IOC Report
install_numarkidjliveii.exe

loading gif

Files

File Path
Type
Category
Malicious
install_numarkidjliveii.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\Tools\modules\bugreport.hta
HTML document, Unicode text, UTF-8 text
dropped
malicious
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\Tools\run.hta
HTML document, ASCII text
dropped
malicious
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\drp.js
ASCII text, with very long lines (896)
dropped
malicious
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\run.hta
HTML document, ASCII text
dropped
malicious
C:\Users\user\AppData\Local\Temp\na2e5gjd\na2e5gjd.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsn222C.tmp
data
dropped
malicious
C:\Users\user\AppData\Roaming\DRPSu\temp\ps.lv3gqien.fxnz0.cmd.txt
Unicode text, UTF-16, little-endian text, with very long lines (379), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\DRPSu\temp\ps.lv3gqigp.n326h.ps1
C++ source, Unicode text, UTF-16, little-endian text
dropped
malicious
C:\Users\user\AppData\Roaming\DRPSu\temp\run_command_59771.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\DRPSu\temp\run_command_96271.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\30541482[1].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\33423178[1].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\46420341[1].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\advert[1].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\allfont[1].css
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\collect[1].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\collect[2].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\30541482[1].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\33423178[1].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\46420341[1].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\COARH4S2.htm
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\collect[1].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\sync_cookie_image_decide_secondary[1].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\30541482[1].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\33423178[1].gif
GIF image data, version 89a, 1 x 1
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\46420341[1].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\watch[1].js
Unicode text, UTF-8 (with BOM) text, with very long lines (570)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\allfont[1].htm
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\sync_cookie_image_decide[1].gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\DriverPackSolution.html
HTML document, Unicode text, UTF-8 text, with very long lines (1592)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\Tools\Icon.ico
MS Windows icon resource - 9 icons, 48x48, 16 colors, 4 bits/pixel, 32x32, 16 colors, 4 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\Tools\load8.gif
GIF image data, version 89a, 50 x 50
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\Tools\patch.reg
Windows Registry text (Win2K or above)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\config.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\blank.gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\custom-control.css
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\DRPcheckbox\DRPcheckbox.eot
Embedded OpenType (EOT), icomoon family
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\DRPcheckbox\DRPcheckbox.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\DRPcheckbox\DRPcheckbox.ttf
TrueType Font data, 11 tables, 1st "OS/2", 14 names, Macintosh, type 1 string, icomoon
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\DRPcheckbox\DRPcheckbox.woff
Web Open Font Format, TrueType, length 1136, version 0.0
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\DRPicons\DRPicons-webfont.eot
Embedded OpenType (EOT), icomoon family
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\DRPicons\DRPicons-webfont.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\DRPicons\DRPicons-webfont.ttf
TrueType Font data, 11 tables, 1st "OS/2", 14 names, Macintosh, type 1 string, icomoon
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\DRPicons\DRPicons-webfont.woff
Web Open Font Format, TrueType, length 7908, version 0.0
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\Open-Sans\generator_config.txt
ASCII text, with very long lines (569)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\Open-Sans\opensans-bold-webfont.eot
Embedded OpenType (EOT), Open Sans family
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\Open-Sans\opensans-bold-webfont.ttf
TrueType Font data, 17 tables, 1st "FFTM", 12 names, Microsoft, language 0x409, Digitized data copyright \251 2010-2011, Google Corporation.Open SansBoldwebfontOpen Sans BoldVe
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\Open-Sans\opensans-italic-webfont.eot
Embedded OpenType (EOT), Open Sans family
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\Open-Sans\opensans-italic-webfont.ttf
TrueType Font data, 17 tables, 1st "FFTM", 12 names, Microsoft, language 0x409, Digitized data copyright \251 2010-2011, Google Corporation.Open SansItalicwebfontOpen Sans Ital
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\Open-Sans\opensans-regular-webfont.eot
Embedded OpenType (EOT), Open Sans family
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\Open-Sans\opensans-regular-webfont.ttf
TrueType Font data, 17 tables, 1st "FFTM", 12 names, Microsoft, language 0x409, Digitized data copyright \251 2010-2011, Google Corporation.Open SansRegularwebfontOpen Sans Reg
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\Open-Sans\opensans-semibold-webfont.eot
Embedded OpenType (EOT), Open Sans Semibold family
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\Open-Sans\opensans-semibold-webfont.ttf
TrueType Font data, 19 tables, 1st "FFTM", 17 names, Microsoft, language 0x409, Digitized data copyright \251 2011, Google Corporation.Open Sans SemiboldRegularAscender - Open
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\ProximaNova\proxima_nova_light-webfont.eot
Embedded OpenType (EOT), Proxima Nova Lt family
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\ProximaNova\proxima_nova_light-webfont.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\ProximaNova\proxima_nova_light-webfont.ttf
TrueType Font data, 19 tables, 1st "FFTM", 19 names, Microsoft, language 0x409, Copyright (c) Mark Simonson, 2005. All rights reserved.Proxima Nova LtLightMarkSimonson: Proxima
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\ProximaNova\proxima_nova_light-webfont.woff
Web Open Font Format, TrueType, length 27788, version 1.0
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\ProximaNova\proxima_nova_regular-webfont.eot
Embedded OpenType (EOT), Proxima Nova Rg family
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\ProximaNova\proxima_nova_regular-webfont.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\ProximaNova\proxima_nova_regular-webfont.ttf
TrueType Font data, 19 tables, 1st "FFTM", 19 names, Microsoft, language 0x409, Copyright (c) Mark Simonson, 2005. All rights reserved.Proxima Nova RgRegularMarkSimonson: Proxi
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\ProximaNova\proxima_nova_regular-webfont.woff
Web Open Font Format, TrueType, length 29548, version 1.0
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\ProximaNova\proxima_nova_semibold-webfont.eot
Embedded OpenType (EOT), Proxima Nova Lt family
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\ProximaNova\proxima_nova_semibold-webfont.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\ProximaNova\proxima_nova_semibold-webfont.ttf
TrueType Font data, 19 tables, 1st "FFTM", 19 names, Microsoft, language 0x409, Copyright (c) Mark Simonson, 2005. All rights reserved.Proxima Nova LtSemiboldMarkSimonson: Prox
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\ProximaNova\proxima_nova_semibold-webfont.woff
Web Open Font Format, TrueType, length 29768, version 1.0
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\Roboto\roboto-light-webfont.eot
Embedded OpenType (EOT), Roboto Light family
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\Roboto\roboto-light-webfont.ttf
TrueType Font data, 19 tables, 1st "FFTM", 20 names, Microsoft, language 0x409, Copyright 2011 Google Inc. All Rights Reserved.Roboto LightRegularRoboto LightRoboto Light Regul
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\Roboto\roboto-regular-webfont.eot
Embedded OpenType (EOT), Roboto family
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\Roboto\roboto-regular-webfont.ttf
TrueType Font data, 19 tables, 1st "FFTM", 18 names, Microsoft, language 0x409, Copyright 2011 Google Inc. All Rights Reserved.RobotoRegularRobotoRoboto RegularVersion 2.001101
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\Roboto\roboto-thin-webfont.eot
Embedded OpenType (EOT), Roboto Thin family
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\fonts\Roboto\roboto-thin-webfont.ttf
TrueType Font data, 19 tables, 1st "FFTM", 20 names, Microsoft, language 0x409, Copyright 2011 Google Inc. All Rights Reserved.Roboto ThinRegularRoboto ThinRoboto Thin RegularV
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\icons-checkbox.css
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\icons.css
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\ie6.css
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\ie7.css
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\lte-ie8.css
CSV text
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\lte-ie9.css
CSV text
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\normalize.min.css
ASCII text, with very long lines (1858), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\open-sans.css
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\proximanova.css
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\roboto.css
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\css\style.css
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\drp.css
ASCII text, with very long lines (1522)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\blank.gif
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\btn-icon-admin-mode.png
PNG image data, 108 x 75, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\bugreport\BugReport_icon_alert.png
PNG image data, 42 x 38, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\bugreport\BugReport_icon_ie.png
PNG image data, 31 x 31, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\bugreport\BugReport_icon_previous.png
PNG image data, 31 x 31, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\bugreport\BugReport_icon_skip.png
PNG image data, 31 x 31, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\bugreport\BugReport_loader.gif
GIF image data, version 89a, 64 x 64
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\burger\auto_installation.png
PNG image data, 22 x 22, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\cam.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\charms\apps.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=4, xresolution=62, yresolution=70, resolutionunit=2, software=paint.net 4.0.3], baseline, precision 8, 32x32, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\charms\arrow.png
PNG image data, 10 x 17, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\charms\computer.png
PNG image data, 24 x 18, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\charms\download.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=4, xresolution=62, yresolution=70, resolutionunit=2, software=paint.net 4.0.3], baseline, precision 8, 32x32, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\charms\download.png
PNG image data, 64 x 48, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\charms\gears.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\charms\help.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\charms\info.png
PNG image data, 16 x 16, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\charms\line.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=4, xresolution=62, yresolution=70, resolutionunit=2, software=paint.net 4.0.3], baseline, precision 8, 32x1, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\charms\pc.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=4, xresolution=62, yresolution=70, resolutionunit=2, software=paint.net 4.0.3], baseline, precision 8, 32x32, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\charms\programms.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\charms\reload-sm.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\charms\setup.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=4, xresolution=62, yresolution=70, resolutionunit=2, software=paint.net 4.0.3], baseline, precision 8, 32x32, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\charms\setup.png
PNG image data, 64 x 48, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\charms\store.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\charms\toolkit.png
PNG image data, 64 x 48, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\device-class\bluetooth.png
PNG image data, 62 x 62, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\device-class\cardreader.png
PNG image data, 54 x 54, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\device-class\chipset.png
PNG image data, 60 x 60, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\device-class\default.png
PNG image data, 62 x 62, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\device-class\inputdev.png
PNG image data, 62 x 62, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\device-class\lan.png
PNG image data, 62 x 62, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\device-class\massstorage.png
PNG image data, 62 x 62, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\device-class\modem.png
PNG image data, 62 x 62, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\device-class\monitor.png
PNG image data, 62 x 62, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\device-class\other.png
PNG image data, 62 x 62, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\device-class\phone.png
PNG image data, 60 x 60, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\device-class\printer.png
PNG image data, 62 x 62, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\device-class\sound.png
PNG image data, 60 x 60, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\device-class\tvtuner.png
PNG image data, 62 x 62, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\device-class\undefined-device.png
PNG image data, 61 x 60, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\device-class\video.png
PNG image data, 60 x 60, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\device-class\webcamera.png
PNG image data, 62 x 62, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\device-class\wifi.png
PNG image data, 62 x 62, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\device-generic.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\driver-row-arrow.png
PNG image data, 37 x 23, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\fake-installation\browser.png
PNG image data, 30 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\fake-installation\connect.png
PNG image data, 22 x 34, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\fake-installation\firewall.png
PNG image data, 24 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\fake-installation\torrent.png
PNG image data, 26 x 30, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\fake-installation\vpn.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\final\final_aside-failure$2x.png
PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\final\final_button-warning$2x.png
PNG image data, 65 x 58, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\final\final_failure$2x.png
PNG image data, 264 x 263, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\final\final_main-cta-arrow$2x.png
PNG image data, 12 x 19, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\final\final_partial-success$2x.png
PNG image data, 264 x 263, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\final\final_success$2x.png
PNG image data, 264 x 263, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\games\games-bottom-logo.png
PNG image data, 386 x 111, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\games\games-button-icon-green.png
PNG image data, 38 x 38, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\games\games-button-icon-white.png
PNG image data, 38 x 38, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\games\games-cloud-big.png
PNG image data, 1889 x 993, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\games\games-cloud.png
PNG image data, 1227 x 813, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\games\games-top-civilization.jpg
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=165, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=293], baseline, precision 8, 293x165, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\games\games-top-doom-large.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 72x72, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=1], baseline, precision 8, 601x339, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\games\games-top-doom.jpg
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=165, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=293], baseline, precision 8, 293x165, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\games\games-top-gta.jpg
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=165, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=293], baseline, precision 8, 293x165, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\games\games-top-hitman.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 72x72, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=1], baseline, precision 8, 293x165, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\games\games-top-mafia.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 72x72, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=1], baseline, precision 8, 293x165, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\games\games-top-overwatch.jpg
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=165, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=293], baseline, precision 8, 293x165, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\games\games-top-resident-evil.jpg
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=165, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=293], baseline, precision 8, 293x165, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\games\games-top-witcher-large.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 72x72, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=1], baseline, precision 8, 601x339, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\games\games-top-witcher.jpg
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=165, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=293], baseline, precision 8, 293x165, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\header\header-bell.png
PNG image data, 22 x 23, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\header\header-logo$2x.png
PNG image data, 336 x 44, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\header\header-logo.png
PNG image data, 168 x 22, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\info.png
PNG image data, 16 x 16, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner-arrow-left.png
PNG image data, 26 x 55, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner-arrow-right.png
PNG image data, 27 x 55, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_auth-bg.jpg
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, progressive, precision 8, 403x265, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_avast-bg.jpg
JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, baseline, precision 8, 404x266, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_browsers-bg.jpg
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, progressive, precision 8, 403x265, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_bullit-active.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_bullit-empty.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_catalog-bg-en.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 72x72, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=1], baseline, precision 8, 403x265, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_catalog-bg-pt-br.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 72x72, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=1], baseline, precision 8, 403x265, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_catalog-bg-ru.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 72x72, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=1], baseline, precision 8, 403x265, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_catalog-bg.jpg
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, progressive, precision 8, 403x265, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_cloud-bg.jpg
JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, baseline, precision 8, 404x266, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_driverpack-for-all-bg.jpg
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, progressive, precision 8, 403x265, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_how-it-works-bg.jpg
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, progressive, precision 8, 403x265, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_istart-bg.jpg
JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, baseline, precision 8, 404x266, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_opera-bg.gif
GIF image data, version 89a, 469 x 250
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_protect-bg-de.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 72x72, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=1], baseline, precision 8, 403x265, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_protect-bg-en.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 72x72, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=1], baseline, precision 8, 403x265, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_protect-bg-es.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 72x72, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=1], baseline, precision 8, 403x265, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_protect-bg-fr.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 72x72, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=1], baseline, precision 8, 403x265, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_protect-bg-pt-br.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 72x72, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=1], baseline, precision 8, 403x265, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_protect-bg-ru.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 72x72, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=1], baseline, precision 8, 403x265, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_protect-bg.jpg
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, progressive, precision 8, 403x265, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_restore-bg.jpg
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, progressive, precision 8, 403x265, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_social-bg-en.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 72x72, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=1], baseline, precision 8, 403x265, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_social-bg-ru.jpg
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, progressive, precision 8, 403x265, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_social-fb.png
PNG image data, 61 x 75, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_social-vk.png
PNG image data, 61 x 75, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_virus-bg.png
PNG image data, 314 x 203, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_win-10-bg.jpg
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, progressive, precision 8, 403x265, components 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\banner_yandex.png
PNG image data, 592 x 96, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\confirm-popup-check-mark.png
PNG image data, 24 x 18, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\controls\cancel.png
PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\controls\cancel_disable.png
PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\controls\cancel_hover.png
PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\controls\close.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\controls\close_hover.png
PNG image data, 16 x 17, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\controls\info_hover.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\controls\info_normal.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\controls\less_hover.png
PNG image data, 16 x 12, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\controls\less_normal.png
PNG image data, 16 x 12, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\controls\more_hover.png
PNG image data, 16 x 12, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\controls\more_normal.png
PNG image data, 16 x 12, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\controls\pause.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\controls\pause_hover.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\controls\play.png
PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\controls\play_hover.png
PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\controls\reload.png
PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\controls\reload_disable.png
PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\controls\reload_hover.png
PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\DP_Biometric.png
PNG image data, 57 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\DP_Printer.png
PNG image data, 57 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\DP_TV_DVB.png
PNG image data, 57 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\DP_Touchpad.png
PNG image data, 57 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\DP_xUSB.png
PNG image data, 57 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\Notebook.png
PNG image data, 57 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\Scanner.png
PNG image data, 57 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\bluetooth.png
PNG image data, 57 x 55, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\cardreader.png
PNG image data, 57 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\chipset.png
PNG image data, 57 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\inputdev.png
PNG image data, 57 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\lan.png
PNG image data, 57 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\massstorage.png
PNG image data, 57 x 54, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\modem.png
PNG image data, 57 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\monitor.png
PNG image data, 57 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\other.png
PNG image data, 57 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\phone.png
PNG image data, 57 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\printer.png
PNG image data, 57 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\restore_point.png
PNG image data, 57 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\sound.png
PNG image data, 57 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\tvtuner.png
PNG image data, 57 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\vendor.png
PNG image data, 57 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\video.png
PNG image data, 57 x 55, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\webcamera.png
PNG image data, 57 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\wifi.png
PNG image data, 57 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\drivers\zBad.png
PNG image data, 57 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\icon-details.png
PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\icon-install.png
PNG image data, 20 x 18, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\icon-installed.png
PNG image data, 31 x 22, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\soft\Antivirus.png
PNG image data, 56 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\soft\Archiver.png
PNG image data, 56 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\soft\Backup.png
PNG image data, 56 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\soft\Browser.png
PNG image data, 56 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\soft\Drivers.png
PNG image data, 56 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\soft\Internet.png
PNG image data, 56 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\soft\Messenger.png
PNG image data, 56 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\soft\Player.png
PNG image data, 56 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\soft\System.png
PNG image data, 56 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\soft\Viewer.png
PNG image data, 56 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\statuses\done.png
PNG image data, 40 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\statuses\error.png
PNG image data, 40 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\statuses\progress.gif
GIF image data, version 89a, 240 x 3
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\installation\statuses\sleep.png
PNG image data, 40 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\loading-finish.png
PNG image data, 211 x 48, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\loading-spiner.gif
GIF image data, version 89a, 200 x 200
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\loading.gif
GIF image data, version 89a, 400 x 400
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\med_logo.png
PNG image data, 256 x 81, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\med_logo_dark.png
PNG image data, 263 x 74, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\med_logo_ui2.png
PNG image data, 166 x 47, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\new-logo.png
PNG image data, 342 x 42, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\no_internet\no_internet-complete.png
PNG image data, 210 x 130, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\no_internet\no_internet-connection.png
PNG image data, 204 x 149, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\no_internet\no_internet-step1.png
PNG image data, 210 x 130, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\no_internet\no_internet-step2.png
PNG image data, 210 x 130, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\onboarding\antiviruses.gif
GIF image data, version 89a, 610 x 322
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\onboarding\autostart.png
PNG image data, 600 x 600, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\onboarding\blocked.png
PNG image data, 600 x 600, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\onboarding\checking.png
PNG image data, 600 x 600, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\onboarding\cleaning.png
PNG image data, 600 x 600, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\onboarding\done.png
PNG image data, 28 x 28, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\onboarding\likes\down-active.png
PNG image data, 26 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\onboarding\likes\down-hover.png
PNG image data, 26 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\onboarding\likes\down.png
PNG image data, 26 x 26, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\onboarding\likes\up-active.png
PNG image data, 26 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\onboarding\likes\up-hover.png
PNG image data, 26 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\onboarding\likes\up.png
PNG image data, 26 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\onboarding\settings.png
PNG image data, 600 x 600, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\onboarding\social.png
PNG image data, 600 x 600, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\onboarding\soft.png
PNG image data, 600 x 600, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\programs\arrow-collapse.png
PNG image data, 24 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\programs\arrow-expand.png
PNG image data, 24 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\programs\btn-icon-install-all-soft.png
PNG image data, 46 x 38, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\programs\btn-icon.png
PNG image data, 46 x 38, 8-bit gray+alpha, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\programs\confirm-popup-accept.png
PNG image data, 31 x 31, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\programs\confirm-popup-deny.png
PNG image data, 31 x 31, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\programs\default-soft.png
PNG image data, 36 x 36, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\programs\expand-all.png
PNG image data, 17 x 11, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\programs\expand-all@2x.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\programs\installed-programs_info-success.png
PNG image data, 61 x 61, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\programs\installed-programs_info-warn.png
PNG image data, 61 x 61, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\programs\protector-bg.png
PNG image data, 130 x 160, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\programs\rolling-remove-single.gif
GIF image data, version 89a, 24 x 24
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\programs\rolling.gif
GIF image data, version 89a, 30 x 30
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\programs\scan.png
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\programs\soft-bg.png
PNG image data, 144 x 144, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\programs\star-empty-protect.png
PNG image data, 15 x 14, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\programs\star-empty.png
PNG image data, 10 x 10, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\programs\star-full-protect.png
PNG image data, 15 x 14, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\programs\star-full.png
PNG image data, 11 x 10, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\programs\start_arrow.png
PNG image data, 37 x 70, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\programs\start_btn-icon.png
PNG image data, 140 x 136, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\programs\uninstall-all-loader.gif
GIF image data, version 89a, 30 x 30
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\programs\uninstall-single-loader.gif
GIF image data, version 89a, 26 x 26
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\arrow-bottom.png
PNG image data, 17 x 10, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\arrow-start-screen-toggle.png
PNG image data, 15 x 6, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\arrow-top.png
PNG image data, 17 x 10, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\backup-grey.png
PNG image data, 24 x 23, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\checkbox.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\configurator-btn-icon.png
PNG image data, 23 x 23, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\control-panel-grey.png
PNG image data, 23 x 23, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\driver-filter-arrow.png
PNG image data, 9 x 5, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\expert_hover.png
PNG image data, 15 x 15, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\expert_normal.png
PNG image data, 15 x 15, 8-bit gray+alpha, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\globe_hover.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\globe_normal.png
PNG image data, 16 x 16, 8-bit gray+alpha, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\icon-device-manager.png
PNG image data, 28 x 28, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\icon-driver-row-collapse.png
PNG image data, 13 x 7, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\icon-support.png
PNG image data, 27 x 27, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\icon-system-restore.png
PNG image data, 28 x 28, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\install-programs-grey.png
PNG image data, 21 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\kebab-icon.png
PNG image data, 5 x 19, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\language-arrow.png
PNG image data, 10 x 6, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\language-arrow_hover.png
PNG image data, 10 x 6, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\load-screen-server.png
PNG image data, 650 x 627, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\menu-diagnostics.png
PNG image data, 22 x 22, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\menu-drivers.png
PNG image data, 22 x 22, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\menu-games.png
PNG image data, 45 x 45, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\menu-lang-arrow.png
PNG image data, 10 x 7, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\menu-lang-icon.png
PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\menu-offline.png
PNG image data, 22 x 22, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\menu-protect.png
PNG image data, 22 x 22, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\menu-report-icon.png
PNG image data, 19 x 18, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\menu-settings-icon.png
PNG image data, 19 x 20, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\menu-software.png
PNG image data, 22 x 22, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\move-to-top_arrow.png
PNG image data, 7 x 12, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\new-logo.png
PNG image data, 341 x 163, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\settings-bg.png
PNG image data, 144 x 135, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\start-info.png
PNG image data, 18 x 17, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\startscreen-slider-oval-hover.png
PNG image data, 38 x 38, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\startscreen-slider-oval-yellow-hover.png
PNG image data, 38 x 38, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\startscreen-slider-oval.png
PNG image data, 36 x 36, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\trusted.png
PNG image data, 128 x 24, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\trusted_hover.png
PNG image data, 128 x 24, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\zero-drivers_button-arrow.png
PNG image data, 12 x 19, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\screens\zero-drivers_logo.png
PNG image data, 1270 x 244, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\speaker.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\wifi-disabled.png
PNG image data, 256 x 256, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\img\wifi.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\js\soft.js
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\ar.js
Unicode text, UTF-8 text, with very long lines (608)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\az.js
Unicode text, UTF-8 text, with very long lines (709)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\be.js
Unicode text, UTF-8 text, with very long lines (617)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\bg.js
Unicode text, UTF-8 text, with very long lines (589)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\bn.js
Unicode text, UTF-8 text, with very long lines (534)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\ca.js
Unicode text, UTF-8 text, with very long lines (775)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\cs.js
Unicode text, UTF-8 text, with very long lines (737)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\de.js
Unicode text, UTF-8 text, with very long lines (771)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\el.js
Unicode text, UTF-8 text, with very long lines (737)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\en.js
Unicode text, UTF-8 text, with very long lines (737)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\es-419.js
Unicode text, UTF-8 text, with very long lines (796)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\es.js
Unicode text, UTF-8 text, with very long lines (735)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\et.js
Unicode text, UTF-8 text, with very long lines (650)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\fa.js
Unicode text, UTF-8 text, with very long lines (723)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\fil.js
Unicode text, UTF-8 text, with very long lines (794)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\fr.js
Unicode text, UTF-8 text, with very long lines (829)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\gu.js
Unicode text, UTF-8 text, with very long lines (495)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\hi.js
Unicode text, UTF-8 text, with very long lines (582)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\hu.js
Unicode text, UTF-8 text, with very long lines (669)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\hy.js
Unicode text, UTF-8 text, with very long lines (508)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\id.js
Unicode text, UTF-8 text, with very long lines (761)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\it.js
Unicode text, UTF-8 text, with very long lines (751)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\ka.js
Unicode text, UTF-8 text, with very long lines (508)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\ko.js
Unicode text, UTF-8 text, with very long lines (437)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\ku.js
Unicode text, UTF-8 text, with very long lines (536)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\nl.js
Unicode text, UTF-8 text, with very long lines (840)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\no.js
Unicode text, UTF-8 text, with very long lines (710)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\om.js
Unicode text, UTF-8 text, with very long lines (630)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\pl.js
Unicode text, UTF-8 text, with very long lines (737)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\ps.js
Unicode text, UTF-8 text, with very long lines (636)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\pt-br.js
Unicode text, UTF-8 text, with very long lines (784)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\pt-pt.js
Unicode text, UTF-8 text, with very long lines (742)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\ro.js
Unicode text, UTF-8 text, with very long lines (776)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\ru.js
Unicode text, UTF-8 text, with very long lines (508)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\sk.js
Unicode text, UTF-8 text, with very long lines (737)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\sl.js
Unicode text, UTF-8 text, with very long lines (708)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\sq.js
Unicode text, UTF-8 text, with very long lines (724)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\sr.js
Unicode text, UTF-8 text, with very long lines (697)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\sw.js
Unicode text, UTF-8 text, with very long lines (733)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\ta.js
Unicode text, UTF-8 text, with very long lines (555)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\te.js
Unicode text, UTF-8 text, with very long lines (546)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\tg.js
Unicode text, UTF-8 text, with very long lines (637)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\th.js
Unicode text, UTF-8 text, with very long lines (550)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\tr.js
Unicode text, UTF-8 text, with very long lines (739)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\uk.js
Unicode text, UTF-8 text, with very long lines (510)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\ur.js
Unicode text, UTF-8 text, with very long lines (737)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\uz.js
Unicode text, UTF-8 text, with very long lines (717)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\vi.js
Unicode text, UTF-8 text, with very long lines (737)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\yo.js
Unicode text, UTF-8 text, with very long lines (734)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\zh-cn.js
Unicode text, UTF-8 text, with very long lines (409)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\languages\zh.js
Unicode text, UTF-8 text, with very long lines (389)
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\programs\AvastAntivirusA.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\programs\AvastAntivirusWorldwideA.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\programs\downloader_browser.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\programs\downloader_browser_tr.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\programs\downloader_elements.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\RES4350.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols, created Wed Apr 17 08:56:37 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_btnw5evz.j5b.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eh3zvqed.vy3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\na2e5gjd\CSC2CD567E8E04445B29892BAFC155E45E.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\na2e5gjd\na2e5gjd.0.cs
Unicode text, UTF-8 (with BOM) text, with very long lines (374)
dropped
C:\Users\user\AppData\Local\Temp\na2e5gjd\na2e5gjd.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\na2e5gjd\na2e5gjd.out
Unicode text, UTF-8 (with BOM) text, with very long lines (482), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\nst22E9.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nst22E9.tmp\modern-header.bmp
PC bitmap, Windows 3.x format, 241 x 91 x 24, image size 65886, resolution 2834 x 2834 px/m, cbSize 65940, bits offset 54
dropped
C:\Users\user\AppData\Roaming\DRPSu\Logs\log___2024-04-17-09-00-08.html
data
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 407 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\install_numarkidjliveii.exe
"C:\Users\user\Desktop\install_numarkidjliveii.exe"
malicious
C:\Windows\SysWOW64\reg.exe
C:\Windows\system32\reg.exe import "C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\Tools\patch.reg"
malicious
C:\Windows\SysWOW64\mshta.exe
C:\Windows\system32\mshta.exe C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\run.hta
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C powershell -NonInteractive -NoLogo -NoProfile -ExecutionPolicy Bypass "Get-Content 'C:\Users\user\AppData\Roaming\DRPSu\temp\ps.lv3gqien.fxnz0.cmd.txt' -Wait | Invoke-Expression" > "C:\Users\user\AppData\Roaming\DRPSu\temp\ps.lv3gqien.fxnz0.stdout.log" 2> "C:\Users\user\AppData\Roaming\DRPSu\temp\ps.lv3gqien.fxnz0.stderr.log"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -NonInteractive -NoLogo -NoProfile -ExecutionPolicy Bypass "Get-Content 'C:\Users\user\AppData\Roaming\DRPSu\temp\ps.lv3gqien.fxnz0.cmd.txt' -Wait | Invoke-Expression"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c "netsh advfirewall firewall delete rule name="DriverPack aria2c.exe" || echo Done & call echo Done %^errorLevel% > "C:\Users\user\AppData\Roaming\DRPSu\temp\run_command_96271.txt""
malicious
C:\Windows\SysWOW64\netsh.exe
netsh advfirewall firewall delete rule name="DriverPack aria2c.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\na2e5gjd\na2e5gjd.cmdline"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c "netsh advfirewall firewall add rule name="DriverPack aria2c.exe" dir=in action=allow program="C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\tools\aria2c.exe" || echo Done & call echo Done %^errorLevel% > "C:\Users\user\AppData\Roaming\DRPSu\temp\run_command_59771.txt""
malicious
C:\Windows\SysWOW64\netsh.exe
netsh advfirewall firewall add rule name="DriverPack aria2c.exe" dir=in action=allow program="C:\Users\user\AppData\Local\Temp\DriverPack-2024041790000\tools\aria2c.exe"
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32 kernel32,Sleep
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES4350.tmp" "c:\Users\user\AppData\Local\Temp\na2e5gjd\CSC2CD567E8E04445B29892BAFC155E45E.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\wbem\WmiPrvSE.exe
C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://mc.yandex.com/sync_cookie_image_checkX2
unknown
http://update.drp.su/api/cleanertVersion
unknown
http://dl.driverpack.io/soft/ab/downloader_browser.exe
unknown
http://update.drp.su/api/selectz
unknown
http://download.drp.su/tools/Asus7.exe
unknown
http://download.drp.su/tools/Dell10.exe
unknown
https://mc.yandex.com/clmap/46420341?page-url=file%3A%2F%2F%2FC%3A%2FUsers%2Fuser%2FAppData%2FLocal%2FTemp%2FDriverPack-2024041790000%2FDriverPackSolution.html%23C%253A%255CUsers%255Cuser%255CAppData%255CLocal%255CTemp%255CDriverPack-2024041790000%255Crun.hta%2520&pointer-click=rn%3A943650839%3Ax%3A32153%3Ay%3A0%3At%3A1902%3Ap%3AA2AA*%3AX%3A628%3AY%3A0&browser-info=u%3A1713337221523401810%3Av%3A1310%3Avf%3A666f337a5rpc9tpuxktcnb7h7%3Arqnl%3A1%3Ast%3A1713337411&t=gdpr(14)ti(4)
87.250.250.119
http://download.drp.su/driverpacks/repack/Sound_IDT/IDT/AllNTx64x86/ECS_6.10.6207.2/IDT-AllNTx64x86-
unknown
http://dl.driverpack.io/tools/Asus7.exe
unknown
http://dl.driverpack.io/soft/7-Zip.png
unknown
http://dl.driverpack.io/soft/ab/4/Internet-Start.exe
unknown
https://driverpack.io/pt-pt/info/translators
unknown
http://download.drp.su/soft/VisualCplus.exe
unknown
http://goo.gl/KsIlge
unknown
https://playkey.net/ru/game/Resident_evil_7_Demo/?utm_source=driverpack&utm_medium=referral&utm_term
unknown
https://mc.yandex.com/clmap/46420341?page-url=file%3A%2F%2F%2FC%3A%2FUsers%2Fuser%2FAppData%2FLocal%2FTemp%2FDriverPack-2024041790000%2FDriverPackSolution.html%23C%253A%255CUsers%255Cuser%255CAppData%255CLocal%255CTemp%255CDriverPack-2024041790000%255Crun.hta%2520&pointer-click=rn%3A964748906%3Ax%3A32153%3Ay%3A0%3At%3A859%3Ap%3AA2AA*%3AX%3A628%3AY%3A0&browser-info=u%3A1713337221523401810%3Av%3A1310%3Avf%3A666f337a5rpc9tpuxktcnb7h7%3Arqnl%3A1%3Ast%3A1713337307&t=gdpr(14)ti(4)
87.250.250.119
https://mc.yandex.com/clmap/46420341?page-url=file%3A%2F%2F%2FC%3A%2FUsers%2Fuser%2FAppData%2FLocal%2FTemp%2FDriverPack-2024041790000%2FDriverPackSolution.html%23C%253A%255CUsers%255Cuser%255CAppData%255CLocal%255CTemp%255CDriverPack-2024041790000%255Crun.hta%2520&pointer-click=rn%3A229434377%3Ax%3A32101%3Ay%3A0%3At%3A1846%3Ap%3AA2AA*%3AX%3A627%3AY%3A0&browser-info=u%3A1713337221523401810%3Av%3A1310%3Avf%3A666f337a5rpc9tpuxktcnb7h7%3Arqnl%3A1%3Ast%3A1713337406&t=gdpr(14)ti(4)
87.250.250.119
http://dl.driverpack.io/soft/Opera64cis_woGoogle_win7.exe
unknown
https://mc.yandex.com/clmap/33423178?page-url=file%3A%2F%2F%2FC%3A%2FUsers%2Fuser%2FAppData%2FLocal%2FTemp%2FDriverPack-2024041790000%2FDriverPackSolution.html%23C%253A%255CUsers%255Cuser%255CAppData%255CLocal%255CTemp%255CDriverPack-2024041790000%255Crun.hta%2520&pointer-click=rn%3A482164787%3Ax%3A32153%3Ay%3A0%3At%3A1788%3Ap%3AA2AA*%3AX%3A628%3AY%3A0&browser-info=u%3A1713337221523401810%3Av%3A1310%3Avf%3A666f337a5rpc9tpuxktcnb7h7%3Arqnl%3A1%3Ast%3A1713337400&t=gdpr(14)ti(4)
87.250.250.119
https://driverpack.io/gu/info/translators
unknown
http://download.drp.su/tools/MSIx64.exe
unknown
http://update.drp.su/api/events14e6Temp/DriverPack-2024041790000/
unknown
https://mc.yandex.com/clmap/33423178?page-url=file%3A%2F%2F%2FC%3A%2FUsers%2Fuser%2FAppData%2FLocal%2FTemp%2FDriverPack-2024041790000%2FDriverPackSolution.html%23C%253A%255CUsers%255Cuser%255CAppData%255CLocal%255CTemp%255CDriverPack-2024041790000%255Crun.hta%2520&pointer-click=rn%3A55722148%3Ax%3A32153%3Ay%3A0%3At%3A409%3Ap%3AA2AA*%3AX%3A628%3AY%3A0&browser-info=u%3A1713337221523401810%3Av%3A1310%3Avf%3A666f337a5rpc9tpuxktcnb7h7%3Arqnl%3A1%3Ast%3A1713337262&t=gdpr(14)ti(4)
87.250.250.119
http://download.drp.su/soft/WinRARx86Rus.exe
unknown
https://mc.yandex.co
unknown
https://vk.com/driverpacksolution
unknown
https://mc.yandex.com/clmap/46420341?page-url=file%3A%2F%2F%2FC%3A%2FUsers%2Fuser%2FAppData%2FLocal%2FTemp%2FDriverPack-2024041790000%2FDriverPackSolution.html%23C%253A%255CUsers%255Cuser%255CAppData%255CLocal%255CTemp%255CDriverPack-2024041790000%255Crun.hta%2520&pointer-click=rn%3A587143957%3Ax%3A32153%3Ay%3A0%3At%3A2142%3Ap%3AA2AA*%3AX%3A628%3AY%3A0&browser-info=u%3A1713337221523401810%3Av%3A1310%3Avf%3A666f337a5rpc9tpuxktcnb7h7%3Arqnl%3A1%3Ast%3A1713337435&t=gdpr(14)ti(4)
87.250.250.119
https://vk.com/topic-29220845_34742952p
unknown
http://allfont.ru/allfont.css?fonts=lucida-consolei
unknown
http://download.drp.su/clean-icons/E38CFFEAD913423A620C3914CEF36C7C.png
unknown
https://mc.yandex.com/clmap/33423178?page-url=file%3A%2F%2F%2FC%3A%2FUsers%2Fuser%2FAppData%2FLocal%2FTemp%2FDriverPack-2024041790000%2FDriverPackSolution.html%23C%253A%255CUsers%255Cuser%255CAppData%255CLocal%255CTemp%255CDriverPack-2024041790000%255Crun.hta%2520&pointer-click=rn%3A257828719%3Ax%3A32101%3Ay%3A0%3At%3A147%3Ap%3AA2AA*%3AX%3A627%3AY%3A0&browser-info=u%3A1713337221523401810%3Av%3A1310%3Avf%3A666f337a5rpc9tpuxktcnb7h7%3Arqnl%3A1%3Ast%3A1713337236&t=gdpr(14)ti(4)
87.250.250.119
https://mc.yandex.com/clmap/30541482?page-url=file%3A%2F%2F%2FC%3A%2FUsers%2Fuser%2FAppData%2FLocal%2FTemp%2FDriverPack-2024041790000%2FDriverPackSolution.html%23C%253A%255CUsers%255Cuser%255CAppData%255CLocal%255CTemp%255CDriverPack-2024041790000%255Crun.hta%2520&pointer-click=rn%3A761297770%3Ax%3A32153%3Ay%3A0%3At%3A859%3Ap%3AA2AA*%3AX%3A628%3AY%3A0&browser-info=u%3A1713337221523401810%3Av%3A1310%3Avf%3A666f337a5rpc9tpuxktcnb7h7%3Arqnl%3A1%3Ast%3A1713337307&t=gdpr(14)ti(4)
87.250.250.119
https://playkey.net/ru/intro_witcher3/?utm_source=driverpack&utm_medium=referral&utm_term=witcher3&u
unknown
https://yastatic.net/s3/metrika
unknown
http://download.drp.su/soft/system/empty.cmd
unknown
http://update.drp.su/api/eventssoft
unknown
http://update.drp.su/api/eventsXO
unknown
http://dl.driverpack.io/soft/7-Zip.exe
unknown
http://download.drp.su/clean-icons/44E73F3C92E551742A13ED5FE352DE77.png
unknown
http://dl.drp.su/soft/Opera86cis_woGoogle.exe
unknown
http://goo.gl/LhFpo0
unknown
http://download.driverpacks.net
unknown
http://dl.drp.su/soft/AIMP.png
unknown
https://playkey.net/ru/game/Hitman_demo/?utm_source=driverpack&utm_medium=referral&utm_term=Hitman&u
unknown
http://dl.driverpack.io/soft/SearcherBar.png
unknown
http://download.drp.su/soft/system/windows8.1-kb4012213-x86.msu
unknown
https://mc.yandex.com/watch/30541482?wmode=7&page-url=file%3A%2F%2F%2FC%3A%2FUsers%2Fuser%2FAppData%2FLocal%2FTemp%2FDriverPack-2024041790000%2FDriverPackSolution.html%23C%253A%255CUsers%255Cuser%255CAppData%255CLocal%255CTemp%255CDriverPack-2024041790000%255Crun.hta%2520&nohit=1&charset=utf-8&ut=noindex&uah=che%0A0&browser-info=pv%3A1%3Avf%3A666f337a5rpc9tpuxktcnb7h7%3Afu%3A0%3Aen%3Autf-8%3Ala%3Aen-CH%3Av%3A1310%3Acn%3A2%3Adp%3A0%3Als%3A216293643373%3Ahid%3A878105662%3Az%3A120%3Ai%3A20240417090021%3Aet%3A1713337221%3Ac%3A1%3Arn%3A57545193%3Au%3A1713337221523401810%3Aw%3A1280x984%3As%3A1280x1024x24%3Ask%3A1%3Aj%3A1%3Aco%3A0%3Ans%3A1713337205210%3Arqnl%3A1%3Ast%3A1713337223%3At%3ADriverPack%20Solution%2017.10.7%20Online&t=gdpr(14)mc(p-1-ui-1)clc(0-0-0)eco(3703048)aw(1)rcm(0)cdl(na)ti(2)
87.250.250.119
http://dl.driverpack.io/soft/uTorrent.exe
unknown
https://mc.yandex.com/clmap/30541482?page-url=file%3A%2F%2F%2FC%3A%2FUsers%2Fuser%2FAppData%2FLocal%2FTemp%2FDriverPack-2024041790000%2FDriverPackSolution.html%23C%253A%255CUsers%255Cuser%255CAppData%255CLocal%255CTemp%255CDriverPack-2024041790000%255Crun.hta%2520&pointer-click=rn%3A278268286%3Ax%3A32153%3Ay%3A0%3At%3A1618%3Ap%3AA2AA*%3AX%3A628%3AY%3A0&browser-info=u%3A1713337221523401810%3Av%3A1310%3Avf%3A666f337a5rpc9tpuxktcnb7h7%3Arqnl%3A1%3Ast%3A1713337383&t=gdpr(14)ti(4)
87.250.250.119
https://drp.su/en/info/translators
unknown
http://download.drp.su/17-online/DriverPack-17-Online.exe
unknown
http://download.drp.su/clean-icons/2601EE98B41E8800E63FAF547D46059E.png
unknown
http://download.drp.su/soft/OperaBlink64.exe
unknown
https://driverpack.io/ro/info/translators
unknown
http://dl.driverpack.io/soft/DirectX.png
unknown
https://drp.su/ru/info/translators
unknown
https://mc.yandex.com/clmap/33423178?page-url=file%3A%2F%2F%2FC%3A%2FUsers%2Fuser%2FAppData%2FLocal%2FTemp%2FDriverPack-2024041790000%2FDriverPackSolution.html%23C%253A%255CUsers%255Cuser%255CAppData%255CLocal%255CTemp%255CDriverPack-2024041790000%255Crun.hta%2520&pointer-click=rn%3A897563375%3Ax%3A32153%3Ay%3A0%3At%3A0%3Ap%3AA1AA*%3AX%3A628%3AY%3A0&browser-info=u%3A1713337221523401810%3Av%3A1310%3Avf%3A666f337a5rpc9tpuxktcnb7h7%3Arqnl%3A1%3Ast%3A1713337221&t=gdpr(14)ti(4)
87.250.250.119
https://www.avast.ru/free-antivirus-download
unknown
https://driverpack.io/sw/info/translators
unknown
http://dl.drp.su/soft/AIMP.exe
unknown
https://driverpack.io/hu/info/translators
unknown
http://dl.driverpack.io/soft/SearcherBar.exe
unknown
http://dl.driverpack.io/soft/PotPlayer.exe
unknown
https://mc.yandex.com/clmap/30541482?page-url=file%3A%2F%2F%2FC%3A%2FUsers%2Fuser%2FAppData%2FLocal%2FTemp%2FDriverPack-2024041790000%2FDriverPackSolution.html%23C%253A%255CUsers%255Cuser%255CAppData%255CLocal%255CTemp%255CDriverPack-2024041790000%255Crun.hta%2520&pointer-click=rn%3A461435439%3Ax%3A32101%3Ay%3A0%3At%3A1846%3Ap%3AA2AA*%3AX%3A627%3AY%3A0&browser-info=u%3A1713337221523401810%3Av%3A1310%3Avf%3A666f337a5rpc9tpuxktcnb7h7%3Arqnl%3A1%3Ast%3A1713337406&t=gdpr(14)ti(4)
87.250.250.119
http://fb.me/react-warning-keys
unknown
http://nsis.sf.net/NSIS_Error
unknown
http://dl.drp.su/soft/system/empty.cmd
unknown
http://dl.driverpack.io/soft/PotPlayer.exeH
unknown
http://dl.drp.su/tools/Asus8.exe
unknown
https://sdi-tool.org/yandex_games.ico
unknown
http://dl.drp.su/tools/Dell81.exe
unknown
http://download.drp.su/soft/AIMP.exe
unknown
https://mc.yandex.com/clmap/30541482?page-url=file%3A%2F%2F%2FC%3A%2FUsers%2Fuser%2FAppData%2FLocal%2FTemp%2FDriverPack-2024041790000%2FDriverPackSolution.html%23C%253A%255CUsers%255Cuser%255CAppData%255CLocal%255CTemp%255CDriverPack-2024041790000%255Crun.hta%2520&pointer-click=rn%3A1002945535%3Ax%3A32101%3Ay%3A0%3At%3A918%3Ap%3AA2AA*%3AX%3A627%3AY%3A0&browser-info=u%3A1713337221523401810%3Av%3A1310%3Avf%3A666f337a5rpc9tpuxktcnb7h7%3Arqnl%3A1%3Ast%3A1713337313&t=gdpr(14)ti(4)
87.250.250.119
https://mc.yandex.com/clmap/30541482?page-url=file%3A%2F%2F%2FC%3A%2FUsers%2Fuser%2FAppData%2FLocal%2FTemp%2FDriverPack-2024041790000%2FDriverPackSolution.html%23C%253A%255CUsers%255Cuser%255CAppData%255CLocal%255CTemp%255CDriverPack-2024041790000%255Crun.hta%2520&pointer-click=rn%3A657646641%3Ax%3A32153%3Ay%3A0%3At%3A2084%3Ap%3AA2AA*%3AX%3A628%3AY%3A0&browser-info=u%3A1713337221523401810%3Av%3A1310%3Avf%3A666f337a5rpc9tpuxktcnb7h7%3Arqnl%3A1%3Ast%3A1713337429&t=gdpr(14)ti(4)
87.250.250.119
https://mc.yandex.com/metrika/advert.gifor
unknown
http://dl.drp.su/soft/Yandex.png
unknown
http://dl.driverpack.io/soft/uTorrent.png
unknown
http://download.drp.su/soft/AIMP.png
unknown
http://allfont.ru/allfont.css?fonts=lucida-console&
unknown
http://download.drp.su/soft/VisualCplus.png
unknown
http://static.drp.su/update/logs/script.js
unknown
https://mc.yandex.com/ata
unknown
https://mc.yandex.com/watch/33423178/1?wmode=7&page-url=file%3A%2F%2F%2FC%3A%2FUsers%2Fuser%2FAppDa
unknown
https://mc.yandex.com/clmap/33423178?page-url=file%3A%2F%2F%2FC%3A%2FUsers%2Fuser%2FAppData%2FLocal%2FTemp%2FDriverPack-2024041790000%2FDriverPackSolution.html%23C%253A%255CUsers%255Cuser%255CAppData%255CLocal%255CTemp%255CDriverPack-2024041790000%255Crun.hta%2520&pointer-click=rn%3A986971658%3Ax%3A32101%3Ay%3A0%3At%3A464%3Ap%3AA2AA*%3AX%3A627%3AY%3A0&browser-info=u%3A1713337221523401810%3Av%3A1310%3Avf%3A666f337a5rpc9tpuxktcnb7h7%3Arqnl%3A1%3Ast%3A1713337267&t=gdpr(14)ti(4)
87.250.250.119
http://allfont.ru/allfont.css?fonts=lucida-console4
unknown
http://dl.driverpack.io/soft/PotPlayer.png
unknown
https://mc.yandex.com/clmap/30541482?page-url=file%3A%2F%2F%2FC%3A%2FUsers%2Fuser%2FAppData%2FLocal%2FTemp%2FDriverPack-2024041790000%2FDriverPackSolution.html%23C%253A%255CUsers%255Cuser%255CAppData%255CLocal%255CTemp%255CDriverPack-2024041790000%255Crun.hta%2520&pointer-click=rn%3A107870281%3Ax%3A32153%3Ay%3A0%3At%3A180%3Ap%3AA2AA*%3AX%3A628%3AY%3A0&browser-info=u%3A1713337221523401810%3Av%3A1310%3Avf%3A666f337a5rpc9tpuxktcnb7h7%3Arqnl%3A1%3Ast%3A1713337239&t=gdpr(14)ti(4)
87.250.250.119
http://dl.driverpack.io/soft/DirectX.exe
unknown
http://dl.driverpack.io/soft/Opera86cis_woGoogle.exe
unknown
https://driverpack.io/ku/info/translators
unknown
https://driverpack.io/te/info/translators
unknown
https://mc.yandex.com/clmap/30541482?page-url=file%3A%2F%2F%2FC%3A%2FUsers%2Fuser%2FAppData%2FLocal%2FTemp%2FDriverPack-2024041790000%2FDriverPackSolution.html%23C%253A%255CUsers%255Cuser%255CAppData%255CLocal%255CTemp%255CDriverPack-2024041790000%255Crun.hta%2520&pointer-click=rn%3A531994509%3Ax%3A32101%3Ay%3A0%3At%3A293%3Ap%3AA2AA*%3AX%3A627%3AY%3A0&browser-info=u%3A1713337221523401810%3Av%3A1310%3Avf%3A666f337a5rpc9tpuxktcnb7h7%3Arqnl%3A1%3Ast%3A1713337250&t=gdpr(14)ti(4)
87.250.250.119
http://update.drp.su/api/logsE0.
unknown
http://www.opera.com/privacy
unknown
https://driverpack.io/yo/info/translators
unknown
http://update.drp.su/api/cleaner
37.9.8.75
http://dl.driverpack.io/soft/Opera.png
unknown
http://dl.drp.su/soft/system/windows7-kb4012212-x64.msu
unknown
https://mc.yandex.com/clmap/46420341?page-url=file%3A%2F%2F%2FC%3A%2FUsers%2Fuser%2FAppData%2FLocal%2FTemp%2FDriverPack-2024041790000%2FDriverPackSolution.html%23C%253A%255CUsers%255Cuser%255CAppData%255CLocal%255CTemp%255CDriverPack-2024041790000%255Crun.hta%2520&pointer-click=rn%3A1066264284%3Ax%3A32101%3Ay%3A0%3At%3A748%3Ap%3AA2AA*%3AX%3A627%3AY%3A0&browser-info=u%3A1713337221523401810%3Av%3A1310%3Avf%3A666f337a5rpc9tpuxktcnb7h7%3Arqnl%3A1%3Ast%3A1713337296&t=gdpr(14)ti(4)
87.250.250.119
http://auth.drp.su
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mc.yandex.ru
77.88.21.119
auth.drp.su
87.117.235.115
update.drp.su
37.9.8.75
allfont.ru
172.67.209.192
mc.yandex.com
unknown

IPs

IP
Domain
Country
Malicious
87.117.235.115
auth.drp.su
United Kingdom
77.88.21.119
mc.yandex.ru
Russian Federation
172.67.209.192
allfont.ru
United States
87.250.250.119
unknown
Russian Federation
37.9.8.75
update.drp.su
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\drp.su\update
http
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\drp.su\update
https
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
GlobalUserOffline
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1
1406
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Styles
MaxScriptStatements
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DirectDraw\MostRecentApplication
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DirectDraw\MostRecentApplication
ID
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Microsoft-Windows-Diagnostics-Performance/Operational
NULL
HKEY_CURRENT_USER\SOFTWARE\drpsu
clientId
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\drpsu
computerId
HKEY_CURRENT_USER\SOFTWARE\drpsu
computerId
There are 1 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
D607000
heap
page read and write
E47E000
trusted library allocation
page read and write
E57D000
trusted library allocation
page read and write
D664000
heap
page read and write
B1A1000
trusted library allocation
page read and write
9F51000
trusted library allocation
page read and write
C0E000
stack
page read and write
E499000
trusted library allocation
page read and write
DB60000
trusted library allocation
page read and write
D8C9000
heap
page read and write
80CE000
trusted library allocation
page read and write
E856000
heap
page read and write
D79A000
heap
page read and write
B19F000
trusted library allocation
page read and write
D7D7000
heap
page read and write
F589000
trusted library allocation
page read and write
AF52000
trusted library allocation
page read and write
AF90000
remote allocation
page read and write
D75F000
heap
page read and write
E503000
trusted library allocation
page read and write
F4DB000
trusted library allocation
page read and write
D5A9000
heap
page read and write
DC0000
heap
page read and write
43A000
unkown
page write copy
F5BC000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
E4AA000
trusted library allocation
page read and write
9F52000
trusted library allocation
page read and write
D742000
heap
page read and write
F293000
trusted library allocation
page read and write
4BEE000
stack
page read and write
F510000
trusted library allocation
page read and write
E181000
heap
page read and write
857F000
trusted library allocation
page read and write
D6AA000
heap
page read and write
F0EA000
trusted library allocation
page read and write
EEC8000
trusted library allocation
page read and write
8576000
trusted library allocation
page read and write
E54E000
trusted library allocation
page read and write
D58A000
heap
page read and write
9F69000
trusted library allocation
page read and write
80EC000
trusted library allocation
page read and write
7F4D000
trusted library allocation
page read and write
D8CC000
heap
page read and write
DEF4000
trusted library allocation
page read and write
F60000
heap
page read and write
E3C7000
trusted library allocation
page read and write
D58B000
heap
page read and write
F415000
trusted library allocation
page read and write
80C9000
trusted library allocation
page read and write
9F51000
trusted library allocation
page read and write
857F000
trusted library allocation
page read and write
D87D000
heap
page read and write
C0AB000
heap
page read and write
8578000
trusted library allocation
page read and write
D6B8000
heap
page read and write
E87D000
heap
page read and write
857F000
trusted library allocation
page read and write
E80000
heap
page read and write
C06E000
heap
page read and write
C405000
trusted library allocation
page read and write
E4E8000
trusted library allocation
page read and write
F2C3000
trusted library allocation
page read and write
DB10000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
F3FC000
trusted library allocation
page read and write
AEF6000
trusted library allocation
page read and write
5C75000
heap
page read and write
D91E000
heap
page read and write
9F54000
trusted library allocation
page read and write
D8B4000
heap
page read and write
D678000
heap
page read and write
E4AA000
trusted library allocation
page read and write
9F51000
trusted library allocation
page read and write
D59B000
heap
page read and write
8574000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
DB10000
trusted library allocation
page read and write
5C58000
heap
page read and write
C049000
heap
page read and write
D678000
heap
page read and write
E3B2000
trusted library allocation
page read and write
80B9000
trusted library allocation
page read and write
E765000
heap
page read and write
F0A3000
trusted library allocation
page read and write
E4C8000
trusted library allocation
page read and write
C0A7000
heap
page read and write
80C9000
trusted library allocation
page read and write
D683000
heap
page read and write
4A50000
direct allocation
page read and write
8585000
trusted library allocation
page read and write
4EA6000
trusted library allocation
page read and write
858B000
trusted library allocation
page read and write
F01C000
trusted library allocation
page read and write
F503000
trusted library allocation
page read and write
E534000
trusted library allocation
page read and write
B19D000
trusted library allocation
page read and write
4B80000
heap
page read and write
80CE000
trusted library allocation
page read and write
9F51000
trusted library allocation
page read and write
858D000
trusted library allocation
page read and write
F1FC000
trusted library allocation
page read and write
D82A000
heap
page read and write
80E9000
trusted library allocation
page read and write
D713000
heap
page read and write
4C5B000
heap
page read and write
9F5C000
trusted library allocation
page read and write
D754000
heap
page read and write
C40B000
trusted library allocation
page read and write
D540000
heap
page read and write
BF9E000
heap
page read and write
C3F5000
trusted library allocation
page read and write
F2D9000
trusted library allocation
page read and write
F26F000
trusted library allocation
page read and write
D7E4000
heap
page read and write
D5B4000
heap
page read and write
857B000
trusted library allocation
page read and write
E419000
trusted library allocation
page read and write
C0DF000
heap
page read and write
BFD5000
heap
page read and write
D69F000
heap
page read and write
D82A000
heap
page read and write
F62E000
trusted library allocation
page read and write
F23A000
trusted library allocation
page read and write
F4FF000
trusted library allocation
page read and write
C035000
heap
page read and write
D7E4000
heap
page read and write
F589000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
DC70000
trusted library allocation
page read and write
C3FD000
trusted library allocation
page read and write
857E000
trusted library allocation
page read and write
F298000
trusted library allocation
page read and write
C05A000
heap
page read and write
8579000
trusted library allocation
page read and write
D743000
heap
page read and write
D907000
heap
page read and write
5C75000
heap
page read and write
C0A7000
heap
page read and write
80E4000
trusted library allocation
page read and write
C041000
heap
page read and write
4EB7000
trusted library allocation
page read and write
D573000
heap
page read and write
F3FE000
trusted library allocation
page read and write
BF8E000
heap
page read and write
72E000
stack
page read and write
C031000
heap
page read and write
D813000
heap
page read and write
F25C000
trusted library allocation
page read and write
E87E000
heap
page read and write
DB7000
heap
page read and write
C01A000
heap
page read and write
EFF5000
trusted library allocation
page read and write
DEF5000
trusted library allocation
page read and write
E507000
trusted library allocation
page read and write
D5A5000
heap
page read and write
D742000
heap
page read and write
4D30000
trusted library allocation
page read and write
E534000
trusted library allocation
page read and write
DEEA000
trusted library allocation
page read and write
F23D000
trusted library allocation
page read and write
B1AE000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
E7CC000
heap
page read and write
C408000
trusted library allocation
page read and write
D69B000
heap
page read and write
47FE000
stack
page read and write
BFD7000
heap
page read and write
E36B000
trusted library allocation
page read and write
42A000
unkown
page read and write
D792000
heap
page read and write
E4F4000
trusted library allocation
page read and write
D8DC000
heap
page read and write
D888000
heap
page read and write
F248000
trusted library allocation
page read and write
F278000
trusted library allocation
page read and write
E50F000
trusted library allocation
page read and write
DEE6000
trusted library allocation
page read and write
F575000
trusted library allocation
page read and write
D962000
trusted library allocation
page read and write
EF4E000
trusted library allocation
page read and write
76E000
stack
page read and write
F2D9000
trusted library allocation
page read and write
C035000
heap
page read and write
F62E000
trusted library allocation
page read and write
C3F8000
trusted library allocation
page read and write
E6E8000
heap
page read and write
F2D7000
trusted library allocation
page read and write
D754000
heap
page read and write
8586000
trusted library allocation
page read and write
E51C000
trusted library allocation
page read and write
C0DA000
heap
page read and write
7DF000
stack
page read and write
EFF5000
trusted library allocation
page read and write
E371000
trusted library allocation
page read and write
7F46000
trusted library allocation
page read and write
E60C000
trusted library allocation
page read and write
7E9B000
trusted library allocation
page read and write
80E9000
trusted library allocation
page read and write
DEF7000
trusted library allocation
page read and write
D717000
heap
page read and write
D957000
trusted library allocation
page read and write
857F000
trusted library allocation
page read and write
F2D9000
trusted library allocation
page read and write
C05A000
heap
page read and write
F2E7000
trusted library allocation
page read and write
DEC9000
trusted library allocation
page read and write
D619000
heap
page read and write
5CA5000
heap
page read and write
7F44000
trusted library allocation
page read and write
D619000
heap
page read and write
DD1A000
heap
page read and write
E534000
trusted library allocation
page read and write
71F0000
heap
page read and write
5C83000
heap
page read and write
D965000
trusted library allocation
page read and write
F0AD000
trusted library allocation
page read and write
E4A4000
trusted library allocation
page read and write
E4C8000
trusted library allocation
page read and write
C3F7000
trusted library allocation
page read and write
E389000
trusted library allocation
page read and write
D583000
heap
page read and write
8571000
trusted library allocation
page read and write
D74C000
heap
page read and write
74A1000
heap
page read and write
F5C4000
trusted library allocation
page read and write
DEFA000
trusted library allocation
page read and write
8581000
trusted library allocation
page read and write
F2CE000
trusted library allocation
page read and write
9F52000
trusted library allocation
page read and write
9F54000
trusted library allocation
page read and write
EE8A000
trusted library allocation
page read and write
B770000
trusted library allocation
page read and write
DEEA000
trusted library allocation
page read and write
E507000
trusted library allocation
page read and write
DA40000
trusted library allocation
page read and write
992000
heap
page read and write
4760000
trusted library allocation
page read and write
F4A7000
trusted library allocation
page read and write
F276000
trusted library allocation
page read and write
EED0000
trusted library allocation
page read and write
E55D000
trusted library allocation
page read and write
4A41000
direct allocation
page read and write
D6F3000
heap
page read and write
C3F0000
trusted library allocation
page read and write
F3F6000
trusted library allocation
page read and write
BFD7000
heap
page read and write
8579000
trusted library allocation
page read and write
80E7000
trusted library allocation
page read and write
C04D000
heap
page read and write
B199000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
F1F0000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
E4C8000
trusted library allocation
page read and write
F1F1000
trusted library allocation
page read and write
C3F0000
trusted library allocation
page read and write
E51C000
trusted library allocation
page read and write
E549000
trusted library allocation
page read and write
E81F000
heap
page read and write
E3C3000
trusted library allocation
page read and write
DEFB000
trusted library allocation
page read and write
F1DC000
trusted library allocation
page read and write
E7DD000
heap
page read and write
9F55000
trusted library allocation
page read and write
C04D000
heap
page read and write
D583000
heap
page read and write
7E0000
heap
page read and write
D723000
heap
page read and write
DEE1000
trusted library allocation
page read and write
D74A000
heap
page read and write
731E000
stack
page read and write
D8DC000
heap
page read and write
DEE4000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
E488000
trusted library allocation
page read and write
C0AA000
heap
page read and write
8573000
trusted library allocation
page read and write
9AE000
stack
page read and write
DEF2000
trusted library allocation
page read and write
AF63000
trusted library allocation
page read and write
D5D6000
heap
page read and write
BFC1000
heap
page read and write
E874000
heap
page read and write
77D0000
trusted library allocation
page read and write
E417000
trusted library allocation
page read and write
2DC4000
trusted library allocation
page read and write
D96E000
trusted library allocation
page read and write
F670000
trusted library allocation
page read and write
E47E000
trusted library allocation
page read and write
E3C8000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
D9DB000
trusted library allocation
page read and write
E842000
heap
page read and write
7E83000
trusted library allocation
page read and write
F41B000
trusted library allocation
page read and write
9F58000
trusted library allocation
page read and write
D7EE000
heap
page read and write
F000000
trusted library allocation
page read and write
E380000
trusted library allocation
page read and write
E649000
heap
page read and write
D88E000
heap
page read and write
E842000
heap
page read and write
EF34000
trusted library allocation
page read and write
9F51000
trusted library allocation
page read and write
858F000
trusted library allocation
page read and write
E804000
heap
page read and write
D0B0000
trusted library allocation
page read and write
F235000
trusted library allocation
page read and write
9F5A000
trusted library allocation
page read and write
D88E000
heap
page read and write
F62E000
trusted library allocation
page read and write
7E86000
trusted library allocation
page read and write
E391000
trusted library allocation
page read and write
E53E000
trusted library allocation
page read and write
E181000
heap
page read and write
DA50000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
8578000
trusted library allocation
page read and write
E4C8000
trusted library allocation
page read and write
E503000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
F273000
trusted library allocation
page read and write
D8F7000
heap
page read and write
F62E000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
E3A2000
trusted library allocation
page read and write
C031000
heap
page read and write
80E9000
trusted library allocation
page read and write
8571000
trusted library allocation
page read and write
9F64000
trusted library allocation
page read and write
D8C4000
heap
page read and write
C06E000
heap
page read and write
857A000
trusted library allocation
page read and write
4EA2000
trusted library allocation
page read and write
1F0000
heap
page read and write
9F5C000
trusted library allocation
page read and write
490000
heap
page read and write
9F52000
trusted library allocation
page read and write
E50F000
trusted library allocation
page read and write
D83E000
heap
page read and write
E4CA000
trusted library allocation
page read and write
12BE000
stack
page read and write
858D000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
E49B000
trusted library allocation
page read and write
857A000
trusted library allocation
page read and write
8581000
trusted library allocation
page read and write
F247000
trusted library allocation
page read and write
C035000
heap
page read and write
DB11000
heap
page read and write
D7E4000
heap
page read and write
F5CF000
trusted library allocation
page read and write
D670000
heap
page read and write
7F46000
trusted library allocation
page read and write
DEE4000
trusted library allocation
page read and write
D592000
heap
page read and write
BFC3000
heap
page read and write
80E9000
trusted library allocation
page read and write
D832000
heap
page read and write
80D8000
trusted library allocation
page read and write
BF7E000
heap
page read and write
8577000
trusted library allocation
page read and write
E53E000
trusted library allocation
page read and write
E82E000
heap
page read and write
E87E000
heap
page read and write
D981000
trusted library allocation
page read and write
9F54000
trusted library allocation
page read and write
857B000
trusted library allocation
page read and write
D96A000
trusted library allocation
page read and write
F88000
heap
page read and write
E3D4000
trusted library allocation
page read and write
F3D5000
trusted library allocation
page read and write
C05A000
heap
page read and write
E468000
trusted library allocation
page read and write
E4BC000
trusted library allocation
page read and write
D8A7000
heap
page read and write
DF20000
trusted library allocation
page read and write
80EC000
trusted library allocation
page read and write
E39E000
trusted library allocation
page read and write
F3CA000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
9F53000
trusted library allocation
page read and write
80CE000
trusted library allocation
page read and write
C0DA000
heap
page read and write
4EC0000
trusted library allocation
page read and write
D690000
heap
page read and write
F3F0000
trusted library allocation
page read and write
D58F000
heap
page read and write
D561000
heap
page read and write
F62E000
trusted library allocation
page read and write
E503000
trusted library allocation
page read and write
DEE5000
trusted library allocation
page read and write
D757000
heap
page read and write
7E95000
trusted library allocation
page read and write
DEF9000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
9F55000
trusted library allocation
page read and write
F293000
trusted library allocation
page read and write
D68A000
heap
page read and write
DEF7000
trusted library allocation
page read and write
E4F8000
trusted library allocation
page read and write
E376000
trusted library allocation
page read and write
AF66000
trusted library allocation
page read and write
7E98000
trusted library allocation
page read and write
B1A6000
trusted library allocation
page read and write
C07F000
heap
page read and write
9F0000
heap
page read and write
5F59000
trusted library allocation
page read and write
C041000
heap
page read and write
D7E4000
heap
page read and write
DEF2000
trusted library allocation
page read and write
D876000
heap
page read and write
B740000
trusted library allocation
page read and write
F2F3000
trusted library allocation
page read and write
F4FF000
trusted library allocation
page read and write
7E9B000
trusted library allocation
page read and write
D798000
heap
page read and write
E39B000
trusted library allocation
page read and write
DEE6000
trusted library allocation
page read and write
D619000
heap
page read and write
D968000
trusted library allocation
page read and write
C073000
heap
page read and write
F3D5000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
D875000
heap
page read and write
E842000
heap
page read and write
9F55000
trusted library allocation
page read and write
40A000
unkown
page read and write
8DCD000
heap
page read and write
F41B000
trusted library allocation
page read and write
8588000
trusted library allocation
page read and write
F2CD000
trusted library allocation
page read and write
F25E000
trusted library allocation
page read and write
D633000
heap
page read and write
9F52000
trusted library allocation
page read and write
80BF000
trusted library allocation
page read and write
D713000
heap
page read and write
9F57000
trusted library allocation
page read and write
858F000
trusted library allocation
page read and write
8578000
trusted library allocation
page read and write
80EC000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
8571000
trusted library allocation
page read and write
D75F000
heap
page read and write
9F53000
trusted library allocation
page read and write
D8BF000
heap
page read and write
D8C4000
heap
page read and write
8586000
trusted library allocation
page read and write
E872000
heap
page read and write
4A32000
direct allocation
page read and write
80DE000
trusted library allocation
page read and write
C0CB000
heap
page read and write
F1DC000
trusted library allocation
page read and write
D30000
trusted library section
page read and write
4800000
trusted library allocation
page execute and read and write
E38F000
trusted library allocation
page read and write
80CE000
trusted library allocation
page read and write
E3AA000
trusted library allocation
page read and write
F2AF000
trusted library allocation
page read and write
E36A000
trusted library allocation
page read and write
E488000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
D7D7000
heap
page read and write
EE90000
trusted library allocation
page read and write
4C45000
heap
page read and write
7E98000
trusted library allocation
page read and write
C07F000
heap
page read and write
D650000
heap
page read and write
401000
unkown
page execute read
8588000
trusted library allocation
page read and write
E534000
trusted library allocation
page read and write
9F52000
trusted library allocation
page read and write
C06E000
heap
page read and write
E4B9000
trusted library allocation
page read and write
857A000
trusted library allocation
page read and write
80EC000
trusted library allocation
page read and write
8580000
trusted library allocation
page read and write
2870000
heap
page read and write
D6CA000
heap
page read and write
F0BC000
trusted library allocation
page read and write
E51C000
trusted library allocation
page read and write
B1A3000
trusted library allocation
page read and write
EE8E000
trusted library allocation
page read and write
D7D7000
heap
page read and write
F1C9000
trusted library allocation
page read and write
13BF000
stack
page read and write
E57B000
trusted library allocation
page read and write
4A20000
heap
page read and write
C0A1000
heap
page read and write
E60000
heap
page read and write
F4DF000
trusted library allocation
page read and write
D619000
heap
page read and write
4EE7000
trusted library allocation
page read and write
C069000
heap
page read and write
F020000
trusted library allocation
page read and write
B130000
trusted library allocation
page read and write
DEED000
trusted library allocation
page read and write
E51C000
trusted library allocation
page read and write
D8A7000
heap
page read and write
AF66000
trusted library allocation
page read and write
9F62000
trusted library allocation
page read and write
80CE000
trusted library allocation
page read and write
D5AC000
heap
page read and write
E503000
trusted library allocation
page read and write
F241000
trusted library allocation
page read and write
9F54000
trusted library allocation
page read and write
BFD7000
heap
page read and write
9F57000
trusted library allocation
page read and write
E4E8000
trusted library allocation
page read and write
D723000
heap
page read and write
8570000
trusted library allocation
page read and write
7E95000
trusted library allocation
page read and write
D6AF000
heap
page read and write
EF63000
trusted library allocation
page read and write
C031000
heap
page read and write
D885000
heap
page read and write
E3B4000
trusted library allocation
page read and write
80F0000
trusted library allocation
page execute
E4C8000
trusted library allocation
page read and write
E503000
trusted library allocation
page read and write
E4C8000
trusted library allocation
page read and write
E51C000
trusted library allocation
page read and write
5CC9000
heap
page read and write
F2D9000
trusted library allocation
page read and write
80BF000
trusted library allocation
page read and write
E37D000
trusted library allocation
page read and write
D798000
heap
page read and write
DEF2000
trusted library allocation
page read and write
D713000
heap
page read and write
F2D9000
trusted library allocation
page read and write
E53E000
trusted library allocation
page read and write
F3CD000
trusted library allocation
page read and write
D687000
heap
page read and write
D6F7000
heap
page read and write
D5B0000
heap
page read and write
F1FC000
trusted library allocation
page read and write
F5C4000
trusted library allocation
page read and write
D828000
heap
page read and write
F3F9000
trusted library allocation
page read and write
C0AB000
heap
page read and write
9F52000
trusted library allocation
page read and write
E7CA000
heap
page read and write
DEE7000
trusted library allocation
page read and write
F239000
trusted library allocation
page read and write
9F57000
trusted library allocation
page read and write
F25C000
trusted library allocation
page read and write
D619000
heap
page read and write
E363000
trusted library allocation
page read and write
F5CF000
trusted library allocation
page read and write
D865000
heap
page read and write
8579000
trusted library allocation
page read and write
F589000
trusted library allocation
page read and write
AF78000
trusted library allocation
page read and write
80EC000
trusted library allocation
page read and write
858D000
trusted library allocation
page read and write
D662000
heap
page read and write
E50B000
trusted library allocation
page read and write
E503000
trusted library allocation
page read and write
E649000
heap
page read and write
9F5E000
trusted library allocation
page read and write
7E98000
trusted library allocation
page read and write
E372000
trusted library allocation
page read and write
D743000
heap
page read and write
F5CF000
trusted library allocation
page read and write
F413000
trusted library allocation
page read and write
DEF5000
trusted library allocation
page read and write
D912000
heap
page read and write
4C02000
heap
page read and write
80B9000
trusted library allocation
page read and write
D7E3000
heap
page read and write
F3D8000
trusted library allocation
page read and write
C05A000
heap
page read and write
C041000
heap
page read and write
F285000
trusted library allocation
page read and write
D698000
heap
page read and write
C0D1000
heap
page read and write
F577000
trusted library allocation
page read and write
F5DD000
trusted library allocation
page read and write
F2DC000
trusted library allocation
page read and write
EFFB000
trusted library allocation
page read and write
5C85000
heap
page read and write
D8AD000
heap
page read and write
DEF9000
trusted library allocation
page read and write
DEE7000
trusted library allocation
page read and write
2FCF000
heap
page read and write
E4CD000
trusted library allocation
page read and write
5C75000
heap
page read and write
D978000
trusted library allocation
page read and write
F62E000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
9F51000
trusted library allocation
page read and write
DF14000
trusted library allocation
page read and write
DEF3000
trusted library allocation
page read and write
40B000
unkown
page readonly
DEE7000
trusted library allocation
page read and write
E364000
trusted library allocation
page read and write
F25C000
trusted library allocation
page read and write
9F59000
trusted library allocation
page read and write
858E000
trusted library allocation
page read and write
C376000
trusted library allocation
page read and write
D72A000
heap
page read and write
8588000
trusted library allocation
page read and write
F23D000
trusted library allocation
page read and write
D74C000
heap
page read and write
D40000
trusted library allocation
page read and write
D71B000
heap
page read and write
80E9000
trusted library allocation
page read and write
E87F000
heap
page read and write
857A000
trusted library allocation
page read and write
C057000
heap
page read and write
D675000
heap
page read and write
DEF2000
trusted library allocation
page read and write
C0D8000
heap
page read and write
9F53000
trusted library allocation
page read and write
E47E000
trusted library allocation
page read and write
F255000
trusted library allocation
page read and write
E4C4000
trusted library allocation
page read and write
D5A9000
heap
page read and write
E4F4000
trusted library allocation
page read and write
826D000
stack
page read and write
F3C0000
trusted library allocation
page read and write
96A000
heap
page read and write
9F53000
trusted library allocation
page read and write
D00000
heap
page read and write
D5D6000
heap
page read and write
100000
heap
page read and write
E84E000
heap
page read and write
7E9B000
trusted library allocation
page read and write
E4C8000
trusted library allocation
page read and write
D5A6000
heap
page read and write
80CE000
trusted library allocation
page read and write
7E8E000
trusted library allocation
page read and write
C5D000
stack
page read and write
D88E000
heap
page read and write
8587000
trusted library allocation
page read and write
F258000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
F503000
trusted library allocation
page read and write
9F53000
trusted library allocation
page read and write
E4BF000
trusted library allocation
page read and write
8E5D000
heap
page read and write
E4B9000
trusted library allocation
page read and write
D885000
heap
page read and write
D909000
heap
page read and write
E408000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
5C8D000
heap
page read and write
E4BC000
trusted library allocation
page read and write
D82000
trusted library allocation
page read and write
D675000
heap
page read and write
D83E000
heap
page read and write
E53E000
trusted library allocation
page read and write
E47E000
trusted library allocation
page read and write
8585000
trusted library allocation
page read and write
D88E000
heap
page read and write
D5B6000
heap
page read and write
E3C9000
trusted library allocation
page read and write
DEF6000
trusted library allocation
page read and write
B4F3000
heap
page read and write
D799000
heap
page read and write
E4BF000
trusted library allocation
page read and write
7F39000
trusted library allocation
page read and write
EE72000
trusted library allocation
page read and write
EF87000
trusted library allocation
page read and write
D802000
heap
page read and write
9F53000
trusted library allocation
page read and write
AF30000
trusted library allocation
page read and write
BFC0000
heap
page read and write
DB20000
trusted library allocation
page read and write
E51C000
trusted library allocation
page read and write
D809000
heap
page read and write
F2F0000
trusted library allocation
page read and write
EF06000
trusted library allocation
page read and write
80C9000
trusted library allocation
page read and write
E886000
heap
page read and write
D983000
trusted library allocation
page read and write
D78C000
heap
page read and write
EF2A000
trusted library allocation
page read and write
E4BC000
trusted library allocation
page read and write
E520000
trusted library allocation
page read and write
E488000
trusted library allocation
page read and write
E4C8000
trusted library allocation
page read and write
C0D8000
heap
page read and write
D987000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
BFC2000
heap
page read and write
E560000
trusted library allocation
page read and write
AF78000
trusted library allocation
page read and write
73AA000
heap
page read and write
C07F000
heap
page read and write
E7CA000
heap
page read and write
DF14000
trusted library allocation
page read and write
8E5D000
heap
page read and write
9F5D000
trusted library allocation
page read and write
E4F8000
trusted library allocation
page read and write
7450000
heap
page read and write
7E8F000
trusted library allocation
page read and write
D670000
heap
page read and write
E367000
trusted library allocation
page read and write
E6A1000
heap
page read and write
2FBF000
stack
page read and write
D742000
heap
page read and write
96B000
heap
page read and write
DEF2000
trusted library allocation
page read and write
E87E000
heap
page read and write
C0A7000
heap
page read and write
F280000
trusted library allocation
page read and write
CE6000
heap
page read and write
E37E000
trusted library allocation
page read and write
7F46000
trusted library allocation
page read and write
D6D4000
heap
page read and write
E4E000
stack
page read and write
9F57000
trusted library allocation
page read and write
9F5C000
trusted library allocation
page read and write
D888000
heap
page read and write
9F52000
trusted library allocation
page read and write
8311000
trusted library allocation
page read and write
80E7000
trusted library allocation
page read and write
D7E4000
heap
page read and write
DEE0000
trusted library allocation
page read and write
D7D1000
heap
page read and write
E4F4000
trusted library allocation
page read and write
BFC1000
heap
page read and write
D5A7000
heap
page read and write
D8A7000
heap
page read and write
91E000
heap
page read and write
DEF2000
trusted library allocation
page read and write
E51C000
trusted library allocation
page read and write
7E98000
trusted library allocation
page read and write
E4C6000
trusted library allocation
page read and write
F62E000
trusted library allocation
page read and write
43E000
stack
page read and write
F62E000
trusted library allocation
page read and write
E4AA000
trusted library allocation
page read and write
F25C000
trusted library allocation
page read and write
D693000
heap
page read and write
C0A5000
heap
page read and write
EF18000
trusted library allocation
page read and write
B640000
trusted library allocation
page read and write
5CB5000
heap
page read and write
D798000
heap
page read and write
D969000
trusted library allocation
page read and write
F24B000
trusted library allocation
page read and write
9F59000
trusted library allocation
page read and write
E7E9000
heap
page read and write
F2EC000
trusted library allocation
page read and write
9F51000
trusted library allocation
page read and write
D7FA000
heap
page read and write
DEF2000
trusted library allocation
page read and write
80E9000
trusted library allocation
page read and write
D865000
heap
page read and write
DEF3000
trusted library allocation
page read and write
F4F9000
trusted library allocation
page read and write
E843000
heap
page read and write
DB50000
trusted library allocation
page read and write
D5BF000
heap
page read and write
F4DF000
trusted library allocation
page read and write
D8E3000
heap
page read and write
96A000
heap
page read and write
D5A9000
heap
page read and write
E3D5000
trusted library allocation
page read and write
D5AC000
heap
page read and write
9F54000
trusted library allocation
page read and write
EF72000
trusted library allocation
page read and write
C073000
heap
page read and write
F2DF000
trusted library allocation
page read and write
80BF000
trusted library allocation
page read and write
935000
heap
page read and write
80D8000
trusted library allocation
page read and write
D7CE000
heap
page read and write
9F5D000
trusted library allocation
page read and write
F27E000
trusted library allocation
page read and write
9F59000
trusted library allocation
page read and write
F4DF000
trusted library allocation
page read and write
E50B000
trusted library allocation
page read and write
858F000
trusted library allocation
page read and write
D82F000
heap
page read and write
B767000
trusted library allocation
page read and write
986000
heap
page read and write
8583000
trusted library allocation
page read and write
8586000
trusted library allocation
page read and write
F5CF000
trusted library allocation
page read and write
E821000
heap
page read and write
E3AF000
trusted library allocation
page read and write
D91E000
heap
page read and write
5523000
trusted library allocation
page read and write
9F55000
trusted library allocation
page read and write
E3AC000
trusted library allocation
page read and write
E4CD000
trusted library allocation
page read and write
E4F4000
trusted library allocation
page read and write
DEEC000
trusted library allocation
page read and write
B750000
trusted library allocation
page read and write
F0A0000
trusted library allocation
page read and write
80E9000
trusted library allocation
page read and write
E6A8000
heap
page read and write
E648000
heap
page read and write
D8C4000
heap
page read and write
D6B0000
heap
page read and write
F589000
trusted library allocation
page read and write
9F63000
trusted library allocation
page read and write
80CE000
trusted library allocation
page read and write
D8B4000
heap
page read and write
DEF2000
trusted library allocation
page read and write
F5B9000
trusted library allocation
page read and write
DEE2000
trusted library allocation
page read and write
D957000
trusted library allocation
page read and write
D7D2000
heap
page read and write
B1AD000
trusted library allocation
page read and write
80EC000
trusted library allocation
page read and write
D8C9000
heap
page read and write
E500000
trusted library allocation
page read and write
EF09000
trusted library allocation
page read and write
9F55000
trusted library allocation
page read and write
C0CB000
heap
page read and write
D918000
heap
page read and write
9F53000
trusted library allocation
page read and write
73DF000
heap
page read and write
9F6C000
trusted library allocation
page read and write
5752000
trusted library allocation
page read and write
E4AA000
trusted library allocation
page read and write
D5F9000
heap
page read and write
5C78000
heap
page read and write
DEE2000
trusted library allocation
page read and write
F577000
trusted library allocation
page read and write
9F51000
trusted library allocation
page read and write
9F53000
trusted library allocation
page read and write
D9D8000
trusted library allocation
page read and write
9F6D000
trusted library allocation
page read and write
D8DC000
heap
page read and write
D8C6000
heap
page read and write
E87E000
heap
page read and write
EFEF000
trusted library allocation
page read and write
F2D4000
trusted library allocation
page read and write
80EC000
trusted library allocation
page read and write
F5B9000
trusted library allocation
page read and write
D50000
trusted library allocation
page read and write
C062000
heap
page read and write
80E7000
trusted library allocation
page read and write
D69F000
heap
page read and write
E4C4000
trusted library allocation
page read and write
DEF0000
trusted library allocation
page read and write
E7F5000
heap
page read and write
D60D000
heap
page read and write
E480000
trusted library allocation
page read and write
80B7000
trusted library allocation
page read and write
F283000
trusted library allocation
page read and write
8571000
trusted library allocation
page read and write
F5C4000
trusted library allocation
page read and write
967000
heap
page read and write
8571000
trusted library allocation
page read and write
80E7000
trusted library allocation
page read and write
858B000
trusted library allocation
page read and write
E503000
trusted library allocation
page read and write
D822000
heap
page read and write
E50F000
trusted library allocation
page read and write
4C3B000
heap
page read and write
EF3E000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
4ADF000
direct allocation
page read and write
C05A000
heap
page read and write
959000
heap
page read and write
EF25000
trusted library allocation
page read and write
9F6F000
trusted library allocation
page read and write
4EF1000
trusted library allocation
page read and write
C3FD000
trusted library allocation
page read and write
DEF8000
trusted library allocation
page read and write
4EA0000
trusted library allocation
page read and write
B600000
trusted library allocation
page read and write
C04D000
heap
page read and write
F3C2000
trusted library allocation
page read and write
EE4A000
trusted library allocation
page read and write
F509000
trusted library allocation
page read and write
D8A7000
heap
page read and write
F2D9000
trusted library allocation
page read and write
E874000
heap
page read and write
E500000
trusted library allocation
page read and write
F2D9000
trusted library allocation
page read and write
F5C4000
trusted library allocation
page read and write
D8B7000
heap
page read and write
80B7000
trusted library allocation
page read and write
D670000
heap
page read and write
858B000
trusted library allocation
page read and write
E4BC000
trusted library allocation
page read and write
B1A2000
trusted library allocation
page read and write
D931000
trusted library allocation
page read and write
EF55000
trusted library allocation
page read and write
9F54000
trusted library allocation
page read and write
F172000
trusted library allocation
page read and write
DEF4000
trusted library allocation
page read and write
D670000
heap
page read and write
7E91000
trusted library allocation
page read and write
F4D7000
trusted library allocation
page read and write
D873000
heap
page read and write
DEF8000
trusted library allocation
page read and write
D84E000
heap
page read and write
EF66000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
DEE0000
trusted library allocation
page read and write
B750000
trusted library allocation
page read and write
E4E8000
trusted library allocation
page read and write
B551000
heap
page read and write
D8BF000
heap
page read and write
7E91000
trusted library allocation
page read and write
E4C1000
trusted library allocation
page read and write
D912000
heap
page read and write
F1DC000
trusted library allocation
page read and write
E4F8000
trusted library allocation
page read and write
EEAF000
trusted library allocation
page read and write
F4DF000
trusted library allocation
page read and write
EEFE000
trusted library allocation
page read and write
4A90000
direct allocation
page read and write
4C6F000
heap
page read and write
8E90000
trusted library allocation
page read and write
C18000
heap
page read and write
D6FB000
heap
page read and write
D920000
trusted library allocation
page read and write
F454000
trusted library allocation
page read and write
E50B000
trusted library allocation
page read and write
7E92000
trusted library allocation
page read and write
857A000
trusted library allocation
page read and write
80EC000
trusted library allocation
page read and write
D72F000
heap
page read and write
4BD8000
heap
page read and write
D602000
heap
page read and write
B198000
trusted library allocation
page read and write
E36C000
trusted library allocation
page read and write
9F64000
trusted library allocation
page read and write
7370000
trusted library allocation
page read and write
E36D000
trusted library allocation
page read and write
F2FA000
trusted library allocation
page read and write
4C5B000
heap
page read and write
857F000
trusted library allocation
page read and write
B1AA000
trusted library allocation
page read and write
F231000
trusted library allocation
page read and write
F2A6000
trusted library allocation
page read and write
EE2E000
trusted library allocation
page read and write
D710000
heap
page read and write
E507000
trusted library allocation
page read and write
9F60000
trusted library allocation
page read and write
F29D000
trusted library allocation
page read and write
C041000
heap
page read and write
E86F000
heap
page read and write
8E19000
heap
page read and write
8579000
trusted library allocation
page read and write
8570000
trusted library allocation
page read and write
AF90000
remote allocation
page read and write
C40D000
trusted library allocation
page read and write
AF68000
trusted library allocation
page read and write
DA70000
trusted library allocation
page read and write
D8CC000
heap
page read and write
C069000
heap
page read and write
D619000
heap
page read and write
C01A000
heap
page read and write
F2ED000
trusted library allocation
page read and write
9F56000
trusted library allocation
page read and write
F57D000
trusted library allocation
page read and write
D961000
trusted library allocation
page read and write
F272000
trusted library allocation
page read and write
F530000
trusted library allocation
page read and write
E4AA000
trusted library allocation
page read and write
E4C6000
trusted library allocation
page read and write
80B9000
trusted library allocation
page read and write
E499000
trusted library allocation
page read and write
E369000
trusted library allocation
page read and write
E53E000
trusted library allocation
page read and write
EFEF000
trusted library allocation
page read and write
F2EF000
trusted library allocation
page read and write
5C75000
heap
page read and write
F25C000
trusted library allocation
page read and write
8AC000
stack
page read and write
D60D000
heap
page read and write
8579000
trusted library allocation
page read and write
DB40000
trusted library allocation
page read and write
7447000
heap
page read and write
D8A7000
heap
page read and write
4D40000
heap
page read and write
F2EA000
trusted library allocation
page read and write
E4C6000
trusted library allocation
page read and write
BFC7000
heap
page read and write
D71B000
heap
page read and write
7600000
trusted library allocation
page read and write
E4C1000
trusted library allocation
page read and write
80C9000
trusted library allocation
page read and write
D77E000
heap
page read and write
EE7A000
trusted library allocation
page read and write
E842000
heap
page read and write
D678000
heap
page read and write
5C75000
heap
page read and write
D7EA000
heap
page read and write
DB20000
trusted library allocation
page read and write
D5C5000
heap
page read and write
4C05000
heap
page read and write
E4BC000
trusted library allocation
page read and write
3290000
heap
page read and write
4A26000
heap
page read and write
D666000
heap
page read and write
DEFD000
trusted library allocation
page read and write
F225000
trusted library allocation
page read and write
E182000
heap
page read and write
8579000
trusted library allocation
page read and write
4C5D000
heap
page read and write
D805000
heap
page read and write
DEF2000
trusted library allocation
page read and write
D97D000
trusted library allocation
page read and write
EE80000
trusted library allocation
page read and write
F080000
trusted library allocation
page read and write
7F39000
trusted library allocation
page read and write
C07F000
heap
page read and write
E4BC000
trusted library allocation
page read and write
7E9B000
trusted library allocation
page read and write
959000
heap
page read and write
E54A000
trusted library allocation
page read and write
77A0000
trusted library allocation
page read and write
2FC3000
heap
page read and write
D88E000
heap
page read and write
C059000
heap
page read and write
D8C6000
heap
page read and write
D20000
trusted library section
page read and write
F3F8000
trusted library allocation
page read and write
F23D000
trusted library allocation
page read and write
D67A000
heap
page read and write
8579000
trusted library allocation
page read and write
DEE1000
trusted library allocation
page read and write
B740000
trusted library allocation
page read and write
9F61000
trusted library allocation
page read and write
E87E000
heap
page read and write
D779000
heap
page read and write
8587000
trusted library allocation
page read and write
7E91000
trusted library allocation
page read and write
C057000
heap
page read and write
D756000
heap
page read and write
D776000
heap
page read and write
E3A7000
trusted library allocation
page read and write
8330000
trusted library allocation
page read and write
D5BF000
heap
page read and write
E86F000
heap
page read and write
D9D6000
trusted library allocation
page read and write
F3D1000
trusted library allocation
page read and write
E1C000
stack
page read and write
E36F000
trusted library allocation
page read and write
E4E8000
trusted library allocation
page read and write
E4CD000
trusted library allocation
page read and write
E3C4000
trusted library allocation
page read and write
D77B000
heap
page read and write
F2E4000
trusted library allocation
page read and write
8570000
trusted library allocation
page read and write
C06E000
heap
page read and write
F62E000
trusted library allocation
page read and write
E4C1000
trusted library allocation
page read and write
857B000
trusted library allocation
page read and write
E50B000
trusted library allocation
page read and write
C0D8000
heap
page read and write
E3D1000
trusted library allocation
page read and write
B620000
trusted library allocation
page read and write
F0F8000
trusted library allocation
page read and write
C3F0000
trusted library allocation
page read and write
80DE000
trusted library allocation
page read and write
D6F3000
heap
page read and write
8579000
trusted library allocation
page read and write
C04D000
heap
page read and write
C041000
heap
page read and write
D82F000
heap
page read and write
5C75000
heap
page read and write
F23D000
trusted library allocation
page read and write
F2D9000
trusted library allocation
page read and write
E0F000
stack
page read and write
E569000
trusted library allocation
page read and write
D8DC000
heap
page read and write
E4F4000
trusted library allocation
page read and write
9F52000
trusted library allocation
page read and write
857E000
trusted library allocation
page read and write
D865000
heap
page read and write
EF2E000
trusted library allocation
page read and write
D6AA000
heap
page read and write
D713000
heap
page read and write
D7D2000
heap
page read and write
43A000
unkown
page write copy
960000
heap
page read and write
9F56000
trusted library allocation
page read and write
E648000
heap
page read and write
D985000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
71E0000
heap
page read and write
D670000
heap
page read and write
F29F000
trusted library allocation
page read and write
4C00000
heap
page read and write
EF85000
trusted library allocation
page read and write
C06E000
heap
page read and write
D798000
heap
page read and write
7E9B000
trusted library allocation
page read and write
9F53000
trusted library allocation
page read and write
D87D000
heap
page read and write
E462000
trusted library allocation
page read and write
DEEB000
trusted library allocation
page read and write
C091000
heap
page read and write
E84B000
heap
page read and write
E50F000
trusted library allocation
page read and write
8588000
trusted library allocation
page read and write
DEE6000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
98E000
heap
page read and write
C0A7000
heap
page read and write
D633000
heap
page read and write
AF28000
trusted library allocation
page read and write
8581000
trusted library allocation
page read and write
4ADF000
direct allocation
page read and write
F3F6000
trusted library allocation
page read and write
D5D6000
heap
page read and write
BFD7000
heap
page read and write
80E4000
trusted library allocation
page read and write
C07F000
heap
page read and write
E4F4000
trusted library allocation
page read and write
D8A7000
heap
page read and write
F5E8000
trusted library allocation
page read and write
AF20000
trusted library allocation
page read and write
E3CD000
trusted library allocation
page read and write
E38A000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
E55C000
trusted library allocation
page read and write
E7E9000
heap
page read and write
F2BB000
trusted library allocation
page read and write
C073000
heap
page read and write
C055000
heap
page read and write
D64F000
heap
page read and write
EE9C000
trusted library allocation
page read and write
4C28000
heap
page read and write
80B9000
trusted library allocation
page read and write
4C0E000
heap
page read and write
F293000
trusted library allocation
page read and write
C02A000
heap
page read and write
DEF5000
trusted library allocation
page read and write
F1CC000
trusted library allocation
page read and write
8571000
trusted library allocation
page read and write
4C90000
heap
page execute and read and write
C0DF000
heap
page read and write
BA60000
trusted library allocation
page read and write
D8C9000
heap
page read and write
F246000
trusted library allocation
page read and write
F62E000
trusted library allocation
page read and write
F4BB000
trusted library allocation
page read and write
C06B000
heap
page read and write
D713000
heap
page read and write
80D8000
trusted library allocation
page read and write
D894000
heap
page read and write
D8B8000
heap
page read and write
C407000
trusted library allocation
page read and write
EEC4000
trusted library allocation
page read and write
F27D000
trusted library allocation
page read and write
8583000
trusted library allocation
page read and write
D64F000
heap
page read and write
C057000
heap
page read and write
8587000
trusted library allocation
page read and write
91A000
heap
page read and write
EFEF000
trusted library allocation
page read and write
80DE000
trusted library allocation
page read and write
F23D000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
C082000
heap
page read and write
DEEA000
trusted library allocation
page read and write
8572000
trusted library allocation
page read and write
C0CB000
heap
page read and write
C062000
heap
page read and write
DEFD000
trusted library allocation
page read and write
E82E000
heap
page read and write
E534000
trusted library allocation
page read and write
D7CF000
heap
page read and write
F277000
trusted library allocation
page read and write
80BF000
trusted library allocation
page read and write
4ECE000
stack
page read and write
F3CE000
trusted library allocation
page read and write
3249000
heap
page read and write
D753000
heap
page read and write
E4A4000
trusted library allocation
page read and write
F49C000
trusted library allocation
page read and write
D6A3000
heap
page read and write
E570000
trusted library allocation
page read and write
7E95000
trusted library allocation
page read and write
D6AD000
heap
page read and write
EEFD000
trusted library allocation
page read and write
F2F1000
trusted library allocation
page read and write
4BF9000
heap
page read and write
7E91000
trusted library allocation
page read and write
D5F9000
heap
page read and write
D670000
heap
page read and write
E362000
trusted library allocation
page read and write
F2E3000
trusted library allocation
page read and write
D920000
trusted library allocation
page read and write
D5BF000
heap
page read and write
C06E000
heap
page read and write
E488000
trusted library allocation
page read and write
F575000
trusted library allocation
page read and write
AF52000
trusted library allocation
page read and write
D678000
heap
page read and write
C0CB000
heap
page read and write
DEE5000
trusted library allocation
page read and write
F80000
heap
page read and write
D7D5000
heap
page read and write
8575000
trusted library allocation
page read and write
DA50000
trusted library allocation
page read and write
9F51000
trusted library allocation
page read and write
80CE000
trusted library allocation
page read and write
D602000
heap
page read and write
E7DD000
heap
page read and write
E3A0000
trusted library allocation
page read and write
E46C000
trusted library allocation
page read and write
5C6F000
heap
page read and write
C02A000
heap
page read and write
49D0000
direct allocation
page read and write
1E0000
heap
page read and write
C0CB000
heap
page read and write
C031000
heap
page read and write
D7F0000
heap
page read and write
E84B000
heap
page read and write
E4F8000
trusted library allocation
page read and write
D897000
heap
page read and write
EF52000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
DEE0000
trusted library allocation
page read and write
7E99000
trusted library allocation
page read and write
EE57000
trusted library allocation
page read and write
5C7F000
heap
page read and write
E3C1000
trusted library allocation
page read and write
80B7000
trusted library allocation
page read and write
C04D000
heap
page read and write
412000
unkown
page read and write
858D000
trusted library allocation
page read and write
C035000
heap
page read and write
F589000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
D8BD000
heap
page read and write
7E95000
trusted library allocation
page read and write
5C74000
heap
page read and write
F2B8000
trusted library allocation
page read and write
E800000
heap
page read and write
F4C5000
trusted library allocation
page read and write
F43C000
trusted library allocation
page read and write
D6B8000
heap
page read and write
EFA0000
trusted library allocation
page read and write
AF20000
trusted library allocation
page read and write
992000
heap
page read and write
DB20000
trusted library allocation
page read and write
80D8000
trusted library allocation
page read and write
77E0000
trusted library allocation
page read and write
D964000
trusted library allocation
page read and write
B190000
trusted library allocation
page read and write
C029000
heap
page read and write
F2DE000
trusted library allocation
page read and write
D80000
trusted library allocation
page read and write
D7D4000
heap
page read and write
F57D000
trusted library allocation
page read and write
9F51000
trusted library allocation
page read and write
DEF8000
trusted library allocation
page read and write
D9D2000
trusted library allocation
page read and write
F4DF000
trusted library allocation
page read and write
80E9000
trusted library allocation
page read and write
F2F8000
trusted library allocation
page read and write
E382000
trusted library allocation
page read and write
D742000
heap
page read and write
D5F9000
heap
page read and write
7E91000
trusted library allocation
page read and write
D692000
heap
page read and write
D88E000
heap
page read and write
80B7000
trusted library allocation
page read and write
D747000
heap
page read and write
9F57000
trusted library allocation
page read and write
E3CF000
trusted library allocation
page read and write
E540000
trusted library allocation
page read and write
9F5F000
trusted library allocation
page read and write
F293000
trusted library allocation
page read and write
48BA000
stack
page read and write
9F67000
trusted library allocation
page read and write
80E4000
trusted library allocation
page read and write
C05A000
heap
page read and write
9F66000
trusted library allocation
page read and write
D652000
heap
page read and write
5EF9000
trusted library allocation
page read and write
DF61000
heap
page read and write
4C5B000
heap
page read and write
F62E000
trusted library allocation
page read and write
D885000
heap
page read and write
DF14000
trusted library allocation
page read and write
8571000
trusted library allocation
page read and write
F5C4000
trusted library allocation
page read and write
DD9C000
heap
page read and write
E366000
trusted library allocation
page read and write
8570000
trusted library allocation
page read and write
DEFE000
trusted library allocation
page read and write
D8BE000
heap
page read and write
F2EE000
trusted library allocation
page read and write
857E000
trusted library allocation
page read and write
DEE0000
trusted library allocation
page read and write
4BF8000
heap
page read and write
EFED000
trusted library allocation
page read and write
F2F2000
trusted library allocation
page read and write
D697000
heap
page read and write
D594000
heap
page read and write
DEFA000
trusted library allocation
page read and write
E50B000
trusted library allocation
page read and write
D9D4000
trusted library allocation
page read and write
E53E000
trusted library allocation
page read and write
F2DB000
trusted library allocation
page read and write
F2E8000
trusted library allocation
page read and write
8E19000
heap
page read and write
4EB3000
trusted library allocation
page read and write
D876000
heap
page read and write
E4CD000
trusted library allocation
page read and write
80B7000
trusted library allocation
page read and write
DEFB000
trusted library allocation
page read and write
D619000
heap
page read and write
D540000
heap
page read and write
D670000
heap
page read and write
E7CC000
heap
page read and write
E51C000
trusted library allocation
page read and write
5C78000
heap
page read and write
C0A7000
heap
page read and write
8570000
trusted library allocation
page read and write
D681000
heap
page read and write
9F57000
trusted library allocation
page read and write
D91E000
heap
page read and write
858E000
trusted library allocation
page read and write
9F59000
trusted library allocation
page read and write
8587000
trusted library allocation
page read and write
D5C000
stack
page read and write
D80F000
heap
page read and write
F591000
trusted library allocation
page read and write
DEFC000
trusted library allocation
page read and write
E4C4000
trusted library allocation
page read and write
DEFE000
trusted library allocation
page read and write
F237000
trusted library allocation
page read and write
972000
heap
page read and write
80E7000
trusted library allocation
page read and write
EE59000
trusted library allocation
page read and write
F251000
trusted library allocation
page read and write
8E3E000
heap
page read and write
9F52000
trusted library allocation
page read and write
C031000
heap
page read and write
F510000
trusted library allocation
page read and write
80E7000
trusted library allocation
page read and write
D884000
heap
page read and write
E842000
heap
page read and write
C023000
heap
page read and write
D542000
heap
page read and write
E375000
trusted library allocation
page read and write
D805000
heap
page read and write
D619000
heap
page read and write
C0A6000
heap
page read and write
32B0000
heap
page read and write
C04D000
heap
page read and write
7E89000
trusted library allocation
page read and write
EE97000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
EF3F000
trusted library allocation
page read and write
8305000
trusted library allocation
page read and write
D670000
heap
page read and write
C04D000
heap
page read and write
D73E000
heap
page read and write
E399000
trusted library allocation
page read and write
D7C6000
heap
page read and write
D751000
heap
page read and write
C035000
heap
page read and write
D6A3000
heap
page read and write
80D8000
trusted library allocation
page read and write
9F51000
trusted library allocation
page read and write
D5BF000
heap
page read and write
F577000
trusted library allocation
page read and write
E3D0000
trusted library allocation
page read and write
80CE000
trusted library allocation
page read and write
D957000
trusted library allocation
page read and write
7F46000
trusted library allocation
page read and write
E579000
trusted library allocation
page read and write
E82C000
heap
page read and write
E4AA000
trusted library allocation
page read and write
E500000
trusted library allocation
page read and write
434000
unkown
page read and write
858F000
trusted library allocation
page read and write
5C6F000
heap
page read and write
D7E6000
heap
page read and write
4C5D000
heap
page read and write
D91E000
heap
page read and write
D634000
heap
page read and write
E50000
heap
page read and write
E503000
trusted library allocation
page read and write
DEFA000
trusted library allocation
page read and write
80E4000
trusted library allocation
page read and write
D671000
heap
page read and write
8585000
trusted library allocation
page read and write
D87E000
heap
page read and write
D573000
heap
page read and write
C0D8000
heap
page read and write
D77D000
heap
page read and write
32D0000
heap
page read and write
D778000
heap
page read and write
8200000
trusted library allocation
page read and write
F2CF000
trusted library allocation
page read and write
C0B0000
heap
page read and write
5472000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
9F6E000
trusted library allocation
page read and write
F43E000
trusted library allocation
page read and write
D742000
heap
page read and write
F3F5000
trusted library allocation
page read and write
E3BA000
trusted library allocation
page read and write
323E000
stack
page read and write
5C99000
heap
page read and write
C3F1000
trusted library allocation
page read and write
F2D9000
trusted library allocation
page read and write
9F53000
trusted library allocation
page read and write
80C9000
trusted library allocation
page read and write
BFD7000
heap
page read and write
E39F000
trusted library allocation
page read and write
C0AB000
heap
page read and write
D619000
heap
page read and write
E4C4000
trusted library allocation
page read and write
D865000
heap
page read and write
F62E000
trusted library allocation
page read and write
D53000
trusted library allocation
page execute and read and write
D5D5000
heap
page read and write
F5A6000
trusted library allocation
page read and write
AF52000
trusted library allocation
page read and write
D7F0000
heap
page read and write
9EF000
stack
page read and write
E4A4000
trusted library allocation
page read and write
39DA000
heap
page read and write
B1AC000
trusted library allocation
page read and write
B19C000
trusted library allocation
page read and write
D59B000
heap
page read and write
96C000
heap
page read and write
D7E4000
heap
page read and write
EE36000
trusted library allocation
page read and write
F62E000
trusted library allocation
page read and write
C06B000
heap
page read and write
E84E000
heap
page read and write
F1DC000
trusted library allocation
page read and write
80E9000
trusted library allocation
page read and write
E3CB000
trusted library allocation
page read and write
C031000
heap
page read and write
9F6A000
trusted library allocation
page read and write
9F65000
trusted library allocation
page read and write
4C6B000
heap
page read and write
F5C4000
trusted library allocation
page read and write
E4C8000
trusted library allocation
page read and write
D78A000
heap
page read and write
857B000
trusted library allocation
page read and write
F5CF000
trusted library allocation
page read and write
F3D5000
trusted library allocation
page read and write
C3FB000
trusted library allocation
page read and write
E50B000
trusted library allocation
page read and write
7E95000
trusted library allocation
page read and write
C050000
heap
page read and write
D8BF000
heap
page read and write
8580000
trusted library allocation
page read and write
401000
unkown
page execute read
EED4000
trusted library allocation
page read and write
D7F5000
heap
page read and write
9F52000
trusted library allocation
page read and write
DD97000
heap
page read and write
400000
unkown
page readonly
BFBD000
heap
page read and write
9F55000
trusted library allocation
page read and write
56E4000
trusted library allocation
page read and write
EE47000
trusted library allocation
page read and write
D736000
heap
page read and write
E543000
trusted library allocation
page read and write
32B0000
heap
page read and write
9F56000
trusted library allocation
page read and write
F1DC000
trusted library allocation
page read and write
D967000
trusted library allocation
page read and write
80E7000
trusted library allocation
page read and write
E53E000
trusted library allocation
page read and write
D86F000
heap
page read and write
D5D3000
heap
page read and write
D8E5000
heap
page read and write
80E7000
trusted library allocation
page read and write
D8DC000
heap
page read and write
80E7000
trusted library allocation
page read and write
E50B000
trusted library allocation
page read and write
9F5D000
trusted library allocation
page read and write
4EA6000
trusted library allocation
page read and write
AF38000
trusted library allocation
page read and write
64A000
stack
page read and write
C0CB000
heap
page read and write
F1A0000
trusted library allocation
page read and write
C0CE000
heap
page read and write
DDB000
stack
page read and write
8587000
trusted library allocation
page read and write
782B000
stack
page read and write
E4CA000
trusted library allocation
page read and write
AF12000
trusted library allocation
page read and write
F62E000
trusted library allocation
page read and write
EF89000
trusted library allocation
page read and write
C0CB000
heap
page read and write
C073000
heap
page read and write
8579000
trusted library allocation
page read and write
D8E2000
heap
page read and write
D594000
heap
page read and write
8589000
trusted library allocation
page read and write
D58E000
heap
page read and write
E57C000
trusted library allocation
page read and write
F2F6000
trusted library allocation
page read and write
E79C000
heap
page read and write
4C5B000
heap
page read and write
D8CD000
heap
page read and write
80C9000
trusted library allocation
page read and write
E4C1000
trusted library allocation
page read and write
D619000
heap
page read and write
D8DC000
heap
page read and write
F55A000
trusted library allocation
page read and write
D6B7000
heap
page read and write
8579000
trusted library allocation
page read and write
D809000
heap
page read and write
E641000
heap
page read and write
D79F000
heap
page read and write
D753000
heap
page read and write
8589000
trusted library allocation
page read and write
857C000
trusted library allocation
page read and write
E374000
trusted library allocation
page read and write
E500000
trusted library allocation
page read and write
80E9000
trusted library allocation
page read and write
E51C000
trusted library allocation
page read and write
D91E000
heap
page read and write
B620000
trusted library allocation
page read and write
B190000
trusted library allocation
page read and write
D8CC000
heap
page read and write
8579000
trusted library allocation
page read and write
7790000
trusted library allocation
page read and write
E500000
trusted library allocation
page read and write
B640000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
C0DA000
heap
page read and write
F62E000
trusted library allocation
page read and write
D7E4000
heap
page read and write
8580000
trusted library allocation
page read and write
7E98000
trusted library allocation
page read and write
857E000
trusted library allocation
page read and write
C04D000
heap
page read and write
F41B000
trusted library allocation
page read and write
8572000
trusted library allocation
page read and write
E51C000
trusted library allocation
page read and write
D85000
trusted library allocation
page execute and read and write
D974000
trusted library allocation
page read and write
8581000
trusted library allocation
page read and write
C0DA000
heap
page read and write
D96F000
trusted library allocation
page read and write
D69000
trusted library allocation
page read and write
F454000
trusted library allocation
page read and write
8DE5000
heap
page read and write
98F000
heap
page read and write
F245000
trusted library allocation
page read and write
F5A6000
trusted library allocation
page read and write
F440000
trusted library allocation
page read and write
F40000
heap
page read and write
F411000
trusted library allocation
page read and write
F589000
trusted library allocation
page read and write
5C78000
heap
page read and write
BFBD000
heap
page read and write
E3C5000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
E3CC000
trusted library allocation
page read and write
D6A3000
heap
page read and write
D754000
heap
page read and write
858E000
trusted library allocation
page read and write
C0A7000
heap
page read and write
8584000
trusted library allocation
page read and write
80BF000
trusted library allocation
page read and write
B1A0000
trusted library allocation
page read and write
EFF5000
trusted library allocation
page read and write
8586000
trusted library allocation
page read and write
DF09000
trusted library allocation
page read and write
C023000
heap
page read and write
EFFB000
trusted library allocation
page read and write
D597000
heap
page read and write
F25C000
trusted library allocation
page read and write
E4E8000
trusted library allocation
page read and write
D713000
heap
page read and write
F5BC000
trusted library allocation
page read and write
DB10000
trusted library allocation
page read and write
5C78000
heap
page read and write
D583000
heap
page read and write
5046000
trusted library allocation
page read and write
DEEA000
trusted library allocation
page read and write
5C75000
heap
page read and write
F2D9000
trusted library allocation
page read and write
C01A000
heap
page read and write
D7E0000
heap
page read and write
C40F000
trusted library allocation
page read and write
F57D000
trusted library allocation
page read and write
8587000
trusted library allocation
page read and write
D583000
heap
page read and write
858E000
trusted library allocation
page read and write
7E9B000
trusted library allocation
page read and write
D8AD000
heap
page read and write
B1A9000
trusted library allocation
page read and write
80EC000
trusted library allocation
page read and write
C0D8000
heap
page read and write
D97F000
trusted library allocation
page read and write
F271000
trusted library allocation
page read and write
D8D0000
heap
page read and write
68E000
stack
page read and write
8579000
trusted library allocation
page read and write
D58E000
heap
page read and write
9F52000
trusted library allocation
page read and write
AF38000
trusted library allocation
page read and write
D670000
heap
page read and write
F4C5000
trusted library allocation
page read and write
E50F000
trusted library allocation
page read and write
8574000
trusted library allocation
page read and write
E396000
trusted library allocation
page read and write
E4F4000
trusted library allocation
page read and write
D8E2000
heap
page read and write
C0A7000
heap
page read and write
E4CA000
trusted library allocation
page read and write
95E000
heap
page read and write
DEFE000
trusted library allocation
page read and write
D97A000
trusted library allocation
page read and write
D8BF000
heap
page read and write
C026000
heap
page read and write
C041000
heap
page read and write
D718000
heap
page read and write
EFEF000
trusted library allocation
page read and write
4C59000
heap
page read and write
D6B6000
heap
page read and write
8579000
trusted library allocation
page read and write
AF63000
trusted library allocation
page read and write
D6F7000
heap
page read and write
E82C000
heap
page read and write
F23F000
trusted library allocation
page read and write
F589000
trusted library allocation
page read and write
D9DD000
trusted library allocation
page read and write
D8C3000
heap
page read and write
9F56000
trusted library allocation
page read and write
E84F000
heap
page read and write
D888000
heap
page read and write
AF34000
trusted library allocation
page read and write
D82E000
heap
page read and write
D75F000
heap
page read and write
988000
heap
page read and write
D69F000
heap
page read and write
D754000
heap
page read and write
AF28000
trusted library allocation
page read and write
80E4000
trusted library allocation
page read and write
9F53000
trusted library allocation
page read and write
80BF000
trusted library allocation
page read and write
F2E2000
trusted library allocation
page read and write
C031000
heap
page read and write
F40F000
trusted library allocation
page read and write
F3C6000
trusted library allocation
page read and write
8588000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
C057000
heap
page read and write
E50F000
trusted library allocation
page read and write
F3D5000
trusted library allocation
page read and write
D77B000
heap
page read and write
E4B9000
trusted library allocation
page read and write
F62E000
trusted library allocation
page read and write
EED8000
trusted library allocation
page read and write
AEFA000
trusted library allocation
page read and write
E393000
trusted library allocation
page read and write
D891000
heap
page read and write
E44E000
trusted library allocation
page read and write
E534000
trusted library allocation
page read and write
D7DC000
heap
page read and write
8583000
trusted library allocation
page read and write
C057000
heap
page read and write
E3B1000
trusted library allocation
page read and write
E719000
heap
page read and write
C0DD000
heap
page read and write
770D000
stack
page read and write
E728000
heap
page read and write
E379000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
D69F000
heap
page read and write
F1EB000
trusted library allocation
page read and write
C40A000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
E4A4000
trusted library allocation
page read and write
B1A7000
trusted library allocation
page read and write
AF34000
trusted library allocation
page read and write
AF0E000
trusted library allocation
page read and write
EEA1000
trusted library allocation
page read and write
D97D000
trusted library allocation
page read and write
D67F000
heap
page read and write
F5CF000
trusted library allocation
page read and write
D757000
heap
page read and write
E886000
heap
page read and write
E4BF000
trusted library allocation
page read and write
D77B000
heap
page read and write
D91E000
heap
page read and write
F589000
trusted library allocation
page read and write
C05E000
heap
page read and write
69E0000
heap
page read and write
C057000
heap
page read and write
E407000
trusted library allocation
page read and write
E4CA000
trusted library allocation
page read and write
9F6B000
trusted library allocation
page read and write
7F39000
trusted library allocation
page read and write
DEF4000
trusted library allocation
page read and write
9F54000
trusted library allocation
page read and write
D696000
heap
page read and write
E4BC000
trusted library allocation
page read and write
C403000
trusted library allocation
page read and write
C04D000
heap
page read and write
E640000
heap
page read and write
8E90000
trusted library allocation
page read and write
E1A1000
heap
page read and write
E360000
trusted library allocation
page read and write
E5D6000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
858B000
trusted library allocation
page read and write
D5BF000
heap
page read and write
D8A7000
heap
page read and write
F2B8000
trusted library allocation
page read and write
E534000
trusted library allocation
page read and write
82B0000
heap
page read and write
8587000
trusted library allocation
page read and write
F589000
trusted library allocation
page read and write
F4AC000
trusted library allocation
page read and write
E4BF000
trusted library allocation
page read and write
9F54000
trusted library allocation
page read and write
F2D1000
trusted library allocation
page read and write
D5CA000
heap
page read and write
E20000
heap
page read and write
E507000
trusted library allocation
page read and write
C08E000
heap
page read and write
8586000
trusted library allocation
page read and write
D8C4000
heap
page read and write
6ED000
stack
page read and write
E4A0000
trusted library allocation
page read and write
F5BC000
trusted library allocation
page read and write
C023000
heap
page read and write
F5C4000
trusted library allocation
page read and write
D6D7000
heap
page read and write
F28B000
trusted library allocation
page read and write
F5C4000
trusted library allocation
page read and write
F5CF000
trusted library allocation
page read and write
E50F000
trusted library allocation
page read and write
C07F000
heap
page read and write
D670000
heap
page read and write
D742000
heap
page read and write
9F32000
trusted library allocation
page read and write
F5BC000
trusted library allocation
page read and write
D873000
heap
page read and write
D5D3000
heap
page read and write
D7E4000
heap
page read and write
F293000
trusted library allocation
page read and write
E4CA000
trusted library allocation
page read and write
C0D8000
heap
page read and write
E84E000
heap
page read and write
F23D000
trusted library allocation
page read and write
9F6D000
trusted library allocation
page read and write
4EE0000
heap
page execute and read and write
80C9000
trusted library allocation
page read and write
EEB6000
trusted library allocation
page read and write
E4CD000
trusted library allocation
page read and write
80E4000
trusted library allocation
page read and write
E5C4000
trusted library allocation
page read and write
8585000
trusted library allocation
page read and write
D977000
trusted library allocation
page read and write
E84E000
heap
page read and write
E3D3000
trusted library allocation
page read and write
F594000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
E774000
heap
page read and write
EF08000
trusted library allocation
page read and write
EB0000
heap
page read and write
9F6B000
trusted library allocation
page read and write
80EC000
trusted library allocation
page read and write
E390000
trusted library allocation
page read and write
EE33000
trusted library allocation
page read and write
D5AC000
heap
page read and write
DEE4000
trusted library allocation
page read and write
4C4D000
heap
page read and write
F25C000
trusted library allocation
page read and write
E630000
heap
page read and write
F040000
trusted library allocation
page read and write
80CE000
trusted library allocation
page read and write
E3BE000
trusted library allocation
page read and write
F3F9000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
D68F000
heap
page read and write
8579000
trusted library allocation
page read and write
B1AF000
trusted library allocation
page read and write
8584000
trusted library allocation
page read and write
D69F000
heap
page read and write
EFE8000
trusted library allocation
page read and write
C057000
heap
page read and write
D742000
heap
page read and write
857E000
trusted library allocation
page read and write
D90A000
heap
page read and write
AF20000
trusted library allocation
page read and write
C0AB000
heap
page read and write
F62E000
trusted library allocation
page read and write
DF61000
heap
page read and write
F5BC000
trusted library allocation
page read and write
80B7000
trusted library allocation
page read and write
858B000
trusted library allocation
page read and write
D540000
heap
page read and write
E3A9000
trusted library allocation
page read and write
858B000
trusted library allocation
page read and write
9F56000
trusted library allocation
page read and write
C0DA000
heap
page read and write
F2D9000
trusted library allocation
page read and write
858E000
trusted library allocation
page read and write
2874000
heap
page read and write
858B000
trusted library allocation
page read and write
C041000
heap
page read and write
857B000
trusted library allocation
page read and write
D91E000
heap
page read and write
AF90000
remote allocation
page read and write
E5DE000
trusted library allocation
page read and write
3218000
heap
page read and write
80B9000
trusted library allocation
page read and write
C073000
heap
page read and write
857E000
trusted library allocation
page read and write
E80C000
heap
page read and write
9F51000
trusted library allocation
page read and write
4810000
trusted library allocation
page read and write
D561000
heap
page read and write
C3FC000
trusted library allocation
page read and write
7E98000
trusted library allocation
page read and write
D5C5000
heap
page read and write
857C000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
D8B9000
heap
page read and write
80E4000
trusted library allocation
page read and write
80D8000
trusted library allocation
page read and write
5C7F000
heap
page read and write
E4CA000
trusted library allocation
page read and write
E534000
trusted library allocation
page read and write
5C75000
heap
page read and write
F5C4000
trusted library allocation
page read and write
5C60000
heap
page read and write
9F53000
trusted library allocation
page read and write
B563000
heap
page read and write
D8BE000
heap
page read and write
9F54000
trusted library allocation
page read and write
80EC000
trusted library allocation
page read and write
F1DC000
trusted library allocation
page read and write
F558000
trusted library allocation
page read and write
D96B000
trusted library allocation
page read and write
F509000
trusted library allocation
page read and write
F3D5000
trusted library allocation
page read and write
8576000
trusted library allocation
page read and write
C057000
heap
page read and write
E488000
trusted library allocation
page read and write
EFFB000
trusted library allocation
page read and write
F3D5000
trusted library allocation
page read and write
D7E4000
heap
page read and write
E4CD000
trusted library allocation
page read and write
BFC3000
heap
page read and write
4867000
heap
page read and write
E4F8000
trusted library allocation
page read and write
F5B9000
trusted library allocation
page read and write
DEEF000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
8589000
trusted library allocation
page read and write
7F44000
trusted library allocation
page read and write
40A000
unkown
page write copy
D67F000
heap
page read and write
9F52000
trusted library allocation
page read and write
D845000
heap
page read and write
9F61000
trusted library allocation
page read and write
F57D000
trusted library allocation
page read and write
E181000
heap
page read and write
E50B000
trusted library allocation
page read and write
F253000
trusted library allocation
page read and write
D5B4000
heap
page read and write
E38B000
trusted library allocation
page read and write
F3EF000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
F2E0000
trusted library allocation
page read and write
DEE0000
trusted library allocation
page read and write
98000
stack
page read and write
9F5C000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
E4C0000
trusted library allocation
page read and write
D5B8000
heap
page read and write
8585000
trusted library allocation
page read and write
F5CF000
trusted library allocation
page read and write
DEE1000
trusted library allocation
page read and write
E84E000
heap
page read and write
4C6B000
heap
page read and write
F298000
trusted library allocation
page read and write
D5D000
trusted library allocation
page execute and read and write
D8C6000
heap
page read and write
80BF000
trusted library allocation
page read and write
E534000
trusted library allocation
page read and write
8584000
trusted library allocation
page read and write
C0D8000
heap
page read and write
F298000
trusted library allocation
page read and write
7E95000
trusted library allocation
page read and write
E4E8000
trusted library allocation
page read and write
8E5D000
heap
page read and write
E360000
trusted library allocation
page read and write
9F67000
trusted library allocation
page read and write
7E95000
trusted library allocation
page read and write
D78A000
heap
page read and write
F594000
trusted library allocation
page read and write
E500000
trusted library allocation
page read and write
E1C8000
heap
page read and write
C057000
heap
page read and write
D575000
heap
page read and write
E81F000
heap
page read and write
E38D000
trusted library allocation
page read and write
8320000
trusted library allocation
page read and write
DEE6000
trusted library allocation
page read and write
938000
heap
page read and write
F62E000
trusted library allocation
page read and write
D88A000
heap
page read and write
8589000
trusted library allocation
page read and write
D633000
heap
page read and write
5960000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
E12A000
heap
page read and write
858D000
trusted library allocation
page read and write
C0A1000
heap
page read and write
D5B6000
heap
page read and write
E3A5000
trusted library allocation
page read and write
E412000
trusted library allocation
page read and write
CE0000
heap
page read and write
D785000
heap
page read and write
C04D000
heap
page read and write
DEF2000
trusted library allocation
page read and write
B620000
trusted library allocation
page read and write
D670000
heap
page read and write
81B7000
stack
page read and write
C0DA000
heap
page read and write
E4C4000
trusted library allocation
page read and write
D69F000
heap
page read and write
8597000
trusted library allocation
page read and write
C035000
heap
page read and write
D79F000
heap
page read and write
D6F7000
heap
page read and write
F62E000
trusted library allocation
page read and write
7E85000
trusted library allocation
page read and write
AF68000
trusted library allocation
page read and write
400000
unkown
page readonly
D6F7000
heap
page read and write
4C39000
heap
page read and write
4BEC000
heap
page read and write
EE9D000
trusted library allocation
page read and write
D8C4000
heap
page read and write
DF20000
trusted library allocation
page read and write
AEF8000
trusted library allocation
page read and write
4C5D000
heap
page read and write
D813000
heap
page read and write
F252000
trusted library allocation
page read and write
D940000
trusted library allocation
page read and write
D54000
trusted library allocation
page read and write
F5B9000
trusted library allocation
page read and write
F62E000
trusted library allocation
page read and write
D907000
heap
page read and write
D8F1000
heap
page read and write
E80C000
heap
page read and write
5C78000
heap
page read and write
E49B000
trusted library allocation
page read and write
EF00000
trusted library allocation
page read and write
C05A000
heap
page read and write
D74E000
heap
page read and write
D70E000
heap
page read and write
F243000
trusted library allocation
page read and write
4BD0000
heap
page read and write
E507000
trusted library allocation
page read and write
9F54000
trusted library allocation
page read and write
E500000
trusted library allocation
page read and write
7E98000
trusted library allocation
page read and write
80E4000
trusted library allocation
page read and write
D909000
heap
page read and write
F3D5000
trusted library allocation
page read and write
D8C9000
heap
page read and write
4C2F000
heap
page read and write
9F52000
trusted library allocation
page read and write
DEE2000
trusted library allocation
page read and write
D86F000
heap
page read and write
E867000
heap
page read and write
F4A7000
trusted library allocation
page read and write
127E000
stack
page read and write
E507000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
9F53000
trusted library allocation
page read and write
80E4000
trusted library allocation
page read and write
D5CA000
heap
page read and write
F2C8000
trusted library allocation
page read and write
F298000
trusted library allocation
page read and write
B10000
heap
page read and write
E361000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
EED2000
trusted library allocation
page read and write
F4C5000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
D8B8000
heap
page read and write
80DE000
trusted library allocation
page read and write
B191000
trusted library allocation
page read and write
E4C6000
trusted library allocation
page read and write
E53E000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
D619000
heap
page read and write
F2D5000
trusted library allocation
page read and write
C3FF000
trusted library allocation
page read and write
C0CB000
heap
page read and write
E4BF000
trusted library allocation
page read and write
D91E000
heap
page read and write
80E4000
trusted library allocation
page read and write
C057000
heap
page read and write
C049000
heap
page read and write
9F5B000
trusted library allocation
page read and write
95B000
heap
page read and write
E4CD000
trusted library allocation
page read and write
E500000
trusted library allocation
page read and write
80C9000
trusted library allocation
page read and write
80C9000
trusted library allocation
page read and write
E3D0000
trusted library allocation
page read and write
B640000
trusted library allocation
page read and write
AF14000
trusted library allocation
page read and write
F2BC000
trusted library allocation
page read and write
8E3C000
heap
page read and write
E452000
trusted library allocation
page read and write
D607000
heap
page read and write
DEF6000
trusted library allocation
page read and write
E856000
heap
page read and write
F5DD000
trusted library allocation
page read and write
E4C4000
trusted library allocation
page read and write
C3F2000
trusted library allocation
page read and write
F5E8000
trusted library allocation
page read and write
EF57000
trusted library allocation
page read and write
F5BC000
trusted library allocation
page read and write
F140000
trusted library allocation
page read and write
9F56000
trusted library allocation
page read and write
C40C000
trusted library allocation
page read and write
DEC0000
trusted library allocation
page read and write
80EC000
trusted library allocation
page read and write
95E000
heap
page read and write
858F000
trusted library allocation
page read and write
D713000
heap
page read and write
7E98000
trusted library allocation
page read and write
8583000
trusted library allocation
page read and write
7E9B000
trusted library allocation
page read and write
857B000
trusted library allocation
page read and write
E621000
heap
page read and write
F2B6000
trusted library allocation
page read and write
DEF6000
trusted library allocation
page read and write
D67F000
heap
page read and write
F298000
trusted library allocation
page read and write
9F5E000
trusted library allocation
page read and write
DF10000
trusted library allocation
page read and write
E38E000
trusted library allocation
page read and write
F284000
trusted library allocation
page read and write
D5CA000
heap
page read and write
C0ED000
heap
page read and write
76CE000
stack
page read and write
DB40000
trusted library allocation
page read and write
80BF000
trusted library allocation
page read and write
DB0000
heap
page read and write
82AE000
stack
page read and write
C035000
heap
page read and write
E3BC000
trusted library allocation
page read and write
C060000
heap
page read and write
9F65000
trusted library allocation
page read and write
EEE3000
trusted library allocation
page read and write
8581000
trusted library allocation
page read and write
F62E000
trusted library allocation
page read and write
B19E000
trusted library allocation
page read and write
C05A000
heap
page read and write
E6E9000
heap
page read and write
E534000
trusted library allocation
page read and write
80C9000
trusted library allocation
page read and write
E4C6000
trusted library allocation
page read and write
E4E0000
trusted library allocation
page read and write
9F58000
trusted library allocation
page read and write
E3AB000
trusted library allocation
page read and write
E4BC000
trusted library allocation
page read and write
327F000
stack
page read and write
E488000
trusted library allocation
page read and write
D714000
heap
page read and write
8579000
trusted library allocation
page read and write
E458000
trusted library allocation
page read and write
8570000
trusted library allocation
page read and write
E84E000
heap
page read and write
D713000
heap
page read and write
E87E000
heap
page read and write
E365000
trusted library allocation
page read and write
D64F000
heap
page read and write
C06E000
heap
page read and write
DEE4000
trusted library allocation
page read and write
2FDA000
heap
page read and write
9F5A000
trusted library allocation
page read and write
E503000
trusted library allocation
page read and write
DEF5000
trusted library allocation
page read and write
F1C9000
trusted library allocation
page read and write
D5A5000
heap
page read and write
8360000
trusted library allocation
page read and write
C3F4000
trusted library allocation
page read and write
D6B7000
heap
page read and write
E4BF000
trusted library allocation
page read and write
E4BF000
trusted library allocation
page read and write
F261000
trusted library allocation
page read and write
E4AA000
trusted library allocation
page read and write
D698000
heap
page read and write
D90A000
heap
page read and write
D8C6000
heap
page read and write
F298000
trusted library allocation
page read and write
C0CB000
heap
page read and write
F57D000
trusted library allocation
page read and write
E824000
heap
page read and write
D5AC000
heap
page read and write
5F19000
trusted library allocation
page read and write
D670000
heap
page read and write
4A70000
direct allocation
page read and write
F589000
trusted library allocation
page read and write
F0BC000
trusted library allocation
page read and write
EF47000
trusted library allocation
page read and write
D678000
heap
page read and write
9F57000
trusted library allocation
page read and write
E377000
trusted library allocation
page read and write
9F55000
trusted library allocation
page read and write
80CE000
trusted library allocation
page read and write
475F000
stack
page read and write
F62E000
trusted library allocation
page read and write
80BF000
trusted library allocation
page read and write
DEFD000
trusted library allocation
page read and write
8585000
trusted library allocation
page read and write
AF38000
trusted library allocation
page read and write
EFC0000
trusted library allocation
page read and write
EF56000
trusted library allocation
page read and write
E4B9000
trusted library allocation
page read and write
9F53000
trusted library allocation
page read and write
D984000
trusted library allocation
page read and write
C402000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
C031000
heap
page read and write
9F52000
trusted library allocation
page read and write
DEC2000
trusted library allocation
page read and write
EEB8000
trusted library allocation
page read and write
C06E000
heap
page read and write
E6AD000
heap
page read and write
D7C7000
heap
page read and write
EF94000
trusted library allocation
page read and write
C07F000
heap
page read and write
DB50000
trusted library allocation
page read and write
E3D8000
trusted library allocation
page read and write
D96C000
trusted library allocation
page read and write
F62E000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
80E7000
trusted library allocation
page read and write
DC70000
trusted library allocation
page read and write
D940000
trusted library allocation
page read and write
9F51000
trusted library allocation
page read and write
9F68000
trusted library allocation
page read and write
2DBF000
stack
page read and write
54F8000
trusted library allocation
page read and write
F589000
trusted library allocation
page read and write
E500000
trusted library allocation
page read and write
857F000
trusted library allocation
page read and write
DEF1000
trusted library allocation
page read and write
7E9B000
trusted library allocation
page read and write
D67F000
heap
page read and write
31FE000
stack
page read and write
F509000
trusted library allocation
page read and write
F1FC000
trusted library allocation
page read and write
F2D9000
trusted library allocation
page read and write
EFED000
trusted library allocation
page read and write
C05A000
heap
page read and write
E49B000
trusted library allocation
page read and write
4C06000
heap
page read and write
8DDB000
heap
page read and write
3210000
heap
page read and write
F5C4000
trusted library allocation
page read and write
D6D3000
heap
page read and write
E4F8000
trusted library allocation
page read and write
8583000
trusted library allocation
page read and write
F3C7000
trusted library allocation
page read and write
8588000
trusted library allocation
page read and write
9F54000
trusted library allocation
page read and write
8576000
trusted library allocation
page read and write
D670000
heap
page read and write
7F4D000
trusted library allocation
page read and write
F0F8000
trusted library allocation
page read and write
F40C000
trusted library allocation
page read and write
E49B000
trusted library allocation
page read and write
7E9B000
trusted library allocation
page read and write
F0E0000
trusted library allocation
page read and write
D671000
heap
page read and write
C0DF000
heap
page read and write
D696000
heap
page read and write
AF12000
trusted library allocation
page read and write
D757000
heap
page read and write
E760000
heap
page read and write
D73C000
heap
page read and write
857E000
trusted library allocation
page read and write
D64F000
heap
page read and write
F1F3000
trusted library allocation
page read and write
D69F000
heap
page read and write
C06E000
heap
page read and write
9F6C000
trusted library allocation
page read and write
F5CF000
trusted library allocation
page read and write
E499000
trusted library allocation
page read and write
F5CF000
trusted library allocation
page read and write
C0A1000
heap
page read and write
E39D000
trusted library allocation
page read and write
BFD7000
heap
page read and write
6AD000
stack
page read and write
DEF2000
trusted library allocation
page read and write
6CE000
stack
page read and write
4860000
heap
page read and write
DEF2000
trusted library allocation
page read and write
857A000
trusted library allocation
page read and write
80CE000
trusted library allocation
page read and write
5C6B000
heap
page read and write
D8ED000
heap
page read and write
E440000
trusted library allocation
page read and write
F70000
heap
page read and write
E4C1000
trusted library allocation
page read and write
E534000
trusted library allocation
page read and write
D888000
heap
page read and write
9F34000
trusted library allocation
page read and write
E53E000
trusted library allocation
page read and write
4BF2000
heap
page read and write
E39A000
trusted library allocation
page read and write
98A000
heap
page read and write
F25C000
trusted library allocation
page read and write
E51C000
trusted library allocation
page read and write
C3F9000
trusted library allocation
page read and write
E842000
heap
page read and write
D8C9000
heap
page read and write
DF14000
trusted library allocation
page read and write
9F53000
trusted library allocation
page read and write
7750000
trusted library allocation
page read and write
8E5D000
heap
page read and write
D71E000
heap
page read and write
DEF2000
trusted library allocation
page read and write
C0AC000
heap
page read and write
8579000
trusted library allocation
page read and write
DF09000
trusted library allocation
page read and write
D7D7000
heap
page read and write
17C000
stack
page read and write
D757000
heap
page read and write
D91E000
heap
page read and write
F2D6000
trusted library allocation
page read and write
47BC000
stack
page read and write
C035000
heap
page read and write
E3BB000
trusted library allocation
page read and write
42D000
unkown
page write copy
C0D1000
heap
page read and write
4A30000
direct allocation
page read and write
EFF5000
trusted library allocation
page read and write
9F5B000
trusted library allocation
page read and write
D7E3000
heap
page read and write
D8E2000
heap
page read and write
8584000
trusted library allocation
page read and write
E373000
trusted library allocation
page read and write
E53E000
trusted library allocation
page read and write
D657000
heap
page read and write
D78E000
heap
page read and write
F62E000
trusted library allocation
page read and write
E87D000
heap
page read and write
F575000
trusted library allocation
page read and write
8E5D000
heap
page read and write
EF88000
trusted library allocation
page read and write
80EC000
trusted library allocation
page read and write
8E8000
stack
page read and write
E4F4000
trusted library allocation
page read and write
E3A8000
trusted library allocation
page read and write
857F000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
D5B4000
heap
page read and write
9F6A000
trusted library allocation
page read and write
E507000
trusted library allocation
page read and write
E4C6000
trusted library allocation
page read and write
E7F5000
heap
page read and write
9F54000
trusted library allocation
page read and write
8571000
trusted library allocation
page read and write
7F46000
trusted library allocation
page read and write
C057000
heap
page read and write
81F0000
heap
page read and write
F288000
trusted library allocation
page read and write
F263000
trusted library allocation
page read and write
AF66000
trusted library allocation
page read and write
7E95000
trusted library allocation
page read and write
EF29000
trusted library allocation
page read and write
C0A9000
heap
page read and write
D8A7000
heap
page read and write
9F56000
trusted library allocation
page read and write
9F5F000
trusted library allocation
page read and write
D91E000
heap
page read and write
9F34000
trusted library allocation
page read and write
80E9000
trusted library allocation
page read and write
EE4F000
trusted library allocation
page read and write
D946000
trusted library allocation
page read and write
E4F8000
trusted library allocation
page read and write
F5CF000
trusted library allocation
page read and write
F3D0000
trusted library allocation
page read and write
D592000
heap
page read and write
7F46000
trusted library allocation
page read and write
F62E000
trusted library allocation
page read and write
4AB0000
direct allocation
page read and write
E16F000
heap
page read and write
E823000
heap
page read and write
D8C4000
heap
page read and write
5508000
trusted library allocation
page read and write
C060000
heap
page read and write
D7E9000
heap
page read and write
7E98000
trusted library allocation
page read and write
E387000
trusted library allocation
page read and write
8DC9000
heap
page read and write
EF6D000
trusted library allocation
page read and write
D573000
heap
page read and write
9F55000
trusted library allocation
page read and write
D88E000
heap
page read and write
F256000
trusted library allocation
page read and write
E50B000
trusted library allocation
page read and write
D838000
heap
page read and write
8579000
trusted library allocation
page read and write
D895000
heap
page read and write
D583000
heap
page read and write
E53E000
trusted library allocation
page read and write
E507000
trusted library allocation
page read and write
D757000
heap
page read and write
DF20000
trusted library allocation
page read and write
D5D3000
heap
page read and write
D678000
heap
page read and write
5C6C000
heap
page read and write
4EE8000
trusted library allocation
page read and write
8420000
trusted library section
page read and write
D75F000
heap
page read and write
F25C000
trusted library allocation
page read and write
B4C8000
heap
page read and write
8589000
trusted library allocation
page read and write
96A000
heap
page read and write
F5B9000
trusted library allocation
page read and write
E77D000
heap
page read and write
D619000
heap
page read and write
E37A000
trusted library allocation
page read and write
D966000
trusted library allocation
page read and write
2DC4000
trusted library allocation
page read and write
4C6B000
heap
page read and write
C0D8000
heap
page read and write
D5D5000
heap
page read and write
D6C4000
heap
page read and write
81C0000
heap
page read and write
8588000
trusted library allocation
page read and write
80BF000
trusted library allocation
page read and write
D606000
heap
page read and write
D573000
heap
page read and write
80BF000
trusted library allocation
page read and write
910000
heap
page read and write
BFD7000
heap
page read and write
9F51000
trusted library allocation
page read and write
DC70000
trusted library allocation
page read and write
D90F000
heap
page read and write
D8AD000
heap
page read and write
F589000
trusted library allocation
page read and write
80E4000
trusted library allocation
page read and write
735E000
stack
page read and write
D802000
heap
page read and write
DEF2000
trusted library allocation
page read and write
80E7000
trusted library allocation
page read and write
D5C4000
heap
page read and write
E416000
trusted library allocation
page read and write
C10000
heap
page read and write
E872000
heap
page read and write
DEFC000
trusted library allocation
page read and write
E4CD000
trusted library allocation
page read and write
EF43000
trusted library allocation
page read and write
73F7000
heap
page read and write
E380000
trusted library allocation
page read and write
E3B0000
trusted library allocation
page read and write
D698000
heap
page read and write
E4A4000
trusted library allocation
page read and write
C406000
trusted library allocation
page read and write
857E000
trusted library allocation
page read and write
D675000
heap
page read and write
E507000
trusted library allocation
page read and write
E4E8000
trusted library allocation
page read and write
D83E000
heap
page read and write
F1CC000
trusted library allocation
page read and write
D9D5000
trusted library allocation
page read and write
D698000
heap
page read and write
C0CA000
heap
page read and write
E3B5000
trusted library allocation
page read and write
5C56000
heap
page read and write
F2A7000
trusted library allocation
page read and write
8577000
trusted library allocation
page read and write
80BF000
trusted library allocation
page read and write
E4CA000
trusted library allocation
page read and write
D5BF000
heap
page read and write
D8C4000
heap
page read and write
E80C000
heap
page read and write
E4C1000
trusted library allocation
page read and write
EF69000
trusted library allocation
page read and write
C04D000
heap
page read and write
E460000
trusted library allocation
page read and write
D84E000
heap
page read and write
E4C6000
trusted library allocation
page read and write
DEE1000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
7710000
trusted library allocation
page execute and read and write
D802000
heap
page read and write
D789000
heap
page read and write
DEE8000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
D8DC000
heap
page read and write
D58E000
heap
page read and write
D90A000
heap
page read and write
E7DD000
heap
page read and write
E4A4000
trusted library allocation
page read and write
4C5D000
heap
page read and write
F589000
trusted library allocation
page read and write
F0BC000
trusted library allocation
page read and write
B196000
trusted library allocation
page read and write
D813000
heap
page read and write
D57D000
heap
page read and write
E50F000
trusted library allocation
page read and write
7390000
heap
page read and write
C0D1000
heap
page read and write
D65D000
heap
page read and write
F5C4000
trusted library allocation
page read and write
73BA000
heap
page read and write
9F5B000
trusted library allocation
page read and write
F4AC000
trusted library allocation
page read and write
D74B000
heap
page read and write
F5BC000
trusted library allocation
page read and write
F0AD000
trusted library allocation
page read and write
98D000
heap
page read and write
F5BC000
trusted library allocation
page read and write
EFE8000
trusted library allocation
page read and write
8E3C000
heap
page read and write
7780000
trusted library allocation
page read and write
858D000
trusted library allocation
page read and write
F5CF000
trusted library allocation
page read and write
8586000
trusted library allocation
page read and write
B1A5000
trusted library allocation
page read and write
9F5A000
trusted library allocation
page read and write
F589000
trusted library allocation
page read and write
D67F000
heap
page read and write
E39D000
trusted library allocation
page read and write
DF10000
trusted library allocation
page read and write
D69F000
heap
page read and write
D678000
heap
page read and write
9F55000
trusted library allocation
page read and write
E4B9000
trusted library allocation
page read and write
D813000
heap
page read and write
E388000
trusted library allocation
page read and write
F5C4000
trusted library allocation
page read and write
F3D3000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
EF21000
trusted library allocation
page read and write
D90F000
heap
page read and write
D670000
heap
page read and write
750000
heap
page read and write
D8C4000
heap
page read and write
D67A000
heap
page read and write
E3B3000
trusted library allocation
page read and write
F2D9000
trusted library allocation
page read and write
E4A4000
trusted library allocation
page read and write
EEA7000
trusted library allocation
page read and write
858D000
trusted library allocation
page read and write
E36E000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
E3B9000
trusted library allocation
page read and write
F509000
trusted library allocation
page read and write
992000
heap
page read and write
D695000
heap
page read and write
C0D1000
heap
page read and write
3200000
heap
page readonly
E50B000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
D97C000
trusted library allocation
page read and write
D6F7000
heap
page read and write
8E20000
heap
page read and write
EE43000
trusted library allocation
page read and write
7E91000
trusted library allocation
page read and write
F270000
trusted library allocation
page read and write
C059000
heap
page read and write
D8AD000
heap
page read and write
F0AB000
trusted library allocation
page read and write
D670000
heap
page read and write
80C9000
trusted library allocation
page read and write
F62E000
trusted library allocation
page read and write
E4B9000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
EEDD000
trusted library allocation
page read and write
D6D7000
heap
page read and write
E5E6000
trusted library allocation
page read and write
80D8000
trusted library allocation
page read and write
E46C000
trusted library allocation
page read and write
80D8000
trusted library allocation
page read and write
D7E4000
heap
page read and write
D78E000
heap
page read and write
F3F3000
trusted library allocation
page read and write
DEFF000
trusted library allocation
page read and write
8586000
trusted library allocation
page read and write
E3B6000
trusted library allocation
page read and write
4C3C000
heap
page read and write
E4C6000
trusted library allocation
page read and write
D742000
heap
page read and write
D57D000
heap
page read and write
80EC000
trusted library allocation
page read and write
8E20000
heap
page read and write
80CE000
trusted library allocation
page read and write
7F36000
trusted library allocation
page read and write
77C0000
trusted library allocation
page read and write
80C9000
trusted library allocation
page read and write
DEE8000
trusted library allocation
page read and write
80B9000
trusted library allocation
page read and write
9F57000
trusted library allocation
page read and write
D90F000
heap
page read and write
8581000
trusted library allocation
page read and write
F4BB000
trusted library allocation
page read and write
D7B7000
heap
page read and write
80DE000
trusted library allocation
page read and write
F4AC000
trusted library allocation
page read and write
BFC1000
heap
page read and write
9F5E000
trusted library allocation
page read and write
E4F8000
trusted library allocation
page read and write
4C53000
heap
page read and write
F268000
trusted library allocation
page read and write
D78E000
heap
page read and write
D5AC000
heap
page read and write
E7F5000
heap
page read and write
D72A000
heap
page read and write
D5D6000
heap
page read and write
AF78000
trusted library allocation
page read and write
9F57000
trusted library allocation
page read and write
EF7C000
trusted library allocation
page read and write
E3D2000
trusted library allocation
page read and write
F3D5000
trusted library allocation
page read and write
5C79000
heap
page read and write
80EC000
trusted library allocation
page read and write
80E7000
trusted library allocation
page read and write
AF14000
trusted library allocation
page read and write
8410000
trusted library allocation
page read and write
C0D8000
heap
page read and write
C06E000
heap
page read and write
C0CB000
heap
page read and write
BFD7000
heap
page read and write
EF48000
trusted library allocation
page read and write
D1BA000
trusted library allocation
page read and write
F5CF000
trusted library allocation
page read and write
D592000
heap
page read and write
5C75000
heap
page read and write
D813000
heap
page read and write
C031000
heap
page read and write
7F44000
trusted library allocation
page read and write
977000
heap
page read and write
EF11000
trusted library allocation
page read and write
DEFC000
trusted library allocation
page read and write
F1FC000
trusted library allocation
page read and write
80E7000
trusted library allocation
page read and write
858F000
trusted library allocation
page read and write
E499000
trusted library allocation
page read and write
D875000
heap
page read and write
F5C4000
trusted library allocation
page read and write
D66B000
heap
page read and write
8E3E000
heap
page read and write
F3F8000
trusted library allocation
page read and write
D861000
heap
page read and write
E53E000
trusted library allocation
page read and write
5C7F000
heap
page read and write
8588000
trusted library allocation
page read and write
C06E000
heap
page read and write
8586000
trusted library allocation
page read and write
80E7000
trusted library allocation
page read and write
E4CD000
trusted library allocation
page read and write
D69C000
heap
page read and write
AF68000
trusted library allocation
page read and write
D671000
heap
page read and write
7E95000
trusted library allocation
page read and write
DEF7000
trusted library allocation
page read and write
7E8D000
trusted library allocation
page read and write
9F68000
trusted library allocation
page read and write
E5E6000
trusted library allocation
page read and write
8583000
trusted library allocation
page read and write
F589000
trusted library allocation
page read and write
E4E8000
trusted library allocation
page read and write
F2EB000
trusted library allocation
page read and write
E4BC000
trusted library allocation
page read and write
C026000
heap
page read and write
D5DA000
heap
page read and write
C0D7000
heap
page read and write
8579000
trusted library allocation
page read and write
F5B1000
trusted library allocation
page read and write
E106000
heap
page read and write
4AD0000
direct allocation
page read and write
F2DA000
trusted library allocation
page read and write
F62E000
trusted library allocation
page read and write
E46C000
trusted library allocation
page read and write
D8D5000
heap
page read and write
C01A000
heap
page read and write
C0A8000
heap
page read and write
D604000
heap
page read and write
DEF2000
trusted library allocation
page read and write
D755000
heap
page read and write
80EC000
trusted library allocation
page read and write
E4F8000
trusted library allocation
page read and write
EF2F000
trusted library allocation
page read and write
F57D000
trusted library allocation
page read and write
D906000
heap
page read and write
8DDB000
heap
page read and write
DEF2000
trusted library allocation
page read and write
8583000
trusted library allocation
page read and write
F282000
trusted library allocation
page read and write
C05A000
heap
page read and write
F4DB000
trusted library allocation
page read and write
F577000
trusted library allocation
page read and write
9F56000
trusted library allocation
page read and write
E378000
trusted library allocation
page read and write
80DE000
trusted library allocation
page read and write
9F63000
trusted library allocation
page read and write
D875000
heap
page read and write
E4CA000
trusted library allocation
page read and write
EFED000
trusted library allocation
page read and write
857B000
trusted library allocation
page read and write
DF00000
trusted library allocation
page read and write
4BF1000
heap
page read and write
F170000
trusted library allocation
page read and write
E47E000
trusted library allocation
page read and write
8584000
trusted library allocation
page read and write
E499000
trusted library allocation
page read and write
8585000
trusted library allocation
page read and write
D7E4000
heap
page read and write
D986000
trusted library allocation
page read and write
C073000
heap
page read and write
B193000
trusted library allocation
page read and write
768F000
stack
page read and write
9F5E000
trusted library allocation
page read and write
E4B9000
trusted library allocation
page read and write
5C78000
heap
page read and write
C073000
heap
page read and write
80E9000
trusted library allocation
page read and write
E37F000
trusted library allocation
page read and write
7E9B000
trusted library allocation
page read and write
E500000
trusted library allocation
page read and write
D5F9000
heap
page read and write
8579000
trusted library allocation
page read and write
79E000
stack
page read and write
D8F9000
heap
page read and write
80E4000
trusted library allocation
page read and write
E87F000
heap
page read and write
80EC000
trusted library allocation
page read and write
D769000
heap
page read and write
D602000
heap
page read and write
80E7000
trusted library allocation
page read and write
E680000
heap
page read and write
4C95000
heap
page execute and read and write
D5AC000
heap
page read and write
E40C000
trusted library allocation
page read and write
9F51000
trusted library allocation
page read and write
D68F000
heap
page read and write
EFF5000
trusted library allocation
page read and write
F630000
trusted library allocation
page read and write
E80C000
heap
page read and write
D8A7000
heap
page read and write
E4AA000
trusted library allocation
page read and write
C04D000
heap
page read and write
F224000
trusted library allocation
page read and write
8570000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
EF91000
trusted library allocation
page read and write
D6F8000
heap
page read and write
F5B9000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
D802000
heap
page read and write
8589000
trusted library allocation
page read and write
764E000
stack
page read and write
C01A000
heap
page read and write
80E9000
trusted library allocation
page read and write
1570000
heap
page read and write
7E98000
trusted library allocation
page read and write
E560000
trusted library allocation
page read and write
F5C4000
trusted library allocation
page read and write
9F55000
trusted library allocation
page read and write
D97E000
trusted library allocation
page read and write
9F51000
trusted library allocation
page read and write
D8C9000
heap
page read and write
F22F000
trusted library allocation
page read and write
857B000
trusted library allocation
page read and write
D582000
heap
page read and write
E49B000
trusted library allocation
page read and write
D680000
heap
page read and write
8573000
trusted library allocation
page read and write
80E4000
trusted library allocation
page read and write
F413000
trusted library allocation
page read and write
D9DE000
trusted library allocation
page read and write
EE27000
trusted library allocation
page read and write
7E9B000
trusted library allocation
page read and write
E50F000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
DEFB000
trusted library allocation
page read and write
E4CA000
trusted library allocation
page read and write
E648000
heap
page read and write
E503000
trusted library allocation
page read and write
80C9000
trusted library allocation
page read and write
AF30000
trusted library allocation
page read and write
9F56000
trusted library allocation
page read and write
F1E8000
trusted library allocation
page read and write
D798000
heap
page read and write
B1A8000
trusted library allocation
page read and write
C083000
heap
page read and write
F293000
trusted library allocation
page read and write
F62E000
trusted library allocation
page read and write
E499000
trusted library allocation
page read and write
C041000
heap
page read and write
47D000
stack
page read and write
8579000
trusted library allocation
page read and write
E865000
heap
page read and write
C0CB000
heap
page read and write
E4C1000
trusted library allocation
page read and write
D77B000
heap
page read and write
DEE2000
trusted library allocation
page read and write
D963000
trusted library allocation
page read and write
C073000
heap
page read and write
E39C000
trusted library allocation
page read and write
80CE000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
8577000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
C082000
heap
page read and write
E4C4000
trusted library allocation
page read and write
D5B8000
heap
page read and write
C0DF000
heap
page read and write
8579000
trusted library allocation
page read and write
81E0000
trusted library allocation
page read and write
80E9000
trusted library allocation
page read and write
8580000
trusted library allocation
page read and write
9F60000
trusted library allocation
page read and write
BA70000
trusted library allocation
page read and write
D5F9000
heap
page read and write
8573000
trusted library allocation
page read and write
E51C000
trusted library allocation
page read and write
D6F7000
heap
page read and write
E5E4000
trusted library allocation
page read and write
C0CB000
heap
page read and write
E507000
trusted library allocation
page read and write
D885000
heap
page read and write
32DA000
heap
page read and write
F5B9000
trusted library allocation
page read and write
9F58000
trusted library allocation
page read and write
E3BD000
trusted library allocation
page read and write
8581000
trusted library allocation
page read and write
E4E8000
trusted library allocation
page read and write
DEE8000
trusted library allocation
page read and write
D619000
heap
page read and write
D8C9000
heap
page read and write
F2D2000
trusted library allocation
page read and write
9F58000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
8572000
trusted library allocation
page read and write
E53E000
trusted library allocation
page read and write
E4F4000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
E4BF000
trusted library allocation
page read and write
D7D8000
heap
page read and write
C073000
heap
page read and write
C3F3000
trusted library allocation
page read and write
D846000
heap
page read and write
9F6E000
trusted library allocation
page read and write
D891000
heap
page read and write
F23D000
trusted library allocation
page read and write
E500000
trusted library allocation
page read and write
5529000
trusted library allocation
page read and write
8E20000
heap
page read and write
AF78000
trusted library allocation
page read and write
BFBD000
heap
page read and write
9F54000
trusted library allocation
page read and write
7E0000
heap
page read and write
9F56000
trusted library allocation
page read and write
F57D000
trusted library allocation
page read and write
F3F5000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
F25C000
trusted library allocation
page read and write
E4C4000
trusted library allocation
page read and write
40B000
unkown
page readonly
E0E000
stack
page read and write
C0CB000
heap
page read and write
4A36000
direct allocation
page read and write
D8DC000
heap
page read and write
5C7F000
heap
page read and write
7F44000
trusted library allocation
page read and write
D713000
heap
page read and write
C0D1000
heap
page read and write
F1C0000
trusted library allocation
page read and write
C07F000
heap
page read and write
F274000
trusted library allocation
page read and write
9F5D000
trusted library allocation
page read and write
E4AA000
trusted library allocation
page read and write
D77B000
heap
page read and write
EFFB000
trusted library allocation
page read and write
D8E2000
heap
page read and write
77B0000
trusted library allocation
page read and write
7E98000
trusted library allocation
page read and write
D957000
trusted library allocation
page read and write
E11D000
heap
page read and write
D582000
heap
page read and write
E84B000
heap
page read and write
5C6B000
heap
page read and write
7360000
heap
page execute and read and write
F2B8000
trusted library allocation
page read and write
D7D1000
heap
page read and write
D888000
heap
page read and write
2DC4000
trusted library allocation
page read and write
F2B8000
trusted library allocation
page read and write
AF63000
trusted library allocation
page read and write
C0D8000
heap
page read and write
E4C1000
trusted library allocation
page read and write
739A000
heap
page read and write
EFFB000
trusted library allocation
page read and write
D670000
heap
page read and write
D97D000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
E3D7000
trusted library allocation
page read and write
857A000
trusted library allocation
page read and write
857A000
trusted library allocation
page read and write
F2C5000
trusted library allocation
page read and write
F5A6000
trusted library allocation
page read and write
F503000
trusted library allocation
page read and write
D521000
heap
page read and write
D903000
heap
page read and write
D5D4000
heap
page read and write
4768000
trusted library allocation
page read and write
9F66000
trusted library allocation
page read and write
D799000
heap
page read and write
E160000
heap
page read and write
F62E000
trusted library allocation
page read and write
E50B000
trusted library allocation
page read and write
F22A000
trusted library allocation
page read and write
80E9000
trusted library allocation
page read and write
F2F4000
trusted library allocation
page read and write
1E0000
heap
page read and write
E415000
trusted library allocation
page read and write
D7F2000
heap
page read and write
9F54000
trusted library allocation
page read and write
96B000
heap
page read and write
E38C000
trusted library allocation
page read and write
E3C2000
trusted library allocation
page read and write
F4B1000
trusted library allocation
page read and write
E541000
trusted library allocation
page read and write
AF30000
trusted library allocation
page read and write
7F44000
trusted library allocation
page read and write
4BED000
heap
page read and write
C041000
heap
page read and write
F5CF000
trusted library allocation
page read and write
C07F000
heap
page read and write
EF76000
trusted library allocation
page read and write
D845000
heap
page read and write
D6A3000
heap
page read and write
E3A6000
trusted library allocation
page read and write
E7CC000
heap
page read and write
8579000
trusted library allocation
page read and write
E534000
trusted library allocation
page read and write
DEC9000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
D5A9000
heap
page read and write
C0DF000
heap
page read and write
E46C000
trusted library allocation
page read and write
DEF4000
trusted library allocation
page read and write
D960000
trusted library allocation
page read and write
D791000
heap
page read and write
D9D0000
trusted library allocation
page read and write
8584000
trusted library allocation
page read and write
F2D3000
trusted library allocation
page read and write
4BFF000
heap
page read and write
F1DE000
trusted library allocation
page read and write
D744000
heap
page read and write
9F5B000
trusted library allocation
page read and write
E397000
trusted library allocation
page read and write
E865000
heap
page read and write
D962000
trusted library allocation
page read and write
E4C4000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
E50F000
trusted library allocation
page read and write
D798000
heap
page read and write
C041000
heap
page read and write
F57D000
trusted library allocation
page read and write
F5CF000
trusted library allocation
page read and write
80C9000
trusted library allocation
page read and write
E468000
trusted library allocation
page read and write
F1FC000
trusted library allocation
page read and write
E3AE000
trusted library allocation
page read and write
F3F0000
trusted library allocation
page read and write
D6F7000
heap
page read and write
75C0000
trusted library allocation
page read and write
F45000
heap
page read and write
E640000
heap
page read and write
73C5000
heap
page read and write
D865000
heap
page read and write
EF6B000
trusted library allocation
page read and write
F62E000
trusted library allocation
page read and write
D583000
heap
page read and write
E145000
heap
page read and write
80CE000
trusted library allocation
page read and write
8587000
trusted library allocation
page read and write
4D37000
trusted library allocation
page read and write
D8C9000
heap
page read and write
8581000
trusted library allocation
page read and write
F460000
trusted library allocation
page read and write
EE73000
trusted library allocation
page read and write
F2F5000
trusted library allocation
page read and write
F149000
trusted library allocation
page read and write
F3FD000
trusted library allocation
page read and write
C05E000
heap
page read and write
8584000
trusted library allocation
page read and write
4C6B000
heap
page read and write
D65B000
heap
page read and write
F5C4000
trusted library allocation
page read and write
E41A000
trusted library allocation
page read and write
F171000
trusted library allocation
page read and write
C050000
heap
page read and write
D6A3000
heap
page read and write
F25C000
trusted library allocation
page read and write
F3D5000
trusted library allocation
page read and write
E40D000
trusted library allocation
page read and write
858E000
trusted library allocation
page read and write
E381000
trusted library allocation
page read and write
8585000
trusted library allocation
page read and write
D9D9000
trusted library allocation
page read and write
5C6B000
heap
page read and write
D8CC000
heap
page read and write
D91E000
heap
page read and write
E4C6000
trusted library allocation
page read and write
E462000
trusted library allocation
page read and write
D897000
heap
page read and write
DEE8000
trusted library allocation
page read and write
80B9000
trusted library allocation
page read and write
DF09000
trusted library allocation
page read and write
9F52000
trusted library allocation
page read and write
BB0000
heap
page read and write
E739000
heap
page read and write
DEFF000
trusted library allocation
page read and write
E4F8000
trusted library allocation
page read and write
EED9000
trusted library allocation
page read and write
C0AB000
heap
page read and write
50CE000
stack
page read and write
9F57000
trusted library allocation
page read and write
E368000
trusted library allocation
page read and write
D93B000
trusted library allocation
page read and write
E4A4000
trusted library allocation
page read and write
D733000
heap
page read and write
E169000
heap
page read and write
8583000
trusted library allocation
page read and write
AF1B000
trusted library allocation
page read and write
80DE000
trusted library allocation
page read and write
F25C000
trusted library allocation
page read and write
5EF1000
trusted library allocation
page read and write
7E9B000
trusted library allocation
page read and write
80DE000
trusted library allocation
page read and write
E4B9000
trusted library allocation
page read and write
E37C000
trusted library allocation
page read and write
5C78000
heap
page read and write
5C7F000
heap
page read and write
32A2000
heap
page read and write
DEFF000
trusted library allocation
page read and write
E53E000
trusted library allocation
page read and write
F3D5000
trusted library allocation
page read and write
D74D000
heap
page read and write
D79B000
heap
page read and write
EFE0000
trusted library allocation
page read and write
9F55000
trusted library allocation
page read and write
8584000
trusted library allocation
page read and write
DF30000
trusted library allocation
page read and write
E4B9000
trusted library allocation
page read and write
E4BF000
trusted library allocation
page read and write
7730000
trusted library allocation
page read and write
D5C0000
heap
page read and write
AF18000
trusted library allocation
page read and write
F5CF000
trusted library allocation
page read and write
D66E000
heap
page read and write
C01A000
heap
page read and write
E49B000
trusted library allocation
page read and write
4C13000
heap
page read and write
82C0000
trusted library allocation
page execute and read and write
C06E000
heap
page read and write
D750000
heap
page read and write
E3BF000
trusted library allocation
page read and write
D67A000
heap
page read and write
4BAE000
stack
page read and write
EFFB000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
F3F3000
trusted library allocation
page read and write
DD1F000
heap
page read and write
9F51000
trusted library allocation
page read and write
E79C000
heap
page read and write
D5D6000
heap
page read and write
858E000
trusted library allocation
page read and write
C01A000
heap
page read and write
857F000
trusted library allocation
page read and write
D607000
heap
page read and write
8E3C000
heap
page read and write
DEF2000
trusted library allocation
page read and write
E534000
trusted library allocation
page read and write
F25D000
trusted library allocation
page read and write
C057000
heap
page read and write
E394000
trusted library allocation
page read and write
B195000
trusted library allocation
page read and write
F23D000
trusted library allocation
page read and write
858F000
trusted library allocation
page read and write
E500000
trusted library allocation
page read and write
D807000
heap
page read and write
9F5F000
trusted library allocation
page read and write
F2D9000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
E4C1000
trusted library allocation
page read and write
C055000
heap
page read and write
8579000
trusted library allocation
page read and write
E641000
heap
page read and write
EEE2000
trusted library allocation
page read and write
4F51000
trusted library allocation
page read and write
117E000
stack
page read and write
D659000
heap
page read and write
D57C000
heap
page read and write
E468000
trusted library allocation
page read and write
D5AC000
heap
page read and write
98D000
heap
page read and write
9F69000
trusted library allocation
page read and write
8589000
trusted library allocation
page read and write
F161000
trusted library allocation
page read and write
C073000
heap
page read and write
9F5A000
trusted library allocation
page read and write
DEE7000
trusted library allocation
page read and write
F1CC000
trusted library allocation
page read and write
D97D000
trusted library allocation
page read and write
C01A000
heap
page read and write
EF90000
trusted library allocation
page read and write
C031000
heap
page read and write
8E6F000
heap
page read and write
9F62000
trusted library allocation
page read and write
D5F9000
heap
page read and write
D980000
trusted library allocation
page read and write
C028000
heap
page read and write
E418000
trusted library allocation
page read and write
D86F000
heap
page read and write
E3AD000
trusted library allocation
page read and write
DEF2000
trusted library allocation
page read and write
8579000
trusted library allocation
page read and write
859D000
trusted library allocation
page read and write
8574000
trusted library allocation
page read and write
E50F000
trusted library allocation
page read and write
EEDC000
trusted library allocation
page read and write
80E9000
trusted library allocation
page read and write
D698000
heap
page read and write
81D0000
trusted library allocation
page execute and read and write
F3CF000
trusted library allocation
page read and write
D670000
heap
page read and write
D692000
heap
page read and write
DEEE000
trusted library allocation
page read and write
DEF9000
trusted library allocation
page read and write
E503000
trusted library allocation
page read and write
8570000
trusted library allocation
page read and write
C07F000
heap
page read and write
E507000
trusted library allocation
page read and write
D83C000
heap
page read and write
DEF2000
trusted library allocation
page read and write
There are 3044 hidden memdumps, click here to show them.