
page read and write
724000
heap
page read and write
6C13B000
unkown
page write copy
539CC000
direct allocation
page read and write
6A1D1000
unkown
page execute read
F20000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
2B8A8000
direct allocation
page read and write
733000
heap
page read and write
53B50000
direct allocation
page read and write
724000
heap
page read and write
480F000
heap
page read and write
6A4000
heap
page read and write
480D000
heap
page read and write
6A4000
heap
page read and write
41BD000
heap
page read and write
480F000
heap
page read and write
53AC8000
direct allocation
page read and write
2B788000
direct allocation
page read and write
6A4000
heap
page read and write
539C4000
direct allocation
page read and write
4814000
heap
page read and write
2B754000
direct allocation
page read and write
355A000
heap
page read and write
4813000
heap
page read and write
5396C000
direct allocation
page read and write
646E000
unclassified section
page read and write
4ED61000
direct allocation
page read and write
41C3000
heap
page read and write
2B794000
direct allocation
page read and write
724000
heap
page read and write
4760000
unkown
page readonly
3088000
heap
page read and write
4BAE4000
direct allocation
page read and write
F506000
direct allocation
page execute and read and write
2B6E0000
direct allocation
page read and write
755000
heap
page read and write
6A4000
heap
page read and write
9450000
heap
page read and write
6A4000
heap
page read and write
A71000
unkown
page execute read
78D000
heap
page read and write
5674000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
6470000
unclassified section
page read and write
724000
heap
page read and write
53AFC000
direct allocation
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
65E000
stack
page read and write
6A4000
heap
page read and write
2B898000
direct allocation
page read and write
6C060000
unkown
page readonly
29BE000
stack
page read and write
7C4000
heap
page read and write
6A4000
heap
page read and write
26001000
direct allocation
page read and write
53910000
direct allocation
page read and write
400000
unkown
page readonly
9459000
heap
page read and write
724000
heap
page read and write
6C84000
direct allocation
page read and write
480D000
heap
page read and write
538E4000
direct allocation
page read and write
5B22000
trusted library allocation
page read and write
4815000
heap
page read and write
724000
heap
page read and write
683D1000
unkown
page execute read
6CE51000
unkown
page execute read
3FA60000
direct allocation
page read and write
26064000
direct allocation
page read and write
6A4000
heap
page read and write
5395C000
direct allocation
page read and write
6A4000
heap
page read and write
2B0C000
heap
page read and write
7BE000
stack
page read and write
38A0000
unkown
page readonly
6A4000
heap
page read and write
355C000
heap
page read and write
539B0000
direct allocation
page read and write
724000
heap
page read and write
538C0000
direct allocation
page read and write
724000
heap
page read and write
480F000
heap
page read and write
480F000
heap
page read and write
4808000
heap
page read and write
3C6C000
unkown
page readonly
724000
heap
page read and write
6482000
heap
page read and write
6B8AF000
unkown
page readonly
6B8AF000
unkown
page readonly
4813000
heap
page read and write
2EE0000
heap
page read and write
D81000
unkown
page readonly
55F4000
heap
page read and write
12FE000
stack
page read and write
2B62C000
direct allocation
page read and write
6A4000
heap
page read and write
7B1000
heap
page read and write
56CB000
heap
page read and write
725000
heap
page read and write
2B7F0000
direct allocation
page read and write
2B6D0000
direct allocation
page read and write
A71000
unkown
page execute read
6C143000
unkown
page write copy
54AC000
stack
page read and write
40A0000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
724000
heap
page read and write
480D000
heap
page read and write
6A4000
heap
page read and write
724000
heap
page read and write
2B8D0000
direct allocation
page read and write
2CA0000
heap
page read and write
53A94000
direct allocation
page read and write
53A34000
direct allocation
page read and write
724000
heap
page read and write
7A9000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
There are 3335 hidden memdumps, click here to show them.