IOC Report
SetupPoker.exe

loading gif

Files

File Path
Type
Category
Malicious
SetupPoker.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\33CUD2J1\index[1].7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\90SNK17T\index[1].7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\90SNK17T\new[1].7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\AN5UOLP8\index[1].7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\AN5UOLP8\new[1].7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\index.7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (1).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (10).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (11).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (12).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (13).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (14).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (15).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (16).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (17).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (18).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (19).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (2).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (20).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (21).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (22).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (23).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (24).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (25).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (26).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (27).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (28).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (29).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (3).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (30).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (31).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (32).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (33).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (34).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (35).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (36).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (37).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (38).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (39).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (4).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (40).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (41).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (42).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (43).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (44).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (5).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (6).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (7).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (8).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new (9).7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new.7z
7-zip archive data, version 0.4
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\33CUD2J1\new[1].7z
7-zip archive data, version 0.4
dropped
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\WebInstaller_7012.log
Unicode text, UTF-8 (with BOM) text, with very long lines (65533), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\index.html
HTML document, ASCII text, with very long lines (33425)
dropped
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new\css\template.css
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new\html\template.html
exported SGML document, Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new\images\attractive_tournaments_icon.png
PNG image data, 52 x 52, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new\images\background.jpg
JPEG image data, baseline, precision 8, 887x557, components 3
dropped
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new\images\chech-flag.png
PNG image data, 18 x 13, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new\images\close-button_normal.png
PNG image data, 21 x 21, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new\images\close-button_over.png
PNG image data, 21 x 21, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new\images\countless_cash_games_icon.png
PNG image data, 52 x 52, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new\images\cta-button_normal.png
PNG image data, 240 x 57, 4-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new\images\cta-button_over.png
PNG image data, 240 x 57, 4-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new\images\estonia-flag.png
PNG image data, 18 x 13, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new\images\greek-flag.png
PNG image data, 18 x 13, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new\images\logo.png
PNG image data, 194 x 42, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new\images\progress-bar.png
PNG image data, 629 x 15, 1-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new\images\sprite.png
PNG image data, 415 x 547, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\WebInstaller_C49FBE6B451748A5B36D1C32CC29DCBB\new\images\thrilling_casino_games_icon.png
PNG image data, 52 x 52, 8-bit colormap, non-interlaced
dropped
There are 61 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SetupPoker.exe
"C:\Users\user\Desktop\SetupPoker.exe"
malicious

URLs

Name
IP
Malicious
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjYxMzIyOCZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT02OQ%3D%3D
52.213.137.28
http://help.bet365.com/home/mainpage.asp?popmembers=5360t
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjYyODkzNCZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT04NA%3D%3D
52.213.137.28
https://d3a6p9a3vksur7.cloudfront.net/compressed_assets/poker_bet365_com/
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjYzMDQ5NyZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT04Ng%3D%3D
52.213.137.28
https://d3a6p9a3vksur7.cloudfront.net/compressed_assets/poker_bet365_com/index.7z
52.85.39.184
http://www.bet365.comB
unknown
HTTP://HELP.BET365.COM/HOME/MAINPAGE.ASP?POPMEMBERS=5360&SCTID=8lay
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjY1NTU1NCZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT0xMTE%3D
52.213.137.28
https://d3a6p9a3vksur7.cloudfront.net/cabs/poker_bet365_com/
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjU0ODc2OCZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT00
52.213.137.28
http://jqueryui.com
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjYzMjA1OSZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT04OA%3D%3D
52.213.137.28
http://help.bet365.com/home/mainpage.asp?popmembers=5360&sctid=8&prd=4&lng=1&tid=1qP:
unknown
http://www.bet365.comX
unknown
http://help.bet365.com/home/mainpage.asp?popmembers=5360ui-datepicker-group
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjY0NDU2NiZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT0xMDA%3D
52.213.137.28
HTTP://HELP.BET365.COM/HOME/MAINPAGE.ASP?POPMEMBERS=5360&SCTID=8&PRD=4&LNG=1&TID=1c
unknown
http://stats.ptinstaller.com/stats.gif?event=100&brand=Poker
unknown
HTTP://HELP.BET365.COM/HOME/MAINPAGE.ASP?POPMEMBERS=5360&SCTID=8&PRD=4&LNG=1&TID=1a
unknown
http://help.bet365.com/home/mainpage.asp?popmembers=5360&sctid=8&prd=4&lng=1&tid=1RZU
unknown
http://www.bet365.comR
unknown
http://www.bet365.comQ
unknown
http://www.bet365.comal
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjY0OTI5MyZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT0xMDU%3D
52.213.137.28
http://stats.ptinstaller.com/stats.gif
unknown
http://help.bet365.com/home/mainpage.asp?popmembers=5360&sctid=8&prd=4&lng=1&tid=1ct
unknown
http://help.bet365.com/home/mainpage.asp?popmembers=5360&sctid=8&prd=4&lng=1&tid=1te
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjYxMTE1NSZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT02Nw%3D%3D
52.213.137.28
https://d3a6p9a3vksur7.cloudfront.net/
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjYzMzYwNyZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT04OQ%3D%3D
52.213.137.28
HTTP://HELP.BET365.COM/HOME/MAINPAGE.ASP?POPMEMBERS=5360&SCTID=8&PRD=4&LNG=1&TID=15
unknown
https://dl-com.p365play.com/download/poker/client_update_urls.php
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjYyNDIyMiZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT04MA%3D%3D
52.213.137.28
HTTP://HELP.BET365.COM/HOME/MAINPAGE.ASP?POPMEMBERS=5360&SCTID=8&PRD=4&LNG=1&TID=1.
unknown
http://help.bet365.com/home/mainpage.asp?popmembers=5360&sctid=8&prd=4&lng=1HAVE
unknown
http://help.bet365.com/home/mainpage.asp?popmembers=5360&sctid=8&prd=4.
unknown
http://www.bet365.comv
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjYyMjY0NyZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT03OA%3D%3D
52.213.137.28
http://www.bet365.comq
unknown
HTTP://HELP.BET
unknown
http://help.bet365.com/home/mainpage.asp?popmembers=5360&sctid=8&prd=4&lng=1&tid
unknown
http://help.bet365.com/home/mainpage.asp?popmembers=5360
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjY1MjQwNCZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT0xMDg%3D
52.213.137.28
http://help.bet365.com/home/mainpage.asp?popmembers=5360&sctid=8&p
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90
unknown
http://help.bet365.com/home/mainpage.asp?popmembers=5360&sctid=8&prd=4&lng=1D
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjY1MDg1NyZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT0xMDY%3D
52.213.137.28
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjYxOTUwNyZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT03NQ%3D%3D
52.213.137.28
HTTP://HELP.BET365.COM/HOME/MAINPAGE.ASP?POPMEMBERS=5360&SCTID=8&PRD=4&LNG=1&TID=1
unknown
http://help.bet365.com/home/mainpage.asp?popmembers=5360&sctid=8&prd=4&lng=1&tid=1le=
unknown
https://d3a6p9a3vksur7.cloudfront.net/compressed_assets/poker_bet365_com/templates/D
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjY2OTc0NCZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT0xMjU%3D
52.213.137.28
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjYzOTg2OCZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT05NQ%3D%3D
52.213.137.28
http://help.bet365.com/home/mainpage.asp?popmembers=5360&sctid=8&prd=4&lng=1?
unknown
HTTP://HELP.BET365.COM/HOME/MAINPAGE.ASP?POPMEMBERS=5360&SCTID=8&PRD=4&LNG=1&TID=1)
unknown
https://d3a6p9a3vksur7.cloudfrontw
unknown
http://www.bet365.com_h
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjYxNjM3OSZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT03Mg%3D%3D
52.213.137.28
HTTP://HELP.BET365.COM/HOME/MAINPAGE.ASP?POPMEMBERS=5360&SCTID=8&PRD=4&LNG=1&TID=1le=
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjY0MzAwNyZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT05OA%3D%3D
52.213.137.28
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjYyNTc5MyZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT04MQ%3D%3D
52.213.137.28
http://poker.bet365.com/home/en/n0
unknown
http://help.bet365.com/home/mainpage.asp?popmembers=5360&sctid=8&prd=4&lng=1&tid=1vaT
unknown
HTTP://HELP.BET365.COM/HOME/MAINPAGE.ASP?POPMEMBERS=5360&SCTID=8&PRD=4&LNG=1&TID=1nd
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjY2MDI5OSZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT0xMTY%3D
52.213.137.28
https://d3a6p9a3vksur7.cloudfront.net/compressed_assets/poker_bet365_com/index.7zo/
unknown
http://help.bet365.com/home/mainpage.asp?popmembers=5360&sct
unknown
http://help.bet365.com/home/mainpage.asp?popmembers=5360&sctid=8&prd=4&lng=1&tid=1JQ
unknown
http://help.bet365.com/home/mainpage.asp?popmembers=5360&sctid=8&prd=4&lng=1&tid=1RZ
unknown
http://www.bet365.com?h
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjY2ODE4MSZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT0xMjQ%3D
52.213.137.28
https://d3a6p9a3vksur7.cloudfront.net/compressed_assets/poker_bet365_com/templates/installer/new.7z
52.85.39.184
HTTP://HELP.BET365.COM/HOME/MAINPAGE.ASP?POPMEMBERS=5360&SCTID=8&PRD=4
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjU1MzkxMyZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT05
52.213.137.28
http://help.bet365.com/home/mainpage.asp?popmembers=5360&sctid=8&prd=4&lng=1&tid=1:
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjU2MjYxNiZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT0xOA%3D%3D
52.213.137.28
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjYwNjY0MiZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT02Mg%3D%3D
52.213.137.28
http://help.bet365.com/home/mainpage.asp?popmembers=5360&sctid=8&prd=4&lng=1&tid=1.
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjY2MTg4MSZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT0xMTc%3D
52.213.137.28
https://github.com/jquery/jquery-ui
unknown
http://stats.ptinstaller.com/sta
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjU4Njg0OSZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT00Mg%3D%3D
52.213.137.28
http://help.bet365.com/home/mainpage.asp?popmembers=5360&sctid=8&prd=4&lng=1&tid=1I
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=zxzlbnq9mtawjmjyyw5kpvbva2vyigf0iejlddm2nszldmvudf90
unknown
https://d3a6p9a3vksur7.cloudfront.net/compressed_assets/poker_bet365_com/templates/installer/new.7zC
unknown
http://help.bet365.com/home/mainpage.asp?popmembers=5360&sctid=8&prd=4&lng=1&tid=1C
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjY1Mzk4NyZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT0xMDk%3D
52.213.137.28
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjY2NjU1MyZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT0xMjI%3D
52.213.137.28
http://help.bet365.com/home/mainp
unknown
http://help.bet365.com/home/mainpage.asp?popmembers=5360&sctid=8&prd=4&lng=1&tid=1(
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjYxNzk0MSZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT03Mw%3D%3D
52.213.137.28
http://help.bet365.com/home/mainpage.asp?popmembers=5360&sctid=8&prd=4&lng=1nachetAttribL0.ui
unknown
http://poker.bet365.com/home/en/W
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjY2MzQ0NyZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT0xMTk%3D
52.213.137.28
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjU3MzE2MSZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT0yOQ%3D%3D
52.213.137.28
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjY2NTAwOCZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT0xMjA%3D
52.213.137.28
http://help.bet365.com/home/mainpage.asp?popmembers=5360&sctid=8&prd=4&lng=1N9
unknown
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjYxNDgzMyZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT03MA%3D%3D
52.213.137.28
http://stats.ptinstaller.com/stats.gif?v=2&data=ZXZlbnQ9MTAwJmJyYW5kPVBva2VyIGF0IEJldDM2NSZldmVudF90eXBlPWVycm9yJmVycm9yX3RleHQ9aW5zdGFsbGVyX21haW5fdGltZW91dCZvcz0oOTIwMClfNjRiaXQmb3NfbGFuZz0yMDU3JmllX3Zlcj0xMS43ODkuMTkwNDEuMCZwcm9jZXNzX2lkPUM0OUZCRTZCNDUxNzQ4QTVCMzZEMUMzMkNDMjlEQ0JCJnZlcmlmaWVyPWMwYzE4ZWFiNGZiN2VkOTZiZDMzN2RjNmJkZjBjZjk5JnVzZXJfaWQ9QzQ5RkJFNkI0NTE3NDhBNUIzNkQxQzMyQ0MyOURDQkImaW5zdGFsbGVyX3Zlcj0xLjEuMS4zNiZ0aW1lc3RhbXA9MTcxMzk2NjYyMTA4NCZhZG1pbnVzZXI9MSZzdGFydHRpbWU9MTcxMzk2NjU0NCZsaWZldGltZT03Nw%3D%3D
52.213.137.28
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
stats.ptinstaller.com
52.213.137.28
d3a6p9a3vksur7.cloudfront.net
52.85.39.184

IPs

IP
Domain
Country
Malicious
52.213.137.28
stats.ptinstaller.com
United States
52.85.39.184
d3a6p9a3vksur7.cloudfront.net
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_41
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_18467
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\PTECH\376
userid
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_6334
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_26500
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_19169
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_15724
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_11478
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_29358
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_26962
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_24464
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_5705
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_28145
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_23281
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_16827
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_9961
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_491
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_2995
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_11942
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_4827
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_5436
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_32391
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_14604
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_3902
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_153
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_292
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_12382
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_17421
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_18716
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_19718
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_19895
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_5447
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_21726
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_14771
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_11538
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_1869
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_19912
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_25667
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_26299
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_17035
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_9894
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_28703
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_23811
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_31322
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_30333
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_17673
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_4664
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_15141
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\tempo_7711
NULL
There are 39 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
444C000
heap
page read and write
6128000
heap
page read and write
A4B000
heap
page read and write
51C8000
heap
page read and write
517F000
heap
page read and write
51C6000
heap
page read and write
AADC000
heap
page read and write
4204000
heap
page read and write
4451000
heap
page read and write
63A2000
heap
page read and write
5FCD000
heap
page read and write
60F3000
heap
page read and write
61DE000
heap
page read and write
A9A000
heap
page read and write
50B0000
heap
page read and write
5213000
heap
page read and write
48D3000
trusted library allocation
page read and write
66A6000
heap
page read and write
6702000
heap
page read and write
61D1000
heap
page read and write
66FE000
heap
page read and write
608C000
heap
page read and write
5E65000
trusted library allocation
page read and write
4882000
trusted library allocation
page read and write
611A000
heap
page read and write
A95000
heap
page read and write
5876000
trusted library allocation
page read and write
6111000
heap
page read and write
50B3000
heap
page read and write
594C000
trusted library allocation
page read and write
5AEA000
trusted library allocation
page read and write
5FBB000
heap
page read and write
614D000
heap
page read and write
5F4D000
trusted library allocation
page read and write
616A000
heap
page read and write
50B0000
heap
page read and write
440D000
heap
page read and write
6581000
heap
page read and write
5F76000
heap
page read and write
59EC000
trusted library allocation
page read and write
6754000
trusted library allocation
page read and write
5BB6000
trusted library allocation
page read and write
441A000
heap
page read and write
511D000
heap
page read and write
C486000
heap
page read and write
AABC000
heap
page read and write
65B3000
heap
page read and write
A6DF000
trusted library allocation
page read and write
673F000
heap
page read and write
ADAA000
heap
page read and write
6029000
heap
page read and write
5F7C000
heap
page read and write
60C7000
heap
page read and write
60A4000
heap
page read and write
4437000
heap
page read and write
ABE000
heap
page read and write
53C1000
trusted library allocation
page read and write
6384000
heap
page read and write
512E000
heap
page read and write
620C000
heap
page read and write
4455000
heap
page read and write
5EE2000
trusted library allocation
page read and write
5E5F000
trusted library allocation
page read and write
5B7A000
trusted library allocation
page read and write
6290000
heap
page read and write
A4C000
heap
page read and write
5206000
heap
page read and write
48B0000
trusted library allocation
page read and write
67A8000
trusted library allocation
page read and write
5124000
heap
page read and write
60A3000
heap
page read and write
6148000
heap
page read and write
99B7000
trusted library allocation
page read and write
51C9000
heap
page read and write
60A2000
heap
page read and write
43E2000
heap
page read and write
5E1C000
trusted library allocation
page read and write
A7F8000
trusted library allocation
page read and write
B156000
heap
page read and write
A956000
heap
page read and write
B0D7000
heap
page read and write
4895000
trusted library allocation
page read and write
51D6000
heap
page read and write
B11C000
heap
page read and write
421E000
heap
page read and write
4F33000
heap
page read and write
50B0000
heap
page read and write
9969000
trusted library allocation
page read and write
5E71000
trusted library allocation
page read and write
B1E6000
heap
page read and write
61AF000
heap
page read and write
5D80000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
5FDD000
heap
page read and write
634B000
heap
page read and write
509F000
heap
page read and write
4C01000
heap
page read and write
AF9B000
heap
page read and write
67C4000
trusted library allocation
page read and write
5BB2000
trusted library allocation
page read and write
623C000
heap
page read and write
51FD000
heap
page read and write
9980000
trusted library allocation
page read and write
A811000
heap
page read and write
6087000
heap
page read and write
4F02000
heap
page read and write
61AC000
heap
page read and write
99CB000
trusted library allocation
page read and write
595F000
trusted library allocation
page read and write
62B8000
heap
page read and write
A45000
heap
page read and write
629B000
heap
page read and write
621F000
heap
page read and write
60CF000
heap
page read and write
6044000
heap
page read and write
B1CE000
heap
page read and write
5FC9000
heap
page read and write
43FC000
heap
page read and write
58EF000
trusted library allocation
page read and write
6417000
heap
page read and write
61C9000
heap
page read and write
62A3000
heap
page read and write
60C6000
heap
page read and write
C55D000
heap
page read and write
516C000
heap
page read and write
5EFF000
trusted library allocation
page read and write
48D1000
trusted library allocation
page read and write
5BB0000
trusted library allocation
page read and write
60C4000
heap
page read and write
4460000
heap
page read and write
53BF000
trusted library allocation
page read and write
4EF8000
heap
page read and write
99C2000
trusted library allocation
page read and write
67CE000
trusted library allocation
page read and write
A6B7000
trusted library allocation
page read and write
53A4000
trusted library allocation
page read and write
51C2000
heap
page read and write
60EC000
heap
page read and write
5049000
heap
page read and write
610C000
heap
page read and write
604C000
heap
page read and write
5EE1000
trusted library allocation
page read and write
6230000
heap
page read and write
5AE5000
trusted library allocation
page read and write
6084000
heap
page read and write
4873000
trusted library allocation
page read and write
668F000
heap
page read and write
5F7B000
heap
page read and write
5FAC000
heap
page read and write
AAA1000
heap
page read and write
4C19000
heap
page read and write
AA5000
heap
page read and write
B273000
heap
page read and write
A59000
heap
page read and write
639A000
heap
page read and write
43FC000
heap
page read and write
61C3000
heap
page read and write
510C000
heap
page read and write
6310000
heap
page read and write
5E17000
trusted library allocation
page read and write
5B55000
trusted library allocation
page read and write
50B1000
heap
page read and write
6369000
heap
page read and write
610C000
heap
page read and write
616A000
heap
page read and write
658F000
heap
page read and write
4E1F000
trusted library allocation
page read and write
5FDE000
heap
page read and write
512F000
heap
page read and write
6128000
heap
page read and write
5BCD000
trusted library allocation
page read and write
601A000
heap
page read and write
5AF3000
trusted library allocation
page read and write
4C0C000
heap
page read and write
51E0000
heap
page read and write
9959000
trusted library allocation
page read and write
65F4000
heap
page read and write
61CF000
heap
page read and write
66A9000
heap
page read and write
611E000
heap
page read and write
66F0000
heap
page read and write
62D2000
heap
page read and write
6351000
heap
page read and write
A6B1000
trusted library allocation
page read and write
AE9B000
trusted library allocation
page read and write
522B000
heap
page read and write
43F1000
heap
page read and write
48F7000
trusted library allocation
page read and write
50CD000
heap
page read and write
5F25000
trusted library allocation
page read and write
5F4D000
trusted library allocation
page read and write
60F3000
heap
page read and write
5124000
heap
page read and write
5F64000
heap
page read and write
59EC000
trusted library allocation
page read and write
B367000
heap
page read and write
43EB000
heap
page read and write
99CE000
trusted library allocation
page read and write
63A0000
heap
page read and write
43E2000
heap
page read and write
5CB6000
trusted library allocation
page read and write
60C8000
heap
page read and write
6208000
heap
page read and write
4456000
heap
page read and write
6227000
heap
page read and write
5203000
heap
page read and write
5C2C000
trusted library allocation
page read and write
618C000
heap
page read and write
59ED000
trusted library allocation
page read and write
5CE9000
trusted library allocation
page read and write
622D000
heap
page read and write
6106000
heap
page read and write
602B000
heap
page read and write
6167000
heap
page read and write
5EE6000
trusted library allocation
page read and write
5FE3000
heap
page read and write
A6DC000
trusted library allocation
page read and write
61B2000
heap
page read and write
51C2000
heap
page read and write
51E3000
heap
page read and write
6144000
heap
page read and write
61B1000
heap
page read and write
A9B000
heap
page read and write
4C19000
heap
page read and write
A973000
heap
page read and write
9964000
trusted library allocation
page read and write
5CD8000
trusted library allocation
page read and write
A3A000
heap
page read and write
61E5000
heap
page read and write
66F8000
heap
page read and write
A20000
heap
page read and write
60C4000
heap
page read and write
4404000
heap
page read and write
617A000
heap
page read and write
A651000
trusted library allocation
page read and write
4462000
heap
page read and write
510D000
heap
page read and write
5DCB000
trusted library allocation
page read and write
642D000
heap
page read and write
48BA000
trusted library allocation
page read and write
48C1000
trusted library allocation
page read and write
5122000
heap
page read and write
5E2F000
trusted library allocation
page read and write
512F000
heap
page read and write
674B000
heap
page read and write
5B46000
trusted library allocation
page read and write
671F000
heap
page read and write
5C45000
trusted library allocation
page read and write
5BB0000
trusted library allocation
page read and write
5FE1000
heap
page read and write
621D000
heap
page read and write
66CB000
heap
page read and write
B12F000
heap
page read and write
9970000
trusted library allocation
page read and write
601E000
heap
page read and write
6090000
heap
page read and write
61C8000
heap
page read and write
486C000
trusted library allocation
page read and write
60CB000
heap
page read and write
62B9000
heap
page read and write
A660000
trusted library allocation
page read and write
5EAE000
trusted library allocation
page read and write
6517000
heap
page read and write
5F6E000
heap
page read and write
585A000
trusted library allocation
page read and write
5FC7000
heap
page read and write
6064000
heap
page read and write
50B7000
heap
page read and write
9980000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
6661000
heap
page read and write
213000
unkown
page write copy
6227000
heap
page read and write
517E000
heap
page read and write
511D000
heap
page read and write
99C9000
trusted library allocation
page read and write
619E000
heap
page read and write
5938000
trusted library allocation
page read and write
6389000
heap
page read and write
593A000
trusted library allocation
page read and write
4450000
heap
page read and write
99C8000
trusted library allocation
page read and write
62CA000
heap
page read and write
A53000
heap
page read and write
99DA000
trusted library allocation
page read and write
675A000
trusted library allocation
page read and write
6009000
heap
page read and write
AAD0000
heap
page read and write
48D0000
trusted library allocation
page read and write
AAAC000
heap
page read and write
519B000
heap
page read and write
AE82000
trusted library allocation
page read and write
6072000
heap
page read and write
5CE9000
trusted library allocation
page read and write
5ADC000
trusted library allocation
page read and write
5E34000
trusted library allocation
page read and write
440B000
heap
page read and write
48D0000
trusted library allocation
page read and write
6106000
heap
page read and write
621C000
heap
page read and write
60E4000
heap
page read and write
5ABC000
trusted library allocation
page read and write
4420000
heap
page read and write
634E000
heap
page read and write
555F000
trusted library allocation
page read and write
4F11000
heap
page read and write
995E000
trusted library allocation
page read and write
50A9000
heap
page read and write
6144000
heap
page read and write
4C05000
heap
page read and write
6375000
heap
page read and write
5DFF000
trusted library allocation
page read and write
997D000
trusted library allocation
page read and write
660C000
heap
page read and write
62B1000
heap
page read and write
639E000
heap
page read and write
6279000
heap
page read and write
650F000
heap
page read and write
5F6E000
heap
page read and write
51F8000
heap
page read and write
4E15000
trusted library allocation
page read and write
66AD000
heap
page read and write
60CC000
heap
page read and write
6230000
heap
page read and write
48B0000
trusted library allocation
page read and write
4E2E000
trusted library allocation
page read and write
421C000
heap
page read and write
61C3000
heap
page read and write
622F000
heap
page read and write
6440000
heap
page read and write
5BDA000
trusted library allocation
page read and write
4455000
heap
page read and write
5E5F000
trusted library allocation
page read and write
43FA000
heap
page read and write
50FC000
heap
page read and write
612B000
heap
page read and write
5F2C000
trusted library allocation
page read and write
60D2000
heap
page read and write
5D1F000
trusted library allocation
page read and write
B168000
heap
page read and write
422B000
heap
page read and write
99C4000
trusted library allocation
page read and write
A708000
trusted library allocation
page read and write
6036000
heap
page read and write
5FC8000
heap
page read and write
5FED000
heap
page read and write
9974000
trusted library allocation
page read and write
4E1B000
trusted library allocation
page read and write
611E000
heap
page read and write
5924000
trusted library allocation
page read and write
489E000
trusted library allocation
page read and write
6207000
heap
page read and write
5C9B000
trusted library allocation
page read and write
6108000
heap
page read and write
50A0000
heap
page read and write
67D8000
trusted library allocation
page read and write
4E2E000
trusted library allocation
page read and write
62C4000
heap
page read and write
422B000
heap
page read and write
6084000
heap
page read and write
63E9000
heap
page read and write
AABC000
heap
page read and write
59E0000
trusted library allocation
page read and write
51AC000
heap
page read and write
5063000
heap
page read and write
53AF000
trusted library allocation
page read and write
5963000
trusted library allocation
page read and write
5CB9000
trusted library allocation
page read and write
5FE7000
heap
page read and write
ADD4000
heap
page read and write
62CA000
heap
page read and write
614C000
heap
page read and write
60DA000
heap
page read and write
446D000
heap
page read and write
9967000
trusted library allocation
page read and write
5B48000
trusted library allocation
page read and write
587A000
trusted library allocation
page read and write
5CDE000
trusted library allocation
page read and write
62AD000
heap
page read and write
627A000
heap
page read and write
51EB000
heap
page read and write
6066000
heap
page read and write
6141000
heap
page read and write
672D000
heap
page read and write
53AE000
trusted library allocation
page read and write
5EDC000
trusted library allocation
page read and write
60A4000
heap
page read and write
6702000
heap
page read and write
41BA000
heap
page read and write
67C4000
trusted library allocation
page read and write
61DB000
heap
page read and write
43B5000
heap
page read and write
51BA000
heap
page read and write
606A000
heap
page read and write
422B000
heap
page read and write
6064000
heap
page read and write
5FE1000
heap
page read and write
601E000
heap
page read and write
539B000
trusted library allocation
page read and write
67BA000
trusted library allocation
page read and write
9A13000
trusted library allocation
page read and write
AC2D000
heap
page read and write
5FE1000
heap
page read and write
6016000
heap
page read and write
53AB000
trusted library allocation
page read and write
5CE8000
trusted library allocation
page read and write
5104000
heap
page read and write
5E24000
trusted library allocation
page read and write
43E0000
heap
page read and write
5DB2000
trusted library allocation
page read and write
B091000
heap
page read and write
65AD000
heap
page read and write
64DA000
heap
page read and write
5C3A000
trusted library allocation
page read and write
61C1000
heap
page read and write
602C000
heap
page read and write
5099000
heap
page read and write
5FBD000
heap
page read and write
A6E9000
trusted library allocation
page read and write
48B4000
trusted library allocation
page read and write
62AD000
heap
page read and write
5924000
trusted library allocation
page read and write
6668000
heap
page read and write
60DA000
heap
page read and write
A940000
heap
page read and write
A70C000
trusted library allocation
page read and write
633B000
heap
page read and write
59FA000
trusted library allocation
page read and write
5F2C000
trusted library allocation
page read and write
6084000
heap
page read and write
5E5A000
trusted library allocation
page read and write
511D000
heap
page read and write
681E000
trusted library allocation
page read and write
5993000
trusted library allocation
page read and write
60D3000
heap
page read and write
6064000
heap
page read and write
625C000
heap
page read and write
67F6000
trusted library allocation
page read and write
6152000
heap
page read and write
5F6C000
heap
page read and write
489E000
trusted library allocation
page read and write
5C97000
trusted library allocation
page read and write
5F4A000
trusted library allocation
page read and write
5BCB000
trusted library allocation
page read and write
6321000
heap
page read and write
50D4000
heap
page read and write
59C0000
trusted library allocation
page execute
6208000
heap
page read and write
60F3000
heap
page read and write
6272000
heap
page read and write
5F79000
heap
page read and write
A687000
trusted library allocation
page read and write
6758000
trusted library allocation
page read and write
6706000
heap
page read and write
6378000
heap
page read and write
ADA1000
heap
page read and write
5E15000
trusted library allocation
page read and write
518C000
heap
page read and write
61C5000
heap
page read and write
5DCF000
trusted library allocation
page read and write
510E000
heap
page read and write
21E000
unkown
page readonly
51D4000
heap
page read and write
A7FE000
trusted library allocation
page read and write
9988000
trusted library allocation
page read and write
9976000
trusted library allocation
page read and write
5220000
heap
page read and write
443C000
heap
page read and write
51D1000
heap
page read and write
5FC7000
heap
page read and write
63F0000
heap
page read and write
6369000
heap
page read and write
628E000
heap
page read and write
639A000
heap
page read and write
5E52000
trusted library allocation
page read and write
5938000
trusted library allocation
page read and write
619C000
heap
page read and write
60FD000
heap
page read and write
5FEC000
heap
page read and write
5D95000
trusted library allocation
page read and write
5CDA000
trusted library allocation
page read and write
5F5A000
heap
page read and write
5B40000
trusted library allocation
page read and write
5943000
trusted library allocation
page read and write
6144000
heap
page read and write
43DC000
heap
page read and write
509D000
heap
page read and write
519B000
heap
page read and write
4C01000
heap
page read and write
99C4000
trusted library allocation
page read and write
642A000
heap
page read and write
B168000
heap
page read and write
65AB000
heap
page read and write
6122000
heap
page read and write
A716000
trusted library allocation
page read and write
61C3000
heap
page read and write
5ED0000
trusted library allocation
page read and write
41B7000
heap
page read and write
43EB000
heap
page read and write
5133000
heap
page read and write
51E4000
heap
page read and write
5F6E000
heap
page read and write
580A000
trusted library allocation
page read and write
5F3F000
trusted library allocation
page read and write
61F0000
heap
page read and write
43C5000
heap
page read and write
5CD8000
trusted library allocation
page read and write
5F53000
heap
page read and write
5FAC000
heap
page read and write
65DD000
heap
page read and write
5F5B000
heap
page read and write
5CD4000
trusted library allocation
page read and write
666A000
heap
page read and write
ACC6000
trusted library allocation
page read and write
6042000
heap
page read and write
67DC000
trusted library allocation
page read and write
5FC7000
heap
page read and write
65B5000
heap
page read and write
61C7000
heap
page read and write
442B000
heap
page read and write
5CDE000
trusted library allocation
page read and write
AB4000
heap
page read and write
4D6D000
trusted library allocation
page read and write
5D8C000
trusted library allocation
page read and write
6194000
heap
page read and write
50BC000
heap
page read and write
AEAB000
heap
page read and write
6257000
heap
page read and write
5963000
trusted library allocation
page read and write
594A000
trusted library allocation
page read and write
66AA000
heap
page read and write
633F000
heap
page read and write
6090000
heap
page read and write
4E2B000
trusted library allocation
page read and write
5F46000
trusted library allocation
page read and write
5F39000
trusted library allocation
page read and write
A723000
trusted library allocation
page execute
62C7000
heap
page read and write
996C000
trusted library allocation
page read and write
5F25000
trusted library allocation
page read and write
5E92000
trusted library allocation
page read and write
630E000
heap
page read and write
43E7000
heap
page read and write
6355000
heap
page read and write
9A1E000
trusted library allocation
page read and write
6084000
heap
page read and write
61A0000
heap
page read and write
9A22000
trusted library allocation
page read and write
672B000
heap
page read and write
48C3000
trusted library allocation
page read and write
51A5000
heap
page read and write
5F4D000
trusted library allocation
page read and write
9980000
trusted library allocation
page read and write
6168000
heap
page read and write
5E34000
trusted library allocation
page read and write
4C0F000
heap
page read and write
61C2000
heap
page read and write
5B70000
trusted library allocation
page read and write
5F7B000
heap
page read and write
5FD9000
heap
page read and write
5B82000
trusted library allocation
page read and write
AE8F000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
6762000
trusted library allocation
page read and write
4399000
heap
page read and write
639C000
heap
page read and write
6129000
heap
page read and write
593F000
trusted library allocation
page read and write
60F4000
heap
page read and write
5C41000
trusted library allocation
page read and write
A641000
heap
page read and write
6778000
trusted library allocation
page read and write
6620000
heap
page read and write
66B4000
heap
page read and write
A31000
heap
page read and write
4183000
heap
page read and write
5B50000
trusted library allocation
page read and write
60F4000
heap
page read and write
4391000
heap
page read and write
4F33000
heap
page read and write
6391000
heap
page read and write
59DF000
trusted library allocation
page read and write
5EEE000
trusted library allocation
page read and write
5F1E000
trusted library allocation
page read and write
489E000
trusted library allocation
page read and write
6232000
heap
page read and write
50BF000
heap
page read and write
B27D000
heap
page read and write
5A50000
trusted library allocation
page read and write
6333000
heap
page read and write
5BD0000
trusted library allocation
page read and write
65E0000
heap
page read and write
51EB000
heap
page read and write
489E000
trusted library allocation
page read and write
62EE000
heap
page read and write
672F000
heap
page read and write
4287000
trusted library allocation
page read and write
624E000
heap
page read and write
6702000
heap
page read and write
5952000
trusted library allocation
page read and write
6528000
heap
page read and write
51C2000
heap
page read and write
6589000
heap
page read and write
51A5000
heap
page read and write
5520000
trusted library allocation
page read and write
61C7000
heap
page read and write
61D3000
heap
page read and write
5961000
trusted library allocation
page read and write
629A000
heap
page read and write
618C000
heap
page read and write
61B8000
heap
page read and write
4463000
heap
page read and write
5C57000
trusted library allocation
page read and write
6517000
heap
page read and write
5A67000
trusted library allocation
page read and write
4D6A000
trusted library allocation
page read and write
5DCE000
trusted library allocation
page read and write
669F000
heap
page read and write
48DF000
trusted library allocation
page read and write
6209000
heap
page read and write
51ED000
heap
page read and write
50EC000
heap
page read and write
50F9000
heap
page read and write
5049000
heap
page read and write
5953000
trusted library allocation
page read and write
660C000
heap
page read and write
5198000
heap
page read and write
A6BC000
trusted library allocation
page read and write
5FB9000
heap
page read and write
43FE000
heap
page read and write
5E58000
trusted library allocation
page read and write
62B1000
heap
page read and write
65DC000
heap
page read and write
4469000
heap
page read and write
5C16000
trusted library allocation
page read and write
552B000
trusted library allocation
page read and write
43C7000
heap
page read and write
997A000
trusted library allocation
page read and write
6183000
heap
page read and write
5201000
heap
page read and write
6294000
heap
page read and write
608A000
heap
page read and write
6285000
heap
page read and write
65F4000
heap
page read and write
51AC000
heap
page read and write
5CA6000
trusted library allocation
page read and write
5FC9000
heap
page read and write
62CE000
heap
page read and write
43F3000
heap
page read and write
51E7000
heap
page read and write
6257000
heap
page read and write
43E9000
heap
page read and write
48D8000
trusted library allocation
page read and write
6426000
heap
page read and write
609C000
heap
page read and write
4D65000
trusted library allocation
page read and write
B14D000
heap
page read and write
53AD000
trusted library allocation
page read and write
5204000
heap
page read and write
6129000
heap
page read and write
53AD000
trusted library allocation
page read and write
62B6000
heap
page read and write
6268000
heap
page read and write
6624000
heap
page read and write
6344000
heap
page read and write
5203000
heap
page read and write
5FB3000
heap
page read and write
5F5C000
heap
page read and write
5E53000
trusted library allocation
page read and write
635B000
heap
page read and write
5EEA000
trusted library allocation
page read and write
6165000
heap
page read and write
6153000
heap
page read and write
61D1000
heap
page read and write
60AF000
heap
page read and write
60B3000
heap
page read and write
441E000
heap
page read and write
6187000
heap
page read and write
9952000
trusted library allocation
page read and write
5AC1000
trusted library allocation
page read and write
B27D000
heap
page read and write
6169000
heap
page read and write
65BF000
heap
page read and write
B9F000
heap
page read and write
43B1000
heap
page read and write
AEA3000
heap
page read and write
AEA5000
heap
page read and write
998D000
trusted library allocation
page read and write
A953000
heap
page read and write
6144000
heap
page read and write
604A000
heap
page read and write
61A4000
heap
page read and write
5123000
heap
page read and write
604C000
heap
page read and write
5AD5000
trusted library allocation
page read and write
612B000
heap
page read and write
5E97000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
5B30000
trusted library allocation
page read and write
5F5D000
heap
page read and write
B1C7000
heap
page read and write
B167000
heap
page read and write
4167000
heap
page read and write
489E000
trusted library allocation
page read and write
5943000
trusted library allocation
page read and write
602C000
heap
page read and write
48D7000
trusted library allocation
page read and write
50BF000
heap
page read and write
6609000
heap
page read and write
A709000
trusted library allocation
page read and write
50AD000
heap
page read and write
59F7000
trusted library allocation
page read and write
508A000
heap
page read and write
62B6000
heap
page read and write
634B000
heap
page read and write
5F60000
heap
page read and write
60FA000
heap
page read and write
5932000
trusted library allocation
page read and write
41D0000
heap
page read and write
4F0F000
heap
page read and write
60FB000
heap
page read and write
6183000
heap
page read and write
5BB9000
trusted library allocation
page read and write
6321000
heap
page read and write
5D8A000
trusted library allocation
page read and write
AAC000
heap
page read and write
48BE000
trusted library allocation
page read and write
486D000
trusted library allocation
page read and write
600F000
heap
page read and write
5CA4000
trusted library allocation
page read and write
61B1000
heap
page read and write
4BF3000
heap
page read and write
AACC000
heap
page read and write
60F3000
heap
page read and write
5C34000
trusted library allocation
page read and write
59E9000
trusted library allocation
page read and write
5F6A000
heap
page read and write
60BC000
heap
page read and write
61A9000
heap
page read and write
6128000
heap
page read and write
5AD1000
trusted library allocation
page read and write
671D000
heap
page read and write
632F000
heap
page read and write
ACD6000
trusted library allocation
page read and write
608E000
heap
page read and write
A6F2000
trusted library allocation
page read and write
630A000
heap
page read and write
5FC7000
heap
page read and write
6002000
heap
page read and write
67E3000
trusted library allocation
page read and write
611E000
heap
page read and write
4E2C000
trusted library allocation
page read and write
5B7C000
trusted library allocation
page read and write
5AE5000
trusted library allocation
page read and write
5FB9000
heap
page read and write
6788000
trusted library allocation
page read and write
A6FF000
trusted library allocation
page read and write
5EA8000
trusted library allocation
page read and write
A7D6000
trusted library allocation
page read and write
5FE7000
heap
page read and write
5C49000
trusted library allocation
page read and write
63F8000
heap
page read and write
58BA000
trusted library allocation
page read and write
6268000
heap
page read and write
5ACE000
trusted library allocation
page read and write
50C0000
heap
page read and write
61CE000
heap
page read and write
6122000
heap
page read and write
440F000
heap
page read and write
4464000
heap
page read and write
A71B000
trusted library allocation
page read and write
4380000
heap
page read and write
4462000
heap
page read and write
48BE000
trusted library allocation
page read and write
601D000
heap
page read and write
50D2000
heap
page read and write
6160000
heap
page read and write
674B000
heap
page read and write
51CA000
heap
page read and write
5B90000
trusted library allocation
page read and write
62D9000
heap
page read and write
43CE000
heap
page read and write
61EE000
heap
page read and write
592E000
trusted library allocation
page read and write
43DC000
heap
page read and write
6395000
heap
page read and write
99D8000
trusted library allocation
page read and write
43F5000
heap
page read and write
A6DF000
trusted library allocation
page read and write
ACA3000
heap
page read and write
5DDD000
trusted library allocation
page read and write
6160000
heap
page read and write
A89000
heap
page read and write
5CE4000
trusted library allocation
page read and write
997A000
trusted library allocation
page read and write
6565000
heap
page read and write
67E1000
trusted library allocation
page read and write
48C0000
trusted library allocation
page read and write
62D5000
heap
page read and write
A6C0000
trusted library allocation
page read and write
43F8000
heap
page read and write
48B0000
trusted library allocation
page read and write
A700000
trusted library allocation
page read and write
5C5C000
trusted library allocation
page read and write
5CA7000
trusted library allocation
page read and write
621C000
heap
page read and write
4389000
heap
page read and write
A717000
trusted library allocation
page read and write
43A0000
heap
page read and write
51D6000
heap
page read and write
43DC000
heap
page read and write
AAD6000
heap
page read and write
59FE000
trusted library allocation
page read and write
48D0000
trusted library allocation
page read and write
5D29000
trusted library allocation
page read and write
5DB2000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
48DC000
trusted library allocation
page read and write
4386000
heap
page read and write
5FED000
heap
page read and write
520D000
heap
page read and write
5F34000
trusted library allocation
page read and write
67BE000
trusted library allocation
page read and write
4447000
heap
page read and write
673F000
heap
page read and write
A70D000
trusted library allocation
page read and write
643E000
heap
page read and write
48F9000
trusted library allocation
page read and write
6007000
heap
page read and write
AAD0000
heap
page read and write
63F8000
heap
page read and write
50B9000
heap
page read and write
6642000
heap
page read and write
509D000
heap
page read and write
619E000
heap
page read and write
635B000
heap
page read and write
48F9000
trusted library allocation
page read and write
B143000
heap
page read and write
6589000
heap
page read and write
641A000
heap
page read and write
486D000
trusted library allocation
page read and write
A8D000
heap
page read and write
5F42000
trusted library allocation
page read and write
439B000
heap
page read and write
995E000
trusted library allocation
page read and write
6373000
heap
page read and write
50BC000
heap
page read and write
C294000
heap
page read and write
5D8F000
trusted library allocation
page read and write
5043000
heap
page read and write
4E28000
trusted library allocation
page read and write
5BD0000
trusted library allocation
page read and write
51D6000
heap
page read and write
5EE5000
trusted library allocation
page read and write
5A56000
trusted library allocation
page read and write
636F000
heap
page read and write
6666000
heap
page read and write
604E000
heap
page read and write
A806000
trusted library allocation
page read and write
43FE000
heap
page read and write
59DC000
trusted library allocation
page read and write
62BC000
heap
page read and write
4210000
heap
page read and write
60E4000
heap
page read and write
593F000
trusted library allocation
page read and write
65E0000
heap
page read and write
41B4000
heap
page read and write
A6A6000
trusted library allocation
page read and write
A713000
trusted library allocation
page read and write
4214000
heap
page read and write
998F000
trusted library allocation
page read and write
4890000
trusted library allocation
page read and write
4437000
heap
page read and write
62D8000
heap
page read and write
5CA5000
trusted library allocation
page read and write
5831000
trusted library allocation
page read and write
41A7000
heap
page read and write
43BA000
heap
page read and write
5DBC000
trusted library allocation
page read and write
671E000
heap
page read and write
4407000
heap
page read and write
5F0F000
trusted library allocation
page read and write
43E2000
heap
page read and write
43E2000
heap
page read and write
601B000
heap
page read and write
63F5000
heap
page read and write
416F000
heap
page read and write
4429000
heap
page read and write
5EE7000
trusted library allocation
page read and write
5F6E000
heap
page read and write
5B40000
trusted library allocation
page read and write
659A000
heap
page read and write
5D2A000
trusted library allocation
page read and write
6197000
heap
page read and write
5935000
trusted library allocation
page read and write
43F5000
heap
page read and write
6754000
trusted library allocation
page read and write
511D000
heap
page read and write
60C9000
heap
page read and write
6321000
heap
page read and write
6571000
heap
page read and write
B0D8000
heap
page read and write
AAA5000
heap
page read and write
6367000
heap
page read and write
6272000
heap
page read and write
66B5000
heap
page read and write
5C39000
trusted library allocation
page read and write
59ED000
trusted library allocation
page read and write
5AB7000
trusted library allocation
page read and write
43BA000
heap
page read and write
9979000
trusted library allocation
page read and write
6192000
heap
page read and write
5C86000
trusted library allocation
page read and write
A6C9000
trusted library allocation
page read and write
A89000
heap
page read and write
AADB000
heap
page read and write
6148000
heap
page read and write
6451000
heap
page read and write
5FED000
heap
page read and write
65BF000
heap
page read and write
539A000
trusted library allocation
page read and write
5094000
heap
page read and write
602B000
heap
page read and write
5F62000
heap
page read and write
440F000
heap
page read and write
522A000
heap
page read and write
6074000
heap
page read and write
5FA6000
heap
page read and write
618C000
heap
page read and write
5961000
trusted library allocation
page read and write
638D000
heap
page read and write
5ECD000
trusted library allocation
page read and write
5124000
heap
page read and write
6039000
heap
page read and write
4385000
heap
page read and write
4250000
remote allocation
page read and write
6198000
heap
page read and write
51A5000
heap
page read and write
6095000
heap
page read and write
65B3000
heap
page read and write
6350000
heap
page read and write
A28000
heap
page read and write
53CA000
trusted library allocation
page read and write
6351000
heap
page read and write
60DA000
heap
page read and write
50A3000
heap
page read and write
6257000
heap
page read and write
60A2000
heap
page read and write
5C94000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
595C000
trusted library allocation
page read and write
5099000
heap
page read and write
5202000
heap
page read and write
419B000
heap
page read and write
48FA000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
6221000
heap
page read and write
443A000
heap
page read and write
99AA000
trusted library allocation
page read and write
6709000
heap
page read and write
5F44000
trusted library allocation
page read and write
5BCE000
trusted library allocation
page read and write
5FF5000
heap
page read and write
5097000
heap
page read and write
5FBF000
heap
page read and write
6506000
heap
page read and write
5C07000
trusted library allocation
page read and write
61D1000
heap
page read and write
6148000
heap
page read and write
675C000
trusted library allocation
page read and write
50B8000
heap
page read and write
4E1E000
trusted library allocation
page read and write
5BC8000
trusted library allocation
page read and write
5E16000
trusted library allocation
page read and write
53C6000
trusted library allocation
page read and write
B0FE000
heap
page read and write
50EC000
heap
page read and write
5F71000
heap
page read and write
5F34000
trusted library allocation
page read and write
630A000
heap
page read and write
50BF000
heap
page read and write
51EB000
heap
page read and write
43F2000
heap
page read and write
614D000
heap
page read and write
A818000
heap
page read and write
998D000
trusted library allocation
page read and write
6090000
heap
page read and write
5117000
heap
page read and write
4E19000
trusted library allocation
page read and write
60BC000
heap
page read and write
5D8C000
trusted library allocation
page read and write
60A4000
heap
page read and write
6397000
heap
page read and write
5DCE000
trusted library allocation
page read and write
5C46000
trusted library allocation
page read and write
510F000
heap
page read and write
50D4000
heap
page read and write
B0D6000
heap
page read and write
B13F000
heap
page read and write
622E000
heap
page read and write
67DC000
trusted library allocation
page read and write
9982000
trusted library allocation
page read and write
62A2000
heap
page read and write
6324000
heap
page read and write
53BC000
trusted library allocation
page read and write
592F000
trusted library allocation
page read and write
638D000
heap
page read and write
5FED000
heap
page read and write
4C1D000
heap
page read and write
5C46000
trusted library allocation
page read and write
522D000
heap
page read and write
6582000
heap
page read and write
61CA000
heap
page read and write
61C6000
heap
page read and write
A6A0000
trusted library allocation
page read and write
6264000
heap
page read and write
48B0000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page read and write
50EC000
heap
page read and write
65B9000
heap
page read and write
4E2A000
trusted library allocation
page read and write
503C000
heap
page read and write
6384000
heap
page read and write
610C000
heap
page read and write
50ED000
heap
page read and write
5130000
heap
page read and write
4C19000
heap
page read and write
611D000
heap
page read and write
4F24000
heap
page read and write
60C4000
heap
page read and write
5BF0000
trusted library allocation
page read and write
6034000
heap
page read and write
60C4000
heap
page read and write
51C6000
heap
page read and write
60EC000
heap
page read and write
6144000
heap
page read and write
660E000
heap
page read and write
62D5000
heap
page read and write
60CC000
heap
page read and write
B167000
heap
page read and write
6099000
heap
page read and write
61A9000
heap
page read and write
61D7000
heap
page read and write
5AC4000
trusted library allocation
page read and write
637C000
heap
page read and write
A21000
heap
page read and write
61C5000
heap
page read and write
A6CE000
trusted library allocation
page read and write
5FEA000
heap
page read and write
4F37000
heap
page read and write
659E000
heap
page read and write
53A9000
trusted library allocation
page read and write
60E2000
heap
page read and write
61D4000
heap
page read and write
6127000
heap
page read and write
6345000
heap
page read and write
620C000
heap
page read and write
618C000
heap
page read and write
4896000
trusted library allocation
page read and write
6190000
heap
page read and write
43FE000
heap
page read and write
5AF8000
trusted library allocation
page read and write
443A000
heap
page read and write
5E26000
trusted library allocation
page read and write
6001000
heap
page read and write
6030000
heap
page read and write
43DE000
heap
page read and write
A9B000
heap
page read and write
6150000
heap
page read and write
6369000
heap
page read and write
5178000
heap
page read and write
AB8000
heap
page read and write
51E7000
heap
page read and write
594C000
trusted library allocation
page read and write
67F1000
trusted library allocation
page read and write
510F000
heap
page read and write
5F9C000
heap
page read and write
4E23000
trusted library allocation
page read and write
63EF000
heap
page read and write
60B3000
heap
page read and write
602F000
heap
page read and write
6350000
heap
page read and write
6754000
trusted library allocation
page read and write
A810000
trusted library allocation
page read and write
488E000
trusted library allocation
page read and write
5E75000
trusted library allocation
page read and write
62BF000
heap
page read and write
4286000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
5FFD000
heap
page read and write
99AA000
trusted library allocation
page read and write
5C54000
trusted library allocation
page read and write
4450000
heap
page read and write
5DE3000
trusted library allocation
page read and write
A71C000
trusted library allocation
page read and write
61BB000
heap
page read and write
6395000
heap
page read and write
5D10000
trusted library allocation
page read and write
5512000
trusted library allocation
page read and write
4C19000
heap
page read and write
602B000
heap
page read and write
5547000
trusted library allocation
page read and write
5957000
trusted library allocation
page read and write
422B000
heap
page read and write
61C1000
heap
page read and write
B2DD000
heap
page read and write
4E2F000
trusted library allocation
page read and write
65C5000
heap
page read and write
6355000
heap
page read and write
61D1000
heap
page read and write
667E000
heap
page read and write
6270000
heap
page read and write
61D1000
heap
page read and write
A681000
trusted library allocation
page execute
5C50000
trusted library allocation
page read and write
601E000
heap
page read and write
5F7B000
heap
page read and write
5EDF000
trusted library allocation
page read and write
446D000
heap
page read and write
67C8000
trusted library allocation
page read and write
6702000
heap
page read and write
60D2000
heap
page read and write
6507000
heap
page read and write
A6B7000
trusted library allocation
page read and write
5B48000
trusted library allocation
page read and write
51F5000
heap
page read and write
A971000
heap
page read and write
6064000
heap
page read and write
51F2000
heap
page read and write
5D80000
trusted library allocation
page read and write
C1B7000
heap
page read and write
48F7000
trusted library allocation
page read and write
5DC1000
trusted library allocation
page read and write
A7FE000
trusted library allocation
page read and write
59ED000
trusted library allocation
page read and write
4F2A000
heap
page read and write
6124000
heap
page read and write
5E9C000
trusted library allocation
page read and write
6029000
heap
page read and write
5089000
heap
page read and write
61AF000
heap
page read and write
5C55000
trusted library allocation
page read and write
51ED000
heap
page read and write
998F000
trusted library allocation
page read and write
5094000
heap
page read and write
617E000
heap
page read and write
5AE5000
trusted library allocation
page read and write
4284000
trusted library allocation
page read and write
601E000
heap
page read and write
5127000
heap
page read and write
5DFC000
trusted library allocation
page read and write
6092000
heap
page read and write
9982000
trusted library allocation
page read and write
A70F000
trusted library allocation
page read and write
6245000
heap
page read and write
5201000
heap
page read and write
50AE000
heap
page read and write
539A000
trusted library allocation
page read and write
64E8000
heap
page read and write
A95C000
heap
page read and write
5944000
trusted library allocation
page read and write
59A0000
trusted library allocation
page read and write
5FDB000
heap
page read and write
6210000
heap
page read and write
66A2000
heap
page read and write
6079000
heap
page read and write
6621000
heap
page read and write
50CE000
heap
page read and write
4C1D000
heap
page read and write
5EE3000
trusted library allocation
page read and write
A70C000
trusted library allocation
page read and write
9980000
trusted library allocation
page read and write
4455000
heap
page read and write
5FC7000
heap
page read and write
510A000
heap
page read and write
A683000
trusted library allocation
page execute
5FAE000
heap
page read and write
AB8000
heap
page read and write
6389000
heap
page read and write
60E8000
heap
page read and write
A82B000
trusted library allocation
page read and write
6080000
heap
page read and write
5F38000
trusted library allocation
page read and write
606F000
heap
page read and write
65F0000
heap
page read and write
5D7C000
trusted library allocation
page read and write
4413000
heap
page read and write
66FD000
heap
page read and write
5AB8000
trusted library allocation
page read and write
4C0E000
heap
page read and write
51C2000
heap
page read and write
A87000
heap
page read and write
B0F3000
heap
page read and write
5B7A000
trusted library allocation
page read and write
5DBF000
trusted library allocation
page read and write
4455000
heap
page read and write
67E8000
trusted library allocation
page read and write
594F000
trusted library allocation
page read and write
5FD9000
heap
page read and write
AAFD000
heap
page read and write
41B4000
heap
page read and write
6129000
heap
page read and write
4EF8000
heap
page read and write
62BF000
heap
page read and write
43E2000
heap
page read and write
6074000
heap
page read and write
5CEF000
trusted library allocation
page read and write
5FBD000
heap
page read and write
447E000
heap
page read and write
65C3000
heap
page read and write
67EC000
trusted library allocation
page read and write
AAB5000
heap
page read and write
996F000
trusted library allocation
page read and write
5F8A000
heap
page read and write
6656000
heap
page read and write
5AC6000
trusted library allocation
page read and write
5C42000
trusted library allocation
page read and write
51EF000
heap
page read and write
59A7000
trusted library allocation
page read and write
5DC1000
trusted library allocation
page read and write
4890000
trusted library allocation
page read and write
5FBF000
heap
page read and write
41B2000
heap
page read and write
6025000
heap
page read and write
6084000
heap
page read and write
5AE0000
trusted library allocation
page read and write
6114000
heap
page read and write
5FEC000
heap
page read and write
51C2000
heap
page read and write
50D2000
heap
page read and write
5ED6000
trusted library allocation
page read and write
6613000
heap
page read and write
6035000
heap
page read and write
A808000
trusted library allocation
page read and write
642F000
heap
page read and write
5DBD000
trusted library allocation
page read and write
B1B4000
heap
page read and write
62BC000
heap
page read and write
AAF9000
heap
page read and write
60AD000
heap
page read and write
5D9E000
trusted library allocation
page read and write
B130000
heap
page read and write
99CC000
trusted library allocation
page read and write
61C0000
heap
page read and write
43EF000
heap
page read and write
6025000
heap
page read and write
51D5000
heap
page read and write
60AA000
heap
page read and write
65E6000
heap
page read and write
6297000
heap
page read and write
598D000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
5961000
trusted library allocation
page read and write
6037000
heap
page read and write
5C15000
trusted library allocation
page read and write
65C5000
heap
page read and write
6095000
heap
page read and write
4D78000
trusted library allocation
page read and write
6702000
heap
page read and write
512E000
heap
page read and write
5ED4000
trusted library allocation
page read and write
6112000
heap
page read and write
4890000
trusted library allocation
page read and write
A705000
trusted library allocation
page read and write
6717000
heap
page read and write
5C41000
trusted library allocation
page read and write
5F36000
trusted library allocation
page read and write
5215000
heap
page read and write
512E000
heap
page read and write
66E1000
heap
page read and write
637E000
heap
page read and write
6220000
heap
page read and write
60F3000
heap
page read and write
5ADE000
trusted library allocation
page read and write
4D79000
trusted library allocation
page read and write
51F5000
heap
page read and write
486E000
trusted library allocation
page read and write
6107000
heap
page read and write
5E61000
trusted library allocation
page read and write
5FD5000
heap
page read and write
6106000
heap
page read and write
60CC000
heap
page read and write
53A7000
trusted library allocation
page read and write
5FE7000
heap
page read and write
5D03000
trusted library allocation
page read and write
67C8000
trusted library allocation
page read and write
5F63000
heap
page read and write
6808000
trusted library allocation
page read and write
665E000
heap
page read and write
53C3000
trusted library allocation
page read and write
633C000
heap
page read and write
6389000
heap
page read and write
4D6F000
trusted library allocation
page read and write
443C000
heap
page read and write
51C0000
heap
page read and write
48D0000
trusted library allocation
page read and write
59E7000
trusted library allocation
page read and write
635B000
heap
page read and write
43DE000
heap
page read and write
AAC4000
heap
page read and write
669C000
heap
page read and write
B12E000
heap
page read and write
67E0000
trusted library allocation
page read and write
6162000
heap
page read and write
6064000
heap
page read and write
5C3C000
trusted library allocation
page read and write
672B000
heap
page read and write
5826000
trusted library allocation
page read and write
50BA000
heap
page read and write
5F4A000
trusted library allocation
page read and write
5534000
trusted library allocation
page read and write
A703000
trusted library allocation
page read and write
5F4D000
trusted library allocation
page read and write
53AD000
trusted library allocation
page read and write
6754000
trusted library allocation
page read and write
A6C2000
trusted library allocation
page read and write
5F39000
trusted library allocation
page read and write
67BA000
trusted library allocation
page read and write
53B7000
trusted library allocation
page read and write
636D000
heap
page read and write
A6DD000
trusted library allocation
page read and write
9A06000
trusted library allocation
page read and write
60C6000
heap
page read and write
5222000
heap
page read and write
510A000
heap
page read and write
A2B000
heap
page read and write
51E3000
heap
page read and write
6119000
heap
page read and write
9986000
trusted library allocation
page read and write
5F74000
heap
page read and write
4458000
heap
page read and write
512C000
heap
page read and write
41B2000
heap
page read and write
61AF000
heap
page read and write
A6AE000
trusted library allocation
page read and write
5F62000
heap
page read and write
60CA000
heap
page read and write
5DCE000
trusted library allocation
page read and write
59FA000
trusted library allocation
page read and write
60D8000
heap
page read and write
A99B000
heap
page read and write
43ED000
heap
page read and write
51D6000
heap
page read and write
644D000
heap
page read and write
5F1E000
trusted library allocation
page read and write
635B000
heap
page read and write
5AEB000
trusted library allocation
page read and write
6199000
heap
page read and write
21C000
unkown
page readonly
43E7000
heap
page read and write
ACCC000
trusted library allocation
page read and write
518F000
heap
page read and write
624E000
heap
page read and write
998D000
trusted library allocation
page read and write
6162000
heap
page read and write
5D7A000
trusted library allocation
page read and write
6357000
heap
page read and write
60C4000
heap
page read and write
5EF3000
trusted library allocation
page read and write
41F5000
heap
page read and write
5FB5000
heap
page read and write
6150000
heap
page read and write
5987000
trusted library allocation
page read and write
43E0000
heap
page read and write
5102000
heap
page read and write
5063000
heap
page read and write
4D7D000
trusted library allocation
page read and write
53C3000
trusted library allocation
page read and write
4C04000
heap
page read and write
665E000
heap
page read and write
61DC000
heap
page read and write
5E67000
trusted library allocation
page read and write
602C000
heap
page read and write
4F37000
heap
page read and write
5B2E000
trusted library allocation
page read and write
5D1D000
trusted library allocation
page read and write
616B000
heap
page read and write
AAC4000
heap
page read and write
609A000
heap
page read and write
5EE5000
trusted library allocation
page read and write
6357000
heap
page read and write
6084000
heap
page read and write
616A000
heap
page read and write
5EFC000
trusted library allocation
page read and write
6074000
heap
page read and write
51BF000
heap
page read and write
5EC7000
trusted library allocation
page read and write
5F2E000
trusted library allocation
page read and write
606F000
heap
page read and write
520D000
heap
page read and write
6386000
heap
page read and write
6190000
heap
page read and write
66B5000
heap
page read and write
4286000
trusted library allocation
page read and write
516A000
heap
page read and write
6211000
heap
page read and write
4455000
heap
page read and write
51AC000
heap
page read and write
A721000
trusted library allocation
page execute
50BF000
heap
page read and write
5FFF000
heap
page read and write
43FC000
heap
page read and write
633B000
heap
page read and write
61CF000
heap
page read and write
519B000
heap
page read and write
6072000
heap
page read and write
998D000
trusted library allocation
page read and write
635D000
heap
page read and write
51C0000
heap
page read and write
60F3000
heap
page read and write
6614000
heap
page read and write
5A65000
trusted library allocation
page read and write
A3F000
heap
page read and write
65EF000
heap
page read and write
5F7B000
heap
page read and write
5FB1000
heap
page read and write
5002000
heap
page read and write
674B000
heap
page read and write
50EA000
heap
page read and write
6165000
heap
page read and write
53B9000
trusted library allocation
page read and write
615E000
heap
page read and write
6042000
heap
page read and write
5EE3000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
621C000
heap
page read and write
51DE000
heap
page read and write
6389000
heap
page read and write
6196000
heap
page read and write
5FF5000
heap
page read and write
6084000
heap
page read and write
59C3000
trusted library allocation
page execute
50D0000
heap
page read and write
A641000
trusted library allocation
page read and write
5E95000
trusted library allocation
page read and write
5F8A000
heap
page read and write
5EE0000
trusted library allocation
page read and write
6207000
heap
page read and write
6798000
trusted library allocation
page read and write
5B72000
trusted library allocation
page read and write
4288000
trusted library allocation
page read and write
5FB4000
heap
page read and write
5C51000
trusted library allocation
page read and write
6722000
heap
page read and write
520C000
heap
page read and write
51EB000
heap
page read and write
48D3000
trusted library allocation
page read and write
60B5000
heap
page read and write
B157000
heap
page read and write
60C6000
heap
page read and write
AE94000
trusted library allocation
page read and write
6090000
heap
page read and write
5AD0000
trusted library allocation
page read and write
441C000
heap
page read and write
6281000
heap
page read and write
661F000
heap
page read and write
51F9000
heap
page read and write
674B000
heap
page read and write
AE86000
trusted library allocation
page read and write
6204000
heap
page read and write
5DB2000
trusted library allocation
page read and write
66DC000
heap
page read and write
6704000
heap
page read and write
60E6000
heap
page read and write
59EB000
trusted library allocation
page read and write
43EB000
heap
page read and write
AAB0000
heap
page read and write
5AE0000
trusted library allocation
page read and write
43CA000
heap
page read and write
997A000
trusted library allocation
page read and write
43FA000
heap
page read and write
6064000
heap
page read and write
48BE000
trusted library allocation
page read and write
620C000
heap
page read and write
60DA000
heap
page read and write
5FEC000
heap
page read and write
66DF000
heap
page read and write
6290000
heap
page read and write
65CE000
heap
page read and write
41B4000
heap
page read and write
65AB000
heap
page read and write
66CB000
heap
page read and write
62A7000
heap
page read and write
67F6000
trusted library allocation
page read and write
62BF000
heap
page read and write
633B000
heap
page read and write
5B22000
trusted library allocation
page read and write
440B000
heap
page read and write
5F3C000
trusted library allocation
page read and write
5F31000
trusted library allocation
page read and write
539D000
trusted library allocation
page read and write
B163000
heap
page read and write
9A0A000
trusted library allocation
page read and write
9970000
trusted library allocation
page read and write
9952000
trusted library allocation
page read and write
B1CE000
heap
page read and write
5F74000
heap
page read and write
99AC000
trusted library allocation
page read and write
AA9000
heap
page read and write
9970000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
A724000
trusted library allocation
page execute
66B4000
heap
page read and write
6192000
heap
page read and write
A6B7000
trusted library allocation
page read and write
5947000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
633F000
heap
page read and write
5EAC000
trusted library allocation
page read and write
5FC7000
heap
page read and write
660B000
heap
page read and write
522D000
heap
page read and write
5BF5000
trusted library allocation
page read and write
6728000
heap
page read and write
58FC000
trusted library allocation
page read and write
6350000
heap
page read and write
5C44000
trusted library allocation
page read and write
5B3B000
trusted library allocation
page read and write
6183000
heap
page read and write
99B4000
trusted library allocation
page read and write
62EE000
heap
page read and write
ADA3000
heap
page read and write
66B7000
heap
page read and write
6185000
heap
page read and write
A7CF000
heap
page read and write
61CF000
heap
page read and write
A986000
heap
page read and write
62D8000
heap
page read and write
6085000
heap
page read and write
5FC7000
heap
page read and write
5D23000
trusted library allocation
page read and write
512D000
heap
page read and write
67D6000
trusted library allocation
page read and write
592C000
trusted library allocation
page read and write
50F1000
heap
page read and write
4404000
heap
page read and write
5DC0000
trusted library allocation
page read and write
B123000
heap
page read and write
ABE000
heap
page read and write
5F0B000
trusted library allocation
page read and write
5C90000
trusted library allocation
page read and write
60E4000
heap
page read and write
51D8000
heap
page read and write
6129000
heap
page read and write
A9B000
heap
page read and write
5F0E000
trusted library allocation
page read and write
AAD0000
heap
page read and write
B130000
heap
page read and write
5EF3000
trusted library allocation
page read and write
A6B1000
trusted library allocation
page read and write
4437000
heap
page read and write
43B1000
heap
page read and write
5EC8000
trusted library allocation
page read and write
61C2000
heap
page read and write
610A000
heap
page read and write
5FA6000
heap
page read and write
A7CC000
heap
page read and write
99AE000
trusted library allocation
page read and write
51EF000
heap
page read and write
AAD0000
heap
page read and write
99DD000
trusted library allocation
page read and write
A9B000
heap
page read and write
5C46000
trusted library allocation
page read and write
446A000
heap
page read and write
626E000
heap
page read and write
5C41000
trusted library allocation
page read and write
67DE000
trusted library allocation
page read and write
5202000
heap
page read and write
61F2000
heap
page read and write
610C000
heap
page read and write
43F3000
heap
page read and write
51C6000
heap
page read and write
5FC7000
heap
page read and write
6099000
heap
page read and write
5D4B000
trusted library allocation
page read and write
5C68000
trusted library allocation
page read and write
5150000
heap
page read and write
51AC000
heap
page read and write
611B000
heap
page read and write
599E000
trusted library allocation
page read and write
5942000
trusted library allocation
page read and write
51ED000
heap
page read and write
61D1000
heap
page read and write
4F02000
heap
page read and write
5FF5000
heap
page read and write
67C8000
trusted library allocation
page read and write
4894000
trusted library allocation
page read and write
A97000
heap
page read and write
50FC000
heap
page read and write
996F000
trusted library allocation
page read and write
5AE5000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
6353000
heap
page read and write
6156000
heap
page read and write
625E000
heap
page read and write
6029000
heap
page read and write
43BD000
heap
page read and write
99BD000
trusted library allocation
page read and write
60BA000
heap
page read and write
599C000
trusted library allocation
page read and write
6302000
heap
page read and write
486D000
trusted library allocation
page read and write
5F79000
heap
page read and write
444D000
heap
page read and write
66B7000
heap
page read and write
602B000
heap
page read and write
60A3000
heap
page read and write
4BFD000
heap
page read and write
43CF000
heap
page read and write
61C4000
heap
page read and write
53BC000
trusted library allocation
page read and write
5ADA000
trusted library allocation
page read and write
61A4000
heap
page read and write
5BC3000
trusted library allocation
page read and write
5201000
heap
page read and write
60F3000
heap
page read and write
622D000
heap
page read and write
639C000
heap
page read and write
5B8F000
trusted library allocation
page read and write
4E2A000
trusted library allocation
page read and write
62AC000
heap
page read and write
5831000
trusted library allocation
page read and write
6087000
heap
page read and write
5F9C000
heap
page read and write
995C000
trusted library allocation
page read and write
5F47000
trusted library allocation
page read and write
6295000
heap
page read and write
6395000
heap
page read and write
6144000
heap
page read and write
64FA000
heap
page read and write
60CF000
heap
page read and write
48BA000
trusted library allocation
page read and write
5AB2000
trusted library allocation
page read and write
5AB8000
trusted library allocation
page read and write
41B2000
heap
page read and write
60F3000
heap
page read and write
4877000
trusted library allocation
page read and write
60B3000
heap
page read and write
54D5000
trusted library allocation
page read and write
43B1000
heap
page read and write
660E000
heap
page read and write
4413000
heap
page read and write
5184000
heap
page read and write
60EF000
heap
page read and write
633B000
heap
page read and write
61BA000
heap
page read and write
6001000
heap
page read and write
50AF000
heap
page read and write
5FC7000
heap
page read and write
5FAA000
heap
page read and write
6148000
heap
page read and write
5995000
trusted library allocation
page read and write
AF28000
heap
page read and write
A3C000
heap
page read and write
43DC000
heap
page read and write
5CE8000
trusted library allocation
page read and write
5C50000
trusted library allocation
page read and write
6382000
heap
page read and write
6096000
heap
page read and write
4448000
heap
page read and write
60A3000
heap
page read and write
66F0000
heap
page read and write
5C83000
trusted library allocation
page read and write
4464000
heap
page read and write
43EB000
heap
page read and write
5FFD000
heap
page read and write
AB8000
heap
page read and write
A705000
trusted library allocation
page read and write
637A000
heap
page read and write
A6DD000
trusted library allocation
page read and write
A719000
trusted library allocation
page read and write
5B58000
trusted library allocation
page read and write
42B1000
trusted library allocation
page read and write
6018000
heap
page read and write
996C000
trusted library allocation
page read and write
5991000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
620D000
heap
page read and write
5B24000
trusted library allocation
page read and write
639A000
heap
page read and write
5094000
heap
page read and write
50CD000
heap
page read and write
598B000
trusted library allocation
page read and write
5F7C000
heap
page read and write
99C5000
trusted library allocation
page read and write
6391000
heap
page read and write
6653000
heap
page read and write
637C000
heap
page read and write
635C000
heap
page read and write
6228000
heap
page read and write
4D6D000
trusted library allocation
page read and write
6331000
heap
page read and write
161000
unkown
page execute read
6251000
heap
page read and write
5FC7000
heap
page read and write
66AF000
heap
page read and write
53AE000
trusted library allocation
page read and write
6025000
heap
page read and write
D3C000
heap
page read and write
422B000
heap
page read and write
B241000
heap
page read and write
43EB000
heap
page read and write
5DD4000
trusted library allocation
page read and write
4182000
heap
page read and write
6000000
heap
page read and write
607C000
heap
page read and write
51C0000
heap
page read and write
66FE000
heap
page read and write
60EE000
heap
page read and write
51C0000
heap
page read and write
5115000
heap
page read and write
441A000
heap
page read and write
60B3000
heap
page read and write
5CDD000
trusted library allocation
page read and write
4411000
heap
page read and write
5002000
heap
page read and write
60A1000
heap
page read and write
4468000
heap
page read and write
AAB8000
heap
page read and write
444F000
heap
page read and write
996F000
trusted library allocation
page read and write
6064000
heap
page read and write
610B000
heap
page read and write
61D2000
heap
page read and write
5E39000
trusted library allocation
page read and write
5F85000
heap
page read and write
A3A000
heap
page read and write
65DF000
heap
page read and write
67F8000
trusted library allocation
page read and write
60C5000
heap
page read and write
6203000
heap
page read and write
51C6000
heap
page read and write
6322000
heap
page read and write
61A2000
heap
page read and write
AAB8000
heap
page read and write
AAAC000
heap
page read and write
A725000
trusted library allocation
page execute
6040000
heap
page read and write
4429000
heap
page read and write
9982000
trusted library allocation
page read and write
6009000
heap
page read and write
665E000
heap
page read and write
5F6D000
heap
page read and write
A4C000
heap
page read and write
520C000
heap
page read and write
5104000
heap
page read and write
4882000
trusted library allocation
page read and write
62C7000
heap
page read and write
5EBE000
trusted library allocation
page read and write
6156000
heap
page read and write
4605000
heap
page read and write
4D65000
trusted library allocation
page read and write
618C000
heap
page read and write
4422000
heap
page read and write
5E65000
trusted library allocation
page read and write
41D9000
heap
page read and write
AE80000
trusted library allocation
page read and write
5831000
trusted library allocation
page read and write
6183000
heap
page read and write
5997000
trusted library allocation
page read and write
5E03000
trusted library allocation
page read and write
5DC2000
trusted library allocation
page read and write
4385000
heap
page read and write
B0FF000
heap
page read and write
5C10000
trusted library allocation
page read and write
60E5000
heap
page read and write
63F6000
heap
page read and write
6297000
heap
page read and write
63E9000
heap
page read and write
58EF000
trusted library allocation
page read and write
60E2000
heap
page read and write
5936000
trusted library allocation
page read and write
51CE000
heap
page read and write
5075000
heap
page read and write
5F6D000
heap
page read and write
6384000
heap
page read and write
5BB9000
trusted library allocation
page read and write
60AF000
heap
page read and write
440B000
heap
page read and write
5F76000
heap
page read and write
676A000
trusted library allocation
page read and write
5195000
heap
page read and write
67B0000
trusted library allocation
page read and write
626E000
heap
page read and write
4F06000
heap
page read and write
53CE000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
5F49000
trusted library allocation
page read and write
6228000
heap
page read and write
51AC000
heap
page read and write
A80C000
trusted library allocation
page read and write
5961000
trusted library allocation
page read and write
672B000
heap
page read and write
6192000
heap
page read and write
A70F000
trusted library allocation
page read and write
53A1000
trusted library allocation
page read and write
415B000
heap
page read and write
671E000
heap
page read and write
637E000
heap
page read and write
A6C0000
trusted library allocation
page read and write
43E7000
heap
page read and write
51C4000
heap
page read and write
6264000
heap
page read and write
A6E000
heap
page read and write
60F3000
heap
page read and write
43BB000
heap
page read and write
6569000
heap
page read and write
51A6000
heap
page read and write
B0E2000
heap
page read and write
612D000
heap
page read and write
41C3000
heap
page read and write
5E4A000
trusted library allocation
page read and write
6725000
heap
page read and write
61F0000
heap
page read and write
6565000
heap
page read and write
A82E000
trusted library allocation
page read and write
5997000
trusted library allocation
page read and write
6124000
heap
page read and write
5A50000
trusted library allocation
page read and write
A97000
heap
page read and write
A88A000
heap
page read and write
6156000
heap
page read and write
4D77000
trusted library allocation
page read and write
61A8000
heap
page read and write
5CE3000
trusted library allocation
page read and write
66FD000
heap
page read and write
60B7000
heap
page read and write
61B8000
heap
page read and write
62BF000
heap
page read and write
61AF000
heap
page read and write
5E96000
trusted library allocation
page read and write
5831000
trusted library allocation
page read and write
6349000
heap
page read and write
6122000
heap
page read and write
4154000
heap
page read and write
617E000
heap
page read and write
4392000
heap
page read and write
614C000
heap
page read and write
53A0000
trusted library allocation
page read and write
4455000
heap
page read and write
64E9000
heap
page read and write
9A26000
trusted library allocation
page read and write
50CE000
heap
page read and write
6604000
heap
page read and write
590B000
trusted library allocation
page read and write
A708000
trusted library allocation
page read and write
6341000
heap
page read and write
AA2000
heap
page read and write
67B6000
trusted library allocation
page read and write
9978000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
5F53000
heap
page read and write
5F7B000
heap
page read and write
5DCB000
trusted library allocation
page read and write
5F85000
heap
page read and write
67BB000
trusted library allocation
page read and write
607B000
heap
page read and write
4450000
heap
page read and write
4399000
heap
page read and write
A726000
trusted library allocation
page execute
5FC7000
heap
page read and write
53C3000
trusted library allocation
page read and write
5CDE000
trusted library allocation
page read and write
6347000
heap
page read and write
43C7000
heap
page read and write
5E07000
trusted library allocation
page read and write
5E9A000
trusted library allocation
page read and write
4D7A000
trusted library allocation
page read and write
5FB9000
heap
page read and write
48D0000
trusted library allocation
page read and write
6000000
heap
page read and write
5BEA000
trusted library allocation
page read and write
41F5000
heap
page read and write
604C000
heap
page read and write
9A16000
trusted library allocation
page read and write
A6A8000
trusted library allocation
page read and write
58C2000
trusted library allocation
page read and write
9987000
trusted library allocation
page read and write
99C9000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
41B2000
heap
page read and write
51F9000
heap
page read and write
63A2000
heap
page read and write
6099000
heap
page read and write
53CD000
trusted library allocation
page read and write
53B7000
trusted library allocation
page read and write
50D8000
heap
page read and write
99CB000
trusted library allocation
page read and write
6353000
heap
page read and write
53CA000
trusted library allocation
page read and write
443C000
heap
page read and write
6104000
heap
page read and write
65BE000
heap
page read and write
67BE000
trusted library allocation
page read and write
5FD2000
heap
page read and write
6332000
heap
page read and write
C064000
heap
page read and write
5CD5000
trusted library allocation
page read and write
6318000
heap
page read and write
4BF6000
heap
page read and write
99BD000
trusted library allocation
page read and write
59EC000
trusted library allocation
page read and write
6190000
heap
page read and write
41CD000
heap
page read and write
43D4000
heap
page read and write
60E2000
heap
page read and write
4F22000
heap
page read and write
995E000
trusted library allocation
page read and write
6128000
heap
page read and write
634C000
heap
page read and write
5A56000
trusted library allocation
page read and write
627A000
heap
page read and write
5AE5000
trusted library allocation
page read and write
522E000
heap
page read and write
6144000
heap
page read and write
65DD000
heap
page read and write
637A000
heap
page read and write
4433000
heap
page read and write
99E7000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
5EFA000
trusted library allocation
page read and write
422B000
heap
page read and write
9A04000
trusted library allocation
page read and write
50FC000
heap
page read and write
41FD000
heap
page read and write
5FEC000
heap
page read and write
614C000
heap
page read and write
61A3000
heap
page read and write
599D000
trusted library allocation
page read and write
5133000
heap
page read and write
5E3D000
trusted library allocation
page read and write
A829000
trusted library allocation
page read and write
A932000
heap
page read and write
5B0F000
trusted library allocation
page read and write
51CE000
heap
page read and write
A6C000
heap
page read and write
A6C7000
trusted library allocation
page read and write
5F6B000
heap
page read and write
601D000
heap
page read and write
5FB8000
heap
page read and write
A722000
trusted library allocation
page execute
60BF000
heap
page read and write
AAD0000
heap
page read and write
59A0000
trusted library allocation
page read and write
4402000
heap
page read and write
441A000
heap
page read and write
5CBB000
trusted library allocation
page read and write
621C000
heap
page read and write
4E15000
trusted library allocation
page read and write
6758000
trusted library allocation
page read and write
997D000
trusted library allocation
page read and write
6624000
heap
page read and write
5F65000
heap
page read and write
67EB000
trusted library allocation
page read and write
6236000
heap
page read and write
53CC000
trusted library allocation
page read and write
50FC000
heap
page read and write
442D000
heap
page read and write
5077000
heap
page read and write
5FCF000
heap
page read and write
62D8000
heap
page read and write
650D000
heap
page read and write
58EF000
trusted library allocation
page read and write
99B0000
trusted library allocation
page read and write
633B000
heap
page read and write
636D000
heap
page read and write
60F3000
heap
page read and write
6076000
heap
page read and write
5090000
heap
page read and write
51C0000
heap
page read and write
67D9000
trusted library allocation
page read and write
6301000
heap
page read and write
66F8000
heap
page read and write
626D000
heap
page read and write
6043000
heap
page read and write
5E56000
trusted library allocation
page read and write
61D1000
heap
page read and write
5077000
heap
page read and write
60C8000
heap
page read and write
60AF000
heap
page read and write
5950000
trusted library allocation
page read and write
A646000
trusted library allocation
page read and write
6016000
heap
page read and write
6099000
heap
page read and write
63A0000
heap
page read and write
5A50000
trusted library allocation
page read and write
621C000
heap
page read and write
628C000
heap
page read and write
4BF3000
heap
page read and write
59AF000
trusted library allocation
page read and write
5941000
trusted library allocation
page read and write
51AC000
heap
page read and write
58EE000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page read and write
4288000
trusted library allocation
page read and write
61A6000
heap
page read and write
5C37000
trusted library allocation
page read and write
6106000
heap
page read and write
B1F0000
heap
page read and write
6103000
heap
page read and write
99BF000
trusted library allocation
page read and write
4418000
heap
page read and write
4F13000
heap
page read and write
AE88000
trusted library allocation
page read and write
50C8000
heap
page read and write
633B000
heap
page read and write
5B70000
trusted library allocation
page read and write
6846000
trusted library allocation
page read and write
66A3000
heap
page read and write
B1E3000
heap
page read and write
601B000
heap
page read and write
5B80000
trusted library allocation
page read and write
6181000
heap
page read and write
5921000
trusted library allocation
page read and write
51C9000
heap
page read and write
619E000
heap
page read and write
4F0A000
heap
page read and write
4F0A000
heap
page read and write
643C000
heap
page read and write
626C000
heap
page read and write
626F000
heap
page read and write
5ED6000
trusted library allocation
page read and write
50F0000
heap
page read and write
AADA000
heap
page read and write
99D3000
trusted library allocation
page execute
6064000
heap
page read and write
5F88000
heap
page read and write
54C0000
trusted library allocation
page read and write
6420000
heap
page read and write
60C4000
heap
page read and write
624F000
heap
page read and write
617A000
heap
page read and write
C29A000
heap
page read and write
6643000
heap
page read and write
65E2000
heap
page read and write
59E5000
trusted library allocation
page read and write
5F74000
heap
page read and write
50ED000
heap
page read and write
5EB0000
trusted library allocation
page read and write
6353000
heap
page read and write
5F6A000
heap
page read and write
59AF000
trusted library allocation
page read and write
60C6000
heap
page read and write
510E000
heap
page read and write
4F11000
heap
page read and write
5FA8000
heap
page read and write
5F6E000
heap
page read and write
4287000
trusted library allocation
page read and write
A6E000
heap
page read and write
5ED9000
trusted library allocation
page read and write
51D1000
heap
page read and write
5B35000
trusted library allocation
page read and write
59ED000
trusted library allocation
page read and write
51F7000
heap
page read and write
43F3000
heap
page read and write
615E000
heap
page read and write
43F3000
heap
page read and write
608E000
heap
page read and write
51FF000
heap
page read and write
51F4000
heap
page read and write
6080000
heap
page read and write
65AC000
heap
page read and write
444F000
heap
page read and write
684C000
trusted library allocation
page read and write
4391000
heap
page read and write
672B000
heap
page read and write
50B3000
heap
page read and write
5FBE000
heap
page read and write
6141000
heap
page read and write
67D0000
trusted library allocation
page read and write
99C3000
trusted library allocation
page read and write
620C000
heap
page read and write
5FC1000
heap
page read and write
59C1000
trusted library allocation
page execute
51B7000
heap
page read and write
B0DB000
heap
page read and write
5D8A000
trusted library allocation
page read and write
50D7000
heap
page read and write
5CDF000
trusted library allocation
page read and write
50EA000
heap
page read and write
53C5000
trusted library allocation
page read and write
62C7000
heap
page read and write
6702000
heap
page read and write
6212000
heap
page read and write
4F02000
heap
page read and write
4413000
heap
page read and write
6297000
heap
page read and write
4881000
trusted library allocation
page read and write
5FE7000
heap
page read and write
54A5000
heap
page read and write
5021000
heap
page read and write
5DB9000
trusted library allocation
page read and write
50F6000
heap
page read and write
53C8000
trusted library allocation
page read and write
6257000
heap
page read and write
5135000
heap
page read and write
A7FD000
trusted library allocation
page read and write
6382000
heap
page read and write
5F73000
heap
page read and write
6190000
heap
page read and write
51C2000
heap
page read and write
5184000
heap
page read and write
67B6000
trusted library allocation
page read and write
50EA000
heap
page read and write
5E0F000
trusted library allocation
page read and write
A711000
trusted library allocation
page read and write
6342000
heap
page read and write
B11B000
heap
page read and write
5090000
heap
page read and write
5948000
trusted library allocation
page read and write
5986000
trusted library allocation
page read and write
6064000
heap
page read and write
67C4000
trusted library allocation
page read and write
A726000
trusted library allocation
page execute
632E000
heap
page read and write
58D4000
trusted library allocation
page read and write
59CB000
trusted library allocation
page read and write
58D8000
trusted library allocation
page read and write
5831000
trusted library allocation
page read and write
67C5000
trusted library allocation
page read and write
5090000
heap
page read and write
53BD000
trusted library allocation
page read and write
61AF000
heap
page read and write
50F0000
heap
page read and write
422B000
heap
page read and write
5998000
trusted library allocation
page read and write
5FC7000
heap
page read and write
674B000
heap
page read and write
632C000
heap
page read and write
6208000
heap
page read and write
B229000
heap
page read and write
67CE000
trusted library allocation
page read and write
6112000
heap
page read and write
6373000
heap
page read and write
5986000
trusted library allocation
page read and write
422B000
heap
page read and write
635B000
heap
page read and write
AB8000
heap
page read and write
B0F7000
heap
page read and write
604E000
heap
page read and write
48D8000
trusted library allocation
page read and write
60C8000
heap
page read and write
A6A7000
trusted library allocation
page read and write
41D0000
heap
page read and write
5FB9000
heap
page read and write
635C000
heap
page read and write
60E4000
heap
page read and write
5F8E000
heap
page read and write
60F9000
heap
page read and write
62CF000
heap
page read and write
6064000
heap
page read and write
5AD3000
trusted library allocation
page read and write
9968000
trusted library allocation
page read and write
5F2E000
trusted library allocation
page read and write
663E000
heap
page read and write
674B000
heap
page read and write
4396000
heap
page read and write
522C000
heap
page read and write
6583000
heap
page read and write
5ACE000
trusted library allocation
page read and write
4458000
heap
page read and write
5B95000
trusted library allocation
page read and write
AAFD000
heap
page read and write
4B29000
heap
page read and write
5123000
heap
page read and write
520F000
heap
page read and write
43DE000
heap
page read and write
6333000
heap
page read and write
6099000
heap
page read and write
50C4000
heap
page read and write
5FDD000
heap
page read and write
5F44000
trusted library allocation
page read and write
60EA000
heap
page read and write
4203000
heap
page read and write
53AA000
trusted library allocation
page read and write
5ED3000
trusted library allocation
page read and write
5AC4000
trusted library allocation
page read and write
616A000
heap
page read and write
6245000
heap
page read and write
6152000
heap
page read and write
61C9000
heap
page read and write
5DF7000
trusted library allocation
page read and write
A724000
trusted library allocation
page execute
B126000
heap
page read and write
4407000
heap
page read and write
440D000
heap
page read and write
62C7000
heap
page read and write
B133000
heap
page read and write
6018000
heap
page read and write
A95000
heap
page read and write
5FB9000
heap
page read and write
6314000
heap
page read and write
5BED000
trusted library allocation
page read and write
636F000
heap
page read and write
4890000
trusted library allocation
page read and write
4466000
heap
page read and write
9959000
trusted library allocation
page read and write
4C1E000
heap
page read and write
598C000
trusted library allocation
page read and write
511B000
heap
page read and write
A6E000
heap
page read and write
5FC4000
heap
page read and write
4451000
heap
page read and write
6128000
heap
page read and write
65DF000
heap
page read and write
53AA000
trusted library allocation
page read and write
5F4D000
trusted library allocation
page read and write
5ECB000
trusted library allocation
page read and write
4389000
heap
page read and write
5F0F000
trusted library allocation
page read and write
62D9000
heap
page read and write
6183000
heap
page read and write
61D2000
heap
page read and write
5FC4000
heap
page read and write
62B6000
heap
page read and write
62F8000
heap
page read and write
5394000
trusted library allocation
page read and write
A7C0000
trusted library allocation
page read and write
5852000
trusted library allocation
page read and write
5F64000
heap
page read and write
5ABC000
trusted library allocation
page read and write
A717000
trusted library allocation
page read and write
5EEA000
trusted library allocation
page read and write
9980000
trusted library allocation
page read and write
6607000
heap
page read and write
53CC000
trusted library allocation
page read and write
5FB4000
heap
page read and write
486D000
trusted library allocation
page read and write
441E000
heap
page read and write
A46000
heap
page read and write
AAD0000
heap
page read and write
5AD0000
trusted library allocation
page read and write
518B000
heap
page read and write
6391000
heap
page read and write
AEAC000
heap
page read and write
6528000
heap
page read and write
6391000
heap
page read and write
A7D9000
trusted library allocation
page read and write
65C1000
heap
page read and write
AACD000
heap
page read and write
6236000
heap
page read and write
61A9000
heap
page read and write
50CB000
heap
page read and write
66F9000
heap
page read and write
60A1000
heap
page read and write
43BD000
heap
page read and write
612D000
heap
page read and write
51CA000
heap
page read and write
50CD000
heap
page read and write
60BF000
heap
page read and write
6249000
heap
page read and write
63EB000
heap
page read and write
5125000
heap
page read and write
5F2C000
trusted library allocation
page read and write
6156000
heap
page read and write
6220000
heap
page read and write
6262000
heap
page read and write
627C000
heap
page read and write
50AB000
heap
page read and write
637E000
heap
page read and write
5AA5000
trusted library allocation
page read and write
619C000
heap
page read and write
618C000
heap
page read and write
61F2000
heap
page read and write
60DC000
heap
page read and write
5E4A000
trusted library allocation
page read and write
614D000
heap
page read and write
A644000
heap
page read and write
5CEB000
trusted library allocation
page read and write
51C6000
heap
page read and write
48B0000
trusted library allocation
page read and write
B293000
heap
page read and write
5923000
trusted library allocation
page read and write
668D000
heap
page read and write
4C04000
heap
page read and write
B13C000
heap
page read and write
5FBC000
heap
page read and write
58D4000
trusted library allocation
page read and write
60E7000
heap
page read and write
50BF000
heap
page read and write
5ADA000
trusted library allocation
page read and write
ACBF000
trusted library allocation
page read and write
4424000
heap
page read and write
6084000
heap
page read and write
6083000
heap
page read and write
B147000
heap
page read and write
592C000
trusted library allocation
page read and write
5B5F000
trusted library allocation
page read and write
62A0000
heap
page read and write
60BF000
heap
page read and write
C29A000
heap
page read and write
63A0000
heap
page read and write
5D8E000
trusted library allocation
page read and write
C1BA000
heap
page read and write
5123000
heap
page read and write
5EE6000
trusted library allocation
page read and write
65CE000
heap
page read and write
B11B000
heap
page read and write
5FE7000
heap
page read and write
B129000
heap
page read and write
AAE7000
heap
page read and write
60AA000
heap
page read and write
5AE9000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
B11B000
heap
page read and write
4E28000
trusted library allocation
page read and write
4D7B000
trusted library allocation
page read and write
6160000
heap
page read and write
AAD5000
heap
page read and write
61C4000
heap
page read and write
5DC1000
trusted library allocation
page read and write
99C5000
trusted library allocation
page read and write
6604000
heap
page read and write
6174000
heap
page read and write
66E1000
heap
page read and write
6095000
heap
page read and write
6800000
trusted library allocation
page read and write
5F00000
trusted library allocation
page read and write
667B000
heap
page read and write
5FC4000
heap
page read and write
5195000
heap
page read and write
6302000
heap
page read and write
5946000
trusted library allocation
page read and write
A3C000
heap
page read and write
4420000
heap
page read and write
6129000
heap
page read and write
AAD0000
heap
page read and write
5F93000
heap
page read and write
5F79000
heap
page read and write
5E3E000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
5FBB000
heap
page read and write
627E000
heap
page read and write
B27A000
heap
page read and write
99C2000
trusted library allocation
page read and write
4F17000
heap
page read and write
6117000
heap
page read and write
5D16000
trusted library allocation
page read and write
60AB000
heap
page read and write
65A2000
heap
page read and write
65BA000
heap
page read and write
62D4000
heap
page read and write
5951000
trusted library allocation
page read and write
672B000
heap
page read and write
5F24000
trusted library allocation
page read and write
5F70000
heap
page read and write
675D000
trusted library allocation
page read and write
AEAD000
heap
page read and write
AEA1000
heap
page read and write
51D1000
heap
page read and write
5541000
trusted library allocation
page read and write
6347000
heap
page read and write
631B000
heap
page read and write
64DA000
heap
page read and write
43EB000
heap
page read and write
A80F000
trusted library allocation
page read and write
AAB4000
heap
page read and write
6297000
heap
page read and write
53CA000
trusted library allocation
page read and write
617D000
heap
page read and write
5AE5000
trusted library allocation
page read and write
61C9000
heap
page read and write
A682000
trusted library allocation
page execute
6122000
heap
page read and write
6725000
heap
page read and write
5992000
trusted library allocation
page read and write
5EDD000
trusted library allocation
page read and write
ACCA000
trusted library allocation
page read and write
5123000
heap
page read and write
5938000
trusted library allocation
page read and write
41B2000
heap
page read and write
60BA000
heap
page read and write
5DBE000
trusted library allocation
page read and write
62B6000
heap
page read and write
668D000
heap
page read and write
5F4A000
trusted library allocation
page read and write
66B7000
heap
page read and write
5090000
heap
page read and write
4BF6000
heap
page read and write
6294000
heap
page read and write
48C4000
trusted library allocation
page read and write
AB01000
heap
page read and write
4F2C000
heap
page read and write
6254000
heap
page read and write
AB01000
heap
page read and write
67D9000
trusted library allocation
page read and write
66B5000
heap
page read and write
54C6000
trusted library allocation
page read and write
4426000
heap
page read and write
5DB2000
trusted library allocation
page read and write
5EEE000
trusted library allocation
page read and write
A6CB000
trusted library allocation
page read and write
6099000
heap
page read and write
59F2000
trusted library allocation
page read and write
5963000
trusted library allocation
page read and write
48B4000
trusted library allocation
page read and write
4219000
heap
page read and write
48A0000
trusted library allocation
page read and write
4469000
heap
page read and write
61D8000
heap
page read and write
59FE000
trusted library allocation
page read and write
4E1E000
trusted library allocation
page read and write
9967000
trusted library allocation
page read and write
511B000
heap
page read and write
5E4D000
trusted library allocation
page read and write
51A6000
heap
page read and write
61A0000
heap
page read and write
50F4000
heap
page read and write
6099000
heap
page read and write
A3C000
heap
page read and write
9958000
trusted library allocation
page read and write
437F000
heap
page read and write
41C1000
heap
page read and write
6340000
heap
page read and write
65B1000
heap
page read and write
5E6C000
trusted library allocation
page read and write
5050000
heap
page read and write
6380000
heap
page read and write
A6FF000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
5831000
trusted library allocation
page read and write
6187000
heap
page read and write
4469000
heap
page read and write
A7D000
heap
page read and write
594A000
trusted library allocation
page read and write
442F000
heap
page read and write
60E2000
heap
page read and write
AAD0000
heap
page read and write
A6C7000
trusted library allocation
page read and write
A6C7000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
6074000
heap
page read and write
A805000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
6565000
heap
page read and write
5115000
heap
page read and write
5FFD000
heap
page read and write
5153000
heap
page read and write
AB2000
heap
page read and write
633B000
heap
page read and write
43FA000
heap
page read and write
61DE000
heap
page read and write
5993000
trusted library allocation
page read and write
60A6000
heap
page read and write
5060000
heap
page read and write
99B7000
trusted library allocation
page read and write
4888000
trusted library allocation
page read and write
5D78000
trusted library allocation
page read and write
60C7000
heap
page read and write
A8D000
heap
page read and write
43D8000
heap
page read and write
5D8C000
trusted library allocation
page read and write
5229000
heap
page read and write
614C000
heap
page read and write
6589000
heap
page read and write
B117000
heap
page read and write
99C8000
trusted library allocation
page read and write
62BF000
heap
page read and write
6391000
heap
page read and write
4888000
trusted library allocation
page read and write
5F98000
heap
page read and write
6700000
heap
page read and write
6253000
heap
page read and write
60BD000
heap
page read and write
5BBF000
trusted library allocation
page read and write
48F6000
trusted library allocation
page read and write
48F9000
trusted library allocation
page read and write
5923000
trusted library allocation
page read and write
A653000
trusted library allocation
page read and write
6074000
heap
page read and write
5DB9000
trusted library allocation
page read and write
58C6000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
4F1D000
heap
page read and write
61DB000
heap
page read and write
4420000
heap
page read and write
679A000
trusted library allocation
page read and write
5AA2000
trusted library allocation
page read and write
4E28000
trusted library allocation
page read and write
A6FB000
trusted library allocation
page read and write
4E17000
trusted library allocation
page read and write
61CF000
heap
page read and write
512E000
heap
page read and write
6258000
heap
page read and write
99C4000
trusted library allocation
page read and write
62ED000
heap
page read and write
6342000
heap
page read and write
6226000
heap
page read and write
6220000
heap
page read and write
67CE000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
610F000
heap
page read and write
AAB9000
heap
page read and write
4407000
heap
page read and write
5C4E000
trusted library allocation
page read and write
6516000
heap
page read and write
509D000
heap
page read and write
6114000
heap
page read and write
6002000
heap
page read and write
6079000
heap
page read and write
C3A2000
heap
page read and write
5820000
trusted library allocation
page read and write
5FAC000
heap
page read and write
A71D000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
60D0000
heap
page read and write
50EC000
heap
page read and write
51E7000
heap
page read and write
5E10000
trusted library allocation
page read and write
65DD000
heap
page read and write
48DC000
trusted library allocation
page read and write
A9F000
heap
page read and write
59C2000
trusted library allocation
page execute
60BC000
heap
page read and write
5FC3000
heap
page read and write
4F0F000
heap
page read and write
5CA5000
trusted library allocation
page read and write
43CB000
heap
page read and write
4894000
trusted library allocation
page read and write
5FC7000
heap
page read and write
6104000
heap
page read and write
5C94000
trusted library allocation
page read and write
62DA000
heap
page read and write
51AC000
heap
page read and write
4422000
heap
page read and write
51B8000
heap
page read and write
5DD9000
trusted library allocation
page read and write
A83000
heap
page read and write
B139000
heap
page read and write
5BB2000
trusted library allocation
page read and write
638B000
heap
page read and write
65ED000
heap
page read and write
4429000
heap
page read and write
638D000
heap
page read and write
48B4000
trusted library allocation
page read and write
6099000
heap
page read and write
593E000
trusted library allocation
page read and write
5FB9000
heap
page read and write
67DA000
trusted library allocation
page read and write
60C4000
heap
page read and write
414C000
heap
page read and write
5559000
trusted library allocation
page read and write
67C2000
trusted library allocation
page read and write
5FF4000
heap
page read and write
6238000
heap
page read and write
612B000
heap
page read and write
660B000
heap
page read and write
5F85000
heap
page read and write
509F000
heap
page read and write
50AB000
heap
page read and write
AEA9000
heap
page read and write
51D5000
heap
page read and write
637E000
heap
page read and write
5F73000
heap
page read and write
6189000
heap
page read and write
5FBA000
heap
page read and write
5DD2000
trusted library allocation
page read and write
A708000
trusted library allocation
page read and write
66D6000
heap
page read and write
48B4000
trusted library allocation
page read and write
60F3000
heap
page read and write
604A000
heap
page read and write
5FDB000
heap
page read and write
624F000
heap
page read and write
6124000
heap
page read and write
60A1000
heap
page read and write
61E8000
heap
page read and write
441A000
heap
page read and write
AB03000
heap
page read and write
43DE000
heap
page read and write
51B5000
heap
page read and write
520A000
heap
page read and write
5FC7000
heap
page read and write
603B000
heap
page read and write
6401000
heap
page read and write
51D8000
heap
page read and write
5FFD000
heap
page read and write
6185000
heap
page read and write
60F4000
heap
page read and write
6019000
heap
page read and write
99D2000
trusted library allocation
page read and write
61C2000
heap
page read and write
5AFD000
trusted library allocation
page read and write
554E000
trusted library allocation
page read and write
420C000
heap
page read and write
43E0000
heap
page read and write
5C4D000
trusted library allocation
page read and write
5947000
trusted library allocation
page read and write
5FFD000
heap
page read and write
4878000
trusted library allocation
page read and write
B139000
heap
page read and write
668D000
heap
page read and write
59A0000
trusted library allocation
page read and write
671F000
heap
page read and write
5E9F000
trusted library allocation
page read and write
6754000
trusted library allocation
page read and write
99BA000
trusted library allocation
page read and write
4D7A000
trusted library allocation
page read and write
5DC1000
trusted library allocation
page read and write
6066000
heap
page read and write
6198000
heap
page read and write
442D000
heap
page read and write
443A000
heap
page read and write
53BF000
trusted library allocation
page read and write
445A000
heap
page read and write
5DFC000
trusted library allocation
page read and write
B1B4000
heap
page read and write
50FC000
heap
page read and write
592C000
trusted library allocation
page read and write
5FBF000
heap
page read and write
60A1000
heap
page read and write
506E000
heap
page read and write
4433000
heap
page read and write
61B5000
heap
page read and write
5124000
heap
page read and write
66A6000
heap
page read and write
674E000
heap
page read and write
6437000
heap
page read and write
AAFE000
heap
page read and write
B25F000
heap
page read and write
6746000
heap
page read and write
60C0000
heap
page read and write
5396000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
601E000
heap
page read and write
5F7F000
heap
page read and write
5999000
trusted library allocation
page read and write
4896000
trusted library allocation
page read and write
6378000
heap
page read and write
66AA000
heap
page read and write
5130000
heap
page read and write
5E77000
trusted library allocation
page read and write
61D1000
heap
page read and write
51B6000
heap
page read and write
6322000
heap
page read and write
66B5000
heap
page read and write
6264000
heap
page read and write
6562000
heap
page read and write
48E1000
trusted library allocation
page read and write
99F0000
trusted library allocation
page read and write
53CD000
trusted library allocation
page read and write
61E0000
heap
page read and write
5185000
heap
page read and write
48F0000
trusted library allocation
page read and write
601A000
heap
page read and write
5FAF000
heap
page read and write
5CAA000
trusted library allocation
page read and write
B0E0000
heap
page read and write
65B0000
heap
page read and write
C298000
heap
page read and write
5FAB000
heap
page read and write
6355000
heap
page read and write
6187000
heap
page read and write
53A8000
trusted library allocation
page read and write
5FD2000
heap
page read and write
61F1000
heap
page read and write
B293000
heap
page read and write
51C0000
heap
page read and write
43E0000
heap
page read and write
AB8000
heap
page read and write
5EBA000
trusted library allocation
page read and write
6270000
heap
page read and write
A704000
trusted library allocation
page read and write
B23D000
heap
page read and write
4E28000
trusted library allocation
page read and write
AA7000
heap
page read and write
638D000
heap
page read and write
61BA000
heap
page read and write
6106000
heap
page read and write
50A9000
heap
page read and write
632D000
heap
page read and write
5FC7000
heap
page read and write
6032000
heap
page read and write
4224000
heap
page read and write
41C9000
heap
page read and write
522C000
heap
page read and write
5F24000
trusted library allocation
page read and write
4409000
heap
page read and write
51F1000
heap
page read and write
99BF000
trusted library allocation
page read and write
606F000
heap
page read and write
AAD5000
heap
page read and write
5B02000
trusted library allocation
page read and write
6148000
heap
page read and write
6066000
heap
page read and write
6270000
heap
page read and write
4EF8000
heap
page read and write
60EE000
heap
page read and write
5AEA000
trusted library allocation
page read and write
610E000
heap
page read and write
6044000
heap
page read and write
5184000
heap
page read and write
5B70000
trusted library allocation
page read and write
637C000
heap
page read and write
6328000
heap
page read and write
5938000
trusted library allocation
page read and write
AAC0000
heap
page read and write
60B5000
heap
page read and write
5DB9000
trusted library allocation
page read and write
5ED5000
trusted library allocation
page read and write
6037000
heap
page read and write
5B10000
trusted library allocation
page read and write
629F000
heap
page read and write
440F000
heap
page read and write
621C000
heap
page read and write
5EA4000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
4894000
trusted library allocation
page read and write
5E80000
trusted library allocation
page read and write
6768000
trusted library allocation
page read and write
60C2000
heap
page read and write
609A000
heap
page read and write
A658000
trusted library allocation
page read and write
5FAE000
heap
page read and write
A31000
heap
page read and write
50F6000
heap
page read and write
A6FE000
trusted library allocation
page read and write
4E18000
trusted library allocation
page read and write
5CE2000
trusted library allocation
page read and write
61CE000
heap
page read and write
6373000
heap
page read and write
4C0B000
heap
page read and write
5AB7000
trusted library allocation
page read and write
66EA000
heap
page read and write
5F69000
heap
page read and write
606B000
heap
page read and write
6112000
heap
page read and write
5C48000
trusted library allocation
page read and write
4462000
heap
page read and write
4D6E000
trusted library allocation
page read and write
43F8000
heap
page read and write
41C3000
heap
page read and write
5987000
trusted library allocation
page read and write
50EC000
heap
page read and write
5FB9000
heap
page read and write
6074000
heap
page read and write
58D6000
trusted library allocation
page read and write
616A000
heap
page read and write
50D8000
heap
page read and write
60EF000
heap
page read and write
614A000
heap
page read and write
4452000
heap
page read and write
5B86000
trusted library allocation
page read and write
50D5000
heap
page read and write
6413000
heap
page read and write
4C0F000
heap
page read and write
65ED000
heap
page read and write
6503000
heap
page read and write
6072000
heap
page read and write
610C000
heap
page read and write
AAF1000
heap
page read and write
61A3000
heap
page read and write
AE87000
trusted library allocation
page read and write
446A000
heap
page read and write
ACD4000
trusted library allocation
page read and write
4F00000
heap
page read and write
A71B000
trusted library allocation
page read and write
616C000
heap
page read and write
5E22000
trusted library allocation
page read and write
5DA5000
trusted library allocation
page read and write
A723000
trusted library allocation
page execute
5F8B000
heap
page read and write
67CB000
trusted library allocation
page read and write
5E6E000
trusted library allocation
page read and write
5AE1000
trusted library allocation
page read and write
6230000
heap
page read and write
5C74000
trusted library allocation
page read and write
5EAC000
trusted library allocation
page read and write
51C6000
heap
page read and write
53C2000
trusted library allocation
page read and write
4F24000
heap
page read and write
5CE8000
trusted library allocation
page read and write
6020000
heap
page read and write
4462000
heap
page read and write
5EB0000
trusted library allocation
page read and write
5FA6000
heap
page read and write
5FAC000
heap
page read and write
5545000
trusted library allocation
page read and write
5127000
heap
page read and write
AAB9000
heap
page read and write
B166000
heap
page read and write
5DCC000
trusted library allocation
page read and write
C06D000
heap
page read and write
6828000
trusted library allocation
page read and write
6378000
heap
page read and write
5F5E000
heap
page read and write
59F9000
trusted library allocation
page read and write
6723000
heap
page read and write
4150000
heap
page read and write
51F3000
heap
page read and write
A868000
heap
page read and write
637C000
heap
page read and write
5184000
heap
page read and write
59D3000
trusted library allocation
page read and write
5EAC000
trusted library allocation
page read and write
6270000
heap
page read and write
626B000
heap
page read and write
522B000
heap
page read and write
4D72000
trusted library allocation
page read and write
A9B000
heap
page read and write
612B000
heap
page read and write
5EBD000
trusted library allocation
page read and write
631E000
heap
page read and write
6064000
heap
page read and write
4391000
heap
page read and write
629D000
heap
page read and write
6001000
heap
page read and write
539F000
trusted library allocation
page read and write
6007000
heap
page read and write
5FF7000
heap
page read and write
9969000
trusted library allocation
page read and write
62B4000
heap
page read and write
5124000
heap
page read and write
6026000
heap
page read and write
6747000
heap
page read and write
6798000
trusted library allocation
page read and write
59AF000
trusted library allocation
page read and write
4453000
heap
page read and write
4D77000
trusted library allocation
page read and write
5EA8000
trusted library allocation
page read and write
5C4E000
trusted library allocation
page read and write
659A000
heap
page read and write
4D79000
trusted library allocation
page read and write
6044000
heap
page read and write
4D6F000
trusted library allocation
page read and write
623C000
heap
page read and write
612D000
heap
page read and write
C11C000
heap
page read and write
4C1D000
heap
page read and write
4400000
heap
page read and write
6080000
heap
page read and write
5FFD000
heap
page read and write
9951000
trusted library allocation
page read and write
5D7C000
trusted library allocation
page read and write
53C5000
trusted library allocation
page read and write
5E59000
trusted library allocation
page read and write
AE81000
trusted library allocation
page read and write
615E000
heap
page read and write
51C6000
heap
page read and write
9A10000
trusted library allocation
page read and write
5FFD000
heap
page read and write
614C000
heap
page read and write
6297000
heap
page read and write
67BB000
trusted library allocation
page read and write
9A15000
trusted library allocation
page read and write
5FF1000
heap
page read and write
6166000
heap
page read and write
422B000
heap
page read and write
6245000
heap
page read and write
5CC9000
trusted library allocation
page read and write
6359000
heap
page read and write
6770000
trusted library allocation
page read and write
AAB4000
heap
page read and write
AEA5000
heap
page read and write
67C4000
trusted library allocation
page read and write
60C5000
heap
page read and write
440F000
heap
page read and write
4884000
trusted library allocation
page read and write
620C000
heap
page read and write
422B000
heap
page read and write
629A000
heap
page read and write
5195000
heap
page read and write
671F000
heap
page read and write
54C0000
trusted library allocation
page read and write
B1CE000
heap
page read and write
50A9000
heap
page read and write
43D6000
heap
page read and write
50CD000
heap
page read and write
A7A000
heap
page read and write
5F91000
heap
page read and write
5EC8000
trusted library allocation
page read and write
5512000
trusted library allocation
page read and write
A713000
trusted library allocation
page read and write
5F78000
heap
page read and write
996C000
trusted library allocation
page read and write
6651000
heap
page read and write
AAC000
heap
page read and write
51C0000
heap
page read and write
5FB1000
heap
page read and write
99D1000
trusted library allocation
page execute
53B7000
trusted library allocation
page read and write
665F000
heap
page read and write
6602000
heap
page read and write
4EF8000
heap
page read and write
5C4B000
trusted library allocation
page read and write
665E000
heap
page read and write
6084000
heap
page read and write
5F4D000
trusted library allocation
page read and write
A6D0000
trusted library allocation
page read and write
50C4000
heap
page read and write
6064000
heap
page read and write
4400000
heap
page read and write
6349000
heap
page read and write
43DE000
heap
page read and write
43BF000
heap
page read and write
61BA000
heap
page read and write
5DCE000
trusted library allocation
page read and write
9980000
trusted library allocation
page read and write
6143000
heap
page read and write
6326000
heap
page read and write
A6A0000
trusted library allocation
page read and write
4424000
heap
page read and write
6169000
heap
page read and write
63E9000
heap
page read and write
A6FC000
trusted library allocation
page read and write
43C9000
heap
page read and write
6081000
heap
page read and write
5B28000
trusted library allocation
page read and write
6364000
heap
page read and write
5AC5000
trusted library allocation
page read and write
AE81000
trusted library allocation
page read and write
6589000
heap
page read and write
53B3000
trusted library allocation
page read and write
A3A000
heap
page read and write
61CB000
heap
page read and write
6290000
heap
page read and write
65AC000
heap
page read and write
5122000
heap
page read and write
43B9000
heap
page read and write
674C000
heap
page read and write
60A1000
heap
page read and write
9969000
trusted library allocation
page read and write
A6B5000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
43EF000
heap
page read and write
672F000
heap
page read and write
1EC000
unkown
page readonly
67BD000
trusted library allocation
page read and write
5D8A000
trusted library allocation
page read and write
5EDE000
trusted library allocation
page read and write
B1E2000
heap
page read and write
A801000
trusted library allocation
page read and write
51C2000
heap
page read and write
A6F4000
trusted library allocation
page read and write
41CD000
heap
page read and write
636B000
heap
page read and write
442F000
heap
page read and write
5ED3000
trusted library allocation
page read and write
41FF000
heap
page read and write
632E000
heap
page read and write
4F33000
heap
page read and write
6288000
heap
page read and write
607F000
heap
page read and write
6198000
heap
page read and write
606F000
heap
page read and write
644F000
heap
page read and write
99D2000
trusted library allocation
page execute
5F8F000
heap
page read and write
4218000
heap
page read and write
6238000
heap
page read and write
59C4000
trusted library allocation
page execute
5DA1000
trusted library allocation
page read and write
A947000
heap
page read and write
5DBC000
trusted library allocation
page read and write
58B8000
trusted library allocation
page read and write
4393000
heap
page read and write
AAE7000
heap
page read and write
5F96000
heap
page read and write
6608000
heap
page read and write
637A000
heap
page read and write
5C70000
trusted library allocation
page read and write
602B000
heap
page read and write
63A0000
heap
page read and write
587C000
trusted library allocation
page read and write
58B6000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
99D0000
trusted library allocation
page execute
610D000
heap
page read and write
6583000
heap
page read and write
AAF5000
heap
page read and write
60DA000
heap
page read and write
5C41000
trusted library allocation
page read and write
5FD9000
heap
page read and write
5E6A000
trusted library allocation
page read and write
48B4000
trusted library allocation
page read and write
B2DD000
heap
page read and write
437E000
heap
page read and write
5BCB000
trusted library allocation
page read and write
5F96000
heap
page read and write
6114000
heap
page read and write
442F000
heap
page read and write
669D000
heap
page read and write
6292000
heap
page read and write
A983000
heap
page read and write
9986000
trusted library allocation
page read and write
5127000
heap
page read and write
5E09000
trusted library allocation
page read and write
60AA000
heap
page read and write
5F81000
heap
page read and write
6257000
heap
page read and write
5ED6000
trusted library allocation
page read and write
A6BF000
trusted library allocation
page read and write
61DC000
heap
page read and write
6044000
heap
page read and write
674B000
heap
page read and write
62B9000
heap
page read and write
61D1000
heap
page read and write
A70B000
trusted library allocation
page read and write
B2E5000
heap
page read and write
4F15000
heap
page read and write
53B4000
trusted library allocation
page read and write
61AF000
heap
page read and write
6308000
heap
page read and write
6375000
heap
page read and write
50AD000
heap
page read and write
61B2000
heap
page read and write
6788000
trusted library allocation
page read and write
AB2000
heap
page read and write
6373000
heap
page read and write
671D000
heap
page read and write
608D000
heap
page read and write
5954000
trusted library allocation
page read and write
A56000
heap
page read and write
4878000
trusted library allocation
page read and write
50BF000
heap
page read and write
50F5000
heap
page read and write
6106000
heap
page read and write
5BC7000
trusted library allocation
page read and write
4EF9000
heap
page read and write
61E0000
heap
page read and write
9974000
trusted library allocation
page read and write
6586000
heap
page read and write
607D000
heap
page read and write
60D3000
heap
page read and write
59C6000
trusted library allocation
page execute
99B0000
trusted library allocation
page read and write
51CD000
heap
page read and write
53C3000
trusted library allocation
page read and write
41EC000
heap
page read and write
5D9B000
trusted library allocation
page read and write
A660000
trusted library allocation
page read and write
4C19000
heap
page read and write
4435000
heap
page read and write
5FBC000
heap
page read and write
5213000
heap
page read and write
4F22000
heap
page read and write
63E9000
heap
page read and write
48F9000
trusted library allocation
page read and write
6160000
heap
page read and write
5F7C000
heap
page read and write
43ED000
heap
page read and write
AE80000
trusted library allocation
page read and write
AAE7000
heap
page read and write
A6BF000
trusted library allocation
page read and write
6297000
heap
page read and write
5012000
heap
page read and write
600B000
heap
page read and write
AAE3000
heap
page read and write
5EE1000
trusted library allocation
page read and write
998D000
trusted library allocation
page read and write
519B000
heap
page read and write
5D81000
trusted library allocation
page read and write
43E7000
heap
page read and write
4462000
heap
page read and write
621C000
heap
page read and write
6220000
heap
page read and write
6567000
heap
page read and write
4469000
heap
page read and write
638B000
heap
page read and write
5EDD000
trusted library allocation
page read and write
5995000
trusted library allocation
page read and write
4431000
heap
page read and write
AAE000
heap
page read and write
512D000
heap
page read and write
522B000
heap
page read and write
A810000
trusted library allocation
page read and write
616A000
heap
page read and write
4409000
heap
page read and write
6264000
heap
page read and write
5BCF000
trusted library allocation
page read and write
50D6000
heap
page read and write
5DF5000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page read and write
628E000
heap
page read and write
9978000
trusted library allocation
page read and write
5E3E000
trusted library allocation
page read and write
A76000
heap
page read and write
43FE000
heap
page read and write
67BE000
trusted library allocation
page read and write
673B000
heap
page read and write
594D000
trusted library allocation
page read and write
6257000
heap
page read and write
AA3000
heap
page read and write
4E1E000
trusted library allocation
page read and write
4E15000
trusted library allocation
page read and write
6156000
heap
page read and write
4463000
heap
page read and write
6233000
heap
page read and write
6768000
trusted library allocation
page read and write
6129000
heap
page read and write
AA2000
heap
page read and write
61C5000
heap
page read and write
4413000
heap
page read and write
5F68000
heap
page read and write
5F2A000
trusted library allocation
page read and write
6290000
heap
page read and write
6386000
heap
page read and write
6583000
heap
page read and write
60F5000
heap
page read and write
5F46000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
61D1000
heap
page read and write
510F000
heap
page read and write
5BF7000
trusted library allocation
page read and write
6264000
heap
page read and write
592D000
trusted library allocation
page read and write
4890000
trusted library allocation
page read and write
6099000
heap
page read and write
505D000
heap
page read and write
A811000
heap
page read and write
62ED000
heap
page read and write
6810000
trusted library allocation
page read and write
443C000
heap
page read and write
59E1000
trusted library allocation
page read and write
43D6000
heap
page read and write
51B5000
heap
page read and write
5E50000
trusted library allocation
page read and write
50BA000
heap
page read and write
4E1B000
trusted library allocation
page read and write
A6B7000
trusted library allocation
page read and write
610C000
heap
page read and write
B27B000
heap
page read and write
5C49000
trusted library allocation
page read and write
5BE5000
trusted library allocation
page read and write
50F2000
heap
page read and write
5E96000
trusted library allocation
page read and write
62BF000
heap
page read and write
67C3000
trusted library allocation
page read and write
4E19000
trusted library allocation
page read and write
51B6000
heap
page read and write
50B3000
heap
page read and write
5554000
trusted library allocation
page read and write
43B9000
heap
page read and write
A720000
trusted library allocation
page execute
50F0000
heap
page read and write
599B000
trusted library allocation
page read and write
5F95000
heap
page read and write
5C48000
trusted library allocation
page read and write
4F31000
heap
page read and write
61EE000
heap
page read and write
6142000
heap
page read and write
B1E2000
heap
page read and write
A30000
heap
page read and write
AB02000
heap
page read and write
5961000
trusted library allocation
page read and write
5925000
trusted library allocation
page read and write
AAA1000
heap
page read and write
4250000
remote allocation
page read and write
522B000
heap
page read and write
5FAA000
heap
page read and write
6158000
heap
page read and write
6560000
heap
page read and write
4C05000
heap
page read and write
A95000
heap
page read and write
5007000
heap
page read and write
6806000
trusted library allocation
page read and write
51D8000
heap
page read and write
6321000
heap
page read and write
6117000
heap
page read and write
61AF000
heap
page read and write
5229000
heap
page read and write
638B000
heap
page read and write
66F9000
heap
page read and write
5995000
trusted library allocation
page read and write
AE8D000
trusted library allocation
page read and write
5BB6000
trusted library allocation
page read and write
602C000
heap
page read and write
51D7000
heap
page read and write
520C000
heap
page read and write
99AC000
trusted library allocation
page read and write
6044000
heap
page read and write
60C0000
heap
page read and write
5F71000
heap
page read and write
510F000
heap
page read and write
5E4A000
trusted library allocation
page read and write
6226000
heap
page read and write
4E2E000
trusted library allocation
page read and write
625E000
heap
page read and write
5961000
trusted library allocation
page read and write
5FF8000
heap
page read and write
48DC000
trusted library allocation
page read and write
A3A000
heap
page read and write
4404000
heap
page read and write
6198000
heap
page read and write
6705000
heap
page read and write
66F0000
heap
page read and write
5944000
trusted library allocation
page read and write
50C4000
heap
page read and write
6071000
heap
page read and write
60BD000
heap
page read and write
5DCA000
trusted library allocation
page read and write
659B000
heap
page read and write
66D1000
heap
page read and write
5EAA000
trusted library allocation
page read and write
60BA000
heap
page read and write
58F0000
trusted library allocation
page read and write
5AE9000
trusted library allocation
page read and write
4437000
heap
page read and write
AE95000
trusted library allocation
page read and write
4D6F000
trusted library allocation
page read and write
6041000
heap
page read and write
6297000
heap
page read and write
5946000
trusted library allocation
page read and write
61C5000
heap
page read and write
5D73000
trusted library allocation
page read and write
60C6000
heap
page read and write
61E3000
heap
page read and write
60C0000
heap
page read and write
99B0000
trusted library allocation
page read and write
611E000
heap
page read and write
5DC7000
trusted library allocation
page read and write
6038000
heap
page read and write
9982000
trusted library allocation
page read and write
5FBF000
heap
page read and write
5F5A000
heap
page read and write
620C000
heap
page read and write
601A000
heap
page read and write
50EC000
heap
page read and write
654A000
heap
page read and write
6324000
heap
page read and write
53A9000
trusted library allocation
page read and write
53A4000
trusted library allocation
page read and write
43CF000
heap
page read and write
63F8000
heap
page read and write
639A000
heap
page read and write
99CC000
trusted library allocation
page read and write
67DB000
trusted library allocation
page read and write
5089000
heap
page read and write
ADAE000
heap
page read and write
B2E3000
heap
page read and write
6125000
heap
page read and write
5F64000
heap
page read and write
4C0E000
heap
page read and write
4216000
heap
page read and write
5ADE000
trusted library allocation
page read and write
6260000
heap
page read and write
61DC000
heap
page read and write
A97000
heap
page read and write
51AC000
heap
page read and write
638D000
heap
page read and write
5FAA000
heap
page read and write
5FE2000
heap
page read and write
6597000
heap
page read and write
5D2B000
trusted library allocation
page read and write
5F63000
heap
page read and write
66E0000
heap
page read and write
611C000
heap
page read and write
515D000
heap
page read and write
62D2000
heap
page read and write
61A0000
heap
page read and write
4D6F000
trusted library allocation
page read and write
A6A6000
trusted library allocation
page read and write
60A2000
heap
page read and write
6301000
heap
page read and write
A711000
trusted library allocation
page read and write
62ED000
heap
page read and write
58BE000
trusted library allocation
page read and write
510E000
heap
page read and write
5FEE000
heap
page read and write
5F83000
heap
page read and write
61A0000
heap
page read and write
66D1000
heap
page read and write
4469000
heap
page read and write
5BBF000
trusted library allocation
page read and write
ADAD000
heap
page read and write
60CC000
heap
page read and write
53BF000
trusted library allocation
page read and write
62AE000
heap
page read and write
51C6000
heap
page read and write
5F68000
heap
page read and write
5E29000
trusted library allocation
page read and write
6220000
heap
page read and write
66D2000
heap
page read and write
5F1E000
trusted library allocation
page read and write
671A000
heap
page read and write
6119000
heap
page read and write
6108000
heap
page read and write
6062000
heap
page read and write
594A000
trusted library allocation
page read and write
510F000
heap
page read and write
6291000
heap
page read and write
508F000
heap
page read and write
5940000
trusted library allocation
page read and write
43D2000
heap
page read and write
6148000
heap
page read and write
590A000
heap
page read and write
A7D000
heap
page read and write
5089000
heap
page read and write
632B000
heap
page read and write
6264000
heap
page read and write
6291000
heap
page read and write
6583000
heap
page read and write
ACD1000
trusted library allocation
page read and write
61EC000
heap
page read and write
5B70000
trusted library allocation
page read and write
5DA7000
trusted library allocation
page read and write
B241000
heap
page read and write
58EF000
trusted library allocation
page read and write
5DB4000
trusted library allocation
page read and write
50F2000
heap
page read and write
5DB9000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
422B000
heap
page read and write
60FE000
heap
page read and write
5EC4000
trusted library allocation
page read and write
617D000
heap
page read and write
6040000
heap
page read and write
625C000
heap
page read and write
ACD5000
trusted library allocation
page read and write
5C32000
trusted library allocation
page read and write
48B0000
trusted library allocation
page read and write
4284000
trusted library allocation
page read and write
67E4000
trusted library allocation
page read and write
A7C0000
trusted library allocation
page read and write
4E2A000
trusted library allocation
page read and write
6367000
heap
page read and write
AAA5000
heap
page read and write
B168000
heap
page read and write
5E39000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
66D9000
heap
page read and write
5FD1000
heap
page read and write
5F9C000
heap
page read and write
48E1000
trusted library allocation
page read and write
A78000
heap
page read and write
4F1B000
heap
page read and write
6582000
heap
page read and write
50D6000
heap
page read and write
62CB000
heap
page read and write
A717000
trusted library allocation
page read and write
AAD0000
heap
page read and write
63A0000
heap
page read and write
5EDC000
trusted library allocation
page read and write
5B56000
trusted library allocation
page read and write
6254000
heap
page read and write
674B000
heap
page read and write
A70B000
trusted library allocation
page read and write
61C1000
heap
page read and write
5F46000
trusted library allocation
page read and write
A720000
trusted library allocation
page execute
A721000
trusted library allocation
page execute
61C0000
heap
page read and write
6516000
heap
page read and write
5FBB000
heap
page read and write
5E64000
trusted library allocation
page read and write
5EE5000
trusted library allocation
page read and write
4D6E000
trusted library allocation
page read and write
4878000
trusted library allocation
page read and write
5F88000
heap
page read and write
B229000
heap
page read and write
A7C1000
heap
page read and write
B0E0000
heap
page read and write
6604000
heap
page read and write
508F000
heap
page read and write
6090000
heap
page read and write
A6FD000
trusted library allocation
page read and write
598D000
trusted library allocation
page read and write
5900000
trusted library allocation
page execute
62BF000
heap
page read and write
A808000
trusted library allocation
page read and write
634D000
heap
page read and write
669C000
heap
page read and write
43BA000
heap
page read and write
4E2B000
trusted library allocation
page read and write
666A000
heap
page read and write
53A9000
trusted library allocation
page read and write
6365000
heap
page read and write
61C1000
heap
page read and write
5DDE000
trusted library allocation
page read and write
65DF000
heap
page read and write
6144000
heap
page read and write
6375000
heap
page read and write
602C000
heap
page read and write
51C8000
heap
page read and write
670A000
heap
page read and write
B1E2000
heap
page read and write
6269000
heap
page read and write
61E4000
heap
page read and write
593F000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
997D000
trusted library allocation
page read and write
5F0F000
trusted library allocation
page read and write
51C3000
heap
page read and write
6656000
heap
page read and write
5209000
heap
page read and write
6373000
heap
page read and write
5EE1000
trusted library allocation
page read and write
6002000
heap
page read and write
5D16000
trusted library allocation
page read and write
60B7000
heap
page read and write
6255000
heap
page read and write
64DA000
heap
page read and write
A804000
trusted library allocation
page read and write
610C000
heap
page read and write
5195000
heap
page read and write
62B3000
heap
page read and write
5AA2000
trusted library allocation
page read and write
622C000
heap
page read and write
61CF000
heap
page read and write
5F7B000
heap
page read and write
65EA000
heap
page read and write
5961000
trusted library allocation
page read and write
4F2E000
heap
page read and write
A6E3000
trusted library allocation
page read and write
50D6000
heap
page read and write
4424000
heap
page read and write
6582000
heap
page read and write
442F000
heap
page read and write
5AFE000
trusted library allocation
page read and write
C99000
heap
page read and write
ABE000
heap
page read and write
61CF000
heap
page read and write
50C2000
heap
page read and write
6149000
heap
page read and write
5CA3000
trusted library allocation
page read and write
A5D000
heap
page read and write
5F67000
heap
page read and write
6810000
trusted library allocation
page read and write
5D7A000
trusted library allocation
page read and write
51F0000
heap
page read and write
AB2000
heap
page read and write
644A000
heap
page read and write
659B000
heap
page read and write
5940000
trusted library allocation
page read and write
6149000
heap
page read and write
418F000
heap
page read and write
5BBF000
trusted library allocation
page read and write
6615000
heap
page read and write
41B7000
heap
page read and write
6112000
heap
page read and write
5FC3000
heap
page read and write
4270000
direct allocation
page read and write
A6B4000
trusted library allocation
page read and write
A970000
heap
page read and write
A7D000
heap
page read and write
5F9F000
heap
page read and write
4D78000
trusted library allocation
page read and write
623A000
heap
page read and write
60A8000
heap
page read and write
5B09000
trusted library allocation
page read and write
51AC000
heap
page read and write
667E000
heap
page read and write
4E23000
trusted library allocation
page read and write
5FBF000
heap
page read and write
512D000
heap
page read and write
5F44000
trusted library allocation
page read and write
5FE7000
heap
page read and write
65AB000
heap
page read and write
5AE9000
trusted library allocation
page read and write
501F000
heap
page read and write
58EE000
trusted library allocation
page read and write
6114000
heap
page read and write
606E000
heap
page read and write
6036000
heap
page read and write
612D000
heap
page read and write
6040000
heap
page read and write
60F0000
heap
page read and write
64F7000
heap
page read and write
629D000
heap
page read and write
5AE9000
trusted library allocation
page read and write
6395000
heap
page read and write
A80D000
trusted library allocation
page read and write
5203000
heap
page read and write
511C000
heap
page read and write
54CA000
heap
page read and write
48BA000
trusted library allocation
page read and write
A670000
trusted library allocation
page read and write
5838000
trusted library allocation
page read and write
5DA6000
trusted library allocation
page read and write
5876000
trusted library allocation
page read and write
5FDB000
heap
page read and write
65EF000
heap
page read and write
5F49000
trusted library allocation
page read and write
51B2000
heap
page read and write
59E9000
trusted library allocation
page read and write
5FAF000
heap
page read and write
B168000
heap
page read and write
6552000
heap
page read and write
C06C000
heap
page read and write
B0F7000
heap
page read and write
5C3B000
trusted library allocation
page read and write
60AD000
heap
page read and write
6208000
heap
page read and write
610C000
heap
page read and write
6565000
heap
page read and write
A8A000
heap
page read and write
6090000
heap
page read and write
4447000
heap
page read and write
6160000
heap
page read and write
5B86000
trusted library allocation
page read and write
50C1000
heap
page read and write
A70E000
trusted library allocation
page read and write
B0FE000
heap
page read and write
5AE0000
trusted library allocation
page read and write
4F20000
heap
page read and write
AAA1000
heap
page read and write
422B000
heap
page read and write
A802000
trusted library allocation
page read and write
5EE5000
trusted library allocation
page read and write
63F8000
heap
page read and write
65F0000
heap
page read and write
639C000
heap
page read and write
5F5F000
heap
page read and write
60EE000
heap
page read and write
619C000
heap
page read and write
997A000
trusted library allocation
page read and write
AAA6000
heap
page read and write
5FF1000
heap
page read and write
99D0000
trusted library allocation
page read and write
4F0C000
heap
page read and write
5961000
trusted library allocation
page read and write
5961000
trusted library allocation
page read and write
5ABD000
trusted library allocation
page read and write
5138000
heap
page read and write
5998000
trusted library allocation
page read and write
A712000
trusted library allocation
page read and write
51D2000
heap
page read and write
65D9000
heap
page read and write
6112000
heap
page read and write
AAC8000
heap
page read and write
676A000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
99B6000
trusted library allocation
page read and write
66F0000
heap
page read and write
5BB1000
trusted library allocation
page read and write
5AB7000
trusted library allocation
page read and write
6160000
heap
page read and write
61D1000
heap
page read and write
5FD9000
heap
page read and write
48B4000
trusted library allocation
page read and write
51C7000
heap
page read and write
629F000
heap
page read and write
4424000
heap
page read and write
60A2000
heap
page read and write
617E000
heap
page read and write
60F4000
heap
page read and write
99F0000
trusted library allocation
page read and write
5EDE000
trusted library allocation
page read and write
5E69000
trusted library allocation
page read and write
AACC000
heap
page read and write
61C7000
heap
page read and write
43F8000
heap
page read and write
5FE7000
heap
page read and write
A6CD000
trusted library allocation
page read and write
5164000
heap
page read and write
6706000
heap
page read and write
5F71000
heap
page read and write
5107000
heap
page read and write
6373000
heap
page read and write
9965000
trusted library allocation
page read and write
5C92000
trusted library allocation
page read and write
660C000
heap
page read and write
A71D000
trusted library allocation
page read and write
4284000
trusted library allocation
page read and write
620C000
heap
page read and write
617D000
heap
page read and write
5F5E000
heap
page read and write
5CAD000
trusted library allocation
page read and write
A6B7000
trusted library allocation
page read and write
51FA000
heap
page read and write
615E000
heap
page read and write
5996000
trusted library allocation
page read and write
5C98000
trusted library allocation
page read and write
AAB0000
heap
page read and write
672B000
heap
page read and write
628E000
heap
page read and write
6257000
heap
page read and write
60CF000
heap
page read and write
5002000
heap
page read and write
622E000
heap
page read and write
5209000
heap
page read and write
50B4000
heap
page read and write
50A0000
heap
page read and write
5956000
trusted library allocation
page read and write
5935000
trusted library allocation
page read and write
6284000
heap
page read and write
5EF9000
trusted library allocation
page read and write
6226000
heap
page read and write
48E0000
trusted library allocation
page read and write
661F000
heap
page read and write
6709000
heap
page read and write
625C000
heap
page read and write
58D0000
trusted library allocation
page read and write
43BC000
heap
page read and write
62BB000
heap
page read and write
50BC000
heap
page read and write
62C7000
heap
page read and write
65F4000
heap
page read and write
99B1000
trusted library allocation
page read and write
9956000
trusted library allocation
page read and write
5F8A000
heap
page read and write
4876000
trusted library allocation
page read and write
6322000
heap
page read and write
508B000
heap
page read and write
A71C000
trusted library allocation
page read and write
50F0000
heap
page read and write
5F4D000
trusted library allocation
page read and write
6310000
heap
page read and write
61B1000
heap
page read and write
50EF000
heap
page read and write
43B1000
heap
page read and write
5819000
trusted library allocation
page read and write
A976000
heap
page read and write
51AE000
heap
page read and write
4C05000
heap
page read and write
5C4E000
trusted library allocation
page read and write
6268000
heap
page read and write
995C000
trusted library allocation
page read and write
602C000
heap
page read and write
5FF7000
heap
page read and write
5ACC000
trusted library allocation
page read and write
4D63000
trusted library allocation
page read and write
62B5000
heap
page read and write
53C8000
trusted library allocation
page read and write
99C5000
trusted library allocation
page read and write
4409000
heap
page read and write
6631000
heap
page read and write
619C000
heap
page read and write
5FA1000
heap
page read and write
4C0C000
heap
page read and write
602B000
heap
page read and write
5FAA000
heap
page read and write
5EE3000
trusted library allocation
page read and write
50FC000
heap
page read and write
9982000
trusted library allocation
page read and write
5FB9000
heap
page read and write
66A8000
heap
page read and write
48A0000
trusted library allocation
page read and write
AAAF000
heap
page read and write
623E000
heap
page read and write
60BD000
heap
page read and write
A643000
trusted library allocation
page read and write
53A1000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
60CD000
heap
page read and write
4F2E000
heap
page read and write
A8D000
heap
page read and write
5097000
heap
page read and write
51A5000
heap
page read and write
51D6000
heap
page read and write
617E000
heap
page read and write
67D8000
trusted library allocation
page read and write
5F9C000
heap
page read and write
C068000
heap
page read and write
A803000
trusted library allocation
page read and write
59A6000
trusted library allocation
page read and write
43C4000
heap
page read and write
6295000
heap
page read and write
48B4000
trusted library allocation
page read and write
6144000
heap
page read and write
660E000
heap
page read and write
5DF0000
trusted library allocation
page read and write
446D000
heap
page read and write
595B000
trusted library allocation
page read and write
48C6000
trusted library allocation
page read and write
6096000
heap
page read and write
5111000
heap
page read and write
611D000
heap
page read and write
53BF000
trusted library allocation
page read and write
6226000
heap
page read and write
5FF5000
heap
page read and write
48BA000
trusted library allocation
page read and write
610D000
heap
page read and write
48A0000
trusted library allocation
page read and write
660B000
heap
page read and write
99B2000
trusted library allocation
page read and write
6724000
heap
page read and write
487A000
trusted library allocation
page read and write
673F000
heap
page read and write
60C4000
heap
page read and write
5B40000
trusted library allocation
page read and write
65BA000
heap
page read and write
6768000
trusted library allocation
page read and write
67C7000
trusted library allocation
page read and write
53B2000
trusted library allocation
page read and write
5B53000
trusted library allocation
page read and write
5F75000
heap
page read and write
99C6000
trusted library allocation
page read and write
625C000
heap
page read and write
61A4000
heap
page read and write
9974000
trusted library allocation
page read and write
511F000
heap
page read and write
555D000
trusted library allocation
page read and write
637E000
heap
page read and write
5FF5000
heap
page read and write
61CB000
heap
page read and write
6332000
heap
page read and write
61AD000
heap
page read and write
617E000
heap
page read and write
6537000
heap
page read and write
521F000
heap
page read and write
5C64000
trusted library allocation
page read and write
A80C000
trusted library allocation
page read and write
66CB000
heap
page read and write
6016000
heap
page read and write
6249000
heap
page read and write
6603000
heap
page read and write
41B2000
heap
page read and write
5952000
trusted library allocation
page read and write
5FF1000
heap
page read and write
6220000
heap
page read and write
587A000
trusted library allocation
page read and write
43C4000
heap
page read and write
A6C0000
trusted library allocation
page read and write
6162000
heap
page read and write
6148000
heap
page read and write
625C000
heap
page read and write
5959000
trusted library allocation
page read and write
62D8000
heap
page read and write
606F000
heap
page read and write
A6CF000
trusted library allocation
page read and write
67D8000
trusted library allocation
page read and write
622D000
heap
page read and write
A6B1000
trusted library allocation
page read and write
5FF5000
heap
page read and write
50D7000
heap
page read and write
437E000
heap
page read and write
61AB000
heap
page read and write
633B000
heap
page read and write
53BF000
trusted library allocation
page read and write
B169000
heap
page read and write
4386000
heap
page read and write
6209000
heap
page read and write
59FC000
trusted library allocation
page read and write
5FC4000
heap
page read and write
5E9A000
trusted library allocation
page read and write
AAF9000
heap
page read and write
A7A000
heap
page read and write
A20000
heap
page read and write
602B000
heap
page read and write
C3AE000
heap
page read and write
B11E000
heap
page read and write
674B000
heap
page read and write
AAB1000
heap
page read and write
6369000
heap
page read and write
60ED000
heap
page read and write
4C1D000
heap
page read and write
5BB6000
trusted library allocation
page read and write
997A000
trusted library allocation
page read and write
521E000
heap
page read and write
996C000
trusted library allocation
page read and write
651D000
heap
page read and write
51F9000
heap
page read and write
4C19000
heap
page read and write
6720000
heap
page read and write
6143000
heap
page read and write
641E000
heap
page read and write
5C94000
trusted library allocation
page read and write
43C3000
heap
page read and write
629B000
heap
page read and write
AB5C000
heap
page read and write
6537000
heap
page read and write
67C5000
trusted library allocation
page read and write
420B000
heap
page read and write
6709000
heap
page read and write
5EC4000
trusted library allocation
page read and write
639E000
heap
page read and write
997D000
trusted library allocation
page read and write
629B000
heap
page read and write
629B000
heap
page read and write
6255000
heap
page read and write
41AA000
heap
page read and write
50D9000
heap
page read and write
676C000
trusted library allocation
page read and write
5F4A000
trusted library allocation
page read and write
6608000
heap
page read and write
AE80000
trusted library allocation
page read and write
5DC6000
trusted library allocation
page read and write
AAD5000
heap
page read and write
633B000
heap
page read and write
4182000
heap
page read and write
53B9000
trusted library allocation
page read and write
60DD000
heap
page read and write
99F2000
trusted library allocation
page read and write
6257000
heap
page read and write
5FBF000
heap
page read and write
5CE4000
trusted library allocation
page read and write
6109000
heap
page read and write
6254000
heap
page read and write
5C44000
trusted library allocation
page read and write
51B6000
heap
page read and write
A2A000
heap
page read and write
5FE3000
heap
page read and write
606E000
heap
page read and write
48B4000
trusted library allocation
page read and write
602B000
heap
page read and write
43DC000
heap
page read and write
633B000
heap
page read and write
617E000
heap
page read and write
6255000
heap
page read and write
6228000
heap
page read and write
61F2000
heap
page read and write
51D9000
heap
page read and write
60F4000
heap
page read and write
615E000
heap
page read and write
4206000
heap
page read and write
4888000
trusted library allocation
page read and write
5FFD000
heap
page read and write
5E7A000
trusted library allocation
page read and write
616A000
heap
page read and write
62F4000
heap
page read and write
5098000
heap
page read and write
6355000
heap
page read and write
6279000
heap
page read and write
9A0A000
trusted library allocation
page read and write
618F000
heap
page read and write
5218000
heap
page read and write
5816000
trusted library allocation
page read and write
420A000
heap
page read and write
4F28000
heap
page read and write
6270000
heap
page read and write
5EC4000
trusted library allocation
page read and write
99E5000
trusted library allocation
page read and write
A717000
trusted library allocation
page read and write
5FE7000
heap
page read and write
4411000
heap
page read and write
A6C000
heap
page read and write
64EE000
heap
page read and write
437E000
heap
page read and write
5FAC000
heap
page read and write
5F47000
trusted library allocation
page read and write
4466000
heap
page read and write
A9F000
heap
page read and write
505B000
heap
page read and write
5C49000
trusted library allocation
page read and write
66B5000
heap
page read and write
5127000
heap
page read and write
AFD5000
heap
page read and write
594F000
trusted library allocation
page read and write
60D1000
heap
page read and write
6204000
heap
page read and write
520D000
heap
page read and write
4878000
trusted library allocation
page read and write
A805000
trusted library allocation
page read and write
6397000
heap
page read and write
60EF000
heap
page read and write
59E1000
trusted library allocation
page read and write
607F000
heap
page read and write
60BD000
heap
page read and write
5099000
heap
page read and write
65E8000
heap
page read and write
5EDE000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
41F5000
heap
page read and write
5CE1000
trusted library allocation
page read and write
50FC000
heap
page read and write
AA5000
heap
page read and write
4420000
heap
page read and write
5AD9000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
5F4B000
trusted library allocation
page read and write
6806000
trusted library allocation
page read and write
5E86000
trusted library allocation
page read and write
ACAD000
heap
page read and write
B169000
heap
page read and write
50F1000
heap
page read and write
53BF000
trusted library allocation
page read and write
5F91000
heap
page read and write
5ED8000
trusted library allocation
page read and write
4286000
trusted library allocation
page read and write
674B000
heap
page read and write
50F7000
heap
page read and write
50FC000
heap
page read and write
51AC000
heap
page read and write
6314000
heap
page read and write
615B000
heap
page read and write
48B0000
trusted library allocation
page read and write
5D26000
trusted library allocation
page read and write
5EEB000
trusted library allocation
page read and write
66F8000
heap
page read and write
A815000
heap
page read and write
511C000
heap
page read and write
5E6C000
trusted library allocation
page read and write
517F000
heap
page read and write
51DC000
heap
page read and write
61DC000
heap
page read and write
60A1000
heap
page read and write
5DC2000
trusted library allocation
page read and write
5229000
heap
page read and write
6849000
trusted library allocation
page read and write
A711000
trusted library allocation
page read and write
61CA000
heap
page read and write
612B000
heap
page read and write
635B000
heap
page read and write
5FEE000
heap
page read and write
6118000
heap
page read and write
5215000
heap
page read and write
519B000
heap
page read and write
61D1000
heap
page read and write
5F57000
heap
page read and write
6614000
heap
page read and write
43F5000
heap
page read and write
638D000
heap
page read and write
5F62000
heap
page read and write
AAC8000
heap
page read and write
B10D000
heap
page read and write
618C000
heap
page read and write
9969000
trusted library allocation
page read and write
61B1000
heap
page read and write
519B000
heap
page read and write
6075000
heap
page read and write
6279000
heap
page read and write
61AA000
heap
page read and write
6264000
heap
page read and write
99C8000
trusted library allocation
page read and write
61AF000
heap
page read and write
51EB000
heap
page read and write
5EBA000
trusted library allocation
page read and write
6758000
trusted library allocation
page read and write
5D75000
trusted library allocation
page read and write
C11D000
heap
page read and write
50B4000
heap
page read and write
6112000
heap
page read and write
62C8000
heap
page read and write
6333000
heap
page read and write
48F7000
trusted library allocation
page read and write
5EC8000
trusted library allocation
page read and write
415F000
heap
page read and write
A46000
heap
page read and write
66F8000
heap
page read and write
6290000
heap
page read and write
61A9000
heap
page read and write
598E000
trusted library allocation
page read and write
998D000
trusted library allocation
page read and write
636D000
heap
page read and write
617A000
heap
page read and write
43E9000
heap
page read and write
5062000
heap
page read and write
A6B1000
trusted library allocation
page read and write
6279000
heap
page read and write
5C61000
trusted library allocation
page read and write
62AB000
heap
page read and write
ADA7000
heap
page read and write
A669000
trusted library allocation
page read and write
421D000
heap
page read and write
41D9000
heap
page read and write
48DC000
trusted library allocation
page read and write
51D7000
heap
page read and write
617A000
heap
page read and write
636D000
heap
page read and write
5127000
heap
page read and write
67BA000
trusted library allocation
page read and write
A6D1000
trusted library allocation
page read and write
61D2000
heap
page read and write
48A0000
trusted library allocation
page read and write
6382000
heap
page read and write
5FB4000
heap
page read and write
C064000
heap
page read and write
653C000
heap
page read and write
5084000
heap
page read and write
5FFD000
heap
page read and write
43FC000
heap
page read and write
62D2000
heap
page read and write
606C000
heap
page read and write
A20000
heap
page read and write
6152000
heap
page read and write
99F2000
trusted library allocation
page read and write
5EE9000
trusted library allocation
page read and write
6192000
heap
page read and write
4D77000
trusted library allocation
page read and write
6391000
heap
page read and write
60FA000
heap
page read and write
AA5000
heap
page read and write
595A000
trusted library allocation
page read and write
627E000
heap
page read and write
5EEE000
trusted library allocation
page read and write
B0E0000
heap
page read and write
4888000
trusted library allocation
page read and write
6095000
heap
page read and write
6028000
heap
page read and write
5DE9000
trusted library allocation
page read and write
6666000
heap
page read and write
65AB000
heap
page read and write
6754000
trusted library allocation
page read and write
62EE000
heap
page read and write
99CA000
trusted library allocation
page read and write
B1B0000
heap
page read and write
4447000
heap
page read and write
ABD000
heap
page read and write
601E000
heap
page read and write
4BF4000
heap
page read and write
50A6000
heap
page read and write
5098000
heap
page read and write
61A3000
heap
page read and write
AFA6000
heap
page read and write
4E28000
trusted library allocation
page read and write
5959000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
5F7B000
heap
page read and write
658B000
heap
page read and write
50BD000
heap
page read and write
60A6000
heap
page read and write
6609000
heap
page read and write
5E7C000
trusted library allocation
page read and write
508E000
heap
page read and write
A711000
trusted library allocation
page read and write
6111000
heap
page read and write
50F6000
heap
page read and write
4455000
heap
page read and write
598E000
trusted library allocation
page read and write
6091000
heap
page read and write
5ADA000
trusted library allocation
page read and write
680A000
trusted library allocation
page read and write
5117000
heap
page read and write
48D0000
trusted library allocation
page read and write
59E2000
trusted library allocation
page read and write
61E6000
heap
page read and write
61DE000
heap
page read and write
6152000
heap
page read and write
633F000
heap
page read and write
608C000
heap
page read and write
6509000
heap
page read and write
A71A000
trusted library allocation
page read and write
6727000
heap
page read and write
6347000
heap
page read and write
620B000
heap
page read and write
53AB000
trusted library allocation
page read and write
43BA000
heap
page read and write
51C6000
heap
page read and write
61DC000
heap
page read and write
442F000
heap
page read and write
48B0000
trusted library allocation
page read and write
60EE000
heap
page read and write
5EE2000
trusted library allocation
page read and write
5229000
heap
page read and write
60FE000
heap
page read and write
99F8000
trusted library allocation
page read and write
ACC2000
trusted library allocation
page read and write
A6BB000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
53C9000
trusted library allocation
page read and write
A7A000
heap
page read and write
9A09000
trusted library allocation
page read and write
B169000
heap
page read and write
6108000
heap
page read and write
437E000
heap
page read and write
67C4000
trusted library allocation
page read and write
5AB7000
trusted library allocation
page read and write
51BA000
heap
page read and write
5C4B000
trusted library allocation
page read and write
63A2000
heap
page read and write
641A000
heap
page read and write
6607000
heap
page read and write
442B000
heap
page read and write
B091000
heap
page read and write
99C8000
trusted library allocation
page read and write
508A000
heap
page read and write
6306000
heap
page read and write
5F6B000
heap
page read and write
41E4000
heap
page read and write
5AC0000
trusted library allocation
page read and write
59E1000
trusted library allocation
page read and write
5C3C000
trusted library allocation
page read and write
612B000
heap
page read and write
A6FD000
trusted library allocation
page read and write
9A21000
trusted library allocation
page read and write
A71B000
trusted library allocation
page read and write
5200000
heap
page read and write
5FC4000
heap
page read and write
AAC0000
heap
page read and write
6270000
heap
page read and write
6809000
trusted library allocation
page read and write
6613000
heap
page read and write
5DB4000
trusted library allocation
page read and write
4F08000
heap
page read and write
60E4000
heap
page read and write
6822000
trusted library allocation
page read and write
50D8000
heap
page read and write
441C000
heap
page read and write
B164000
heap
page read and write
B091000
heap
page read and write
61DC000
heap
page read and write
5B73000
trusted library allocation
page read and write
51D1000
heap
page read and write
99AE000
trusted library allocation
page read and write
6064000
heap
page read and write
51FD000
heap
page read and write
6614000
heap
page read and write
633B000
heap
page read and write
66F8000
heap
page read and write
D3E000
heap
page read and write
5C32000
trusted library allocation
page read and write
AB4000
heap
page read and write
672B000
heap
page read and write
A6F3000
trusted library allocation
page read and write
5E52000
trusted library allocation
page read and write
6725000
heap
page read and write
5049000
heap
page read and write
AEA4000
heap
page read and write
6668000
heap
page read and write
6066000
heap
page read and write
5215000
heap
page read and write
64DA000
heap
page read and write
5220000
heap
page read and write
6666000
heap
page read and write
58FC000
trusted library allocation
page read and write
5133000
heap
page read and write
62C7000
heap
page read and write
9954000
trusted library allocation
page read and write
63FB000
heap
page read and write
6290000
heap
page read and write
AAF5000
heap
page read and write
43A0000
heap
page read and write
636F000
heap
page read and write
5DC0000
trusted library allocation
page read and write
5B01000
trusted library allocation
page read and write
4C10000
heap
page read and write
5F85000
heap
page read and write
60F8000
heap
page read and write
99CA000
trusted library allocation
page read and write
486D000
trusted library allocation
page read and write
611B000
heap
page read and write
A680000
trusted library allocation
page read and write
6668000
heap
page read and write
6118000
heap
page read and write
A9F000
heap
page read and write
5F4F000
trusted library allocation
page read and write
5CE4000
trusted library allocation
page read and write
60AB000
heap
page read and write
4288000
trusted library allocation
page read and write
5AD8000
trusted library allocation
page read and write
607B000
heap
page read and write
61D1000
heap
page read and write
5B2B000
trusted library allocation
page read and write
6108000
heap
page read and write
621F000
heap
page read and write
5D7F000
trusted library allocation
page read and write
603D000
heap
page read and write
43A2000
heap
page read and write
5D8A000
trusted library allocation
page read and write
4EFE000
heap
page read and write
4402000
heap
page read and write
510E000
heap
page read and write
6768000
trusted library allocation
page read and write
48DC000
trusted library allocation
page read and write
65CE000
heap
page read and write
5920000
trusted library allocation
page read and write
67BB000
trusted library allocation
page read and write
5AD3000
trusted library allocation
page read and write
51C2000
heap
page read and write
62BA000
heap
page read and write
51EE000
heap
page read and write
6266000
heap
page read and write
5AB7000
trusted library allocation
page read and write
6717000
heap
page read and write
634E000
heap
page read and write
53B6000
trusted library allocation
page read and write
4289000
trusted library allocation
page read and write
A6C000
heap
page read and write
A808000
trusted library allocation
page read and write
6279000
heap
page read and write
99C5000
trusted library allocation
page read and write
5CEB000
trusted library allocation
page read and write
66B5000
heap
page read and write
610C000
heap
page read and write
4F2C000
heap
page read and write
60F4000
heap
page read and write
A6F2000
trusted library allocation
page read and write
51FF000
heap
page read and write
5E58000
trusted library allocation
page read and write
539D000
trusted library allocation
page read and write
5BBF000
trusted library allocation
page read and write
621C000
heap
page read and write
99AF000
trusted library allocation
page read and write
5554000
trusted library allocation
page read and write
A801000
trusted library allocation
page read and write
AAD0000
heap
page read and write
5E5C000
trusted library allocation
page read and write
5F53000
heap
page read and write
5874000
trusted library allocation
page read and write
4E2E000
trusted library allocation
page read and write
59C9000
trusted library allocation
page read and write
6285000
heap
page read and write
5FD5000
heap
page read and write
A28000
heap
page read and write
60E4000
heap
page read and write
A6B8000
trusted library allocation
page read and write
5229000
heap
page read and write
5100000
heap
page read and write
B12E000
heap
page read and write
4E17000
trusted library allocation
page read and write
628A000
heap
page read and write
5CDC000
trusted library allocation
page read and write
441A000
heap
page read and write
48B3000
trusted library allocation
page read and write
661F000
heap
page read and write
521E000
heap
page read and write
A28000
heap
page read and write
593B000
trusted library allocation
page read and write
5CE9000
trusted library allocation
page read and write
61AB000
heap
page read and write
5EC9000
trusted library allocation
page read and write
637A000
heap
page read and write
4204000
heap
page read and write
99DF000
trusted library allocation
page read and write
5945000
trusted library allocation
page read and write
51C0000
heap
page read and write
6238000
heap
page read and write
522B000
heap
page read and write
48BE000
trusted library allocation
page read and write
656F000
heap
page read and write
65F0000
heap
page read and write
43B7000
heap
page read and write
48D3000
trusted library allocation
page read and write
5AE2000
trusted library allocation
page read and write
5C91000
trusted library allocation
page read and write
50EB000
heap
page read and write
5F37000
trusted library allocation
page read and write
6364000
heap
page read and write
5ACD000
trusted library allocation
page read and write
5215000
heap
page read and write
5F2C000
trusted library allocation
page read and write
5955000
trusted library allocation
page read and write
50FC000
heap
page read and write
60EC000
heap
page read and write
5ADF000
trusted library allocation
page read and write
5F73000
heap
page read and write
614D000
heap
page read and write
A646000
trusted library allocation
page read and write
609C000
heap
page read and write
50B4000
heap
page read and write
998D000
trusted library allocation
page read and write
446A000
heap
page read and write
5F76000
heap
page read and write
422B000
heap
page read and write
4F06000
heap
page read and write
4F17000
heap
page read and write
5540000
trusted library allocation
page read and write
6611000
heap
page read and write
61A6000
heap
page read and write
6267000
heap
page read and write
5112000
heap
page read and write
61A4000
heap
page read and write
60E4000
heap
page read and write
6143000
heap
page read and write
43BC000
heap
page read and write
522A000
heap
page read and write
A8A000
heap
page read and write
5F66000
heap
page read and write
41F8000
heap
page read and write
160000
unkown
page readonly
444C000
heap
page read and write
6070000
heap
page read and write
5CDE000
trusted library allocation
page read and write
9980000
trusted library allocation
page read and write
4204000
heap
page read and write
445F000
heap
page read and write
5029000
heap
page read and write
60FC000
heap
page read and write
AB2000
heap
page read and write
5F2E000
trusted library allocation
page read and write
67B6000
trusted library allocation
page read and write
6192000
heap
page read and write
5D8A000
trusted library allocation
page read and write
60E0000
heap
page read and write
5FBD000
heap
page read and write
53FD000
heap
page read and write
6733000
heap
page read and write
4433000
heap
page read and write
615B000
heap
page read and write
AB2000
heap
page read and write
6208000
heap
page read and write
AE9D000
trusted library allocation
page read and write
61D8000
heap
page read and write
53BF000
trusted library allocation
page read and write
5C96000
trusted library allocation
page read and write
666B000
heap
page read and write
6371000
heap
page read and write
5C9F000
trusted library allocation
page read and write
519B000
heap
page read and write
B2DE000
heap
page read and write
51C2000
heap
page read and write
6771000
trusted library allocation
page read and write
5211000
heap
page read and write
6226000
heap
page read and write
63F8000
heap
page read and write
5C90000
trusted library allocation
page read and write
439B000
heap
page read and write
AAD0000
heap
page read and write
5F96000
heap
page read and write
43CC000
heap
page read and write
5FFE000
heap
page read and write
51C2000
heap
page read and write
6207000
heap
page read and write
A680000
trusted library allocation
page read and write
5D8F000
trusted library allocation
page read and write
5D7F000
trusted library allocation
page read and write
5E34000
trusted library allocation
page read and write
A7FC000
trusted library allocation
page read and write
4BF3000
heap
page read and write
5127000
heap
page read and write
AEAC000
heap
page read and write
4399000
heap
page read and write
634D000
heap
page read and write
682A000
trusted library allocation
page read and write
43ED000
heap
page read and write
5F26000
trusted library allocation
page read and write
B23D000
heap
page read and write
5208000
heap
page read and write
6039000
heap
page read and write
51F9000
heap
page read and write
62C7000
heap
page read and write
5D75000
trusted library allocation
page read and write
6106000
heap
page read and write
6800000
trusted library allocation
page read and write
4433000
heap
page read and write
60E7000
heap
page read and write
5203000
heap
page read and write
AAD0000
heap
page read and write
593C000
trusted library allocation
page read and write
5F88000
heap
page read and write
A6E7000
trusted library allocation
page read and write
A690000
trusted library allocation
page read and write
6723000
heap
page read and write
6268000
heap
page read and write
B229000
heap
page read and write
62AB000
heap
page read and write
608A000
heap
page read and write
53AD000
trusted library allocation
page read and write
43DD000
heap
page read and write
6236000
heap
page read and write
A53000
heap
page read and write
4C19000
heap
page read and write
996F000
trusted library allocation
page read and write
6214000
heap
page read and write
9A1F000
trusted library allocation
page read and write
5107000
heap
page read and write
67BD000
trusted library allocation
page read and write
6098000
heap
page read and write
61CC000
heap
page read and write
5E4D000
trusted library allocation
page read and write
9A23000
trusted library allocation
page read and write
48F9000
trusted library allocation
page read and write
6016000
heap
page read and write
6180000
heap
page read and write
6297000
heap
page read and write
5100000
heap
page read and write
6279000
heap
page read and write
5EDF000
trusted library allocation
page read and write
660F000
heap
page read and write
43EF000
heap
page read and write
48D7000
trusted library allocation
page read and write
62B2000
heap
page read and write
48BE000
trusted library allocation
page read and write
60FB000
heap
page read and write
6152000
heap
page read and write
67D5000
trusted library allocation
page read and write
43F1000
heap
page read and write
4D73000
trusted library allocation
page read and write
612D000
heap
page read and write
622E000
heap
page read and write
539B000
trusted library allocation
page read and write
6758000
trusted library allocation
page read and write
A42000
heap
page read and write
5926000
trusted library allocation
page read and write
61A2000
heap
page read and write
668D000
heap
page read and write
51ED000
heap
page read and write
441C000
heap
page read and write
A714000
trusted library allocation
page read and write
61B4000
heap
page read and write
636B000
heap
page read and write
628D000
heap
page read and write
5087000
heap
page read and write
43C3000
heap
page read and write
A801000
trusted library allocation
page read and write
5EBD000
trusted library allocation
page read and write
A713000
trusted library allocation
page read and write
B1A2000
heap
page read and write
6666000
heap
page read and write
4177000
heap
page read and write
B0CA000
heap
page read and write
5CEE000
trusted library allocation
page read and write
639E000
heap
page read and write
9964000
trusted library allocation
page read and write
606C000
heap
page read and write
43B1000
heap
page read and write
51E3000
heap
page read and write
9982000
trusted library allocation
page read and write
6375000
heap
page read and write
53AD000
trusted library allocation
page read and write
C4A7000
heap
page read and write
5F38000
trusted library allocation
page read and write
A6FA000
trusted library allocation
page read and write
6566000
heap
page read and write
6528000
heap
page read and write
4C19000
heap
page read and write
5E32000
trusted library allocation
page read and write
51C6000
heap
page read and write
A53000
heap
page read and write
6118000
heap
page read and write
AAE8000
heap
page read and write
6380000
heap
page read and write
5F7B000
heap
page read and write
622E000
heap
page read and write
671D000
heap
page read and write
99C8000
trusted library allocation
page read and write
5C02000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
6084000
heap
page read and write
62B5000
heap
page read and write
5D46000
trusted library allocation
page read and write
B0F7000
heap
page read and write
59A0000
trusted library allocation
page read and write
50CC000
heap
page read and write
48D4000
trusted library allocation
page read and write
5E03000
trusted library allocation
page read and write
60F4000
heap
page read and write
53A9000
trusted library allocation
page read and write
660C000
heap
page read and write
AE87000
trusted library allocation
page read and write
53C8000
trusted library allocation
page read and write
629A000
heap
page read and write
A700000
trusted library allocation
page read and write
5099000
heap
page read and write
5A50000
trusted library allocation
page read and write
51F0000
heap
page read and write
61AF000
heap
page read and write
5EEE000
trusted library allocation
page read and write
6203000
heap
page read and write
51C3000
heap
page read and write
997D000
trusted library allocation
page read and write
5BCE000
trusted library allocation
page read and write
4418000
heap
page read and write
59EB000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
5AE5000
trusted library allocation
page read and write
B123000
heap
page read and write
66A9000
heap
page read and write
50C4000
heap
page read and write
A722000
trusted library allocation
page execute
A714000
trusted library allocation
page read and write
A6A6000
trusted library allocation
page read and write
59A0000
trusted library allocation
page read and write
5E59000
trusted library allocation
page read and write
5999000
trusted library allocation
page read and write
487C000
trusted library allocation
page read and write
5FB1000
heap
page read and write
9950000
trusted library allocation
page read and write
587C000
trusted library allocation
page read and write
5C79000
trusted library allocation
page read and write
5D71000
trusted library allocation
page read and write
AB02000
heap
page read and write
521A000
heap
page read and write
5FAE000
heap
page read and write
6586000
heap
page read and write
A8E4000
heap
page read and write
4878000
trusted library allocation
page read and write
5FC7000
heap
page read and write
4250000
remote allocation
page read and write
618D000
heap
page read and write
6413000
heap
page read and write
6119000
heap
page read and write
A6BF000
trusted library allocation
page read and write
AAAC000
heap
page read and write
61D6000
heap
page read and write
440B000
heap
page read and write
B103000
heap
page read and write
633B000
heap
page read and write
61EC000
heap
page read and write
6292000
heap
page read and write
50FC000
heap
page read and write
631A000
heap
page read and write
511B000
heap
page read and write
620B000
heap
page read and write
B115000
heap
page read and write
A660000
trusted library allocation
page read and write
5F6D000
heap
page read and write
67CB000
trusted library allocation
page read and write
611E000
heap
page read and write
5B50000
direct allocation
page read and write
608D000
heap
page read and write
51A5000
heap
page read and write
51ED000
heap
page read and write
A6D5000
trusted library allocation
page read and write
B143000
heap
page read and write
51A5000
heap
page read and write
51CE000
heap
page read and write
5EEF000
trusted library allocation
page read and write
5125000
heap
page read and write
66D6000
heap
page read and write
5856000
trusted library allocation
page read and write
997D000
trusted library allocation
page read and write
5EEA000
trusted library allocation
page read and write
50F1000
heap
page read and write
4888000
trusted library allocation
page read and write
5FA9000
heap
page read and write
4C0A000
heap
page read and write
5E0C000
trusted library allocation
page read and write
53CB000
trusted library allocation
page read and write
5EEE000
trusted library allocation
page read and write
5F92000
heap
page read and write
6122000
heap
page read and write
5920000
trusted library allocation
page read and write
43F1000
heap
page read and write
5993000
trusted library allocation
page read and write
631A000
heap
page read and write
4285000
trusted library allocation
page read and write
5FE7000
heap
page read and write
5AD3000
trusted library allocation
page read and write
4E24000
trusted library allocation
page read and write
4F19000
heap
page read and write
AF9C000
heap
page read and write
5119000
heap
page read and write
53C2000
trusted library allocation
page read and write
4391000
heap
page read and write
5AD3000
trusted library allocation
page read and write
587A000
trusted library allocation
page read and write
4455000
heap
page read and write
675C000
trusted library allocation
page read and write
5E5C000
trusted library allocation
page read and write
6237000
heap
page read and write
43DE000
heap
page read and write
6603000
heap
page read and write
51B8000
heap
page read and write
6389000
heap
page read and write
A6F5000
trusted library allocation
page read and write
9953000
trusted library allocation
page read and write
601E000
heap
page read and write
6236000
heap
page read and write
43E4000
heap
page read and write
628E000
heap
page read and write
61D1000
heap
page read and write
5FD7000
heap
page read and write
5209000
heap
page read and write
5F2F000
trusted library allocation
page read and write
4182000
heap
page read and write
522D000
heap
page read and write
A680000
trusted library allocation
page execute
AB8000
heap
page read and write
487E000
trusted library allocation
page read and write
4467000
heap
page read and write
5C26000
trusted library allocation
page read and write
512D000
heap
page read and write
6327000
heap
page read and write
6187000
heap
page read and write
5397000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5FFD000
heap
page read and write
48A0000
trusted library allocation
page read and write
6086000
heap
page read and write
AACD000
heap
page read and write
5E65000
trusted library allocation
page read and write
62EE000
heap
page read and write
5139000
heap
page read and write
5BF0000
trusted library allocation
page read and write
67E6000
trusted library allocation
page read and write
5D78000
trusted library allocation
page read and write
67B1000
trusted library allocation
page read and write
66D1000
heap
page read and write
612F000
heap
page read and write
5930000
trusted library allocation
page read and write
6072000
heap
page read and write
6535000
heap
page read and write
4E2E000
trusted library allocation
page read and write
522E000
heap
page read and write
6264000
heap
page read and write
4E28000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
6228000
heap
page read and write
51A5000
heap
page read and write
50CB000
heap
page read and write
There are 4555 hidden memdumps, click here to show them.