IOC Report
CuteWriter.exe

loading gif

Files

File Path
Type
Category
Malicious
CuteWriter.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\installer.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Program Files (x86)\CutePDF Writer\CPWSave.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files (x86)\CutePDF Writer\CPWSave.exe.manifest
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CutePDF Writer\CPWriter2.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\CutePDF Writer\CuteEdit.ico
MS Windows icon resource - 2 icons, 32x32, 16x16
dropped
C:\Program Files (x86)\CutePDF Writer\CutePDFWriter.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\CutePDF Writer\PDFWrite.rsp
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CutePDF Writer\README.HTM
HTML document, Non-ISO extended-ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CutePDF Writer\setup.inf
PGP Secret Sub-key -
dropped
C:\Program Files (x86)\CutePDF Writer\setup.ini
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CutePDF Writer\unInstcpw64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\CutePDF Writer\Readme.lnk
MS Windows shortcut, Item id list present, Has Description string, Icon number=0, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\CutePDF Writer\Try Free CutePDF Editor.lnk
MS Windows shortcut, Item id list present, Has Description string, Icon number=0, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x000000000000002f.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x0000000000000030.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\features[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\gplgs[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\Assistant_109.0.5097.45_Setup[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\102.0.53-DNA-116018-opera_intro[1].crx
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\2c461151f9ffff27314ebfffe3c4ccf3[1].crx
Google Chrome extension, version 2
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\Opera_109.0.5097.45_Autoupdate_x64[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\109.0.5097.45.manifest
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\Assets\150x150Logo.scale-100.png
PNG image data, 150 x 150, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\Assets\150x150Logo.scale-100_contrast-white.png
PNG image data, 150 x 150, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\Assets\150x150Logo.scale-140.png
PNG image data, 210 x 210, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\Assets\150x150Logo.scale-140_contrast-white.png
PNG image data, 210 x 210, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\Assets\150x150Logo.scale-180.png
PNG image data, 270 x 270, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\Assets\150x150Logo.scale-180_contrast-white.png
PNG image data, 270 x 270, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\Assets\150x150Logo.scale-80.png
PNG image data, 120 x 120, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\Assets\150x150Logo.scale-80_contrast-white.png
PNG image data, 120 x 120, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\Assets\70x70Logo.scale-100.png
PNG image data, 70 x 70, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\Assets\70x70Logo.scale-100_contrast-white.png
PNG image data, 70 x 70, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\Assets\70x70Logo.scale-140.png
PNG image data, 98 x 98, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\Assets\70x70Logo.scale-140_contrast-white.png
PNG image data, 98 x 98, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\Assets\70x70Logo.scale-180.png
PNG image data, 126 x 126, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\Assets\70x70Logo.scale-180_contrast-white.png
PNG image data, 126 x 126, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\Assets\70x70Logo.scale-80.png
PNG image data, 56 x 56, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\Assets\70x70Logo.scale-80_contrast-white.png
PNG image data, 56 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\MEIPreload\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\MEIPreload\preloaded_data.pb
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\Resources.pri
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\assistant_package
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\b3f1fe4f-1fcf-49c6-b37e-023d620a35b8.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\d3dcompiler_47.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\dxcompiler.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\dxil.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\files_list
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\files_list.1713386541.old (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\headless_command_resources.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\headless_lib_data.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\headless_lib_strings.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\icudtl.dat
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\installer_helper_64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\launcher.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\launcher.exe.1713386541.old (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\launcher.visualelementsmanifest.xml
ASCII text
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\libEGL.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\libGLESv2.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\bg.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\bn.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\ca.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\cs.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\da.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\de.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\el.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\en-GB.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\en-US.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\es-419.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\es.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\fi.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\fil.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\fr.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\hi.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\hr.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\hu.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\id.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\it.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\ja.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\ko.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\lt.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\lv.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\ms.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\nb.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\nl.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\pl.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\pt-BR.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\pt-PT.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\ro.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\ru.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\sk.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\sr.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\sv.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\sw.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\ta.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\te.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\th.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\tr.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\uk.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\vi.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\zh-CN.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\localization\zh-TW.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\mojo_core.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\notification_helper.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\opera.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\opera.exe.sig
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\opera.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\opera.visualelementsmanifest.xml
ASCII text
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\opera_100_percent.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\opera_125_percent.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\opera_150_percent.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\opera_200_percent.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\opera_250_percent.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\opera_autoupdate.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\opera_autoupdate.exe.1713386541.old (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\opera_autoupdate.licenses
ASCII text
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\opera_autoupdate.licenses.1713386541.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\opera_autoupdate.version
ASCII text
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\opera_autoupdate.version.1713386541.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\opera_browser.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\opera_browser.dll.sig
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\opera_crashreporter.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\opera_elf.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\opera_gx_splash.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\013E742B-287B-4228-A0B9-BD617E4E02A4.ico
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\07593226-C5C5-438B-86BE-3F6361CD5B10.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\0CD5F3A0-8BF6-11E2-9E96-0800200C9A66.ico
MS Windows icon resource - 4 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\1AF2CDD0-8BF3-11E2-9E96-0800200C9A66.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\1CF37043-6733-479C-9086-7B21A2292DDA.ico
MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\2A3F5C20-8BF5-11E2-9E96-0800200C9A66.ico
MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\2F8F0E41-F521-45A4-9691-F664AFAFE67F.ico
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\3B6191A0-8BF3-11E2-9E96-0800200C9A66.ico
MS Windows icon resource - 2 icons, 32x32, 32 bits/pixel, 16x16, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\3BFDFA54-5DD6-4DFF-8B6C-C1715F306D6B.ico
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\4C95ADC1-5FD9-449D-BC75-77CA217403AE.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\5BBBDD5B-EDC7-4168-9F5D-290AF826E716.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\66DD4BB6-A3BA-4B11-AF7A-F4BF23E073B2.ico
MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\6D3582E1-6013-429F-BB34-C75B90CDD1F8.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\76C397A8-9E8E-4706-8203-BD2878E9C618.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\8D754F20-8BF5-11E2-9E96-0800200C9A66.ico
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\AD2FD2BD-0727-4AF7-8917-AAED8627ED47.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\B478FE0C-0761-41C3-946F-CD1340356039.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\C665D993-1B49-4C2E-962C-BEB19993BB86.ico
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\CCCED631-6DA2-4060-9824-95737E64350C.ico
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\CFCE84E5-9A95-4B3F-B8E4-3E98CF7EE6C5.ico
MS Windows icon resource - 6 icons, 16x16, 2 colors, 16x16, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\CFD4BE41-4C6D-496A-ADDB-4095DFA1DD0E.ico
MS Windows icon resource - 2 icons, 16x16, 8 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\F3F34CBB-24FF-4830-9E87-1663E7A0A5EE.ico
MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\F98D4D4C-8AA7-4619-A1E7-AC89B24558DD.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\FDC2CCAB-E8F9-4620-91DD-B0B67285997C.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\FF57F01A-0718-44B7-8A1F-8B15BC33A50B.ico
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\FFF3F819-B6CE-4DE6-B4E4-8E2618ABC0D9.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\ab_tests.json
ASCII text, with very long lines (347)
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\automatic_search_engines.json
ASCII text, with very long lines (347)
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\browser.js
C source, ASCII text, with very long lines (347)
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\continue_shopping.json
ASCII text, with very long lines (1971)
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\default_partner_content.json
Unicode text, UTF-8 text, with very long lines (347)
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\doh_providers.json
ASCII text, with very long lines (347)
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\domain_suggestions.json
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\0d406bdcf61e6d381f23.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\11bbdce584eb010669fd.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 612x365, components 3
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\28823de3046af6be5504.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\28ba6531a8d10a17962b.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, baseline, precision 8, 612x365, components 3
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\2d0dbf42750207f78ffa.ttf
TrueType Font data, 15 tables, 1st "GSUB", 8 names, Microsoft, language 0x409
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\313dd08924b1b4a517bb.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 612x365, components 3
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\37d24412e02af82ffc5c.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\3df11e64133f9949a6b2.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 612x365, components 3
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\405e207014bf75cd59c6.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\45763c696a4442585bb4.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\5481ba37652e144d94d4.png
PNG image data, 96 x 96, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\61a42bb99a92e9c1352f.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\61c87b77a034799680ad.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\72036430436803bb8a27.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1568x882, components 3
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\7bbffe1e039c3f8f477a.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\7d53fec23372c39c9d12.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 612x365, components 3
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\83572bda21857cccf821.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 2160x1300, components 3
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\88a9d8b720fa47faa0f7.png
PNG image data, 96 x 96, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\8d979c64297ebab9c9d5.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\9703c15b184d8259a452.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\9b08ddabfa1c4baac551.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=2, orientation=upper-left], baseline, precision 8, 612x365, components 3
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\a298a0ac59f09aeb64eb.otf
OpenType font data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\a62d89cd4deb8790f1a2.png
PNG image data, 96 x 96, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\a9a94f26040d1d617ba5.png
PNG image data, 96 x 96, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\b2a202d6774b9d9503f9.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=2, orientation=upper-left], baseline, precision 8, 612x365, components 3
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\b774f4633fe09bd8bd1f.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\ba5622550ada9b5ff2cd.ttf
TrueType Font data, 15 tables, 1st "GSUB", 8 names, Microsoft, language 0x409
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\cda076c0b79d73963c46.png
PNG image data, 96 x 96, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\d3098ef471597fe3c2ed.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\e393a69f0d2e035d1c42.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\f6aa4959ac4e5f072210.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\fcffb6ccd23559274e62.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\icons\logo.png
PNG image data, 160 x 160, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\icons\logo.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\index.html
HTML document, ASCII text, with very long lines (311), with no line terminators
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\index.js
ASCII text, with very long lines (65473)
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\index.js.LICENSE.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\opera_intro_extension\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\partner_speeddials.json
Unicode text, UTF-8 text, with very long lines (347)
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\purchases-schemas.json
ASCII text, with very long lines (347)
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\siteprefs.json
ASCII text, with very long lines (347)
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\specific_keywords.json
Unicode text, UTF-8 text, with very long lines (5243)
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\standard_themes\default_dark_theme.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\standard_themes\default_theme.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\resources\video_conference_popout.json
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\root_files_list
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\root_files_list.1713386541.old (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\snapshot_blob.bin
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\v8_context_snapshot.bin
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\vk_swiftshader.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\vk_swiftshader_icd.json
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\vulkan-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\win10_share_handler.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\win8_importing.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\362f917e-8f55-4e7e-8d21-b6edc8ce12e6.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Opera\Assets\150x150Logo.scale-100.png (copy)
PNG image data, 150 x 150, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\Assets\150x150Logo.scale-100_contrast-white.png (copy)
PNG image data, 150 x 150, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\Assets\150x150Logo.scale-140.png (copy)
PNG image data, 210 x 210, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\Assets\150x150Logo.scale-140_contrast-white.png (copy)
PNG image data, 210 x 210, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\Assets\150x150Logo.scale-180.png (copy)
PNG image data, 270 x 270, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\Assets\150x150Logo.scale-180_contrast-white.png (copy)
PNG image data, 270 x 270, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\Assets\150x150Logo.scale-80.png (copy)
PNG image data, 120 x 120, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\Assets\150x150Logo.scale-80_contrast-white.png (copy)
PNG image data, 120 x 120, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\Assets\70x70Logo.scale-100.png (copy)
PNG image data, 70 x 70, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\Assets\70x70Logo.scale-100_contrast-white.png (copy)
PNG image data, 70 x 70, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\Assets\70x70Logo.scale-140.png (copy)
PNG image data, 98 x 98, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\Assets\70x70Logo.scale-140_contrast-white.png (copy)
PNG image data, 98 x 98, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\Assets\70x70Logo.scale-180.png (copy)
PNG image data, 126 x 126, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\Assets\70x70Logo.scale-180_contrast-white.png (copy)
PNG image data, 126 x 126, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\Assets\70x70Logo.scale-80.png (copy)
PNG image data, 56 x 56, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\Assets\70x70Logo.scale-80_contrast-white.png (copy)
PNG image data, 56 x 56, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Opera\Resources.pri (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Opera\assistant\assistant_installer.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\assistant\browser_assistant.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\assistant\dbgcore.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\assistant\dbghelp.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\assistant\installation_status.json
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Opera\assistant\mojo_core.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\autoupdate\opera_autoupdate.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\autoupdate\opera_autoupdate.licenses
ASCII text
dropped
C:\Users\user\AppData\Local\Programs\Opera\autoupdate\opera_autoupdate.version
ASCII text
dropped
C:\Users\user\AppData\Local\Programs\Opera\installation_status.json
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Opera\installer_prefs.json (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Opera\launcher.visualelementsmanifest.xml (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Programs\Opera\opera.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Opera\opera.visualelementsmanifest.xml (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Programs\Opera\pref_default_overrides
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Opera\server_tracking_data
ASCII text, with very long lines (784), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\OperaSetup.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\102.0.53-DNA-116018-opera_intro.crx (copy)
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\124fd49f-9a30-42f7-a4db-861fbf0cc6e7.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\7f78f78b-c964-478d-8da9-2dc635d492a3.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\Opera browser.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Apr 17 19:42:21 2024, mtime=Wed Apr 17 19:42:21 2024, atime=Thu Apr 11 06:46:32 2024, length=1581984, window=hide
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\additional_file0.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\additional_file1.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\additional_file2.tmp
Google Chrome extension, version 2
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\assistant\assistant_installer.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\assistant\browser_assistant.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\assistant\dbgcore.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\assistant\dbghelp.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\assistant\files_list
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\assistant\launcher.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\assistant\mojo_core.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\be76331b95dfc399cd776d2fc68021e0db03cc4f.crx (copy)
Google Chrome extension, version 2
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\c27c1215-5bff-4bef-aece-8fcb18dd5b5d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\extensions_files_list
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\extra_apps
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\installer_prefs_include.json (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\installer_prefs_include.json.backup
JSON data
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\installer_prefs_include.json~RF67fecd.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\installer_prefs_include.json~RF67fedd.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\opera_package
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\pref_default_overrides
JSON data
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\server_tracking_data
ASCII text, with very long lines (784), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer\opera_installer_20240417224117808.log
ASCII text, with very long lines (1733)
dropped
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer\opera_installer_20240417224119169.log
ASCII text, with very long lines (1733)
modified
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer\opera_installer_20240417224221297.log
ASCII text, with very long lines (1672), with CRLF, LF line terminators
modified
C:\Users\user\AppData\Local\Temp\Opera_installer_2404172041166342520.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Opera_installer_2404172041175667228.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Opera_installer_2404172041180917624.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Opera_installer_2404172041185797716.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Opera_installer_2404172041189647756.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Opera_installer_2404172042207667120.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Opera_installer_2404172042210696156.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\EndOfTask.ps
data
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\FAPIconfig-FCO
PostScript document text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\FCOfontmap-PCLPS3
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\FCOfontmap-PS3
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\Fontmap.ATB
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\Fontmap.ATM
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\Fontmap.OS2
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\Fontmap.OSF
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\Fontmap.SGI
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\Fontmap.Sol
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\Fontmap.URW-136.T1
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\Fontmap.URW-136.TT
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\Fontmap.Ult
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\Fontmap.VMS
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\Info-macos.plist
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\PDFA_def.ps
PostScript document text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\PDFX_def.ps
PostScript document text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\acctest.ps
PostScript document text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\addxchar.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\afmdiff.awk
awk script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\align.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\bj8.rpd
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\bj8gc12f.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\bj8hg12f.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\bj8oh06n.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\bj8pa06n.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\bj8pp12f.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\bj8ts06n.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\bjc610a0.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\bjc610a1.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\bjc610a2.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\bjc610a3.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\bjc610a4.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\bjc610a5.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\bjc610a6.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\bjc610a7.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\bjc610a8.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\bjc610b1.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\bjc610b2.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\bjc610b3.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\bjc610b4.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\bjc610b6.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\bjc610b7.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\bjc610b8.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\caption.ps
PostScript document text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\cat.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\cbjc600.ppd
PPD file, version "4.1"
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\cbjc800.ppd
PPD file, version "4.1"
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\cdj550.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\cdj690.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\cdj690ec.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\cid2code.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\cidfmap
PostScript document text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\decrypt.ps
PostScript document text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\dnj750c.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\dnj750m.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\docie.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\dvipdf
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\eps2eps
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\eps2eps.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\eps2eps.cmd
OS/2 REXX batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\font2c
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\font2c.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\font2c.cmd
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\font2c.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\font2pcl.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ghostpdf.inf
Windows setup INFormation
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ghostpdf.ppd
PPD file, version "4.3"
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_ce_e.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_cmdl.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_fform.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_il2_e.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_kanji.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_ksb_e.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_l.xbm
xbm image (48x48), ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_l.xpm
X pixmap image, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_l_m.xbm
xbm image (48x48), ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_lgo_e.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_lgx_e.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_m.xbm
xbm image (32x32), ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_m.xpm
X pixmap image, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_m_m.xbm
xbm image (32x32), ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_pfile.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_rdlin.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_s.xbm
xbm image (24x24), ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_s.xpm
X pixmap image, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_s_m.xbm
xbm image (24x24), ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_t.xbm
xbm image (16x16), ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_t.xpm
X pixmap image, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_t_m.xbm
xbm image (16x16), ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_wl1_e.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_wl2_e.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gs_wl5_e.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gsbj
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gsbj.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gsdj
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gsdj.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gsdj500
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gsdj500.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gsdll32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gsdll32.lib
current ar archive
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gslj
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gslj.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gslp
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gslp.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gslp.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gsnd
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gsnd.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gsndt.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gsnup.ps
PostScript document text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gssetgs.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gssetgs32.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gssetgs64.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gst.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gstt.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\gswin32c.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ht_ccsto.ps
PostScript document text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\image-qa.ps
PostScript document text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\impath.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\jispaper.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\jobseparator.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\landscap.ps
PostScript document text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\level1.ps
PostScript document text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\lines.ps
PostScript document text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\lp386.bat
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\lp386r2.bat
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\lpgs.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\lpr2.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\lprsetup.sh
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\markhint.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\markpath.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\mkcidfm.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\necp2x.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\necp2x6.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\opdfread.ps
PostScript document text conforming DSC level 2.0
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\packfile.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\pcharstr.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\pdf2dsc
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\pdf2dsc.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\pdf2dsc.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\pdf2ps
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\pdf2ps.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\pdf2ps.cmd
OS/2 REXX batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\pdfopt
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\pdfopt.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\pdfopt.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\pdfwrite.ps
assembler source, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\pf2afm
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\pf2afm.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\pf2afm.cmd
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\pf2afm.ps
PostScript document text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\pfbtopfa
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\pfbtopfa.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\pfbtopfa.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\pftogsf.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ppath.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\pphs
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\pphs.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\prfont.ps
PostScript document text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\printafm
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\printafm.ps
PostScript document text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2ai.ps
PostScript document text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2ascii
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2ascii.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2ascii.cmd
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2ascii.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2epsi
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2epsi.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2epsi.cmd
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2epsi.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2pdf
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2pdf.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2pdf.cmd
OS/2 REXX batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2pdf12
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2pdf12.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2pdf12.cmd
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2pdf13
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2pdf13.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2pdf13.cmd
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2pdf14
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2pdf14.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2pdf14.cmd
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2pdfwr
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2pdfxx.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2ps
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2ps.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2ps.cmd
OS/2 REXX batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2ps2
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2ps2.bat
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ps2ps2.cmd
OS/2 REXX batch file, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\quit.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ras1.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ras24.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ras3.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ras32.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ras4.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\ras8m.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\rinkj-2200-setup
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\rollconv.ps
PostScript document text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\showchar.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\showpage.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\st640ih.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\st640ihg.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\st640p.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\st640pg.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\st640pl.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\st640plg.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stc.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stc1520h.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stc2.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stc200_h.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stc2_h.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stc2s_h.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stc300.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stc300bl.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stc300bm.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stc500p.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stc500ph.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stc600ih.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stc600p.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stc600pl.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stc640p.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stc800ih.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stc800p.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stc800pl.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stc_h.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stc_l.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stcany.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stcany_h.upp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stcinfo.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stcolor.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\stocht.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\traceimg.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\traceop.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\type1enc.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\type1ops.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\uninfo.ps
PostScript document text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\unix-lpr.sh
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\unprot.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\viewcmyk.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\viewgif.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\viewjpeg.ps
PostScript document text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\viewmiff.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\viewpbm.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\viewpcx.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\viewps2a.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\viewrgb.ps
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WZSE0.TMP\GPLGS\wftopfa
POSIX shell script, ASCII text executable
dropped
C:\Users\user\AppData\Local\Temp\assistant_installer_20240417224144.log
ASCII text
modified
C:\Users\user\AppData\Local\Temp\assistant_installer_20240417224227.log
ASCII text, with very long lines (327)
modified
C:\Users\user\AppData\Local\Temp\assistant_installer_20240417224228.log
ASCII text
modified
C:\Users\user\AppData\Local\Temp\converter.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\CPWSave.exe.manifest (copy)
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\CPWriter2.exe (copy)
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\CuteEdit.ico (copy)
MS Windows icon resource - 2 icons, 32x32, 16x16
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\CutePDFWriter.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\CUTEPDFW.PPD (copy)
PPD file, version "4.3"
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\Cutepdfw.spd (copy)
PPD file, version "4.3"
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\FONTS.MFM (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\ICONLIB.DLL (copy)
MS-DOS executable, NE for MS Windows 3.x (DLL or font)
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\PS5UI.DLL (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\PSCRIPT.DRV (copy)
MS-DOS executable, NE for MS Windows 3.x (DLL or font)
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\PSCRIPT.HLP (copy)
MS Windows 3.1 help, Tue Apr 17 13:11:49 2001, 26038 bytes
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\PSCRIPT.INI (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\PSCRIPT.NTF (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\PSCRIPT5.DLL (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\PSMON.DLL (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\TESTPS.TXT (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\is-3BEAI.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\is-6BH7F.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\is-82ASD.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\is-FDP4K.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\is-GRVTU.tmp
PPD file, version "4.3"
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\is-IGGEH.tmp
MS-DOS executable, NE for MS Windows 3.x (DLL or font)
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\is-KT3FM.tmp
MS-DOS executable, NE for MS Windows 3.x (DLL or font)
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\is-LDLTG.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\is-QK469.tmp
MS Windows 3.1 help, Tue Apr 17 13:11:49 2001, 26038 bytes
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\is-QLTDT.tmp
PPD file, version "4.3"
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\is-QT877.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\is-RSJOB.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\x64\PS5UI.DLL (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\x64\PSCRIPT.HLP (copy)
MS Windows 3.1 help, Tue Apr 17 13:11:49 2001, 26038 bytes
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\x64\PSCRIPT.NTF (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\x64\PSCRIPT5.DLL (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\x64\is-0HCHF.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\x64\is-327TJ.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\x64\is-E1QSQ.tmp
MS Windows 3.1 help, Tue Apr 17 13:11:49 2001, 26038 bytes
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Driver\x64\is-PL7JN.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Opera.bmp
PC bitmap, Windows 3.x format, 623 x 289 x 24, image size 541008, cbSize 541062, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\OperaSetup.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Opera_Logo.bmp
PC bitmap, Windows 3.x format, 55 x 55 x 8, image size 3080, resolution 3780 x 3780 px/m, cbSize 4158, bits offset 1078
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\PDFWrite.rsp (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Readme.htm (copy)
HTML document, Non-ISO extended-ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Setup.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Setup.inf (copy)
PGP Secret Sub-key -
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\WizModernSmallImage-IS.bmp (copy)
PC bitmap, Windows 3.x format, 55 x 55 x 8, image size 3080, resolution 2834 x 2834 px/m, cbSize 4158, bits offset 1078
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\_isetup\_shfoldr.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\cpwmon32_v40.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\cpwmon64_v40.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\is-2AGL8.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\is-39C8H.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\is-5DJ27.tmp
PGP Secret Sub-key -
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\is-5QB8K.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\is-AUL34.tmp
PC bitmap, Windows 3.x format, 55 x 55 x 8, image size 3080, resolution 2834 x 2834 px/m, cbSize 4158, bits offset 1078
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\is-ER5M7.tmp
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\is-GF721.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\is-HHT93.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\is-ICRHC.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\is-INHJ3.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\is-KP2BA.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\is-LD694.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\is-MC5O4.tmp
HTML document, Non-ISO extended-ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\is-O5QNJ.tmp
MS Windows icon resource - 2 icons, 32x32, 16x16
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\is-PO6AU.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\is-QV01T.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\is-UFSC0.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\pdfwriter32.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\pdfwriter64.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\setup.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\setup_svr.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\unInstcpw.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\unInstcpw64.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-NLVSG.tmp\CuteWriter.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Opera browser.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Apr 17 19:42:21 2024, mtime=Wed Apr 17 19:42:21 2024, atime=Thu Apr 11 06:46:32 2024, length=1581984, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Opera browser.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Apr 17 19:42:21 2024, mtime=Wed Apr 17 19:42:21 2024, atime=Thu Apr 11 06:46:32 2024, length=1581984, window=hide
dropped
C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat
data
dropped
C:\Users\user\Desktop\Opera browser.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Apr 17 19:42:21 2024, mtime=Wed Apr 17 19:42:21 2024, atime=Thu Apr 11 06:46:32 2024, length=1581984, window=hide
dropped
C:\Windows\System32\cpwmon64_v40.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\spool\drivers\x64\CUTEPDFW.PPD
PPD file, version "4.3"
dropped
C:\Windows\System32\spool\drivers\x64\PS5UI.DLL
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\spool\drivers\x64\PSCRIPT.HLP
MS Windows 3.1 help, Tue Apr 17 13:11:49 2001, 26038 bytes
dropped
C:\Windows\System32\spool\drivers\x64\PSCRIPT.NTF
data
dropped
C:\Windows\System32\spool\drivers\x64\PSCRIPT5.DLL
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
Chrome Cache Entry: 647
Web Open Font Format (Version 2), TrueType, length 34108, version 1.0
downloaded
Chrome Cache Entry: 648
MS Windows icon resource - 2 icons, 32x32, 16x16
dropped
Chrome Cache Entry: 649
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x52, components 3
downloaded
Chrome Cache Entry: 650
GIF image data, version 89a, 1 x 1
dropped
Chrome Cache Entry: 651
ASCII text, with very long lines (1054)
downloaded
Chrome Cache Entry: 652
GIF image data, version 89a, 1 x 1
dropped
Chrome Cache Entry: 653
GIF image data, version 89a, 450 x 314
downloaded
Chrome Cache Entry: 654
GIF image data, version 89a, 1 x 1
dropped
Chrome Cache Entry: 655
PNG image data, 596 x 533, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 656
ASCII text, with very long lines (786)
downloaded
Chrome Cache Entry: 657
HTML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 658
ASCII text
downloaded
Chrome Cache Entry: 659
ASCII text, with very long lines (2950)
downloaded
Chrome Cache Entry: 660
GIF image data, version 89a, 1 x 1
dropped
Chrome Cache Entry: 661
C++ source, ASCII text, with very long lines (3386)
downloaded
Chrome Cache Entry: 662
ASCII text, with very long lines (2364)
downloaded
Chrome Cache Entry: 663
C++ source, ASCII text, with very long lines (2402)
downloaded
Chrome Cache Entry: 664
JSON data
dropped
Chrome Cache Entry: 665
GIF image data, version 89a, 900 x 5
dropped
Chrome Cache Entry: 666
GIF image data, version 89a, 1 x 1
dropped
Chrome Cache Entry: 667
PNG image data, 728 x 90, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 668
HTML document, ASCII text
downloaded
Chrome Cache Entry: 669
JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 900x260, components 3
dropped
Chrome Cache Entry: 670
PNG image data, 160 x 600, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 671
HTML document, ISO-8859 text, with CRLF line terminators
downloaded
Chrome Cache Entry: 672
GIF image data, version 89a, 1 x 1
downloaded
Chrome Cache Entry: 673
ASCII text, with very long lines (52174)
downloaded
Chrome Cache Entry: 674
ASCII text, with very long lines (3920)
downloaded
Chrome Cache Entry: 675
ASCII text, with very long lines (1321)
downloaded
Chrome Cache Entry: 676
GIF image data, version 89a, 300 x 68
downloaded
Chrome Cache Entry: 677
ASCII text, with very long lines (2937)
downloaded
Chrome Cache Entry: 678
JSON data
downloaded
Chrome Cache Entry: 679
ASCII text, with very long lines (2817)
downloaded
Chrome Cache Entry: 680
GIF image data, version 89a, 900 x 5
downloaded
Chrome Cache Entry: 681
ASCII text, with very long lines (4179)
downloaded
Chrome Cache Entry: 682
PNG image data, 781 x 536, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 683
GIF image data, version 89a, 1 x 1
dropped
Chrome Cache Entry: 684
GIF image data, version 89a, 1 x 1
downloaded
Chrome Cache Entry: 685
HTML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 686
PNG image data, 478 x 583, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 687
GIF image data, version 89a, 35 x 15
dropped
Chrome Cache Entry: 688
GIF image data, version 89a, 1 x 1
downloaded
Chrome Cache Entry: 689
HTML document, ASCII text, with very long lines (2020)
downloaded
Chrome Cache Entry: 690
GIF image data, version 89a, 1 x 1
downloaded
Chrome Cache Entry: 691
HTML document, Unicode text, UTF-8 text, with very long lines (65532), with no line terminators
downloaded
Chrome Cache Entry: 692
GIF image data, version 89a, 239 x 202
downloaded
Chrome Cache Entry: 693
PNG image data, 781 x 536, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 694
GIF image data, version 89a, 400 x 62
downloaded
Chrome Cache Entry: 695
ASCII text, with very long lines (1838)
downloaded
Chrome Cache Entry: 696
PNG image data, 160 x 600, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 697
PNG image data, 48 x 48, 8-bit gray+alpha, non-interlaced
dropped
Chrome Cache Entry: 698
PNG image data, 100 x 100, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 699
ASCII text, with very long lines (39869)
downloaded
Chrome Cache Entry: 700
PNG image data, 100 x 100, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 701
GIF image data, version 89a, 1 x 1
downloaded
Chrome Cache Entry: 702
JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 1572x498, components 3
dropped
Chrome Cache Entry: 703
HTML document, ASCII text, with very long lines (829), with no line terminators
downloaded
Chrome Cache Entry: 704
GIF image data, version 89a, 960 x 30
downloaded
Chrome Cache Entry: 705
HTML document, ASCII text, with very long lines (3526)
downloaded
Chrome Cache Entry: 706
GIF image data, version 89a, 1 x 1
dropped
Chrome Cache Entry: 707
HTML document, ASCII text
downloaded
Chrome Cache Entry: 708
ASCII text, with very long lines (2888)
downloaded
Chrome Cache Entry: 709
PNG image data, 728 x 90, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 710
ASCII text, with very long lines (4068)
downloaded
Chrome Cache Entry: 711
GIF image data, version 89a, 450 x 314
dropped
Chrome Cache Entry: 712
PNG image data, 48 x 48, 8-bit gray+alpha, non-interlaced
downloaded
Chrome Cache Entry: 713
ASCII text, with very long lines (1595)
downloaded
Chrome Cache Entry: 714
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x52, components 3
dropped
Chrome Cache Entry: 715
GIF image data, version 89a, 1 x 100
downloaded
Chrome Cache Entry: 716
GIF image data, version 89a, 960 x 30
dropped
Chrome Cache Entry: 717
GIF image data, version 89a, 1 x 1
dropped
Chrome Cache Entry: 718
PNG image data, 478 x 583, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 719
ASCII text, with very long lines (2553)
downloaded
Chrome Cache Entry: 720
GIF image data, version 89a, 300 x 68
dropped
Chrome Cache Entry: 721
GIF image data, version 89a, 35 x 15
downloaded
Chrome Cache Entry: 722
GIF image data, version 89a, 1 x 1
downloaded
Chrome Cache Entry: 723
ASCII text, with very long lines (2573)
downloaded
Chrome Cache Entry: 724
PNG image data, 596 x 533, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 725
GIF image data, version 89a, 400 x 62
dropped
Chrome Cache Entry: 726
HTML document, Unicode text, UTF-8 text, with very long lines (65532), with no line terminators
downloaded
Chrome Cache Entry: 727
GIF image data, version 89a, 300 x 68
dropped
Chrome Cache Entry: 728
PNG image data, 48 x 48, 8-bit gray+alpha, non-interlaced
downloaded
Chrome Cache Entry: 729
GIF image data, version 89a, 300 x 68
downloaded
Chrome Cache Entry: 730
GIF image data, version 89a, 1 x 1
downloaded
Chrome Cache Entry: 731
ASCII text, with very long lines (2374)
downloaded
Chrome Cache Entry: 732
assembler source, ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 733
GIF image data, version 89a, 1 x 1
downloaded
Chrome Cache Entry: 734
JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 1572x498, components 3
downloaded
Chrome Cache Entry: 735
PNG image data, 48 x 48, 8-bit gray+alpha, non-interlaced
dropped
Chrome Cache Entry: 736
GIF image data, version 89a, 1 x 100
dropped
Chrome Cache Entry: 737
JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "File written by Adobe Photoshop\250 5.0", baseline, precision 8, 900x260, components 3
downloaded
Chrome Cache Entry: 738
GIF image data, version 89a, 239 x 202
dropped
Chrome Cache Entry: 739
MS Windows icon resource - 2 icons, 32x32, 16x16
downloaded
\Device\Mailslot\opera_installer\C:\Users\user\AppData\Local\Programs\Opera
data
dropped
There are 700 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\installer.exe
"C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\installer.exe" --backend --initial-pid=2520 --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\user\AppData\Local\Programs\Opera" --profile-folder --language=en-GB --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --server-tracking-data=server_tracking_data --show-intro-overlay --package-dir="C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181" --session-guid=b69c0d3b-1d60-4a71-a3bd-8c5c22cda97a --server-tracking-blob="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 " --silent --desktopshortcut=1 --install-subfolder=109.0.5097.45
malicious
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\installer.exe
C:\Users\user\AppData\Local\Programs\Opera\109.0.5097.45\installer.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win64 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x278,0x27c,0x280,0x274,0x250,0x7ffdf9937c80,0x7ffdf9937c8c,0x7ffdf9937c98
malicious
C:\Program Files (x86)\NgafYbgtcPjnJCrIURWNAMDnEdkNRdILKvplyxVhxQAEx\WJViQqIQpkJHwwlXNjpzvf.exe
"C:\Program Files (x86)\NgafYbgtcPjnJCrIURWNAMDnEdkNRdILKvplyxVhxQAEx\WJViQqIQpkJHwwlXNjpzvf.exe"
malicious
C:\Program Files (x86)\NgafYbgtcPjnJCrIURWNAMDnEdkNRdILKvplyxVhxQAEx\WJViQqIQpkJHwwlXNjpzvf.exe
"C:\Program Files (x86)\NgafYbgtcPjnJCrIURWNAMDnEdkNRdILKvplyxVhxQAEx\WJViQqIQpkJHwwlXNjpzvf.exe"
malicious
C:\Program Files (x86)\NgafYbgtcPjnJCrIURWNAMDnEdkNRdILKvplyxVhxQAEx\WJViQqIQpkJHwwlXNjpzvf.exe
"C:\Program Files (x86)\NgafYbgtcPjnJCrIURWNAMDnEdkNRdILKvplyxVhxQAEx\WJViQqIQpkJHwwlXNjpzvf.exe"
malicious
C:\Program Files (x86)\NgafYbgtcPjnJCrIURWNAMDnEdkNRdILKvplyxVhxQAEx\WJViQqIQpkJHwwlXNjpzvf.exe
"C:\Program Files (x86)\NgafYbgtcPjnJCrIURWNAMDnEdkNRdILKvplyxVhxQAEx\WJViQqIQpkJHwwlXNjpzvf.exe"
malicious
C:\Program Files (x86)\NgafYbgtcPjnJCrIURWNAMDnEdkNRdILKvplyxVhxQAEx\WJViQqIQpkJHwwlXNjpzvf.exe
"C:\Program Files (x86)\NgafYbgtcPjnJCrIURWNAMDnEdkNRdILKvplyxVhxQAEx\WJViQqIQpkJHwwlXNjpzvf.exe"
malicious
C:\Program Files (x86)\NgafYbgtcPjnJCrIURWNAMDnEdkNRdILKvplyxVhxQAEx\WJViQqIQpkJHwwlXNjpzvf.exe
"C:\Program Files (x86)\NgafYbgtcPjnJCrIURWNAMDnEdkNRdILKvplyxVhxQAEx\WJViQqIQpkJHwwlXNjpzvf.exe"
malicious
C:\Program Files (x86)\NgafYbgtcPjnJCrIURWNAMDnEdkNRdILKvplyxVhxQAEx\WJViQqIQpkJHwwlXNjpzvf.exe
"C:\Program Files (x86)\NgafYbgtcPjnJCrIURWNAMDnEdkNRdILKvplyxVhxQAEx\WJViQqIQpkJHwwlXNjpzvf.exe"
malicious
C:\Program Files (x86)\NgafYbgtcPjnJCrIURWNAMDnEdkNRdILKvplyxVhxQAEx\WJViQqIQpkJHwwlXNjpzvf.exe
"C:\Program Files (x86)\NgafYbgtcPjnJCrIURWNAMDnEdkNRdILKvplyxVhxQAEx\WJViQqIQpkJHwwlXNjpzvf.exe"
malicious
C:\Program Files (x86)\NgafYbgtcPjnJCrIURWNAMDnEdkNRdILKvplyxVhxQAEx\WJViQqIQpkJHwwlXNjpzvf.exe
"C:\Program Files (x86)\NgafYbgtcPjnJCrIURWNAMDnEdkNRdILKvplyxVhxQAEx\WJViQqIQpkJHwwlXNjpzvf.exe"
malicious
C:\Program Files (x86)\NgafYbgtcPjnJCrIURWNAMDnEdkNRdILKvplyxVhxQAEx\WJViQqIQpkJHwwlXNjpzvf.exe
"C:\Program Files (x86)\NgafYbgtcPjnJCrIURWNAMDnEdkNRdILKvplyxVhxQAEx\WJViQqIQpkJHwwlXNjpzvf.exe"
malicious
C:\Program Files (x86)\NgafYbgtcPjnJCrIURWNAMDnEdkNRdILKvplyxVhxQAEx\WJViQqIQpkJHwwlXNjpzvf.exe
"C:\Program Files (x86)\NgafYbgtcPjnJCrIURWNAMDnEdkNRdILKvplyxVhxQAEx\WJViQqIQpkJHwwlXNjpzvf.exe"
malicious
C:\Users\user\Desktop\CuteWriter.exe
"C:\Users\user\Desktop\CuteWriter.exe"
C:\Users\user\AppData\Local\Temp\is-NLVSG.tmp\CuteWriter.tmp
"C:\Users\user\AppData\Local\Temp\is-NLVSG.tmp\CuteWriter.tmp" /SL5="$20446,5944588,56832,C:\Users\user\Desktop\CuteWriter.exe"
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Setup.exe
"C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\Setup.exe" /inscpw4 -d"C:\Program Files (x86)\CutePDF Writer"
C:\Users\user\AppData\Local\Temp\converter.exe
C:\Users\user\AppData\Local\Temp\\converter.exe /auto
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\unInstcpw64.exe
unInstcpw64.exe /copy
C:\Windows\splwow64.exe
C:\Windows\splwow64.exe 12288
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.cutepdf-editor.com/support/writer.asp
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\OperaSetup.exe
"C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\OperaSetup.exe" --silent --allusers=0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1876 --field-trial-handle=1640,i,13590044467732800076,8352524087445346693,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\OperaSetup.exe
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\OperaSetup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.20 --initial-client-data=0x2e4,0x2e8,0x2ec,0x2c0,0x2f0,0x6c1821c8,0x6c1821d4,0x6c1821e0
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\OperaSetup.exe
"C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\OperaSetup.exe" --version
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\OperaSetup.exe
"C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\OperaSetup.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\user\AppData\Local\Programs\Opera" --profile-folder --language=en-GB --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=2520 --package-dir-prefix="C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240417224118" --session-guid=b69c0d3b-1d60-4a71-a3bd-8c5c22cda97a --server-tracking-blob="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 " --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=6805000000000000
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\OperaSetup.exe
C:\Users\user\AppData\Local\Temp\is-8HLGO.tmp\OperaSetup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.20 --initial-client-data=0x300,0x304,0x308,0x2c8,0x30c,0x6b5d21c8,0x6b5d21d4,0x6b5d21e0
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe
"C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe"
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\assistant\assistant_installer.exe
"C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\assistant\assistant_installer.exe" --version
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\assistant\assistant_installer.exe
"C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x9a6038,0x9a6044,0x9a6050
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\assistant\assistant_installer.exe
"C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\assistant\assistant_installer.exe" --installfolder="C:\Users\user\AppData\Local\Programs\Opera\assistant" --copyonly=0 --allusers=0
C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\assistant\assistant_installer.exe
"C:\Users\user\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404172241181\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x9a6038,0x9a6044,0x9a6050
C:\Users\user\AppData\Local\Programs\Opera\assistant\assistant_installer.exe
"C:\Users\user\AppData\Local\Programs\Opera\assistant\assistant_installer.exe" --installfolder="C:\Users\user\AppData\Local\Programs\Opera\assistant" --run-assistant --allusers=0
C:\Users\user\AppData\Local\Programs\Opera\assistant\assistant_installer.exe
C:\Users\user\AppData\Local\Programs\Opera\assistant\assistant_installer.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x210,0x208,0x234,0x20c,0x238,0x1126038,0x1126044,0x1126050
There are 24 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.cutepdf-editor.com/images/htabs3.gif
unknown
https://get.geo.opera.com/.private/assistserv/opera-intro/102.0.53-DNA-116018-opera_intro.crxWh)3
unknown
https://download.opera.com/y
unknown
https://desktop-netinstaller-sub.osp.opera.software/v1/binaryera.software(
unknown
https://desktop-netinstaller-sub.osp.opera.software/r-sub.osp.opera.software/1
unknown
https://www.cutepdf-editor.com/images/footbg.gifageHandler
unknown
http://anglebug.com/4633
unknown
https://desktop-netinstaller-sub.osp.opera.software/l
unknown
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-6555658820068848&output=html&h=90&slotname=6092711011&adk=1854165047&adf=3987798746&pi=t.ma~as.6092711011&w=728&lmt=1713386480&format=728x90&url=https%3A%2F%2Fwww.cutepdf-editor.com%2Fsupport%2Fwriter.asp&wgl=1&uach=WyJXaW5kb3dzIiwiMTAuMC4wIiwieDg2IiwiIiwiMTE3LjAuNTkzOC4xMzIiLG51bGwsMCxudWxsLCI2NCIsW1siR29vZ2xlIENocm9tZSIsIjExNy4wLjU5MzguMTMyIl0sWyJOb3Q7QT1CcmFuZCIsIjguMC4wLjAiXSxbIkNocm9taXVtIiwiMTE3LjAuNTkzOC4xMzIiXV0sMF0.&dt=1713386479204&bpp=4&bdt=1014&idt=1034&shv=r20240415&mjsv=m202404160101&ptt=9&saldr=aa&abxe=1&eoidce=1&correlator=464567931983&frm=20&pv=2&ga_vid=983432702.1713386479&ga_sid=1713386480&ga_hid=274577743&ga_fc=1&u_tz=120&u_his=1&u_h=1024&u_w=1280&u_ah=984&u_aw=1280&u_cd=24&u_sd=1&dmc=8&adx=268&ady=144&biw=1263&bih=907&scr_x=0&scr_y=0&eid=44759876%2C44759927%2C44759837%2C31082771%2C42532523%2C44798934%2C95328467%2C95329428%2C31082835%2C95322329%2C95329830&oid=2&pvsid=1167234827264558&tmod=1431185080&uas=0&nvt=1&fc=896&brdim=0%2C0%2C0%2C0%2C1280%2C0%2C1280%2C984%2C1280%2C907&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=0&bc=31&bz=1&td=1&psd=W251bGwsbnVsbCxudWxsLDNd&nt=1&ifi=1&uci=a!1&fsb=1&dtd=1048
https://anglebug.com/7382
unknown
https://desktop-netinstaller-sub.osp.opera.software/i
unknown
http://autoupdate-staging.services.ams.osa/
unknown
https://www.google.com/recaptcha/api2/aframetml/r20240415/r20110914/zrt_lookup_fy2021.html#RS-3-&adk
unknown
https://csp.withgoogle.com/csp/gws/otherrj
unknown
about:blank
http://localhost:3001api/prefs/?product=$1&version=$2..
unknown
https://crashpad.chromium.org/https://crashpad.chromium.org/bug/new
unknown
https://desktop-netinstaller-sub.osp.opera.software/SysWOW64
unknown
https://desktop-netinstaller-sub.osp.opera.software/a
unknown
https://www.opera.com/download/
unknown
http://dns-tunnel-check.googlezip.net/connect
unknown
https://features.opera-api2.com/E:Y1
unknown
https://www.cutepdf-editor.com/support/writer.asp#google_vignette
https://desktop-netinstaller-sub.osp.opera.software/W
unknown
https://www.cutepdf-editor.com/images/DocProp.pnggeHandler
unknown
https://desktop-netinstaller-sub.osp.opera.software/U
unknown
https://desktop-netinstaller-sub.osp.opera.software/v1/binaryera.software
unknown
http://unisolated.invalid/
unknown
https://addons.opera.com
unknown
https://fundingchoicesmessages.google.com/i/ca-pub-6555658820068848?ers=2
unknown
http://www.google.com/dl/release2/chrome_component/cpx7rw4q3nwu7emczqf2w6cu7y_2023.3.30.1305/cocncan
unknown
https://desktop-netinstaller-sub.osp.opera.software/L
unknown
https://doubleclick.net/etm
unknown
http://anglebug.com/6929
unknown
https://desktop-netinstaller-sub.osp.opera.software/C
unknown
https://get.geo.opera.com/.private/assistserv/opera-intro/102.0.53-DNA-116018-opera_intro.crxxh
unknown
https://i1.wp.com
unknown
https://download.opera.com/C
unknown
https://desktop-netinstaller-sub.osp.opera.software/r-sub.osp.opera.software/i
unknown
https://anglebug.com/7246
unknown
https://www.cutepdf-editor.com/support/writer.asphttps://www.cutepdf-editor.com/supports
unknown
http://www.google.com/dl/release2/chrome_component/nujou4crtv5zkn6bgthixtooam_2024.3.25.1/kiabhabjdb
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://crashstats-collector.opera.com/collector/submit
unknown
http://dl.google.com/release2/chrome_component/j2hxfei2occ5siitujtlwgp6xi_3/ojhpjlocmbogdgmfpkhlaaea
unknown
https://desktop-netinstaller-sub.osp.opera.software/r-sub.osp.opera.software/s
unknown
https://dl.google.com/release2/chrome_component/V3P1l2hLvLw_7/7_all_sslErrorAssistant.crx3
unknown
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline
unknown
https://pcapp.store
unknown
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-6555658820068848&output=html&h=600&slotname=8138180617&adk=373269726&adf=126291155&pi=t.ma~as.8138180617&w=160&lmt=1713386480&format=160x600&url=https%3A%2F%2Fwww.cutepdf-editor.com%2Fsupport%2Fwriter.asp&wgl=1&uach=WyJXaW5kb3dzIiwiMTAuMC4wIiwieDg2IiwiIiwiMTE3LjAuNTkzOC4xMzIiLG51bGwsMCxudWxsLCI2NCIsW1siR29vZ2xlIENocm9tZSIsIjExNy4wLjU5MzguMTMyIl0sWyJOb3Q7QT1CcmFuZCIsIjguMC4wLjAiXSxbIkNocm9taXVtIiwiMTE3LjAuNTkzOC4xMzIiXV0sMF0.&dt=1713386479208&bpp=1&bdt=1018&idt=1057&shv=r20240415&mjsv=m202404160101&ptt=9&saldr=aa&abxe=1&eoidce=1&prev_fmts=728x90&correlator=464567931983&frm=20&pv=1&ga_vid=983432702.1713386479&ga_sid=1713386480&ga_hid=274577743&ga_fc=1&u_tz=120&u_his=1&u_h=1024&u_w=1280&u_ah=984&u_aw=1280&u_cd=24&u_sd=1&dmc=8&adx=867&ady=420&biw=1263&bih=907&scr_x=0&scr_y=0&eid=44759876%2C44759927%2C44759837%2C31082771%2C42532523%2C44798934%2C95328467%2C95329428%2C31082835%2C95322329%2C95329830&oid=2&pvsid=1167234827264558&tmod=1431185080&uas=0&nvt=1&fc=896&brdim=0%2C0%2C0%2C0%2C1280%2C0%2C1280%2C984%2C1280%2C907&vis=1&rsz=d%7C%7CoeE%7Cn&abl=XS&pfx=0&fu=0&bc=31&bz=1&td=1&psd=W251bGwsbnVsbCxudWxsLDNd&nt=1&ifi=2&uci=a!2&fsb=1&dtd=1063
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://www.opera.com/eula/computers
unknown
https://addons-extensions.operacdn.com/media/direct/90/287790/2c461151f9ffff27314ebfffe3c4ccf3.crxt
unknown
https://www.google.com/dl/release2/chrome_component/acezyjyt2fp2x53dhyqbvt3gxdlq_63/khaoiebndkojlmpp
unknown
https://addons-media.operacdn.com/media/;
unknown
http://anglebug.com/5375xE
unknown
http://www.CutePDF.comInstallLocationDisplayIconPublisherAcro
unknown
https://drive-daily-5.corp.google.com/
unknown
https://addons-extensions.operacdn.com/media/direct/90/287790/2c461151f9ffff27314ebfffe3c4ccf3.crxy
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://www.google.com/dl/release2/chrome_component/ad6eob6nunr64xlqs3i7jpbbwlqa_20230923.567854667.
unknown
https://desktop-netinstaller-sub.osp.opera.software/v1/binaryera.softwareC
unknown
https://download.opera.com/download/get/?id=65593&autoupdate=1&ni=1&stream=stable&utm_campaign=cpdf_
unknown
http://dl.google.com/release2/chrome_component/AMpg5-cnrANo_2018.8.8.0/2018.8.8.0_win64_win_third_pa
unknown
https://sWgic.cVd://wb
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://chrome.google.com/webstoreD
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
https://www.cutepdf-editor.com/021
unknown
https://gamemaker.io/en/get.
unknown
https://gamemaker.io
unknown
https://www.cutepdf-editor.com/support/writer.asp#google_vignettebId
unknown
https://googleads.g.doubleclick.net/pagead/html/r20240415/r20110914/zrt_lookup_fy2021.html#RS-1-&adk=1812271803&client=ca-pub-6555658820068848&fa=3&ifi=7&uci=a!7&btvi=2
https://get.geo.opera.com/.private/assistserv/opera-intro/102.0.53-DNA-116018-opera_intro.crxl
unknown
https://www.google.com/dl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYTBmQUFZUHRkSkgtb01uSGNvRHZ
unknown
https://desktop-netinstaller-sub.osp.opera.software/r-sub.osp.opera.software/W
unknown
https://convertgetpdf.com%22
unknown
https://www.cutepdf-editor.comShortcut
unknown
https://dl.google.com/release2/chrome_component/dvwmczhfksazn5mwlykzsdqv6u_2024.3.27.0/gonpemdgkjcec
unknown
https://googleads.g.doubleclick.net/pagead/drt/si?st=NO_DATA0
unknown
http://unisolated.invalid/a
unknown
https://addons-extensions.operacdn.com/media/direct/90/287790/2c461151f9ffff27314ebfffe3c4ccf3.crx.
unknown
https://addons-extensions.operacdn.com/media/direct/90/287790/2c461151f9ffff27314ebfffe3c4ccf3.crx2
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
https://doubleclick.net/
unknown
http://anglebug.com/3625
unknown
http://dl.google.com/release2/chrome_component/ad3rm3ciqs3fjr4bc4x5vwuildeq_9.49.1/gcmjkmgdlgnkkcocm
unknown
http://anglebug.com/3624
unknown
https://addons.opera.com/extensions/download/be76331b95dfc399cd776d2fc68021e0db03cc4fionKeyBackward
unknown
https://www.cutepdf-editor.com/images/headerbg.gif
unknown
https://www.google.com/dl/release2/chrome_component/ad3rm3ciqs3fjr4bc4x5vwuildeq_9.49.1/gcmjkmgdlgnk
unknown
http://anglebug.com/3862
unknown
https://googleads.g.doubleclick.net/
unknown
https://csp.withgoogle.com/csp/report-to/gws/other
unknown
https://googleads.g.doubleclick.net/pagead/html/r20240415/r20110914/zrt_lookup_fy2021.html#RS-2-&adk
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
172.217.215.100
unknown
United States
142.250.105.84
unknown
United States
142.250.105.156
unknown
United States
173.194.219.157
unknown
United States
37.228.108.133
unknown
Norway
142.250.105.154
unknown
United States
192.168.2.4
unknown
unknown
173.194.219.132
unknown
United States
74.125.136.181
unknown
United States
64.233.185.154
unknown
United States
23.11.231.170
unknown
United States
185.26.182.111
unknown
Norway
37.228.108.149
unknown
Norway
172.217.215.97
unknown
United States
74.125.138.94
unknown
United States
107.167.96.31
unknown
United States
74.125.138.155
unknown
United States
172.217.215.155
unknown
United States
74.125.138.147
unknown
United States
64.233.177.94
unknown
United States
172.253.124.155
unknown
United States
1.1.1.1
unknown
Australia
74.125.136.94
unknown
United States
74.125.136.95
unknown
United States
142.250.105.94
unknown
United States
74.125.136.138
unknown
United States
142.250.105.101
unknown
United States
64.34.201.145
unknown
Canada
64.34.201.144
unknown
Canada
172.253.124.94
unknown
United States
142.250.9.181
unknown
United States
142.251.15.154
unknown
United States
142.251.15.156
unknown
United States
239.255.255.250
unknown
Reserved
107.167.110.217
unknown
United States
104.18.11.89
unknown
United States
74.125.136.157
unknown
United States
74.125.136.154
unknown
United States
108.177.122.103
unknown
United States
107.167.125.189
unknown
United States
64.233.177.181
unknown
United States
There are 31 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_LOCAL_MACHINE\SOFTWARE\Acro Software Inc\CutePDF Writer
Port Name
HKEY_LOCAL_MACHINE\SOFTWARE\Acro Software Inc\CutePDF Writer
Printer Name
HKEY_LOCAL_MACHINE\SOFTWARE\Acro Software Inc\CutePDF Writer
Destination Folder
HKEY_LOCAL_MACHINE\SOFTWARE\Acro Software Inc\CutePDF Writer
Programmatic Access
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Acro Software Inc\CutePDF Writer
Destination Folder
HKEY_CURRENT_USER\Printers\DevModes2
CutePDF Writer
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CutePDF Writer Installation
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CutePDF Writer Installation
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CutePDF Writer Installation
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CutePDF Writer Installation
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CutePDF Writer Installation
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CutePDF Writer Installation
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CutePDF Writer Installation
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Acro Software Inc\CutePDF Writer\CPW4:
Destination Folder
HKEY_CURRENT_USER\SOFTWARE\Opera Software
Last Stable Install Path
HKEY_CURRENT_USER_Classes\OperaStable
FriendlyTypeName
HKEY_CURRENT_USER_Classes\OperaStable
URL Protocol
HKEY_CURRENT_USER_Classes\OperaStable\DefaultIcon
NULL
HKEY_CURRENT_USER_Classes\OperaStable\shell\open\command
NULL
HKEY_CURRENT_USER_Classes\OperaStable\shell\open\ddeexec
NULL
HKEY_CURRENT_USER_Classes\OperaStable\shell\open\ddeexec\Application
NULL
HKEY_CURRENT_USER_Classes\OperaStable\shell\open\ddeexec\Topic
NULL
HKEY_CURRENT_USER_Classes\.opdownload\OpenWithProgIDs
OperaStable
HKEY_CURRENT_USER_Classes\.htm\OpenWithProgids
OperaStable
HKEY_CURRENT_USER_Classes\.html\OpenWithProgids
OperaStable
HKEY_CURRENT_USER_Classes\.pdf\OpenWithProgids
OperaStable
HKEY_CURRENT_USER_Classes\.shtml\OpenWithProgIDs
OperaStable
HKEY_CURRENT_USER_Classes\.xht\OpenWithProgIDs
OperaStable
HKEY_CURRENT_USER_Classes\.xhtml\OpenWithProgIDs
OperaStable
HKEY_CURRENT_USER_Classes\Applications\opera.exe\shell\open\command
NULL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\opera.exe
NULL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\opera.exe
Path
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted
C:\Users\user\AppData\Local\Programs\Opera\opera.exe
HKEY_CURRENT_USER\SOFTWARE\RegisteredApplications
Opera Stable
HKEY_CURRENT_USER\SOFTWARE\Clients\StartMenuInternet\OperaStable
NULL
HKEY_CURRENT_USER\SOFTWARE\Clients\StartMenuInternet\OperaStable\DefaultIcon
NULL
HKEY_CURRENT_USER\SOFTWARE\Clients\StartMenuInternet\OperaStable\InstallInfo
IconsVisible
HKEY_CURRENT_USER\SOFTWARE\Clients\StartMenuInternet\OperaStable\shell\open\command
NULL
HKEY_CURRENT_USER\SOFTWARE\Clients\StartMenuInternet\OperaStable\Capabilities
ApplicationDescription
HKEY_CURRENT_USER\SOFTWARE\Clients\StartMenuInternet\OperaStable\Capabilities
ApplicationIcon
HKEY_CURRENT_USER\SOFTWARE\Clients\StartMenuInternet\OperaStable\Capabilities
ApplicationName
HKEY_CURRENT_USER\SOFTWARE\Clients\StartMenuInternet\OperaStable\Capabilities\FileAssociations
.crx
HKEY_CURRENT_USER\SOFTWARE\Clients\StartMenuInternet\OperaStable\Capabilities\FileAssociations
.htm
HKEY_CURRENT_USER\SOFTWARE\Clients\StartMenuInternet\OperaStable\Capabilities\FileAssociations
.html
HKEY_CURRENT_USER\SOFTWARE\Clients\StartMenuInternet\OperaStable\Capabilities\FileAssociations
.opdownload
HKEY_CURRENT_USER\SOFTWARE\Clients\StartMenuInternet\OperaStable\Capabilities\FileAssociations
.pdf
HKEY_CURRENT_USER\SOFTWARE\Clients\StartMenuInternet\OperaStable\Capabilities\FileAssociations
.shtml
HKEY_CURRENT_USER\SOFTWARE\Clients\StartMenuInternet\OperaStable\Capabilities\FileAssociations
.xht
HKEY_CURRENT_USER\SOFTWARE\Clients\StartMenuInternet\OperaStable\Capabilities\FileAssociations
.xhtml
HKEY_CURRENT_USER\SOFTWARE\Clients\StartMenuInternet\OperaStable\Capabilities\Startmenu
StartMenuInternet
HKEY_CURRENT_USER\SOFTWARE\Clients\StartMenuInternet\OperaStable\Capabilities\UrlAssociations
http
HKEY_CURRENT_USER\SOFTWARE\Clients\StartMenuInternet\OperaStable\Capabilities\UrlAssociations
https
HKEY_CURRENT_USER\SOFTWARE\Clients\StartMenuInternet\OperaStable\Capabilities\UrlAssociations
ftp
HKEY_CURRENT_USER\SOFTWARE\Clients\StartMenuInternet\OperaStable\Capabilities\UrlAssociations
mailto
HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{E7629152-0A34-4487-B787-5D1144304455}\LocalServer32
NULL
HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{E7629152-0A34-4487-B787-5D1144304455}\LocalServer32
ServerExecutable
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Opera 109.0.5097.45
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Opera 109.0.5097.45
DisplayIcon
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Opera 109.0.5097.45
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Opera 109.0.5097.45
HelpLink
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Opera 109.0.5097.45
InstallLocation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Opera 109.0.5097.45
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Opera 109.0.5097.45
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Opera 109.0.5097.45
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Opera 109.0.5097.45
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Opera 109.0.5097.45
URLInfoAbout
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Opera 109.0.5097.45
URLUpdateInfo
HKEY_CURRENT_USER\SOFTWARE\Opera Software
Previous Default Browser
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\UserChoice
ProgID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\UserChoice
Hash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\UserChoice
ProgID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\UserChoice
Hash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Associations\UrlAssociations\https\UserChoice
ProgID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Associations\UrlAssociations\https\UserChoice
Hash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Associations\UrlAssociations\http\UserChoice
ProgID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Associations\UrlAssociations\http\UserChoice
Hash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Taskband
FavoritesResolve
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Taskband
Favorites
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Taskband
FavoritesChanges
HKEY_CURRENT_USER_Classes\OperaStable
URL Protocol
HKEY_CURRENT_USER_Classes\OperaStable\shell\open\ddeexec
NULL
HKEY_CURRENT_USER_Classes\OperaStable\shell\open\ddeexec\Application
NULL
HKEY_CURRENT_USER_Classes\OperaStable\shell\open\ddeexec\Topic
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_CURRENT_USER_Classes\OperaStable
URL Protocol
HKEY_CURRENT_USER_Classes\OperaStable\shell\open\ddeexec
NULL
HKEY_CURRENT_USER_Classes\OperaStable\shell\open\ddeexec\Application
NULL
HKEY_CURRENT_USER_Classes\OperaStable\shell\open\ddeexec\Topic
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000304D4
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000002043A
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\wbarf\NccQngn\Ybpny\Cebtenzf\Bcren\nffvfgnag\oebjfre_nffvfgnag.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000006069A
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\CloudStore\Store\Cache\DefaultAccount\$de${c5714585-99d0-48c3-bbf6-cf4cf8d87525}$$windows.data.unifiedtile.localstartvolatiletilepropertiesmap\Current
Data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
browser_assistant.exe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Opera Browser Assistant
There are 102 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1F5000
unkown
page execute and read and write
C4400C73000
unkown
page read and write
7FF5ED7DB000
unkown
page readonly
7FF5ED519000
unkown
page readonly
46AE000
stack
page read and write
7FF5ED5C1000
unkown
page readonly
54E000
stack
page read and write
7FF5ED86B000
unkown
page readonly
7A34000
unkown
page read and write
C4401F0C000
unkown
page read and write
D34000
heap
page read and write
136400368000
unkown
page read and write
EC0000
unkown
page readonly
EC1000
unkown
page execute read
C4402001000
unkown
page read and write
BD1D000
stack
page read and write
4BCE000
stack
page read and write
1C8000
unkown
page execute and read and write
EFD000
stack
page read and write
7FF5ED409000
unkown
page readonly
2A2F000
stack
page read and write
310E000
stack
page read and write
2794000
heap
page read and write
35C4C000
direct allocation
page read and write
FE92000
heap
page read and write
3351000
heap
page read and write
E10000
unkown
page readonly
8208000
stack
page read and write
2A6F000
stack
page read and write
2C3000628000
direct allocation
page read and write
AB21000
unkown
page read and write
2150000
direct allocation
page read and write
23464000
direct allocation
page read and write
3351000
heap
page read and write
1A61AAD0000
unkown
page read and write
3351000
heap
page read and write
7FF5ED534000
unkown
page readonly
C4401920000
unkown
page read and write
3351000
heap
page read and write
EF0000
unkown
page readonly
786B000
unkown
page read and write
7695000
stack
page read and write
2C30002C8000
direct allocation
page read and write
C4400E0C000
unkown
page read and write
4BC9000
unkown
page read and write
FCD7000
unkown
page read and write
1A61E2B0000
unkown
page read and write
211C000
direct allocation
page read and write
C440286C000
unkown
page read and write
564000
heap
page read and write
5569000
heap
page read and write
9883000
unkown
page read and write
1A61D42B000
unkown
page read and write
38DE000
stack
page read and write
6CA71000
unkown
page execute read
3CB77FC000
unkown
page read and write
D0B000
heap
page read and write
7F0000
unkown
page readonly
EA0000
unkown
page readonly
1115000
unkown
page write copy
564000
heap
page read and write
9792000
unkown
page read and write
7FF5ED404000
unkown
page readonly
3756000
unkown
page read and write
2C3000308000
direct allocation
page read and write
B2AE000
stack
page read and write
9879000
unkown
page read and write
4FE0000
heap
page read and write
258E000
stack
page read and write
1230000
unkown
page read and write
2C3000614000
direct allocation
page read and write
7FF5ED295000
unkown
page readonly
419C00210000
unkown
page read and write
560000
heap
page read and write
136400314000
unkown
page read and write
C4400978000
unkown
page read and write
170000
unkown
page readonly
4BE1000
unkown
page read and write
7FF5ED9E1000
unkown
page readonly
7FF5ED3AC000
unkown
page readonly
F933000
unkown
page read and write
1DE26030000
heap
page read and write
3CBA7FD000
unkown
page read and write
3700000
unkown
page read and write
C4400A01000
unkown
page read and write
FD0F000
unkown
page read and write
130E000
heap
page read and write
136D000
heap
page read and write
56A34000
direct allocation
page read and write
3351000
heap
page read and write
1230000
unkown
page read and write
4E80000
heap
page read and write
2C3000201000
direct allocation
page read and write
FC0000
unkown
page read and write
7FF5ED7F1000
unkown
page readonly
6F810000
unkown
page readonly
1DE23619000
heap
page read and write
1700000
heap
page read and write
6C18A000
unkown
page execute read
6F920000
unkown
page readonly
B190000
unkown
page read and write
3351000
heap
page read and write
1A621034000
unkown
page read and write
C4400098000
unkown
page read and write
564000
heap
page read and write
CC5000
heap
page read and write
B640000
unkown
page read and write
C4401108000
unkown
page read and write
564000
heap
page read and write
C4400B6C000
unkown
page read and write
D20000
unkown
page readonly
3CACFFE000
unkown
page readonly
3351000
heap
page read and write
2564000
heap
page read and write
1DE25580000
trusted library allocation
page read and write
15BC000
unkown
page readonly
ED5000
unkown
page read and write
3CA3E65000
unkown
page read and write
C4401028000
unkown
page read and write
7FF5EDA69000
unkown
page readonly
1364007D4000
unkown
page read and write
564000
heap
page read and write
7FF5ED850000
unkown
page readonly
79FB000
unkown
page read and write
7FF5ED821000
unkown
page readonly
3351000
heap
page read and write
C4401B44000
unkown
page read and write
6CA70000
unkown
page readonly
679000
stack
page read and write
7FF5ED937000
unkown
page readonly
7FF5ED980000
unkown
page readonly
564000
heap
page read and write
C440150C000
unkown
page read and write
2AEE000
heap
page read and write
3351000
heap
page read and write
2C3000238000
direct allocation
page read and write
30BE000
stack
page read and write
1DE2612C000
heap
page read and write
41CA4000
direct allocation
page read and write
7660000
heap
page read and write
D71000
unkown
page readonly
564000
heap
page read and write
137E000
stack
page read and write
7820000
heap
page read and write
130B000
heap
page read and write
342E000
stack
page read and write
E71000
unkown
page readonly
B22B000
stack
page read and write
3351000
heap
page read and write
1A61EC48000
unkown
page read and write
35CEC000
direct allocation
page read and write
C44028C8000
unkown
page read and write
FD0E000
unkown
page read and write
7D0000
unkown
page readonly
234AC000
direct allocation
page read and write
3351000
heap
page read and write
B8AB000
stack
page read and write
8190FE000
unkown
page readonly
2C3000630000
direct allocation
page read and write
40B000
unkown
page read and write
69F000
unkown
page write copy
C440027C000
unkown
page read and write
C4402038000
unkown
page read and write
7FF5ED507000
unkown
page readonly
3351000
heap
page read and write
12F4000
heap
page read and write
1DE23611000
heap
page read and write
2260000
heap
page read and write
51F8000
heap
page read and write
1DE260F1000
heap
page read and write
78A0000
unkown
page read and write
89A0000
unkown
page read and write
C4400480000
unkown
page read and write
7FF5ED586000
unkown
page readonly
7FF5ED85F000
unkown
page readonly
C89C000
unkown
page read and write
C440171C000
unkown
page read and write
41CD4000
direct allocation
page read and write
E59D000
stack
page read and write
3E50C000
direct allocation
page read and write
EC0000
unkown
page readonly
72E000
heap
page read and write
9AD000
unkown
page readonly
C857000
unkown
page read and write
C44002F0000
unkown
page read and write
ED5000
unkown
page read and write
2110000
direct allocation
page read and write
1500000
heap
page read and write
6BDB1000
unkown
page execute read
3791000
unkown
page read and write
408000
unkown
page readonly
6B761000
unkown
page execute read
5022000
heap
page read and write
7900000
unkown
page read and write
C893000
unkown
page read and write
CD0000
heap
page read and write
B6C000
unkown
page readonly
564000
heap
page read and write
F9E000
unkown
page read and write
2C3000408000
direct allocation
page read and write
1308000
heap
page read and write
3351000
heap
page read and write
12CF000
unkown
page read and write
C440383C000
unkown
page read and write
BDD0000
unkown
page readonly
3351000
heap
page read and write
112D000
unkown
page readonly
136E000
heap
page read and write
F30000
heap
page read and write
986F000
unkown
page read and write
C440098C000
unkown
page read and write
564000
heap
page read and write
B30000
unkown
page readonly
56B7C000
direct allocation
page read and write
3700000
unkown
page read and write
1A620C00000
unkown
page read and write
46E34000
direct allocation
page read and write
A21E000
stack
page read and write
7FF5ED3AC000
unkown
page readonly
FCE8000
unkown
page read and write
406000
unkown
page read and write
3351000
heap
page read and write
BDB000
unkown
page execute and read and write
55BE000
stack
page read and write
551000
unkown
page readonly
3351000
heap
page read and write
414000
unkown
page readonly
3CC8FFE000
unkown
page read and write
23401000
direct allocation
page read and write
6CA71000
unkown
page execute read
54EE000
stack
page read and write
3351000
heap
page read and write
46C0000
remote allocation
page read and write
C4400A17000
unkown
page read and write
1DE23611000
heap
page read and write
F50000
unkown
page readonly
6CA36000
unkown
page read and write
7F2E000
stack
page read and write
23498000
direct allocation
page read and write
3431000
unkown
page read and write
56AB8000
direct allocation
page read and write
3351000
heap
page read and write
C4401850000
unkown
page read and write
10DD000
unkown
page readonly
1308000
heap
page read and write
8710000
unkown
page readonly
EC0000
unkown
page readonly
FCE8000
unkown
page read and write
56AEC000
direct allocation
page read and write
9A000
stack
page read and write
25C9FD000
stack
page read and write
3351000
heap
page read and write
3CA3E3D000
unkown
page read and write
F8F4000
unkown
page read and write
234B0000
direct allocation
page read and write
968000
heap
page read and write
3351000
heap
page read and write
352F000
stack
page read and write
C440072C000
unkown
page read and write
1DE23602000
heap
page read and write
1660000
unkown
page readonly
C4401F00000
trusted library allocation
page read and write
C4400F44000
unkown
page read and write
48FF000
stack
page read and write
13B0000
unkown
page readonly
650000
heap
page read and write
FCDD000
unkown
page read and write
C44009BC000
unkown
page read and write
3756000
unkown
page read and write
994000
unkown
page write copy
C4400EC4000
unkown
page read and write
FCDB000
unkown
page read and write
C4401B1C000
trusted library allocation
page read and write
9883000
unkown
page read and write
CC1000
heap
page read and write
ECE000
unkown
page readonly
6D9000
heap
page read and write
7FF5ED806000
unkown
page readonly
4C4B000
unkown
page read and write
57F0000
trusted library allocation
page read and write
ECE000
unkown
page readonly
C44005EC000
unkown
page read and write
3351000
heap
page read and write
41B000
unkown
page readonly
C440034C000
trusted library allocation
page read and write
1B9000
heap
page read and write
1364002B0000
unkown
page read and write
C4401798000
unkown
page read and write
35D0000
unkown
page read and write
7FF5EDA76000
unkown
page readonly
F8BB000
unkown
page read and write
A11F000
stack
page read and write
7FF5ED9CA000
unkown
page readonly
2C3000220000
direct allocation
page read and write
7F0000
unkown
page read and write
B8AB000
stack
page read and write
3791000
unkown
page read and write
10B8000
heap
page read and write
171000
unkown
page execute and read and write
CB0000
heap
page read and write
10DD000
unkown
page readonly
12920000
unkown
page read and write
C9E000
unkown
page read and write
592000
heap
page read and write
3351000
heap
page read and write
56A04000
direct allocation
page read and write
407000
unkown
page readonly
9A6000
unkown
page read and write
3351000
heap
page read and write
C512000
unkown
page read and write
112D000
unkown
page readonly
A310000
unkown
page read and write
C4400EA8000
unkown
page read and write
1040000
heap
page read and write
C4400001000
unkown
page read and write
860000
heap
page read and write
6CC26000
unkown
page readonly
37F2000
unkown
page read and write
401000
unkown
page execute read
30F0000
direct allocation
page read and write
7FF5EDA76000
unkown
page readonly
B00000
unkown
page readonly
C4400BB8000
unkown
page read and write
3351000
heap
page read and write
6BB3A000
unkown
page execute read
100000
unkown
page readonly
C440373C000
unkown
page read and write
1DE24F41000
heap
page read and write
FD0E000
unkown
page read and write
B5AE000
stack
page read and write
56D9000
unkown
page read and write
3351000
heap
page read and write
3351000
heap
page read and write
1A61EBB7000
unkown
page read and write
C4400431000
unkown
page read and write
7FF5ED9A1000
unkown
page readonly
593000
heap
page read and write
4FC84000
direct allocation
page read and write
81A2FE000
unkown
page readonly
1A623887000
unkown
page read and write
7C90000
unkown
page read and write
46EDC000
direct allocation
page read and write
3351000
heap
page read and write
7FF67B511000
unkown
page execute read
4FC28000
direct allocation
page read and write
4CE0000
unkown
page read and write
6F811000
unkown
page execute read
860000
unkown
page readonly
4E628000
direct allocation
page read and write
9792000
unkown
page read and write
3351000
heap
page read and write
16EE000
stack
page read and write
400000
unkown
page readonly
345E000
stack
page read and write
2342C000
direct allocation
page read and write
3CBB7FC000
unkown
page read and write
7FF5ED404000
unkown
page readonly
740000
unkown
page readonly
7FF5ED735000
unkown
page readonly
FCFE000
unkown
page read and write
ED7000
unkown
page readonly
C440370C000
unkown
page read and write
1390000
heap
page read and write
2560000
heap
page read and write
7FF5ED5C9000
unkown
page readonly
7FF5ED4BB000
unkown
page readonly
CB0000
unkown
page read and write
3CC77FE000
unkown
page read and write
7FF5ED6A5000
unkown
page readonly
7FF5ED48A000
unkown
page readonly
56B54000
direct allocation
page read and write
F8F4000
unkown
page read and write
4FC01000
direct allocation
page read and write
CA63000
unkown
page read and write
3351000
heap
page read and write
CA08000
unkown
page read and write
564000
heap
page read and write
3351000
heap
page read and write
1E0000
unkown
page readonly
C44004E8000
unkown
page read and write
3CA3E35000
unkown
page read and write
6C16E000
unkown
page write copy
3351000
heap
page read and write
C44036DC000
unkown
page read and write
379E000
stack
page read and write
978E000
unkown
page read and write
2198000
direct allocation
page read and write
41C2C000
direct allocation
page read and write
275E000
stack
page read and write
920000
unkown
page readonly
C44002C0000
unkown
page read and write
24C0000
unkown
page readonly
1DE2614C000
heap
page read and write
ECE000
unkown
page readonly
7FF5EDA38000
unkown
page readonly
FD04000
unkown
page read and write
2C3000250000
direct allocation
page read and write
CA42000
unkown
page read and write
C40000
unkown
page readonly
900000
unkown
page read and write
C4403748000
unkown
page read and write
420000
heap
page read and write
6D0000
unkown
page readonly
3351000
heap
page read and write
1A61A9A0000
unkown
page readonly
C4402020000
unkown
page read and write
C4400B84000
unkown
page read and write
7FF5ED26E000
unkown
page readonly
C44012C8000
unkown
page read and write
400000
unkown
page readonly
1E623EB0000
heap
page read and write
C4400F20000
unkown
page read and write
7FF5ED803000
unkown
page readonly
564000
heap
page read and write
C4401F70000
unkown
page read and write
1120000
unkown
page readonly
A327000
unkown
page read and write
35C88000
direct allocation
page read and write
E10000
unkown
page readonly
C4402B04000
unkown
page read and write
564000
heap
page read and write
C6C1000
unkown
page read and write
A310000
unkown
page read and write
564000
heap
page read and write
F8B2000
unkown
page read and write
3758000
unkown
page read and write
3E500000
direct allocation
page read and write
D8F000
stack
page read and write
40A000
unkown
page write copy
4C18000
unkown
page read and write
7DF4F3041000
unkown
page execute read
4C0000
heap
page read and write
BDE000
unkown
page execute and write copy
349E000
stack
page read and write
DF0000
unkown
page readonly
C4401744000
unkown
page read and write
A364000
unkown
page read and write
589B000
stack
page read and write
564000
heap
page read and write
1A62117C000
unkown
page read and write
1080000
unkown
page readonly
F8B2000
unkown
page read and write
12E4000
heap
page read and write
3351000
heap
page read and write
564000
heap
page read and write
32D0000
heap
page read and write
3351000
heap
page read and write
7FF5ED674000
unkown
page readonly
7FF5ED4A1000
unkown
page readonly
C6D8000
unkown
page read and write
3351000
heap
page read and write
5480000
heap
page read and write
7FF5ED3EA000
unkown
page readonly
1311000
heap
page read and write
3CCE7FE000
unkown
page read and write
B50000
unkown
page readonly
E30000
heap
page read and write
1300000
unkown
page read and write
564000
heap
page read and write
4E6D8000
direct allocation
page read and write
A502000
unkown
page read and write
7FF67B511000
unkown
page execute read
1A623924000
unkown
page read and write
C70000
heap
page read and write
51F0000
heap
page read and write
7FF67B510000
unkown
page readonly
EF0000
unkown
page readonly
3CBEFFE000
unkown
page readonly
7FF5ED205000
unkown
page readonly
3351000
heap
page read and write
FD04000
unkown
page read and write
FCEE000
unkown
page read and write
3D0000
unkown
page readonly
2300000
unkown
page read and write
6BB3B000
unkown
page readonly
10F90000
unkown
page read and write
C4400784000
unkown
page read and write
C440288C000
trusted library allocation
page read and write
CA0000
unkown
page read and write
7FF5ED996000
unkown
page readonly
564000
heap
page read and write
1A620C1D000
unkown
page read and write
69B000
unkown
page execute and read and write
7FF5ED418000
unkown
page readonly
1A61E03D000
unkown
page read and write
780000
unkown
page readonly
ED5000
unkown
page read and write
1280000
unkown
page readonly
136400754000
unkown
page read and write
35CA4000
direct allocation
page read and write
C700000
unkown
page read and write
35CC4000
direct allocation
page read and write
7FF5ED471000
unkown
page readonly
95D000
unkown
page readonly
C440009E000
unkown
page read and write
810000
heap
page read and write
AAF9000
unkown
page read and write
AA90000
unkown
page read and write
5002000
heap
page read and write
7FF5ED8A4000
unkown
page readonly
3CCCFFE000
unkown
page readonly
564000
heap
page read and write
15AB000
stack
page read and write
E820000
unkown
page read and write
2EAF000
stack
page read and write
3CA3E6F000
unkown
page read and write
1390000
heap
page read and write
C44003A4000
unkown
page read and write
BD98000
stack
page read and write
27F4000
heap
page read and write
C10A000
stack
page read and write
1DE25012000
heap
page read and write
C40000
unkown
page readonly
FD16000
unkown
page read and write
2370000
heap
page read and write
56B70000
direct allocation
page read and write
4D9D000
stack
page read and write
A37D000
unkown
page read and write
7FF5ED9ED000
unkown
page readonly
1140000
heap
page read and write
7F40000
unkown
page readonly
30D0000
heap
page read and write
A4AE000
unkown
page read and write
1A61E8A7000
unkown
page read and write
7FF5ED9B8000
unkown
page readonly
3351000
heap
page read and write
9977000
unkown
page read and write
4808000
heap
page read and write
400C000
stack
page read and write
13F0000
heap
page read and write
46E24000
direct allocation
page read and write
98A8000
unkown
page read and write
7FF5ED3D0000
unkown
page readonly
564000
heap
page read and write
3F0000
unkown
page readonly
3351000
heap
page read and write
7FF5ED4A1000
unkown
page readonly
1DE26111000
heap
page read and write
C4401E01000
unkown
page read and write
4814000
heap
page read and write
2AE0000
heap
page read and write
D00000
unkown
page readonly
C4401824000
unkown
page read and write
564000
heap
page read and write
C44037BC000
unkown
page read and write
3351000
heap
page read and write
C4401630000
unkown
page read and write
A494000
unkown
page read and write
3351000
heap
page read and write
564000
heap
page read and write
C61000
unkown
page readonly
41C44000
direct allocation
page read and write
790000
unkown
page readonly
A4FC000
unkown
page read and write
3351000
heap
page read and write
7FF5ED4F3000
unkown
page readonly
600000
unkown
page readonly
53E000
stack
page read and write
26D5000
heap
page read and write
3758000
unkown
page read and write
EC0000
unkown
page readonly
3528C000
direct allocation
page read and write
A39B000
unkown
page read and write
408000
unkown
page readonly
7FF5ED519000
unkown
page readonly
7FF5ED286000
unkown
page readonly
7FF5ED39B000
unkown
page readonly
C440380C000
unkown
page read and write
FCE8000
unkown
page read and write
27C0000
unkown
page read and write
C440015C000
unkown
page read and write
7FF5ED847000
unkown
page readonly
7FF5ED975000
unkown
page readonly
7FF5ED781000
unkown
page readonly
C4401601000
unkown
page read and write
552E000
stack
page read and write
C4400FD8000
unkown
page read and write
597D000
direct allocation
page read and write
2C30003D4000
direct allocation
page read and write
C440180C000
unkown
page read and write
310E000
stack
page read and write
77F000230000
direct allocation
page read and write
7FF5ED714000
unkown
page readonly
234C4000
direct allocation
page read and write
7FF5ED660000
unkown
page readonly
C440156C000
unkown
page read and write
3351000
heap
page read and write
C4401401000
unkown
page read and write
C440034C000
unkown
page read and write
7FF5ED844000
unkown
page readonly
C4400670000
unkown
page read and write
7FF5ED59E000
unkown
page readonly
136400794000
unkown
page read and write
1A623983000
unkown
page read and write
7FF67B561000
unkown
page readonly
7FF5EDA47000
unkown
page readonly
208A000
heap
page read and write
2630000
heap
page read and write
7FF5ED3DA000
unkown
page readonly
9B000
stack
page read and write
3351000
heap
page read and write
C561000
unkown
page read and write
1DE26115000
heap
page read and write
56D9000
unkown
page read and write
6C16D000
unkown
page read and write
352C0000
direct allocation
page read and write
7FF5ED980000
unkown
page readonly
96DF000
unkown
page read and write
3209000
stack
page read and write
3351000
heap
page read and write
409000
unkown
page readonly
6CC0B000
unkown
page read and write
2C30002D8000
direct allocation
page read and write
908000
heap
page read and write
564000
heap
page read and write
88EE000
stack
page read and write
4C34000
unkown
page read and write
419C0028C000
unkown
page read and write
56AF8000
direct allocation
page read and write
C4400F64000
unkown
page read and write
C50000
unkown
page read and write
658000
heap
page read and write
12E4000
heap
page read and write
9AD000
unkown
page readonly
592000294000
unkown
page read and write
6CC2A000
unkown
page readonly
A494000
unkown
page read and write
1A61AA90000
unkown
page readonly
77C000
stack
page read and write
7E0000
heap
page read and write
9F1E000
stack
page read and write
25C5FE000
stack
page read and write
3351000
heap
page read and write
B60000
unkown
page readonly
3351000
heap
page read and write
12F4000
heap
page read and write
146E000
stack
page read and write
1A61ABB9000
heap
page read and write
11C0000
unkown
page readonly
7FF5EDA14000
unkown
page readonly
35C78000
direct allocation
page read and write
25C4FE000
unkown
page readonly
C4401A5C000
unkown
page read and write
3034000
heap
page read and write
C4401201000
unkown
page read and write
41C54000
direct allocation
page read and write
1DE2613F000
heap
page read and write
1A61E830000
heap
page read and write
2670000
unkown
page readonly
7FF5ED5C5000
unkown
page readonly
2C3000394000
direct allocation
page read and write
12DD000
heap
page read and write
1DE23629000
heap
page read and write
1301000
heap
page read and write
401000
unkown
page execute read
7FF5EDA0D000
unkown
page readonly
3E4EC000
direct allocation
page read and write
EC1000
unkown
page execute read
3210000
unkown
page read and write
1A61EB20000
trusted library section
page read and write
99000
stack
page read and write
D40000
unkown
page readonly
EB0000
unkown
page read and write
A29E000
stack
page read and write
600000
unkown
page readonly
C440070C000
unkown
page read and write
FCEE000
unkown
page read and write
D60000
unkown
page readonly
6A2000
heap
page read and write
3590000
unkown
page read and write
46E74000
direct allocation
page read and write
2370000
heap
page read and write
EA1000
unkown
page readonly
1305000
heap
page read and write
564000
heap
page read and write
564000
heap
page read and write
3CB9FFE000
unkown
page readonly
7FF5ED853000
unkown
page readonly
213C000
direct allocation
page read and write
56AF8000
direct allocation
page read and write
3CC0FFE000
unkown
page readonly
C6F8000
unkown
page read and write
1A622CFE000
unkown
page read and write
7D00000
unkown
page readonly
A30000
heap
page read and write
3351000
heap
page read and write
7884000
unkown
page read and write
1A620AAE000
unkown
page read and write
C4402110000
unkown
page read and write
F30000
unkown
page readonly
C4402A30000
trusted library allocation
page read and write
9B60000
unkown
page readonly
419C00248000
unkown
page read and write
C4402CDC000
unkown
page read and write
2960000
heap
page read and write
C507000
unkown
page read and write
7FF5ED495000
unkown
page readonly
ED7000
unkown
page readonly
23498000
direct allocation
page read and write
1280000
unkown
page readonly
2164000
direct allocation
page read and write
3CA57FB000
unkown
page read and write
D80000
unkown
page read and write
2E90000
heap
page read and write
401000
unkown
page execute read
9795000
unkown
page read and write
1364002F0000
unkown
page read and write
F9B4000
unkown
page read and write
7FF5ED97A000
unkown
page readonly
F20000
unkown
page readonly
C6C9000
unkown
page read and write
35C6C000
direct allocation
page read and write
3351000
heap
page read and write
7B0000
heap
page read and write
3351000
heap
page read and write
1DE23629000
heap
page read and write
28A0000
unkown
page readonly
C4400C9C000
unkown
page read and write
3CCDFFE000
unkown
page readonly
7FF5ED3D0000
unkown
page readonly
A361000
unkown
page read and write
35CB8000
direct allocation
page read and write
2C30002B8000
direct allocation
page read and write
8108000
stack
page read and write
C30000
unkown
page readonly
C44015E4000
unkown
page read and write
1CA000
unkown
page execute and read and write
31DE000
stack
page read and write
170000
unkown
page readonly
E30000
unkown
page readonly
C4401878000
unkown
page read and write
3351000
heap
page read and write
401000
unkown
page execute read
FD0E000
unkown
page read and write
2390000
unkown
page read and write
2344C000
direct allocation
page read and write
1A61EA60000
unkown
page read and write
1A61EBB0000
unkown
page read and write
23401000
direct allocation
page read and write
2F00000
unkown
page readonly
ED5000
unkown
page read and write
7FF5ED4B4000
unkown
page readonly
592000220000
unkown
page read and write
1329000
heap
page read and write
CBBF000
unkown
page read and write
3CA3E37000
unkown
page read and write
56ABC000
direct allocation
page read and write
F30000
heap
page read and write
564000
heap
page read and write
2128000
direct allocation
page read and write
C44021CC000
unkown
page read and write
7FF5ED46E000
unkown
page readonly
95D000
unkown
page readonly
2E0B8000
direct allocation
page read and write
56B6C000
direct allocation
page read and write
C8E1000
unkown
page read and write
2C3000601000
direct allocation
page read and write
3CBCFFE000
unkown
page readonly
112C000
unkown
page readonly
920000
unkown
page readonly
1308000
heap
page read and write
D89000
stack
page read and write
860000
unkown
page readonly
23484000
direct allocation
page read and write
AFC000
stack
page read and write
C44021B8000
unkown
page read and write
C4403201000
unkown
page read and write
35D08000
direct allocation
page read and write
C4402088000
unkown
page read and write
1220000
unkown
page readonly
9660000
unkown
page read and write
4A5D000
stack
page read and write
797D000
unkown
page read and write
C44006C8000
unkown
page read and write
C4400E7C000
unkown
page read and write
520E000
heap
page read and write
4FC000
stack
page read and write
6BB1F000
unkown
page read and write
1280000
unkown
page readonly
564000
heap
page read and write
F97B000
unkown
page read and write
C44001A0000
unkown
page read and write
3E424000
direct allocation
page read and write
CA14000
unkown
page read and write
3351000
heap
page read and write
1A620B40000
unkown
page read and write
1CA000
unkown
page execute and read and write
136400430000
unkown
page read and write
C44028BC000
unkown
page read and write
1E622120000
heap
page read and write
FE0000
unkown
page readonly
C440036C000
unkown
page read and write
2E07C000
direct allocation
page read and write
1A620A70000
trusted library section
page read and write
F10000
heap
page read and write
2343C000
direct allocation
page read and write
7C80000
unkown
page read and write
6CA70000
unkown
page readonly
564000
heap
page read and write
A01D000
stack
page read and write
B629000
stack
page read and write
7FF5EDA31000
unkown
page readonly
6C8A1000
unkown
page execute read
7D0000
unkown
page readonly
35C0C000
direct allocation
page read and write
C4401F68000
unkown
page read and write
13C0000
heap
page read and write
C7C5000
unkown
page read and write
C50000
heap
page read and write
56A34000
direct allocation
page read and write
A29E000
stack
page read and write
4E6BC000
direct allocation
page read and write
3351000
heap
page read and write
7867000
unkown
page read and write
4E6D0000
direct allocation
page read and write
3351000
heap
page read and write
3E0000
unkown
page readonly
5F004000
direct allocation
page read and write
A379000
unkown
page read and write
1A622FA9000
unkown
page read and write
1364007DC000
unkown
page read and write
3351000
heap
page read and write
1A622E1C000
unkown
page read and write
56A48000
direct allocation
page read and write
352A4000
direct allocation
page read and write
1DE2605F000
heap
page read and write
78AD000
unkown
page read and write
564000
heap
page read and write
C964000
unkown
page read and write
171000
unkown
page execute and read and write
E00000
heap
page read and write
5C0000
heap
page read and write
3E401000
direct allocation
page read and write
564000
heap
page read and write
9881000
unkown
page read and write
EF98000
unkown
page read and write
2AD0000
heap
page read and write
1A6211C1000
unkown
page read and write
C4401A48000
unkown
page read and write
7FF5ED337000
unkown
page readonly
3E70000
trusted library allocation
page read and write
900000
unkown
page read and write
3351000
heap
page read and write
797D000
unkown
page read and write
C563000
unkown
page read and write
FA0000
unkown
page read and write
1A61E660000
unkown
page read and write
56B20000
direct allocation
page read and write
C78000
heap
page read and write
2285000
heap
page read and write
F00000
unkown
page readonly
ED7000
unkown
page readonly
BDD0000
unkown
page readonly
C4403758000
trusted library allocation
page read and write
C507000
unkown
page read and write
15B0000
unkown
page readonly
1350000
unkown
page readonly
C44006AC000
unkown
page read and write
27F0000
heap
page read and write
AFC000
stack
page read and write
56C3000
unkown
page read and write
7FF5EDA0D000
unkown
page readonly
ED7000
unkown
page readonly
6F921000
unkown
page execute read
C4400EFC000
unkown
page read and write
3351000
heap
page read and write
5160000
heap
page read and write
7859000
unkown
page read and write
7FF5ED4E8000
unkown
page readonly
1A61AAA0000
unkown
page readonly
E71000
unkown
page readonly
EA0000
heap
page read and write
C857000
unkown
page read and write
3351000
heap
page read and write
70BE000
stack
page read and write
A70000
heap
page read and write
352D8000
direct allocation
page read and write
FD17000
unkown
page read and write
7FF5EDA47000
unkown
page readonly
C44005D8000
unkown
page read and write
13B0000
unkown
page readonly
C44007E0000
unkown
page read and write
3351000
heap
page read and write
C5A0000
unkown
page read and write
968000
heap
page read and write
1A622D87000
unkown
page read and write
4B50000
unkown
page read and write
7FF5ED3D6000
unkown
page readonly
3351000
heap
page read and write
3351000
heap
page read and write
7DF4F3040000
unkown
page readonly
389F000
stack
page read and write
1380000
heap
page read and write
C4400801000
unkown
page read and write
3CABFFE000
unkown
page readonly
C4400360000
unkown
page read and write
FD0E000
unkown
page read and write
77F000238000
direct allocation
page read and write
74A0000
heap
page read and write
AF6000
heap
page read and write
259F000
stack
page read and write
7FF5ED602000
unkown
page readonly
C50000
unkown
page read and write
2E9E000
stack
page read and write
7852000
unkown
page read and write
A85000
direct allocation
page read and write
36F0000
unkown
page readonly
234A8000
direct allocation
page read and write
1329000
heap
page read and write
C440020C000
unkown
page read and write
3351000
heap
page read and write
7FF5D1CCD000
unkown
page readonly
7D1000
unkown
page execute read
12F4000
heap
page read and write
FE90000
heap
page read and write
1A61E40D000
unkown
page read and write
2C300023C000
direct allocation
page read and write
7F0000
unkown
page readonly
6CA5A000
unkown
page readonly
6C182000
unkown
page read and write
3351000
heap
page read and write
136400284000
unkown
page read and write
3351000
heap
page read and write
52DE000
heap
page read and write
FD1F000
unkown
page read and write
3351000
heap
page read and write
1308000
heap
page read and write
EC0000
unkown
page readonly
8EC4000
unkown
page read and write
564000
heap
page read and write
12E1000
heap
page read and write
3351000
heap
page read and write
C4401A50000
unkown
page read and write
3351000
heap
page read and write
AB0000
heap
page read and write
3E4A0000
direct allocation
page read and write
AF8D000
stack
page read and write
C8E1000
unkown
page read and write
7FF5ED7F1000
unkown
page readonly
C4401AFC000
unkown
page read and write
10AE000
stack
page read and write
819FFB000
stack
page read and write
C44007A8000
unkown
page read and write
ED5000
unkown
page read and write
170000
unkown
page readonly
10D0000
heap
page read and write
7FF5ED806000
unkown
page readonly
2180000
direct allocation
page read and write
EA0000
unkown
page readonly
760000
heap
page read and write
987F000
unkown
page read and write
C4402730000
unkown
page read and write
9F1E000
stack
page read and write
C4400294000
trusted library allocation
page read and write
12F4000
heap
page read and write
C4400D9C000
unkown
page read and write
32DF000
stack
page read and write
81A0FE000
unkown
page readonly
4E0000
heap
page read and write
FCD4000
unkown
page read and write
785F000
unkown
page read and write
7A0000
unkown
page readonly
FD0E000
unkown
page read and write
C811000
unkown
page read and write
1A61E510000
unkown
page read and write
419C002EC000
unkown
page read and write
6C18B000
unkown
page readonly
7D0000
unkown
page readonly
3351000
heap
page read and write
7FF5ED2A4000
unkown
page readonly
303B000
stack
page read and write
C4401170000
unkown
page read and write
534000
heap
page read and write
4C5B000
stack
page read and write
C6F2000
unkown
page read and write
1940000
unkown
page readonly
1108000
heap
page read and write
C4400570000
unkown
page read and write
7EE000
stack
page read and write
994000
unkown
page read and write
6E4000
heap
page read and write
5690000
heap
page read and write
4DC0000
heap
page read and write
37AC000
unkown
page read and write
ED5000
unkown
page read and write
C440256C000
unkown
page read and write
7FF5ED872000
unkown
page readonly
4C60000
unkown
page read and write
6F1000
heap
page read and write
1A61E010000
unkown
page read and write
A375000
unkown
page read and write
7B5000
heap
page read and write
564000
heap
page read and write
880000
unkown
page readonly
3351000
heap
page read and write
1325000
heap
page read and write
3351000
heap
page read and write
810000
heap
page read and write
4E674000
direct allocation
page read and write
FCD5000
unkown
page read and write
C4400374000
unkown
page read and write
6CC26000
unkown
page readonly
C5A0000
unkown
page read and write
3351000
heap
page read and write
C4402920000
unkown
page read and write
7FF5ED818000
unkown
page readonly
180000
heap
page read and write
3351000
heap
page read and write
18C000
stack
page read and write
8DAC000
unkown
page read and write
C4401B04000
unkown
page read and write
7FF5ED7E9000
unkown
page readonly
9A6000
unkown
page read and write
40B000
unkown
page write copy
2AE0000
heap
page read and write
1DE23654000
heap
page read and write
7FF5ED5CE000
unkown
page readonly
4B93000
unkown
page read and write
8BF0000
unkown
page readonly
3800000
unkown
page readonly
1DE26126000
heap
page read and write
7FF5EDA38000
unkown
page readonly
8198FE000
unkown
page readonly
4B90000
unkown
page read and write
C44027C0000
unkown
page read and write
3512000
heap
page read and write
3151000
unkown
page read and write
37B0000
unkown
page read and write
3CC57FE000
unkown
page read and write
DE0000
unkown
page readonly
1DE2361A000
heap
page read and write
19A0000
unkown
page readonly
564000
heap
page read and write
6C9000
heap
page read and write
C4400AA4000
unkown
page read and write
1DE235F0000
heap
page read and write
56B70000
direct allocation
page read and write
8F1000
unkown
page readonly
D80000
unkown
page read and write
53E000
unkown
page read and write
ECE000
unkown
page readonly
565000
heap
page read and write
46E64000
direct allocation
page read and write
7869000
unkown
page read and write
7FF5ED445000
unkown
page readonly
564000
heap
page read and write
12D0000
unkown
page readonly
3CB0FFE000
unkown
page readonly
CA9000
stack
page read and write
7FF5ED6B9000
unkown
page readonly
906E000
stack
page read and write
C440089C000
unkown
page read and write
1A622ED0000
unkown
page read and write
C44012E8000
unkown
page read and write
56ABC000
direct allocation
page read and write
EC0000
unkown
page readonly
979C000
unkown
page read and write
564000
heap
page read and write
C6F4000
unkown
page read and write
1302000
heap
page read and write
C94000
heap
page read and write
7FF5ED7E0000
unkown
page readonly
33E0000
unkown
page readonly
FCD0000
unkown
page read and write
4AC000
unkown
page readonly
7FF5ED9D6000
unkown
page readonly
7FF5ED3CE000
unkown
page readonly
FCCF000
unkown
page read and write
564000
heap
page read and write
7FF5ED1D6000
unkown
page readonly
564000
heap
page read and write
6C8A1000
unkown
page execute read
7FF5ED4B0000
unkown
page readonly
6F920000
unkown
page readonly
6E4000
heap
page read and write
C4400A40000
unkown
page read and write
37F6000
unkown
page read and write
1A61C920000
unkown
page read and write
190000
heap
page read and write
3CB97FB000
unkown
page read and write
121AE000
stack
page read and write
3E0000
unkown
page readonly
A361000
unkown
page read and write
46ECC000
direct allocation
page read and write
6CC0B000
unkown
page read and write
3351000
heap
page read and write
1480000
heap
page read and write
A3BE000
unkown
page read and write
A4A1000
unkown
page read and write
3CBDFFE000
unkown
page readonly
388C000
stack
page read and write
5006000
heap
page read and write
9875000
unkown
page read and write
ED5000
unkown
page read and write
41B000
unkown
page readonly
C4402194000
unkown
page read and write
E10000
heap
page read and write
C4400118000
unkown
page read and write
A33E000
unkown
page read and write
C4402710000
unkown
page read and write
1A62397F000
unkown
page read and write
1A61E890000
unkown
page read and write
E00000
unkown
page readonly
19A000
stack
page read and write
7884000
unkown
page read and write
C4401EE4000
unkown
page read and write
3351000
heap
page read and write
1320000
heap
page read and write
35201000
direct allocation
page read and write
3351000
heap
page read and write
3CC27FE000
unkown
page read and write
B6A0000
heap
page read and write
404000
unkown
page readonly
69F000
unkown
page read and write
41CD4000
direct allocation
page read and write
1DE26129000
heap
page read and write
3351000
heap
page read and write
C44020D4000
unkown
page read and write
10C60000
unclassified section
page read and write
26CE000
stack
page read and write
7FF5ED933000
unkown
page readonly
27F0000
heap
page read and write
97A9000
unkown
page read and write
3CA3E51000
unkown
page read and write
C20000
unkown
page readonly
1C0000
unkown
page readonly
308A000
stack
page read and write
414B000
stack
page read and write
7FF5ED674000
unkown
page readonly
10D0000
heap
page read and write
C4400590000
unkown
page read and write
F976000
unkown
page read and write
FCEE000
unkown
page read and write
1DE23612000
heap
page read and write
5590000
unkown
page write copy
564000
heap
page read and write
7FF5ED697000
unkown
page readonly
120000
unkown
page readonly
77F000290000
direct allocation
page read and write
1E623CD0000
heap
page read and write
1A61E677000
unkown
page read and write
BD1D000
stack
page read and write
9D61000
unkown
page read and write
1DE23629000
heap
page read and write
A4B8000
unkown
page read and write
3351000
heap
page read and write
C4402A30000
unkown
page read and write
7FF5ED810000
unkown
page readonly
564000
heap
page read and write
3E4C4000
direct allocation
page read and write
534000
heap
page read and write
C88B000
unkown
page read and write
10DD000
unkown
page readonly
FD0E000
unkown
page read and write
7FF5ED9B8000
unkown
page readonly
FD0E000
unkown
page read and write
A502000
unkown
page read and write
2E0D8000
direct allocation
page read and write
27A0000
unkown
page readonly
4C50000
unkown
page read and write
7FF5ED793000
unkown
page readonly
7FF5ED64F000
unkown
page readonly
14B0000
unkown
page readonly
3351000
heap
page read and write
4530000
direct allocation
page read and write
1DE26033000
heap
page read and write
6F942000
unkown
page readonly
B20000
unkown
page readonly
564000
heap
page read and write
216C000
direct allocation
page read and write
3351000
heap
page read and write
3CA3E77000
unkown
page read and write
136400334000
unkown
page read and write
7FF5ED8C6000
unkown
page readonly
C4401840000
unkown
page read and write
987D000
unkown
page read and write
47F0000
heap
page read and write
DBA000
stack
page read and write
1A620FD3000
unkown
page read and write
20CE000
stack
page read and write
7FF5ED850000
unkown
page readonly
564000
heap
page read and write
C5E000
unkown
page read and write
3351000
heap
page read and write
FD05000
unkown
page read and write
40D000
unkown
page readonly
6AB000
heap
page read and write
46EC4000
direct allocation
page read and write
1A61E3F0000
unkown
page read and write
280E000
stack
page read and write
3351000
heap
page read and write
419C00201000
unkown
page read and write
77F00020C000
direct allocation
page read and write
7FF5ED9CC000
unkown
page readonly
7FF5ED4DF000
unkown
page readonly
F91000
unkown
page readonly
3351000
heap
page read and write
35C50000
direct allocation
page read and write
7FF5ED2A9000
unkown
page readonly
F20000
unkown
page readonly
1DE26144000
heap
page read and write
C440209C000
unkown
page read and write
7DF4F3041000
unkown
page execute read
1490000
unkown
page read and write
C44014B4000
unkown
page read and write
7FF5ED41C000
unkown
page readonly
56A5C000
direct allocation
page read and write
C44001B4000
unkown
page read and write
3351000
heap
page read and write
1A6238AA000
unkown
page read and write
564000
heap
page read and write
3CAB7FB000
unkown
page read and write
3CA3E79000
unkown
page read and write
1DE24F50000
heap
page read and write
1A6205E4000
unkown
page read and write
35C28000
direct allocation
page read and write
2CC0000
unkown
page readonly
35CB0000
direct allocation
page read and write
EC0000
unkown
page readonly
C44027B0000
unkown
page read and write
4F5E000
stack
page read and write
923C000
stack
page read and write
7FF5ED7D6000
unkown
page readonly
CC9000
heap
page read and write
8EA000
stack
page read and write
6CA70000
unkown
page readonly
3351000
heap
page read and write
98A8000
unkown
page read and write
7FF5ED864000
unkown
page readonly
ECE000
unkown
page readonly
C4402070000
unkown
page read and write
7A0000
unkown
page readonly
FCD0000
unkown
page read and write
14B0000
unkown
page readonly
C44006EF000
unkown
page read and write
170000
unkown
page readonly
56BD4000
direct allocation
page read and write
4B8B000
unkown
page read and write
7FF5ED692000
unkown
page readonly
7D20000
unkown
page readonly
47E0000
heap
page read and write
2670000
unkown
page readonly
ED7000
unkown
page readonly
49A000
unkown
page read and write
FCDB000
unkown
page read and write
FD21000
unkown
page read and write
4C18000
unkown
page read and write
1DE2606E000
heap
page read and write
C44006FC000
unkown
page read and write
15AF000
unkown
page read and write
C41F000
stack
page read and write
D50000
unkown
page readonly
9869000
unkown
page read and write
B170000
unkown
page readonly
3351000
heap
page read and write
1250000
heap
page read and write
28E0000
heap
page read and write
4E6E0000
direct allocation
page read and write
C440082C000
unkown
page read and write
77F000408000
direct allocation
page read and write
E91000
unkown
page readonly
56B14000
direct allocation
page read and write
C4402401000
unkown
page read and write
C9E000
stack
page read and write
ED7000
unkown
page readonly
3351000
heap
page read and write
F51000
unkown
page execute read
3351000
heap
page read and write
C4402048000
unkown
page read and write
1A61E6AD000
unkown
page read and write
93BB000
stack
page read and write
1A6223B0000
unkown
page read and write
10C63000
unclassified section
page read and write
4FC64000
direct allocation
page read and write
47F4000
heap
page read and write
EC1000
unkown
page execute read
819CFE000
unkown
page readonly
8E0000
unkown
page read and write
7FF5ED885000
unkown
page readonly
F874000
unkown
page read and write
1DE26085000
heap
page read and write
7FF5ED91A000
unkown
page readonly
CD0000
heap
page read and write
C440161C000
unkown
page read and write
3351000
heap
page read and write
FE90000
heap
page read and write
7FF5ED3CE000
unkown
page readonly
3351000
heap
page read and write
3351000
heap
page read and write
564000
heap
page read and write
7FF5ED97A000
unkown
page readonly
3E4D0000
direct allocation
page read and write
FCE0000
unkown
page read and write
4FC30000
direct allocation
page read and write
C4402B18000
unkown
page read and write
EC0000
unkown
page readonly
6CC26000
unkown
page readonly
3351000
heap
page read and write
C440149C000
unkown
page read and write
7E0000
heap
page read and write
C61000
unkown
page readonly
88EE000
stack
page read and write
3D4D000
stack
page read and write
7FF5ED28E000
unkown
page readonly
1451000
unkown
page readonly
C4400CC0000
unkown
page read and write
7FF5ED800000
unkown
page readonly
3570000
unkown
page readonly
5390000
heap
page read and write
3CA3E4B000
unkown
page read and write
2560000
heap
page read and write
46EBC000
direct allocation
page read and write
EC0000
unkown
page readonly
C6BF000
unkown
page read and write
2794000
heap
page read and write
3E4D4000
direct allocation
page read and write
3C0000
unkown
page readonly
C4401994000
unkown
page read and write
495E000
stack
page read and write
6D7000
heap
page read and write
28E0000
heap
page read and write
7FF5ED73D000
unkown
page readonly
56B9C000
direct allocation
page read and write
C88B000
unkown
page read and write
CA04000
unkown
page read and write
37A0000
unkown
page read and write
7D1000
unkown
page execute read
45AE000
stack
page read and write
56B24000
direct allocation
page read and write
7FF5ED6DB000
unkown
page readonly
8D86000
unkown
page read and write
1A61E800000
unkown
page readonly
592000235000
unkown
page read and write
7D53000
unkown
page read and write
922000
heap
page read and write
9A10000
unkown
page read and write
2E004000
direct allocation
page read and write
3E454000
direct allocation
page read and write
4C50000
unkown
page read and write
C4400A14000
unkown
page read and write
1308000
heap
page read and write
564000
heap
page read and write
3CA3E81000
unkown
page read and write
10F5000
heap
page read and write
9439000
stack
page read and write
1A620F4A000
unkown
page read and write
7847000
unkown
page read and write
307C000
stack
page read and write
1A61E7D0000
unkown
page read and write
EC0000
unkown
page readonly
6CC06000
unkown
page read and write
8730000
unkown
page read and write
1E622230000
heap
page read and write
564000
heap
page read and write
12F4000
heap
page read and write
23414000
direct allocation
page read and write
41CB8000
direct allocation
page read and write
C4401030000
unkown
page read and write
2960000
heap
page read and write
7A0000
heap
page read and write
3CBBFFE000
unkown
page readonly
12F0000
unkown
page read and write
3351000
heap
page read and write
7FF5ED644000
unkown
page readonly
3351000
heap
page read and write
1A622E74000
unkown
page read and write
FD0E000
unkown
page read and write
1364002BC000
unkown
page read and write
CEE000
heap
page read and write
420000
heap
page read and write
564000
heap
page read and write
7FF5EDA70000
unkown
page readonly
7FF5ED1BC000
unkown
page readonly
37F9000
unkown
page read and write
1A61E020000
unkown
page read and write
75B000
stack
page read and write
3351000
heap
page read and write
6B7000
heap
page read and write
149F000
unkown
page read and write
7FF5ED516000
unkown
page readonly
7FFE000
stack
page read and write
C440071C000
unkown
page read and write
9A6000
unkown
page read and write
1240000
heap
page read and write
3800000
unkown
page readonly
7FF5ED295000
unkown
page readonly
7FF67BA6B000
unkown
page readonly
D00000
unkown
page readonly
251E000
stack
page read and write
41D18000
direct allocation
page read and write
6BB32000
unkown
page read and write
8EC4000
unkown
page read and write
3351000
heap
page read and write
2E5D000
stack
page read and write
3351000
heap
page read and write
B2AF000
stack
page read and write
3CA3E45000
unkown
page read and write
C49E000
stack
page read and write
531000
heap
page read and write
C440385C000
unkown
page read and write
9873000
unkown
page read and write
C54A000
unkown
page read and write
3CB67FE000
unkown
page read and write
C4400F50000
unkown
page read and write
2DD0000
unkown
page readonly
419C00280000
unkown
page read and write
41C8C000
direct allocation
page read and write
3351000
heap
page read and write
785B000
unkown
page read and write
404000
unkown
page readonly
F9B4000
unkown
page read and write
3CAD7F9000
unkown
page read and write
C44020E0000
unkown
page read and write
41CC0000
direct allocation
page read and write
7FF5ED4FD000
unkown
page readonly
1A61C910000
unkown
page readonly
C440080C000
unkown
page read and write
7FF5ED5A8000
unkown
page readonly
2790000
heap
page read and write
3351000
heap
page read and write
27F4000
heap
page read and write
C4402AB8000
trusted library allocation
page read and write
C4402014000
unkown
page read and write
54EE000
stack
page read and write
C4400F8C000
unkown
page read and write
278F000
stack
page read and write
69F000
unkown
page read and write
3CA3E39000
unkown
page read and write
920000
unkown
page readonly
1308000
heap
page read and write
565000
heap
page read and write
3351000
heap
page read and write
D60000
unkown
page read and write
355F000
stack
page read and write
564000
heap
page read and write
D71000
unkown
page readonly
37B0000
unkown
page read and write
7FF5ECED2000
unkown
page readonly
1DE24FF2000
heap
page read and write
6F0000
unkown
page readonly
7FF5ED28E000
unkown
page readonly
3351000
heap
page read and write
3351000
heap
page read and write
9AE0000
heap
page read and write
7FF5ED337000
unkown
page readonly
4FD000
stack
page read and write
7900000
unkown
page read and write
56B98000
direct allocation
page read and write
2A30000
unkown
page readonly
7FF67B586000
unkown
page readonly
9138000
stack
page read and write
F50000
heap
page read and write
3351000
heap
page read and write
1A61AAF0000
unkown
page read and write
2343C000
direct allocation
page read and write
3E550000
direct allocation
page read and write
23434000
direct allocation
page read and write
564000
heap
page read and write
960000
heap
page read and write
7FF5ED9C6000
unkown
page readonly
F00000
unkown
page readonly
564000
heap
page read and write
261E000
stack
page read and write
11B0000
unkown
page readonly
C4E000
unkown
page read and write
8185FE000
stack
page read and write
7FF5ED93E000
unkown
page readonly
6EA000
heap
page read and write
C4401FF4000
unkown
page read and write
7FF5ED915000
unkown
page readonly
3351000
heap
page read and write
3351000
heap
page read and write
3CAE7FB000
unkown
page read and write
366F000
stack
page read and write
56B60000
direct allocation
page read and write
7F0000
unkown
page read and write
C57F000
unkown
page read and write
C4402201000
unkown
page read and write
2C30003E0000
direct allocation
page read and write
51EB000
stack
page read and write
CAE5000
unkown
page read and write
3351000
heap
page read and write
B5AE000
stack
page read and write
C4400E24000
unkown
page read and write
C44006B8000
unkown
page read and write
1F5000
unkown
page execute and read and write
C44018C0000
unkown
page read and write
1A61E67D000
unkown
page read and write
1A623969000
unkown
page read and write
A323000
unkown
page read and write
97AD000
unkown
page read and write
7FF5ED990000
unkown
page readonly
C4A0000
unkown
page read and write
6F920000
unkown
page readonly
C557000
unkown
page read and write
C44010B8000
unkown
page read and write
4CC0000
unkown
page read and write
C893000
unkown
page read and write
3351000
heap
page read and write
3351000
heap
page read and write
3351000
heap
page read and write
C4400601000
unkown
page read and write
2A30000
unkown
page readonly
379E000
unkown
page read and write
3CB27FE000
unkown
page read and write
C4401F40000
unkown
page read and write
3351000
heap
page read and write
C50A000
unkown
page read and write
C4402A8C000
unkown
page read and write
C4400844000
unkown
page read and write
1A61E900000
unkown
page read and write
23464000
direct allocation
page read and write
4B56000
unkown
page read and write
580000
heap
page read and write
1DE23660000
heap
page read and write
56AB8000
direct allocation
page read and write
1325000
heap
page read and write
8199FB000
stack
page read and write
7FF5ED73D000
unkown
page readonly
565000
heap
page read and write
C4401EC8000
unkown
page read and write
3CAF7FB000
unkown
page read and write
1440000
unkown
page read and write
4E6B0000
direct allocation
page read and write
2840000
unkown
page readonly
409000
unkown
page readonly
564000
heap
page read and write
F933000
unkown
page read and write
100000
unkown
page readonly
3351000
heap
page read and write
3180000
unkown
page read and write
D80000
unkown
page read and write
8B60000
unkown
page readonly
4C4B000
unkown
page read and write
7FF5ED94A000
unkown
page readonly
1DE24F2D000
heap
page read and write
7FF5ED9D2000
unkown
page readonly
E81C000
stack
page read and write
564000
heap
page read and write
3351000
heap
page read and write
56B60000
direct allocation
page read and write
4BA6000
unkown
page read and write
25BFCB000
stack
page read and write
C4400DD4000
unkown
page read and write
1308000
heap
page read and write
B150000
unkown
page read and write
C440056A000
unkown
page read and write
565000
heap
page read and write
7F0000
unkown
page read and write
C4403554000
trusted library allocation
page read and write
91000
stack
page read and write
1A622A01000
unkown
page read and write
35C60000
direct allocation
page read and write
3CB6FFE000
unkown
page readonly
AAF6000
unkown
page read and write
F50000
unkown
page readonly
7FF5ED3EA000
unkown
page readonly
C44028F4000
unkown
page read and write
C44008DC000
unkown
page read and write
E69B000
stack
page read and write
3CCEFFE000
unkown
page readonly
1100000
heap
page read and write
ED5000
unkown
page read and write
1364000
heap
page read and write
241C000
heap
page read and write
C4400928000
unkown
page read and write
56BB0000
direct allocation
page read and write
8108000
stack
page read and write
5D604000
direct allocation
page read and write
C4400EB4000
unkown
page read and write
C4401FB8000
unkown
page read and write
1364002DC000
unkown
page read and write
41C34000
direct allocation
page read and write
A375000
unkown
page read and write
56B64000
direct allocation
page read and write
2360000
unkown
page readonly
4D0F000
stack
page read and write
6F832000
unkown
page readonly
7FF5ED41C000
unkown
page readonly
C44014D0000
unkown
page read and write
7FF5ED40D000
unkown
page readonly
C4400A82000
unkown
page read and write
13C0000
unkown
page readonly
46E78000
direct allocation
page read and write
D0B000
heap
page read and write
7B0000
unkown
page readonly
7FF5ED6B9000
unkown
page readonly
BD98000
stack
page read and write
C4401FAC000
unkown
page read and write
C4402064000
unkown
page read and write
136400220000
unkown
page read and write
2345C000
direct allocation
page read and write
A19F000
stack
page read and write
FCE0000
unkown
page read and write
3351000
heap
page read and write
7FF67B578000
unkown
page write copy
56B48000
direct allocation
page read and write
56E000
heap
page read and write
7863000
unkown
page read and write
10F60000
unkown
page read and write
564000
heap
page read and write
1CA000
unkown
page execute and read and write
56AF8000
direct allocation
page read and write
2C3000278000
direct allocation
page read and write
3351000
heap
page read and write
670000
heap
page read and write
1A622000000
unkown
page read and write
564000
heap
page read and write
32D0000
heap
page read and write
1500000
heap
page read and write
F51000
unkown
page execute read
77F00029C000
direct allocation
page read and write
7FF5ED503000
unkown
page readonly
23468000
direct allocation
page read and write
3030000
heap
page read and write
ECE000
unkown
page readonly
1364006D4000
unkown
page read and write
2168000
direct allocation
page read and write
41D08000
direct allocation
page read and write
564000
heap
page read and write
C4400A60000
unkown
page read and write
C4401530000
unkown
page read and write
A4AB000
unkown
page read and write
7847000
unkown
page read and write
C44000C4000
unkown
page read and write
E80000
unkown
page read and write
C846000
unkown
page read and write
1A620C8C000
unkown
page readonly
7FF5ED556000
unkown
page readonly
41D05000
direct allocation
page read and write
7DF4F3061000
unkown
page execute read
1DE2502C000
heap
page read and write
1060000
heap
page read and write
3CA77FE000
unkown
page read and write
C4402918000
unkown
page read and write
1DE2615D000
heap
page read and write
5920002BC000
unkown
page read and write
C84D000
unkown
page read and write
FCE0000
unkown
page read and write
3351000
heap
page read and write
B8C0000
unkown
page readonly
C4400C3C000
unkown
page read and write
3351000
heap
page read and write
3351000
heap
page read and write
4E648000
direct allocation
page read and write
5F20A000
direct allocation
page read and write
89C0000
unkown
page read and write
C4400D08000
unkown
page read and write
ECE000
unkown
page readonly
C4400D0E000
unkown
page read and write
56B88000
direct allocation
page read and write
4E694000
direct allocation
page read and write
D00000
unkown
page readonly
7C80000
unkown
page read and write
2CC0000
unkown
page readonly
B10D000
stack
page read and write
4B78000
unkown
page read and write
C44012C0000
unkown
page read and write
1E6222A0000
heap
page read and write
398C000
stack
page read and write
1120000
heap
page read and write
44B0000
direct allocation
page read and write
7FF5ED265000
unkown
page readonly
9DED000
stack
page read and write
35C24000
direct allocation
page read and write
C4401C01000
unkown
page read and write
C440000C000
unkown
page read and write
C4400FF8000
unkown
page read and write
C440016C000
unkown
page read and write
14B000
stack
page read and write
801000
unkown
page readonly
982D000
unkown
page read and write
5090000
heap
page read and write
AADB000
unkown
page read and write
9E6C000
stack
page read and write
1115000
unkown
page write copy
35224000
direct allocation
page read and write
2C3000268000
direct allocation
page read and write
1A622F85000
unkown
page read and write
356E000
stack
page read and write
A379000
unkown
page read and write
3351000
heap
page read and write
2E024000
direct allocation
page read and write
1A61E527000
unkown
page read and write
BDA0000
unkown
page readonly
7FFE000
stack
page read and write
3351000
heap
page read and write
23F0000
direct allocation
page read and write
564000
heap
page read and write
C561000
unkown
page read and write
C4401F1C000
unkown
page read and write
9138000
stack
page read and write
C4402BCC000
unkown
page read and write
C516000
unkown
page read and write
8D8C000
unkown
page read and write
3351000
heap
page read and write
ED5000
unkown
page read and write
72E000
heap
page read and write
3350000
heap
page read and write
ED7000
unkown
page readonly
2C3000334000
direct allocation
page read and write
369F000
stack
page read and write
12E3000
heap
page read and write
1300000
unkown
page read and write
6CA56000
unkown
page readonly
534000
heap
page read and write
7FF5ED86B000
unkown
page readonly
56B24000
direct allocation
page read and write
56B04000
direct allocation
page read and write
C4400294000
trusted library allocation
page read and write
1DE24F53000
heap
page read and write
995000
unkown
page write copy
4CC0000
unkown
page read and write
3CCBFFE000
unkown
page readonly
C20000
unkown
page readonly
19D000
stack
page read and write
1DE236A7000
heap
page read and write
234BC000
direct allocation
page read and write
C4401A40000
unkown
page read and write
7B0000
unkown
page readonly
7E11000
unkown
page read and write
5470000
heap
page read and write
C4402BA8000
unkown
page read and write
51AD000
stack
page read and write
419C002FF000
unkown
page read and write
77F0002C8000
direct allocation
page read and write
5920002B0000
unkown
page read and write
110000
unkown
page readonly
410000
heap
page read and write
9977000
unkown
page read and write
136400210000
unkown
page read and write
6B0000
unkown
page readonly
7FF5ED9E1000
unkown
page readonly
234E0000
direct allocation
page read and write
1301000
heap
page read and write
B728000
stack
page read and write
47E8000
heap
page read and write
2C30003F0000
direct allocation
page read and write
234D0000
direct allocation
page read and write
69F000
unkown
page read and write
56B64000
direct allocation
page read and write
41C01000
direct allocation
page read and write
7FF5EDA53000
unkown
page readonly
20D0000
heap
page read and write
3351000
heap
page read and write
A80000
direct allocation
page read and write
7FF5ED3DA000
unkown
page readonly
C4402AB4000
unkown
page read and write
401000
unkown
page execute read
2140000
direct allocation
page read and write
C44021B0000
unkown
page read and write
36F0000
unkown
page readonly
1A622F6E000
unkown
page read and write
3351000
heap
page read and write
7CC0000
unkown
page readonly
41C0C000
direct allocation
page read and write
986B000
unkown
page read and write
F80000
unkown
page read and write
411000
unkown
page readonly
EC1000
unkown
page execute read
9660000
unkown
page read and write
C440382C000
unkown
page read and write
564000
heap
page read and write
C8E000
stack
page read and write
6F810000
unkown
page readonly
C44003B4000
unkown
page read and write
2E02C000
direct allocation
page read and write
3351000
heap
page read and write
9893000
unkown
page read and write
56B48000
direct allocation
page read and write
2AE0000
unkown
page readonly
C440295C000
trusted library allocation
page read and write
A37B000
unkown
page read and write
359F000
stack
page read and write
200F000
stack
page read and write
6C8A0000
unkown
page readonly
CD2000
heap
page read and write
7FF5ED94A000
unkown
page readonly
C4400F2C000
unkown
page read and write
AAF6000
unkown
page read and write
A33E000
unkown
page read and write
1A620C17000
unkown
page read and write
89E0000
unkown
page read and write
A433000
unkown
page read and write
C4400300000
unkown
page read and write
A4AB000
unkown
page read and write
2411000
heap
page read and write
96E000
stack
page read and write
F8BB000
unkown
page read and write
564000
heap
page read and write
5F39E000
direct allocation
page read and write
56B24000
direct allocation
page read and write
54BE000
stack
page read and write
3351000
heap
page read and write
7FF5ED975000
unkown
page readonly
8860000
unkown
page read and write
C440200C000
unkown
page read and write
3351000
heap
page read and write
10B0000
heap
page read and write
C5A3000
unkown
page read and write
564000
heap
page read and write
7FF5ED9CA000
unkown
page readonly
7FF5ED85F000
unkown
page readonly
564000
heap
page read and write
7FF5EDA53000
unkown
page readonly
13B8000
heap
page read and write
77F000270000
direct allocation
page read and write
3351000
heap
page read and write
7FF5ED625000
unkown
page readonly
6B7000
heap
page read and write
12F0000
unkown
page read and write
ECE000
unkown
page readonly
1A61E3B0000
unkown
page read and write
6BB1D000
unkown
page read and write
7FF5ED743000
unkown
page readonly
3659000
stack
page read and write
2017000
heap
page read and write
3351000
heap
page read and write
15C8000
heap
page read and write
1364002D0000
unkown
page read and write
C4401EF4000
unkown
page read and write
59200024C000
unkown
page read and write
FD04000
unkown
page read and write
564000
heap
page read and write
7FF5ED74A000
unkown
page readonly
5F050000
direct allocation
page read and write
F8C9000
unkown
page read and write
A37B000
unkown
page read and write
3351000
heap
page read and write
2CBF000
stack
page read and write
1A61E980000
unkown
page read and write
3351000
heap
page read and write
10D8000
heap
page read and write
B8C0000
unkown
page readonly
2280000
heap
page read and write
7FF5ED87D000
unkown
page readonly
3351000
heap
page read and write
2411000
heap
page read and write
7FF5ED1CB000
unkown
page readonly
2AB0000
unkown
page readonly
A479000
unkown
page read and write
3CA8FFE000
unkown
page readonly
4FCC0000
direct allocation
page read and write
C4402724000
unkown
page read and write
7FF5ED449000
unkown
page readonly
118E000
stack
page read and write
7A0000
unkown
page readonly
8860000
unkown
page read and write
E9B000
stack
page read and write
3CADFFE000
unkown
page readonly
FCE0000
unkown
page read and write
30F0000
direct allocation
page read and write
6CC2A000
unkown
page readonly
1364007D8000
unkown
page read and write
56A74000
direct allocation
page read and write
9A000
stack
page read and write
2E040000
direct allocation
page read and write
10DD000
unkown
page readonly
564000
heap
page read and write
3351000
heap
page read and write
D30000
unkown
page readonly
ED7000
unkown
page readonly
B60000
unkown
page readonly
3351000
heap
page read and write
564000
heap
page read and write
56BB0000
direct allocation
page read and write
69E000
unkown
page execute and write copy
7FF5ED409000
unkown
page readonly
3E500000
direct allocation
page read and write
3351000
heap
page read and write
FD05000
unkown
page read and write
81A1FB000
stack
page read and write
AADB000
unkown
page read and write
818E000
stack
page read and write
35270000
direct allocation
page read and write
CBD7000
unkown
page read and write
3351000
heap
page read and write
1E622200000
heap
page read and write
C44006DC000
unkown
page read and write
7D1000
unkown
page execute read
527000
heap
page read and write
C44027B2000
unkown
page read and write
3351000
heap
page read and write
7FF5ED956000
unkown
page readonly
977A000
unkown
page read and write
2C30003DC000
direct allocation
page read and write
520000
heap
page read and write
650000
heap
page read and write
3351000
heap
page read and write
13A8000
heap
page read and write
7FF5EDA08000
unkown
page readonly
419C00215000
unkown
page read and write
1DE26118000
heap
page read and write
56A01000
direct allocation
page read and write
22A0000
heap
page read and write
1280000
unkown
page readonly
58E000
heap
page read and write
56B88000
direct allocation
page read and write
564000
heap
page read and write
1A61E8B7000
unkown
page read and write
11CE000
stack
page read and write
C962000
unkown
page read and write
69B000
unkown
page execute and read and write
C44015D0000
unkown
page read and write
2128000
direct allocation
page read and write
6DAD000
stack
page read and write
FD0E000
unkown
page read and write
CA7C000
unkown
page read and write
2194000
direct allocation
page read and write
2AE0000
unkown
page readonly
3E490000
direct allocation
page read and write
C6C9000
unkown
page read and write
9E0000
unkown
page readonly
1DE26055000
heap
page read and write
7FF5ED62F000
unkown
page readonly
769F000
stack
page read and write
AF0000
heap
page read and write
3CBD7FC000
unkown
page read and write
1329000
heap
page read and write
C4400C54000
unkown
page read and write
3CA3E61000
unkown
page read and write
23B0000
heap
page read and write
419C0029C000
unkown
page read and write
7FF5ED3A7000
unkown
page readonly
234F8000
direct allocation
page read and write
7FF5ED814000
unkown
page readonly
C4400C0C000
unkown
page read and write
23494000
direct allocation
page read and write
3580000
unkown
page readonly
AAF2000
unkown
page read and write
7DDF000
stack
page read and write
C4400948000
unkown
page read and write
3351000
heap
page read and write
B2E000
heap
page read and write
7FF5EDA11000
unkown
page readonly
1DE260A6000
heap
page read and write
7FF5ED42B000
unkown
page readonly
C40000
unkown
page readonly
1518000
heap
page read and write
3351000
heap
page read and write
56A84000
direct allocation
page read and write
F10000
unkown
page read and write
C44002F3000
unkown
page read and write
A479000
unkown
page read and write
77F0002DC000
direct allocation
page read and write
401000
unkown
page execute read
1A622F5D000
unkown
page read and write
56B64000
direct allocation
page read and write
7C0000
heap
page read and write
1A61D3E4000
unkown
page read and write
3351000
heap
page read and write
1CA000
unkown
page execute and read and write
85E000
unkown
page read and write
A323000
unkown
page read and write
540000
unkown
page read and write
2340C000
direct allocation
page read and write
C4401B24000
unkown
page read and write
7FF5EDA31000
unkown
page readonly
3351000
heap
page read and write
7D40000
unkown
page read and write
C516000
unkown
page read and write
1A61E867000
unkown
page read and write
540000
unkown
page read and write
C4401F24000
unkown
page read and write
2E0C8000
direct allocation
page read and write
7B0000
unkown
page readonly
F30000
heap
page read and write
6BA97000
unkown
page readonly
A49E000
unkown
page read and write
3CB37FE000
unkown
page read and write
46E48000
direct allocation
page read and write
C4402958000
unkown
page read and write
37D2000
unkown
page read and write
3D72000
heap
page read and write
5009000
heap
page read and write
49C000
unkown
page read and write
1A622ECE000
unkown
page read and write
32D0000
heap
page read and write
C512000
unkown
page read and write
C440288C000
unkown
page read and write
3351000
heap
page read and write
1325000
heap
page read and write
920000
unkown
page readonly
1610000
unkown
page readonly
564000
heap
page read and write
7FF5ED265000
unkown
page readonly
3351000
heap
page read and write
3351000
heap
page read and write
12FE000
unkown
page read and write
1329000
heap
page read and write
CAEF000
unkown
page read and write
3351000
heap
page read and write
5920002F8000
unkown
page read and write
F20000
heap
page read and write
C7C5000
unkown
page read and write
7FF5ED9C6000
unkown
page readonly
C4400BAD000
unkown
page read and write
C4400CFC000
unkown
page read and write
418000
unkown
page write copy
3351000
heap
page read and write
25C3FE000
stack
page read and write
C4402B70000
unkown
page read and write
3590000
unkown
page read and write
56B0C000
direct allocation
page read and write
25D5FE000
stack
page read and write
3CA5FFE000
unkown
page readonly
46AF000
stack
page read and write
7FF5EDA11000
unkown
page readonly
3CAEFFE000
unkown
page readonly
F51000
unkown
page execute read
4C0D000
stack
page read and write
35214000
direct allocation
page read and write
46ED4000
direct allocation
page read and write
C44019A4000
trusted library allocation
page read and write
FCE8000
unkown
page read and write
C4403748000
unkown
page read and write
54A0000
heap
page read and write
18A0000
unkown
page readonly
1DE2612F000
heap
page read and write
3351000
heap
page read and write
1660000
unkown
page readonly
49B000
unkown
page write copy
7FF67B561000
unkown
page readonly
419C002B4000
unkown
page read and write
B640000
unkown
page read and write
CAEF000
unkown
page read and write
91F000
unkown
page read and write
7FF5ED937000
unkown
page readonly
530000
heap
page read and write
565000
heap
page read and write
1210000
unkown
page readonly
987B000
unkown
page read and write
C4401334000
trusted library allocation
page read and write
B20000
unkown
page readonly
C4400A78000
unkown
page read and write
592000284000
unkown
page read and write
1A621048000
unkown
page read and write
10F0000
heap
page read and write
7FF5ED867000
unkown
page readonly
7FF67B510000
unkown
page readonly
23478000
direct allocation
page read and write
1610000
unkown
page readonly
564000
heap
page read and write
4FCD0000
direct allocation
page read and write
C4401098000
unkown
page read and write
EC0000
unkown
page readonly
D50000
unkown
page readonly
1A61D407000
unkown
page read and write
7FF5ED39E000
unkown
page readonly
3351000
heap
page read and write
27C0000
unkown
page read and write
7FF5ED4FD000
unkown
page readonly
3D76000
heap
page read and write
35290000
direct allocation
page read and write
1A61D3A0000
unkown
page read and write
35CA0000
direct allocation
page read and write
AB16000
unkown
page read and write
1325000
heap
page read and write
46E5C000
direct allocation
page read and write
359E000
stack
page read and write
1308000
heap
page read and write
136400734000
unkown
page read and write
EC0000
unkown
page readonly
C4400E01000
unkown
page read and write
3CB57FE000
unkown
page read and write
7869000
unkown
page read and write
46E4C000
direct allocation
page read and write
34E8000
stack
page read and write
7FF5ED505000
unkown
page readonly
564000
heap
page read and write
564000
heap
page read and write
564000
heap
page read and write
78A0000
unkown
page read and write
EF0000
unkown
page readonly
418000
unkown
page read and write
564000
heap
page read and write
C44026D4000
unkown
page read and write
51DE000
stack
page read and write
7FF5D1CCD000
unkown
page readonly
D34000
heap
page read and write
3ACF000
stack
page read and write
4FC38000
direct allocation
page read and write
1505000
heap
page read and write
10C0000
unkown
page readonly
18A000
stack
page read and write
C4402D54000
unkown
page read and write
3E53C000
direct allocation
page read and write
7FF5ED93E000
unkown
page readonly
E40000
heap
page read and write
C440104C000
unkown
page read and write
4E614000
direct allocation
page read and write
3CAA7FD000
unkown
page read and write
52C8000
heap
page read and write
7D0000
unkown
page readonly
7FF5ED5C1000
unkown
page readonly
6E07000
heap
page read and write
D30000
heap
page read and write
7FF5ED40D000
unkown
page readonly
3CC47FE000
unkown
page read and write
3351000
heap
page read and write
3351000
heap
page read and write
B40000
unkown
page readonly
3290000
unkown
page read and write
7FF5ED33F000
unkown
page readonly
C92D000
unkown
page read and write
C4402601000
unkown
page read and write
CBC3000
unkown
page read and write
7FF5ED586000
unkown
page readonly
C6D8000
unkown
page read and write
1095000
stack
page read and write
34E9000
stack
page read and write
7FF5ED9D2000
unkown
page readonly
151C000
unkown
page readonly
419C002C8000
unkown
page read and write
564000
heap
page read and write
3351000
heap
page read and write
136E000
heap
page read and write
EF0000
unkown
page readonly
CBB7000
unkown
page read and write
3351000
heap
page read and write
53EF000
stack
page read and write
3351000
heap
page read and write
C4402228000
unkown
page read and write
89C0000
unkown
page read and write
C51E000
unkown
page read and write
8BF000
stack
page read and write
2C3000294000
direct allocation
page read and write
3351000
heap
page read and write
46EAC000
direct allocation
page read and write
12DD000
heap
page read and write
6CA5A000
unkown
page readonly
C557000
unkown
page read and write
C440296C000
unkown
page read and write
56B98000
direct allocation
page read and write
E6F000
unkown
page read and write
7E11000
unkown
page read and write
47EF000
heap
page read and write
41C40000
direct allocation
page read and write
C6F4000
unkown
page read and write
411000
unkown
page readonly
136400238000
unkown
page read and write
7DF4F3061000
unkown
page execute read
1200000
heap
page read and write
BFF000
stack
page read and write
A50B000
unkown
page read and write
1DE23601000
heap
page read and write
504E000
stack
page read and write
1DE2502B000
heap
page read and write
C52C000
unkown
page read and write
7FF5EDA0B000
unkown
page readonly
1364002C8000
unkown
page read and write
110000
unkown
page readonly
58E000
stack
page read and write
9F9C000
stack
page read and write
C4401A90000
unkown
page read and write
FCE8000
unkown
page read and write
EC1000
unkown
page execute read
3CB7FFE000
unkown
page readonly
8A6E000
stack
page read and write
CAA000
stack
page read and write
C4402740000
unkown
page read and write
FCEE000
unkown
page read and write
6DA000
heap
page read and write
C4401F00000
trusted library allocation
page read and write
3351000
heap
page read and write
3351000
heap
page read and write
3351000
heap
page read and write
1DE26080000
heap
page read and write
8194FE000
unkown
page readonly
3351000
heap
page read and write
C440148C000
unkown
page read and write
930000
unkown
page readonly
35CB8000
direct allocation
page read and write
ED5000
unkown
page read and write
AF0C000
stack
page read and write
730000
heap
page read and write
C4400201000
unkown
page read and write
112D000
unkown
page readonly
7FF5ED48A000
unkown
page readonly
FCD7000
unkown
page read and write
6A3000
heap
page read and write
93BE000
stack
page read and write
740000
unkown
page readonly
B10000
heap
page read and write
12DC000
unkown
page readonly
C4D0000
unkown
page read and write
7950000
unkown
page read and write
C440288C000
trusted library allocation
page read and write
F7E000
unkown
page read and write
B190000
unkown
page read and write
97B5000
unkown
page read and write
3C0000
unkown
page readonly
E79D000
stack
page read and write
95E000
stack
page read and write
2C3000638000
direct allocation
page read and write
4D0000
heap
page read and write
352B8000
direct allocation
page read and write
69E000
unkown
page execute and write copy
7FF5ED4BB000
unkown
page readonly
677E000
stack
page read and write
FCE0000
unkown
page read and write
7AC000
stack
page read and write
C4400498000
unkown
page read and write
3E47C000
direct allocation
page read and write
7FF5ED5EB000
unkown
page readonly
735000
unkown
page execute and read and write
352CC000
direct allocation
page read and write
D80000
unkown
page read and write
7857000
unkown
page read and write
9F99000
stack
page read and write
7FF5ED33F000
unkown
page readonly
3351000
heap
page read and write
7FF5ED279000
unkown
page readonly
C44005B0000
unkown
page read and write
1230000
heap
page read and write
3351000
heap
page read and write
B150000
unkown
page read and write
C4400092000
unkown
page read and write
1080000
unkown
page readonly
A491000
unkown
page read and write
3B0D000
stack
page read and write
C4401544000
unkown
page read and write
C44006BD000
unkown
page read and write
1A61E690000
unkown
page read and write
C544000
unkown
page read and write
994000
unkown
page read and write
3CA87FE000
unkown
page read and write
3998000
heap
page read and write
2360000
unkown
page readonly
564000
heap
page read and write
B10000
unkown
page readonly
3351000
heap
page read and write
1A6239B8000
unkown
page read and write
3CB2FFE000
unkown
page readonly
1210000
heap
page read and write
1C0000
unkown
page readonly
A37D000
unkown
page read and write
F10000
unkown
page read and write
C440290C000
unkown
page read and write
C4401484000
unkown
page read and write
610000
unkown
page readonly
C44005A0000
unkown
page read and write
564000
heap
page read and write
3797000
unkown
page read and write
12E1000
heap
page read and write
B00A000
stack
page read and write
3351000
heap
page read and write
C4402134000
unkown
page read and write
C4400A68000
unkown
page read and write
6CC0B000
unkown
page read and write
C440063C000
unkown
page read and write
1DE24FF2000
heap
page read and write
C44015B8000
unkown
page read and write
3351000
heap
page read and write
2390000
heap
page read and write
3351000
heap
page read and write
740000
heap
page read and write
FFE000
stack
page read and write
56A2B000
direct allocation
page read and write
3CB8FFE000
unkown
page readonly
3CC9FFE000
unkown
page readonly
1A61E04B000
unkown
page read and write
131B000
heap
page read and write
7AE000
stack
page read and write
C4401994000
trusted library allocation
page read and write
56B60000
direct allocation
page read and write
10B8000
heap
page read and write
130000
heap
page read and write
3351000
heap
page read and write
1324000
heap
page read and write
564000
heap
page read and write
8FB9000
stack
page read and write
97C3000
unkown
page read and write
3CBC7FC000
unkown
page read and write
56B54000
direct allocation
page read and write
2190000
direct allocation
page read and write
2410000
heap
page read and write
FCD0000
unkown
page read and write
979C000
unkown
page read and write
3351000
heap
page read and write
2118000
direct allocation
page read and write
266F000
stack
page read and write
C440004C000
unkown
page read and write
EC1000
unkown
page execute read
41C6C000
direct allocation
page read and write
7865000
unkown
page read and write
136E000
heap
page read and write
3CA3E47000
unkown
page read and write
564000
heap
page read and write
BAF9000
stack
page read and write
564000
heap
page read and write
C4402A01000
unkown
page read and write
C4400874000
unkown
page read and write
6500000
heap
page read and write
7A0000
unkown
page readonly
987F000
unkown
page read and write
7FF5ED342000
unkown
page readonly
2540000
heap
page read and write
46C0000
remote allocation
page read and write
3E4CC000
direct allocation
page read and write
EC1000
unkown
page execute read
47C0000
heap
page read and write
47AF000
stack
page read and write
2C300032C000
direct allocation
page read and write
1A61E06C000
unkown
page read and write
C4401774000
unkown
page read and write
3CC87FA000
unkown
page read and write
3220000
unkown
page readonly
25A4000
heap
page read and write
564000
heap
page read and write
1DE24F30000
heap
page read and write
1F5000
unkown
page execute and read and write
111F000
unkown
page read and write
B8B0000
unkown
page read and write
4BD7000
heap
page read and write
7FF5ED642000
unkown
page readonly
2EA0000
unkown
page readonly
9D61000
unkown
page read and write
995000
unkown
page write copy
7FF67B511000
unkown
page execute read
C44028E4000
unkown
page read and write
3CA3E3B000
unkown
page read and write
23484000
direct allocation
page read and write
C44036D8000
unkown
page read and write
35C7C000
direct allocation
page read and write
1A61C930000
unkown
page read and write
3351000
heap
page read and write
7FF5ED80C000
unkown
page readonly
3351000
heap
page read and write
7DF4F3031000
unkown
page execute read
C6F8000
unkown
page read and write
F8C9000
unkown
page read and write
9AD000
unkown
page readonly
18C0000
unkown
page readonly
7FF5ED7FD000
unkown
page readonly
3795000
unkown
page read and write
C4400B1C000
unkown
page read and write
46EF4000
direct allocation
page read and write
3351000
heap
page read and write
C44002B4000
unkown
page read and write
1114000
unkown
page write copy
332F000
stack
page read and write
ECE000
unkown
page readonly
3351000
heap
page read and write
7FF5ED847000
unkown
page readonly
C440008E000
unkown
page read and write
1A62112A000
unkown
page read and write
7FF67B57D000
unkown
page readonly
3351000
heap
page read and write
136400404000
unkown
page read and write
8193FE000
stack
page read and write
C4400520000
unkown
page read and write
7FF5ED65C000
unkown
page readonly
557E000
heap
page read and write
B140000
unkown
page readonly
1510000
heap
page read and write
3E558000
direct allocation
page read and write
56B64000
direct allocation
page read and write
7FF5ED200000
unkown
page readonly
208E000
stack
page read and write
79D3000
unkown
page read and write
2830000
heap
page read and write
1A61AB00000
heap
page read and write
92C000
unkown
page readonly
3CB1FFE000
unkown
page readonly
EF0000
heap
page read and write
996000
unkown
page read and write
56ABC000
direct allocation
page read and write
C4401801000
unkown
page read and write
35260000
direct allocation
page read and write
A433000
unkown
page read and write
8210000
unkown
page read and write
7FF5ED872000
unkown
page readonly
10D0000
heap
page read and write
3351000
heap
page read and write
7FF5ED9A6000
unkown
page readonly
565000
heap
page read and write
B728000
stack
page read and write
623D000
stack
page read and write
136C000
heap
page read and write
1E6222AF000
heap
page read and write
4E65C000
direct allocation
page read and write
7FF5ED625000
unkown
page readonly
6B760000
unkown
page readonly
FD20000
unkown
page read and write
7FF5ED71E000
unkown
page readonly
151F000
stack
page read and write
6CA71000
unkown
page execute read
3CC5FFE000
unkown
page readonly
28E4000
heap
page read and write
23474000
direct allocation
page read and write
3360000
heap
page read and write
D10000
heap
page read and write
C4D0000
unkown
page read and write
1B0000
heap
page read and write
F51000
unkown
page execute read
5920002F0000
unkown
page read and write
2C3000308000
direct allocation
page read and write
3351000
heap
page read and write
3351000
heap
page read and write
3CC67FE000
unkown
page read and write
7CD0000
unkown
page read and write
50E000
stack
page read and write
1A620AE3000
unkown
page read and write
13B8000
heap
page read and write
C4400565000
unkown
page read and write
564000
heap
page read and write
EC1000
unkown
page execute read
75A000
stack
page read and write
C4400ABC000
unkown
page read and write
1518000
heap
page read and write
C563000
unkown
page read and write
2E90000
heap
page read and write
D20000
unkown
page readonly
400000
unkown
page readonly
564000
heap
page read and write
C57F000
unkown
page read and write
C44002E0000
unkown
page read and write
64E0000
heap
page read and write
7FF5ED986000
unkown
page readonly
6F7E000
stack
page read and write
EFC000
unkown
page readonly
3351000
heap
page read and write
C4402238000
unkown
page read and write
7B80000
unkown
page read and write
2AB0000
unkown
page readonly
AFB000
stack
page read and write
C54A000
unkown
page read and write
59200026C000
unkown
page read and write
1A622F01000
unkown
page read and write
352A0000
direct allocation
page read and write
7FF5ED68F000
unkown
page readonly
CA10000
unkown
page read and write
FCFE000
unkown
page read and write
C9DF000
unkown
page read and write
EC1000
unkown
page execute read
1A61E8AD000
unkown
page read and write
171000
unkown
page execute and read and write
C92D000
unkown
page read and write
687F000
stack
page read and write
7859000
unkown
page read and write
C440383C000
unkown
page read and write
B08D000
stack
page read and write
B62F000
stack
page read and write
3E524000
direct allocation
page read and write
3F0D000
stack
page read and write
790000
unkown
page readonly
CBA000
heap
page read and write
3351000
heap
page read and write
76A0000
unkown
page read and write
E30000
heap
page read and write
F9F4000
unkown
page read and write
3351000
heap
page read and write
7FF5ED961000
unkown
page readonly
8197FB000
stack
page read and write
9885000
unkown
page read and write
AB1B000
unkown
page read and write
7FF5ED9ED000
unkown
page readonly
8210000
unkown
page read and write
37F6000
unkown
page read and write
131E000
heap
page read and write
7E60000
unkown
page read and write
BEC000
stack
page read and write
C4400D48000
unkown
page read and write
3351000
heap
page read and write
1A6238A4000
unkown
page read and write
3351000
heap
page read and write
56B7C000
direct allocation
page read and write
4FCAC000
direct allocation
page read and write
1D0000
unkown
page readonly
136400728000
unkown
page read and write
C52C000
unkown
page read and write
7FF5ED2A9000
unkown
page readonly
3351000
heap
page read and write
D10000
unkown
page readonly
7FF5ED97E000
unkown
page readonly
9877000
unkown
page read and write
7FF5ED503000
unkown
page readonly
C4402BD4000
unkown
page read and write
79D3000
unkown
page read and write
C44002A4000
unkown
page read and write
C440034C000
trusted library allocation
page read and write
1040000
heap
page read and write
546000
heap
page read and write
C4401F00000
trusted library allocation
page read and write
1A622EF5000
unkown
page read and write
5560000
heap
page read and write
C4401464000
unkown
page read and write
A39B000
unkown
page read and write
3351000
heap
page read and write
C440040C000
unkown
page read and write
46E0C000
direct allocation
page read and write
8730000
unkown
page read and write
7FF5ED68C000
unkown
page readonly
7E50000
unkown
page readonly
1A622EEC000
unkown
page read and write
1FE000
stack
page read and write
56BB0000
direct allocation
page read and write
4B50000
unkown
page read and write
1E623CD5000
heap
page read and write
112D000
unkown
page readonly
994000
unkown
page read and write
7E50000
unkown
page readonly
1A6237F0000
heap
page read and write
7FF5ED750000
unkown
page readonly
E9E000
stack
page read and write
3351000
heap
page read and write
36D5000
stack
page read and write
FD16000
unkown
page read and write
37F9000
unkown
page read and write
6CA71000
unkown
page execute read
56B64000
direct allocation
page read and write
564000
heap
page read and write
DE0000
heap
page read and write
2790000
heap
page read and write
400000
unkown
page readonly
77F000210000
direct allocation
page read and write
3E414000
direct allocation
page read and write
AE0000
heap
page read and write
564000
heap
page read and write
1AF000
stack
page read and write
10F00000
unkown
page read and write
12D0000
unkown
page readonly
131E000
heap
page read and write
C544000
unkown
page read and write
8FD000
stack
page read and write
6BB37000
unkown
page execute read
7FF5ED7CF000
unkown
page readonly
56A68000
direct allocation
page read and write
3351000
heap
page read and write
715C000
stack
page read and write
56BB4000
direct allocation
page read and write
3351000
heap
page read and write
3522C000
direct allocation
page read and write
ED7000
unkown
page readonly
1A6238E4000
unkown
page read and write
23424000
direct allocation
page read and write
77F000258000
direct allocation
page read and write
4D5C000
stack
page read and write
3351000
heap
page read and write
131E000
heap
page read and write
7FF5ED5C5000
unkown
page readonly
D00000
unkown
page readonly
3351000
heap
page read and write
7FF5ED9AE000
unkown
page readonly
58B0000
heap
page read and write
76A0000
unkown
page read and write
896B000
stack
page read and write
76C0000
unkown
page read and write
ECE000
unkown
page readonly
AB5000
heap
page read and write
9879000
unkown
page read and write
C84D000
unkown
page read and write
ED7000
unkown
page readonly
45A000
heap
page read and write
1A61C950000
heap
page read and write
1A622F64000
unkown
page read and write
C4400A28000
unkown
page read and write
3351000
heap
page read and write
7FF5ED885000
unkown
page readonly
7FF67B586000
unkown
page readonly
3795000
unkown
page read and write
2E044000
direct allocation
page read and write
3CB4FFE000
unkown
page readonly
1A622350000
unkown
page read and write
B3C000
unkown
page readonly
1DE26071000
heap
page read and write
7FF5ED64F000
unkown
page readonly
530000
heap
page read and write
CEE000
heap
page read and write
41CC0000
direct allocation
page read and write
FCE8000
unkown
page read and write
419C0026C000
unkown
page read and write
FCE8000
unkown
page read and write
6CA70000
unkown
page readonly
C4401A2C000
unkown
page read and write
C4402BB8000
unkown
page read and write
C50000
heap
page read and write
7FF5ED445000
unkown
page readonly
C4400CEC000
unkown
page read and write
E61D000
stack
page read and write
E00000
heap
page read and write
414000
unkown
page readonly
3351000
heap
page read and write
7FF5ED990000
unkown
page readonly
544000
heap
page read and write
3351000
heap
page read and write
C4400B28000
unkown
page read and write
77F0002AC000
direct allocation
page read and write
1DE23619000
heap
page read and write
419C002D0000
unkown
page read and write
C44026E0000
unkown
page read and write
C4403710000
unkown
page read and write
3CC1FFE000
unkown
page readonly
3C0E000
stack
page read and write
1A61E407000
unkown
page read and write
136A000
unkown
page read and write
3CB87FC000
unkown
page read and write
4BDB000
heap
page read and write
3351000
heap
page read and write
3351000
heap
page read and write
3318000
stack
page read and write
6E3E000
stack
page read and write
CBB7000
unkown
page read and write
564000
heap
page read and write
56B38000
direct allocation
page read and write
67A000
stack
page read and write
565000
heap
page read and write
1B5000
heap
page read and write
136400244000
unkown
page read and write
3748000
unkown
page read and write
4809000
heap
page read and write
C4401994000
trusted library allocation
page read and write
707F000
stack
page read and write
4FC58000
direct allocation
page read and write
9B60000
unkown
page readonly
FD21000
unkown
page read and write
C4401AC8000
unkown
page read and write
3CBF7FD000
unkown
page read and write
3CC37FC000
unkown
page read and write
C4400C4F000
unkown
page read and write
C4400CA4000
unkown
page read and write
B2E000
heap
page read and write
23B0000
heap
page read and write
7FF5ED3D6000
unkown
page readonly
3351000
heap
page read and write
A50B000
unkown
page read and write
CA0000
unkown
page read and write
ED5000
unkown
page read and write
DE0000
unkown
page readonly
2C3000238000
direct allocation
page read and write
8DA0000
unkown
page read and write
3CA3E33000
unkown
page read and write
3E4B0000
direct allocation
page read and write
3351000
heap
page read and write
1DE26147000
heap
page read and write
401000
unkown
page execute read
564000
heap
page read and write
7FF5ED8AC000
unkown
page readonly
96DF000
unkown
page read and write
EC0000
unkown
page readonly
EC0000
unkown
page readonly
C44012F8000
unkown
page read and write
6CC2A000
unkown
page readonly
419C00234000
unkown
page read and write
3351000
heap
page read and write
ECE000
unkown
page readonly
8A6E000
stack
page read and write
FCFE000
unkown
page read and write
1310000
unkown
page read and write
56B98000
direct allocation
page read and write
7D1000
unkown
page execute read
965C000
stack
page read and write
419C002C0000
unkown
page read and write
1A623884000
unkown
page read and write
3351000
heap
page read and write
E90000
unkown
page read and write
7D0000
unkown
page read and write
7FF5ED286000
unkown
page readonly
D40000
unkown
page readonly
1DE26072000
heap
page read and write
C4400058000
unkown
page read and write
784A000
unkown
page read and write
B30000
heap
page read and write
ECE000
unkown
page readonly
B2F000
unkown
page read and write
3C4E000
stack
page read and write
C440107F000
unkown
page read and write
7861000
unkown
page read and write
ECE000
unkown
page readonly
C4400F40000
unkown
page read and write
1DE25100000
heap
page read and write
A19F000
stack
page read and write
7FF5ED3F3000
unkown
page readonly
6CC2A000
unkown
page readonly
7FF5ED39B000
unkown
page readonly
1A61ACE0000
unkown
page readonly
3351000
heap
page read and write
1F5000
unkown
page execute and read and write
3351000
heap
page read and write
89A0000
unkown
page read and write
7FF5ED81B000
unkown
page readonly
2F00000
unkown
page readonly
2C3000230000
direct allocation
page read and write
C440014C000
unkown
page read and write
7852000
unkown
page read and write
3CA3E5F000
unkown
page read and write
C4401B14000
trusted library allocation
page read and write
986F000
unkown
page read and write
AFC000
stack
page read and write
2340C000
direct allocation
page read and write
1A61E190000
unkown
page readonly
3351000
heap
page read and write
CA10000
unkown
page read and write
3DBE000
stack
page read and write
3351000
heap
page read and write
1A622E8B000
unkown
page read and write
77DE000
stack
page read and write
ED5000
unkown
page read and write
9885000
unkown
page read and write
4FC000
stack
page read and write
4AC000
unkown
page readonly
9A5B000
unkown
page read and write
C4401128000
unkown
page read and write
3351000
heap
page read and write
10B0000
heap
page read and write
FCD5000
unkown
page read and write
564000
heap
page read and write
2250000
heap
page read and write
7FF5ED59E000
unkown
page readonly
7FF5ED62F000
unkown
page readonly
15B0000
unkown
page readonly
5590000
unkown
page write copy
2C300033C000
direct allocation
page read and write
C4400E54000
unkown
page read and write
346E000
stack
page read and write
2C3000404000
direct allocation
page read and write
564000
heap
page read and write
ED5000
unkown
page read and write
564000
heap
page read and write
3351000
heap
page read and write
3CC2FFE000
unkown
page readonly
41CCC000
direct allocation
page read and write
FCFE000
unkown
page read and write
3351000
heap
page read and write
2C30002D8000
direct allocation
page read and write
CFC000
stack
page read and write
ECE000
unkown
page readonly
DFC000
stack
page read and write
7FF5ED4F3000
unkown
page readonly
7FF5ED530000
unkown
page readonly
1A61C900000
unkown
page readonly
F91000
unkown
page readonly
C4403710000
unkown
page read and write
7FF5ED5CE000
unkown
page readonly
1A6223C0000
unkown
page read and write
102E000
stack
page read and write
3351000
heap
page read and write
56B6C000
direct allocation
page read and write
75C000
stack
page read and write
C4402948000
unkown
page read and write
7FF5ED76D000
unkown
page readonly
4FC24000
direct allocation
page read and write
2394000
heap
page read and write
1325000
heap
page read and write
4ACE000
stack
page read and write
7DF4F3050000
unkown
page readonly
2151000
direct allocation
page read and write
6C187000
unkown
page execute read
FC60000
unkown
page read and write
77F00026C000
direct allocation
page read and write
9815000
unkown
page read and write
136400780000
unkown
page read and write
7FF67B561000
unkown
page readonly
8208000
stack
page read and write
2C3000628000
direct allocation
page read and write
2E4F000
stack
page read and write
917000
unkown
page execute and write copy
EBC000
stack
page read and write
3351000
heap
page read and write
7FF5ED956000
unkown
page readonly
2DCF000
stack
page read and write
C4400BCC000
unkown
page read and write
ECE000
unkown
page readonly
6F921000
unkown
page execute read
3738000
unkown
page read and write
7F40000
unkown
page readonly
1220000
unkown
page readonly
F40000
unkown
page readonly
4F0000
heap
page read and write
1325000
heap
page read and write
C440295C000
unkown
page read and write
FCEE000
unkown
page read and write
7F30000
unkown
page read and write
35254000
direct allocation
page read and write
C4402D6C000
unkown
page read and write
2214000
direct allocation
page read and write
C4F000
stack
page read and write
FCA0000
unkown
page read and write
EC1000
unkown
page execute read
BCA000
stack
page read and write
C4402B7C000
unkown
page read and write
3351000
heap
page read and write
1DE23609000
heap
page read and write
1DE260F1000
heap
page read and write
12D0000
unkown
page readonly
1510000
heap
page read and write
F20000
unkown
page readonly
4BE3000
unkown
page read and write
3351000
heap
page read and write
F20000
unkown
page readonly
AAF2000
unkown
page read and write
454E000
stack
page read and write
1DE25012000
heap
page read and write
A49E000
unkown
page read and write
C4402028000
unkown
page read and write
3D7000
unkown
page execute and write copy
1A61AC21000
unkown
page readonly
69F000
unkown
page write copy
77F000280000
direct allocation
page read and write
1440000
unkown
page read and write
B2A000
heap
page read and write
1A61E05C000
unkown
page read and write
6C8A0000
unkown
page readonly
C44007BC000
unkown
page read and write
1A61E035000
unkown
page read and write
3351000
heap
page read and write
9AA000
stack
page read and write
3351000
heap
page read and write
7FF5ED800000
unkown
page readonly
2E0CC000
direct allocation
page read and write
C440091C000
unkown
page read and write
D40000
unkown
page readonly
1A61EA20000
unkown
page read and write
C44015F4000
unkown
page read and write
FD0E000
unkown
page read and write
C440158C000
unkown
page read and write
39DF000
stack
page read and write
B30000
heap
page read and write
1116000
unkown
page read and write
7FF5ED1CF000
unkown
page readonly
1A623843000
unkown
page read and write
5000000
heap
page read and write
C440075C000
unkown
page read and write
2920000
heap
page read and write
47F4000
heap
page read and write
78AD000
unkown
page read and write
161C000
unkown
page readonly
C4401EB4000
unkown
page read and write
3351000
heap
page read and write
ED5000
unkown
page read and write
7FF5ED844000
unkown
page readonly
4E664000
direct allocation
page read and write
76C000
heap
page read and write
6CC06000
unkown
page read and write
1A61D431000
unkown
page read and write
1DE260F1000
heap
page read and write
1240000
heap
page read and write
A3BE000
unkown
page read and write
35CB8000
direct allocation
page read and write
B20000
heap
page read and write
12890000
unkown
page read and write
4B93000
unkown
page read and write
7DF4F3030000
unkown
page readonly
56B88000
direct allocation
page read and write
C44002FB000
unkown
page read and write
419C00290000
unkown
page read and write
C4401AF0000
unkown
page read and write
1DE24F20000
heap
page read and write
3580000
unkown
page readonly
7FF5ED714000
unkown
page readonly
76C0000
unkown
page read and write
75A000
stack
page read and write
56A3C000
direct allocation
page read and write
3CAFFFE000
unkown
page readonly
8DE000
unkown
page read and write
3351000
heap
page read and write
2220000
direct allocation
page execute and read and write
C4401428000
unkown
page read and write
2390000
unkown
page read and write
3D6F000
stack
page read and write
BC9B000
stack
page read and write
C4400DE0000
unkown
page read and write
1365000
heap
page read and write
3351000
heap
page read and write
3CC4FFE000
unkown
page readonly
7FF5ED996000
unkown
page readonly
1DE26137000
heap
page read and write
46C0000
remote allocation
page read and write
9DED000
stack
page read and write
564000
heap
page read and write
C440017C000
unkown
page read and write
3351000
heap
page read and write
C44037E4000
unkown
page read and write
C4402B88000
unkown
page read and write
ED7000
unkown
page readonly
C4400064000
unkown
page read and write
C4402934000
unkown
page read and write
FCE0000
unkown
page read and write
7A8000
heap
page read and write
54B000
heap
page read and write
7FF5ED669000
unkown
page readonly
7FF5ED9FF000
unkown
page readonly
3CCD7FC000
unkown
page read and write
F01C000
stack
page read and write
4F10000
heap
page read and write
E40000
heap
page read and write
7FF5ED426000
unkown
page readonly
3180000
unkown
page read and write
EC1000
unkown
page execute read
25DB000
heap
page read and write
7D1000
unkown
page execute read
7FF5ED77E000
unkown
page readonly
3D7000
unkown
page execute and write copy
3CCAFFE000
unkown
page readonly
136E000
heap
page read and write
56C24000
direct allocation
page read and write
7FF5ED65C000
unkown
page readonly
100000
heap
page read and write
450000
heap
page read and write
6F942000
unkown
page readonly
C44012B4000
unkown
page read and write
FCCD000
unkown
page read and write
D60000
unkown
page readonly
C4401410000
unkown
page read and write
1DE23611000
heap
page read and write
FD04000
unkown
page read and write
C4400040000
unkown
page read and write
2BB0000
heap
page read and write
C4400F98000
unkown
page read and write
35234000
direct allocation
page read and write
C4402788000
unkown
page read and write
6F942000
unkown
page readonly
C4400340000
unkown
page read and write
1DE23698000
heap
page read and write
3351000
heap
page read and write
663C000
stack
page read and write
E20000
unkown
page readonly
41C04000
direct allocation
page read and write
3351000
heap
page read and write
7FF5ED928000
unkown
page readonly
2E05C000
direct allocation
page read and write
56B48000
direct allocation
page read and write
DE0000
unkown
page readonly
46E01000
direct allocation
page read and write
7DF4F3040000
unkown
page readonly
1114000
unkown
page read and write
30E0000
direct allocation
page read and write
995000
unkown
page write copy
7FF5ED43A000
unkown
page readonly
18A0000
unkown
page readonly
1A61EAE0000
unkown
page read and write
7FF5ED7E0000
unkown
page readonly
23468000
direct allocation
page read and write
11C0000
unkown
page readonly
7FF5ED5F7000
unkown
page readonly
3351000
heap
page read and write
7FF5ED697000
unkown
page readonly
1A622E11000
unkown
page read and write
AB51000
unkown
page read and write
1325000
heap
page read and write
3351000
heap
page read and write
3351000
heap
page read and write
14B0000
unkown
page readonly
AB14000
unkown
page read and write
658000
heap
page read and write
BDF000
unkown
page write copy
7FF67B510000
unkown
page readonly
7A1F000
stack
page read and write
3351000
heap
page read and write
FCFE000
unkown
page read and write
A32A000
unkown
page read and write
8720000
unkown
page readonly
41C28000
direct allocation
page read and write
610000
unkown
page readonly
531000
heap
page read and write
C811000
unkown
page read and write
1DE235B9000
heap
page read and write
91B5000
stack
page read and write
7FF5ED495000
unkown
page readonly
C503000
unkown
page read and write
6CC06000
unkown
page read and write
868000
heap
page read and write
1030000
heap
page read and write
ED5000
unkown
page read and write
C440042C000
unkown
page read and write
7FF5ED9F2000
unkown
page readonly
3240000
unkown
page read and write
C4400F7C000
unkown
page read and write
7F2E000
stack
page read and write
7DF4F3071000
unkown
page execute read
C4402CC0000
unkown
page read and write
C44008EC000
unkown
page read and write
7FF5ED81B000
unkown
page readonly
C6BF000
unkown
page read and write
CC2000
heap
page read and write
3CB47FD000
unkown
page read and write
1303000
heap
page read and write
1270000
heap
page read and write
C4400310000
unkown
page read and write
785D000
unkown
page read and write
B10000
unkown
page readonly
1364006FC000
unkown
page read and write
56B6C000
direct allocation
page read and write
27CF000
stack
page read and write
502C000
heap
page read and write
650000
heap
page read and write
30E0000
direct allocation
page read and write
EC1000
unkown
page execute read
140000
heap
page read and write
550000
heap
page read and write
56B60000
direct allocation
page read and write
1A61AB8E000
heap
page read and write
7FF5ED821000
unkown
page readonly
818E000
stack
page read and write
1A623966000
unkown
page read and write
F7C000
stack
page read and write
65A000
stack
page read and write
7FF5ED7E9000
unkown
page readonly
70A000
unkown
page execute and read and write
7FF5ED50A000
unkown
page readonly
2374000
heap
page read and write
CA6000
heap
page read and write
7FF5ED939000
unkown
page readonly
C44015AC000
unkown
page read and write
1A61AAB0000
unkown
page read and write
7FF5ED8C1000
unkown
page readonly
7FF5ED9D6000
unkown
page readonly
7FF5ED87D000
unkown
page readonly
3351000
heap
page read and write
8183FE000
stack
page read and write
733000
heap
page read and write
56B7C000
direct allocation
page read and write
3351000
heap
page read and write
2E0B0000
direct allocation
page read and write
9ED000
stack
page read and write
16C0000
unkown
page readonly
C4400790000
unkown
page read and write
7D20000
unkown
page readonly
C6C1000
unkown
page read and write
2C300062C000
direct allocation
page read and write
1364002E0000
unkown
page read and write
4FC74000
direct allocation
page read and write
C440277C000
unkown
page read and write
560000
unkown
page read and write
B8B0000
unkown
page read and write
7FF5ED7CF000
unkown
page readonly
1DE25D80000
heap
page read and write
1311000
heap
page read and write
7FF5ED853000
unkown
page readonly
2EF0000
heap
page read and write
6F942000
unkown
page readonly
C4402B64000
unkown
page read and write
3351000
heap
page read and write
5B0000
heap
page read and write
2C3000244000
direct allocation
page read and write
C44027CC000
unkown
page read and write
1DE235B0000
heap
page read and write
1DE23611000
heap
page read and write
C4401AD4000
unkown
page read and write
E5D000
unkown
page read and write
8184FE000
unkown
page readonly
FB1000
unkown
page readonly
ED7000
unkown
page readonly
564000
heap
page read and write
23424000
direct allocation
page read and write
7FF5ED93B000
unkown
page readonly
3351000
heap
page read and write
2117000
direct allocation
page read and write
996000
unkown
page read and write
3351000
heap
page read and write
D5E000
unkown
page read and write
3351000
heap
page read and write
37A8000
unkown
page read and write
7FF5ED939000
unkown
page readonly
171000
unkown
page execute and read and write
1A620A3D000
unkown
page read and write
1A6238D6000
unkown
page read and write
7FF5ED755000
unkown
page readonly
4FC60000
direct allocation
page read and write
A4A1000
unkown
page read and write
C440067C000
unkown
page read and write
141E000
stack
page read and write
DD0000
unkown
page readonly
400000
unkown
page readonly
C4403401000
unkown
page read and write
EBE000
stack
page read and write
401000
unkown
page execute read
37F2000
unkown
page read and write
7FF5ECED2000
unkown
page readonly
FE92000
heap
page read and write
7CE0000
unkown
page read and write
6B8000
heap
page read and write
C4400294000
trusted library allocation
page read and write
2344C000
direct allocation
page read and write
564000
heap
page read and write
C44001AC000
unkown
page read and write
C4401F00000
trusted library allocation
page read and write
7FF5ED71B000
unkown
page readonly
E60000
unkown
page read and write
13B0000
heap
page read and write
9A6000
unkown
page read and write
3CA9FFE000
unkown
page readonly
419C0027C000
unkown
page read and write
1320000
heap
page read and write
A32A000
unkown
page read and write
7FF5ED46A000
unkown
page readonly
2BB0000
heap
page read and write
7D0000
unkown
page readonly
E00000
unkown
page readonly
3CC6FFE000
unkown
page readonly
6BB1E000
unkown
page write copy
10B0000
heap
page read and write
13F0000
heap
page read and write
977A000
unkown
page read and write
24C0000
unkown
page readonly
56B88000
direct allocation
page read and write
3351000
heap
page read and write
564000
heap
page read and write
500B000
heap
page read and write
C440220C000
unkown
page read and write
C4400128000
unkown
page read and write
7FF5D1CD4000
unkown
page readonly
136C000
heap
page read and write
B40000
unkown
page readonly
56B24000
direct allocation
page read and write
7953000
unkown
page read and write
C4401F30000
unkown
page read and write
ED5000
unkown
page read and write
6A8000
heap
page read and write
46C0000
heap
page read and write
564000
heap
page read and write
136400230000
unkown
page read and write
97C3000
unkown
page read and write
2C300033C000
direct allocation
page read and write
FD1B000
unkown
page read and write
3659000
stack
page read and write
356E000
stack
page read and write
3351000
heap
page read and write
7FF5ED9BE000
unkown
page readonly
3351000
heap
page read and write
3E524000
direct allocation
page read and write
3351000
heap
page read and write
9A10000
unkown
page read and write
DB9000
stack
page read and write
7CD0000
unkown
page read and write
FCFE000
unkown
page read and write
3351000
heap
page read and write
C4401082000
unkown
page read and write
EA0000
unkown
page read and write
3E405000
direct allocation
page read and write
C4401F80000
unkown
page read and write
95D000
unkown
page readonly
564000
heap
page read and write
3E45C000
direct allocation
page read and write
1DE260A5000
heap
page read and write
742E000
stack
page read and write
987D000
unkown
page read and write
7FF5ED961000
unkown
page readonly
7D40000
unkown
page read and write
C4401ABC000
unkown
page read and write
6D0000
unkown
page readonly
FCDA000
unkown
page read and write
F874000
unkown
page read and write
12F4000
heap
page read and write
2840000
unkown
page readonly
C4402CF0000
unkown
page read and write
ED7000
unkown
page readonly
2E054000
direct allocation
page read and write
40D000
unkown
page readonly
780000
unkown
page readonly
DDC000
stack
page read and write
16CC000
unkown
page readonly
7FF67B578000
unkown
page write copy
7FF5ED42B000
unkown
page readonly
3CB5FFE000
unkown
page readonly
C962000
unkown
page read and write
7FF5ED4DF000
unkown
page readonly
278F000
stack
page read and write
ED7000
unkown
page readonly
35CE0000
direct allocation
page read and write
C964000
unkown
page read and write
C4401EDC000
unkown
page read and write
9F0000
unkown
page readonly
C4401728000
unkown
page read and write
C44014DC000
unkown
page read and write
C08A000
stack
page read and write
136400378000
unkown
page read and write
C4400C18000
unkown
page read and write
76AE000
stack
page read and write
4BC9000
unkown
page read and write
B60000
unkown
page readonly
160000
heap
page read and write
ECE000
unkown
page readonly
35C40000
direct allocation
page read and write
CA1C000
unkown
page read and write
D30000
heap
page read and write
56C04000
direct allocation
page read and write
7FF5ED8E7000
unkown
page readonly
564000
heap
page read and write
56B48000
direct allocation
page read and write
7E1000
unkown
page readonly
C4402160000
unkown
page read and write
7FF5ED2A4000
unkown
page readonly
1A621E00000
unkown
page read and write
401000
unkown
page execute read
2EE0000
heap
page read and write
C44004DC000
unkown
page read and write
1A620BF7000
unkown
page read and write
1DE26080000
heap
page read and write
7C90000
unkown
page read and write
E7B000
stack
page read and write
7865000
unkown
page read and write
ED5000
unkown
page read and write
C44000D0000
unkown
page read and write
7B0000
heap
page read and write
4FCA8000
direct allocation
page read and write
3E48C000
direct allocation
page read and write
2374000
heap
page read and write
7FF5ED6A5000
unkown
page readonly
FC0000
unkown
page read and write
1A620C20000
unkown
page read and write
5E0000
heap
page read and write
4CD0000
unkown
page read and write
1DE260D1000
heap
page read and write
1212E000
stack
page read and write
C29000
heap
page read and write
3351000
heap
page read and write
7FF5ED8E2000
unkown
page readonly
A491000
unkown
page read and write
7FF67B578000
unkown
page read and write
1510000
unkown
page readonly
27A0000
unkown
page readonly
7FF5ED68C000
unkown
page readonly
533D000
stack
page read and write
7FF5ED4C6000
unkown
page readonly
7D00000
unkown
page readonly
31E0000
heap
page read and write
2C3000210000
direct allocation
page read and write
ED7000
unkown
page readonly
7FF5ED8FF000
unkown
page readonly
C44017A8000
unkown
page read and write
7FF5ED9C8000
unkown
page readonly
40A000
unkown
page readonly
76E000
stack
page read and write
3351000
heap
page read and write
77F000404000
direct allocation
page read and write
7DF4F3051000
unkown
page execute read
5641000
unkown
page read and write
95D000
unkown
page readonly
171000
unkown
page execute and read and write
3E560000
direct allocation
page read and write
E30000
unkown
page readonly
234AC000
direct allocation
page read and write
7FF5EDA0B000
unkown
page readonly
C4402C01000
unkown
page read and write
56AA8000
direct allocation
page read and write
1DE24F77000
heap
page read and write
37A8000
unkown
page read and write
41CE0000
direct allocation
page read and write
379E000
unkown
page read and write
2C3000288000
direct allocation
page read and write
56C1C000
direct allocation
page read and write
7FF5ED743000
unkown
page readonly
C440110C000
unkown
page read and write
35C01000
direct allocation
page read and write
81A6FE000
unkown
page readonly
C440129C000
unkown
page read and write
540000
heap
page read and write
56B9C000
direct allocation
page read and write
4E698000
direct allocation
page read and write
2C30002E8000
direct allocation
page read and write
2E090000
direct allocation
page read and write
4FCB8000
direct allocation
page read and write
3240000
unkown
page read and write
69E000
unkown
page execute and write copy
592000230000
unkown
page read and write
7FF67B510000
unkown
page readonly
3351000
heap
page read and write
7FF5ED669000
unkown
page readonly
3E434000
direct allocation
page read and write
A391000
unkown
page read and write
89E0000
unkown
page read and write
C4401624000
unkown
page read and write
3351000
heap
page read and write
3351000
heap
page read and write
C41F000
stack
page read and write
37AE000
unkown
page read and write
419C00220000
unkown
page read and write
2EF0000
heap
page read and write
408000
unkown
page read and write
56BB4000
direct allocation
page read and write
C4401054000
unkown
page read and write
3351000
heap
page read and write
3351000
heap
page read and write
CC9D000
unkown
page read and write
1A62110D000
unkown
page read and write
1380000
heap
page read and write
6D2000
heap
page read and write
5050000
heap
page read and write
C44008D0000
unkown
page read and write
1DE24EF0000
heap
page read and write
282E000
stack
page read and write
C20000
heap
page read and write
2C300034C000
direct allocation
page read and write
C10A000
stack
page read and write
3351000
heap
page read and write
1326000
heap
page read and write
CD3000
heap
page read and write
37BD000
unkown
page read and write
2144000
direct allocation
page read and write
79B1000
unkown
page read and write
2E1F000
stack
page read and write
7DF4F3071000
unkown
page execute read
7FF5EDA14000
unkown
page readonly
28A0000
unkown
page readonly
FCFE000
unkown
page read and write
7FF5D1CD4000
unkown
page readonly
C4400C78000
unkown
page read and write
56BC8000
direct allocation
page read and write
3E518000
direct allocation
page read and write
7FF5ED928000
unkown
page readonly
4B56000
unkown
page read and write
C4400618000
unkown
page read and write
79B1000
unkown
page read and write
7950000
unkown
page read and write
9AD000
unkown
page readonly
3D7000
unkown
page execute and write copy
1DE24F31000
heap
page read and write
7C0000
unkown
page readonly
6CA3B000
unkown
page read and write
C44036FC000
unkown
page read and write
51E000
heap
page read and write
6EF000
heap
page read and write
1DE260B2000
heap
page read and write
7695000
stack
page read and write
4B78000
unkown
page read and write
170000
unkown
page readonly
41CEC000
direct allocation
page read and write
564000
heap
page read and write
1E0000
unkown
page readonly
41C24000
direct allocation
page read and write
25C0000
heap
page read and write
C440176C000
unkown
page read and write
3351000
heap
page read and write
1A620AA2000
unkown
page read and write
1325000
heap
page read and write
2EDD000
stack
page read and write
FCFE000
unkown
page read and write
6F920000
unkown
page readonly
930000
unkown
page readonly
C6CF000
unkown
page read and write
801000
unkown
page readonly
6F921000
unkown
page execute read
A4FC000
unkown
page read and write
1A6211AC000
unkown
page read and write
5D0000
unkown
page readonly
7857000
unkown
page read and write
3738000
unkown
page read and write
7FF5EDA70000
unkown
page readonly
430000
heap
page read and write
136400298000
unkown
page read and write
95D000
unkown
page readonly
41CA0000
direct allocation
page read and write
56B88000
direct allocation
page read and write
C5A3000
unkown
page read and write
FD21000
unkown
page read and write
2C300060C000
direct allocation
page read and write
5940000
direct allocation
page read and write
3351000
heap
page read and write
95D000
unkown
page readonly
7FF5ED803000
unkown
page readonly
79FB000
unkown
page read and write
ECE000
unkown
page readonly
DE0000
unkown
page readonly
2E001000
direct allocation
page read and write
7BA000
stack
page read and write
1308000
heap
page read and write
7FF5ED3A7000
unkown
page readonly
3E4D4000
direct allocation
page read and write
C4400CAC000
unkown
page read and write
C4400510000
unkown
page read and write
4C9C000
stack
page read and write
5E004000
direct allocation
page read and write
7FF5ED71B000
unkown
page readonly
1364007C0000
unkown
page read and write
3351000
heap
page read and write
C44021DC000
unkown
page read and write
B00000
unkown
page readonly
2140000
direct allocation
page read and write
31DC000
stack
page read and write
19A0000
unkown
page readonly
8B60000
unkown
page readonly
551000
unkown
page readonly
32D0000
heap
page read and write
E91000
unkown
page readonly
7FF67B578000
unkown
page read and write
7FF5ED648000
unkown
page readonly
4E684000
direct allocation
page read and write
4FCE8000
direct allocation
page read and write
EF0000
unkown
page readonly
7FF5ED77C000
unkown
page readonly
7B80000
unkown
page read and write
130F000
heap
page read and write
7FF67B57D000
unkown
page readonly
B20000
heap
page read and write
592000238000
unkown
page read and write
982D000
unkown
page read and write
3CAAFFE000
unkown
page readonly
3351000
heap
page read and write
785F000
unkown
page read and write
3E460000
direct allocation
page read and write
10C0000
unkown
page readonly
E8E000
unkown
page read and write
3525C000
direct allocation
page read and write
35DE000
stack
page read and write
35D0000
unkown
page read and write
2E00C000
direct allocation
page read and write
9AD000
unkown
page readonly
41CC0000
direct allocation
page read and write
EC1000
unkown
page execute read
3351000
heap
page read and write
C44026EC000
unkown
page read and write
170000
unkown
page readonly
E60000
heap
page read and write
C70000
heap
page read and write
C4400290000
unkown
page read and write
1F5000
unkown
page execute and read and write
2E0C0000
direct allocation
page read and write
129F000
heap
page read and write
3CCB7FE000
unkown
page read and write
548000
heap
page read and write
564000
heap
page read and write
8186FE000
unkown
page readonly
7FF5ED6DB000
unkown
page readonly
537000
heap
page read and write
3351000
heap
page read and write
2AC0000
trusted library allocation
page read and write
4D5F000
stack
page read and write
3351000
heap
page read and write
7FF5ED864000
unkown
page readonly
4BDC000
unkown
page read and write
7FF5ED5C9000
unkown
page readonly
BDA0000
unkown
page readonly
7FF5ED8A4000
unkown
page readonly
C44026BC000
unkown
page read and write
2C30003D8000
direct allocation
page read and write
592000274000
unkown
page read and write
3351000
heap
page read and write
FCD5000
unkown
page read and write
C4400968000
unkown
page read and write
7C0000
heap
page read and write
2E060000
direct allocation
page read and write
2760000
trusted library allocation
page read and write
4FC80000
direct allocation
page read and write
6CA3B000
unkown
page read and write
ED1A000
stack
page read and write
56B38000
direct allocation
page read and write
A10000
heap
page read and write
C4400134000
unkown
page read and write
7F0000
unkown
page read and write
97AD000
unkown
page read and write
4C0000
heap
page read and write
7FF5EDA08000
unkown
page readonly
57EF000
stack
page read and write
35A0000
unkown
page readonly
3CA47EF000
stack
page read and write
3351000
heap
page read and write
7CE0000
unkown
page read and write
56B7C000
direct allocation
page read and write
97D4000
unkown
page read and write
11B0000
unkown
page readonly
77F000268000
direct allocation
page read and write
3220000
unkown
page readonly
880000
unkown
page readonly
C90000
heap
page read and write
12DD000
heap
page read and write
3526C000
direct allocation
page read and write
2C30003F4000
direct allocation
page read and write
FD04000
unkown
page read and write
150000
heap
page read and write
136400294000
unkown
page read and write
7FF5ED9A1000
unkown
page readonly
215C000
direct allocation
page read and write
C4403601000
unkown
page read and write
9439000
stack
page read and write
3351000
heap
page read and write
1A61ACF0000
heap
page read and write
ECE000
unkown
page readonly
1365000
heap
page read and write
994000
unkown
page write copy
23F0000
direct allocation
page read and write
3351000
heap
page read and write
B650000
unkown
page read and write
1DE23664000
heap
page read and write
23474000
direct allocation
page read and write
2E0A4000
direct allocation
page read and write
E8C000
stack
page read and write
C44021EC000
unkown
page read and write
7FF5ED9FF000
unkown
page readonly
564000
heap
page read and write
1DE23610000
heap
page read and write
7FF5ED93B000
unkown
page readonly
1DE2611A000
heap
page read and write
1A622EF2000
unkown
page read and write
D30000
unkown
page readonly
56A0C000
direct allocation
page read and write
9A5B000
unkown
page read and write
13C0000
heap
page read and write
750000
unkown
page readonly
AAD1000
unkown
page read and write
8BF0000
unkown
page readonly
1483000
heap
page read and write
7B0000
unkown
page readonly
2345C000
direct allocation
page read and write
56B24000
direct allocation
page read and write
C440101C000
unkown
page read and write
77F0002C8000
direct allocation
page read and write
E90000
unkown
page read and write
3CA3E59000
unkown
page read and write
7FF5ED1BC000
unkown
page readonly
36D3000
stack
page read and write
3797000
unkown
page read and write
FCFE000
unkown
page read and write
4E6C4000
direct allocation
page read and write
120000
unkown
page readonly
77F0002BC000
direct allocation
page read and write
41CB0000
direct allocation
page read and write
FD1C000
unkown
page read and write
EC0000
unkown
page readonly
2E070000
direct allocation
page read and write
4808000
heap
page read and write
7FF5ED3F3000
unkown
page readonly
170000
unkown
page readonly
290F000
stack
page read and write
3351000
heap
page read and write
3351000
heap
page read and write
419C002B0000
unkown
page read and write
C44018FC000
unkown
page read and write
3BE1000
heap
page read and write
35C14000
direct allocation
page read and write
B170000
unkown
page readonly
3351000
heap
page read and write
7FF5ED92C000
unkown
page readonly
7E1000
unkown
page readonly
49E000
unkown
page write copy
7FF5ED451000
unkown
page readonly
12C7000
heap
page read and write
564000
heap
page read and write
3CC17FE000
unkown
page read and write
ECE000
unkown
page readonly
1A6211E6000
unkown
page read and write
14B0000
unkown
page readonly
3F0000
unkown
page readonly
1126000
unkown
page read and write
ED7000
unkown
page readonly
1A61ACF5000
heap
page read and write
146C000
stack
page read and write
FE0000
heap
page read and write
C440295C000
trusted library allocation
page read and write
10A0000
unkown
page read and write
CFB000
stack
page read and write
564000
heap
page read and write
1126000
unkown
page read and write
56A24000
direct allocation
page read and write
1364002F3000
unkown
page read and write
4CB0000
unkown
page read and write
564000
heap
page read and write
EF0000
heap
page read and write
AB24000
unkown
page read and write
12F4000
heap
page read and write
FA0000
unkown
page read and write
B82A000
stack
page read and write
787C000
unkown
page read and write
56AC0000
direct allocation
page read and write
C30000
unkown
page readonly
3351000
heap
page read and write
DC000
stack
page read and write
CB000
stack
page read and write
1A61E6A7000
unkown
page read and write
1210000
unkown
page readonly
37D2000
unkown
page read and write
AB51000
unkown
page read and write
7FF5ED46A000
unkown
page readonly
CA20000
unkown
page read and write
2C3000344000
direct allocation
page read and write
3351000
heap
page read and write
23FF000
stack
page read and write
C4400750000
unkown
page read and write
3CC7FFE000
unkown
page readonly
C4401FE8000
unkown
page read and write
1A61EC36000
unkown
page read and write
1095000
stack
page read and write
5920002F4000
unkown
page read and write
7FF5ED77C000
unkown
page readonly
9E0000
unkown
page readonly
30F4000
heap
page read and write
3351000
heap
page read and write
23448000
direct allocation
page read and write
EFC000
unkown
page readonly
3351000
heap
page read and write
AF8D000
stack
page read and write
C4403001000
unkown
page read and write
ED7000
unkown
page readonly
3351000
heap
page read and write
C440166C000
unkown
page read and write
3E550000
direct allocation
page read and write
1A62398C000
unkown
page read and write
C4402AC4000
unkown
page read and write
870000
unkown
page readonly
2AD0000
unkown
page read and write
40A000
unkown
page readonly
1310000
unkown
page read and write
4E634000
direct allocation
page read and write
EC1000
unkown
page execute read
1A61E687000
unkown
page read and write
46E84000
direct allocation
page read and write
7FF5ED476000
unkown
page readonly
3351000
heap
page read and write
3351000
heap
page read and write
4808000
heap
page read and write
3E42C000
direct allocation
page read and write
1120000
unkown
page readonly
23448000
direct allocation
page read and write
FCFE000
unkown
page read and write
3351000
heap
page read and write
D10000
heap
page read and write
3351000
heap
page read and write
57E000
heap
page read and write
C4401A88000
unkown
page read and write
4C60000
unkown
page read and write
136400311000
unkown
page read and write
95D000
unkown
page readonly
B2A000
heap
page read and write
1A622DE4000
unkown
page read and write
ED7000
unkown
page readonly
1325000
heap
page read and write
C44033C0000
unkown
page read and write
965C000
stack
page read and write
9795000
unkown
page read and write
7C0000
heap
page read and write
419C00258000
unkown
page read and write
926000
heap
page read and write
3351000
heap
page read and write
7FF5ED76D000
unkown
page readonly
2C3000630000
direct allocation
page read and write
69B000
unkown
page execute and read and write
2300000
unkown
page read and write
46E3C000
direct allocation
page read and write
953E000
stack
page read and write
C4400E34000
unkown
page read and write
7FF5ED556000
unkown
page readonly
2E014000
direct allocation
page read and write
EB0000
unkown
page read and write
1A622C86000
unkown
page read and write
218C000
direct allocation
page read and write
2C300062C000
direct allocation
page read and write
419C0030C000
unkown
page read and write
3520C000
direct allocation
page read and write
1A621C00000
unkown
page read and write
3CA7FFE000
unkown
page readonly
2890000
heap
page read and write
7FF5ED793000
unkown
page readonly
1510000
unkown
page readonly
B82A000
stack
page read and write
EF0000
unkown
page readonly
730000
unkown
page readonly
CBA6000
unkown
page read and write
407000
unkown
page readonly
3351000
heap
page read and write
400000
unkown
page readonly
EC1000
unkown
page execute read
9AA000
stack
page read and write
1325000
heap
page read and write
C4401640000
unkown
page read and write
3E444000
direct allocation
page read and write
6F811000
unkown
page execute read
EC0000
unkown
page readonly
7FF5ED750000
unkown
page readonly
E8C000
stack
page read and write
8D8F000
unkown
page read and write
97B5000
unkown
page read and write
5CE000
stack
page read and write
AA90000
unkown
page read and write
5557000
stack
page read and write
47FE000
stack
page read and write
C4402801000
unkown
page read and write
5004000
heap
page read and write
136400401000
unkown
page read and write
C08A000
stack
page read and write
56BB0000
direct allocation
page read and write
564000
heap
page read and write
EAE000
unkown
page read and write
2AD0000
heap
page read and write
1A620C40000
unkown
page read and write
73E000
stack
page read and write
5F0000
unkown
page read and write
3351000
heap
page read and write
56B88000
direct allocation
page read and write
4CD0000
unkown
page read and write
C4400764000
unkown
page read and write
3D0000
unkown
page readonly
DD0000
unkown
page readonly
352B0000
direct allocation
page read and write
3034000
heap
page read and write
6CC0B000
unkown
page read and write
1F5000
heap
page read and write
2AE4000
heap
page read and write
2164000
direct allocation
page read and write
2920000
heap
page read and write
352C8000
direct allocation
page read and write
7FF5ED426000
unkown
page readonly
AF09000
stack
page read and write
46E88000
direct allocation
page read and write
7953000
unkown
page read and write
7FF67BA6B000
unkown
page readonly
E69B000
stack
page read and write
C89A000
unkown
page read and write
4FC44000
direct allocation
page read and write
565000
heap
page read and write
1A6211BF000
unkown
page read and write
2890000
heap
page read and write
15B7000
heap
page read and write
2C30002C8000
direct allocation
page read and write
1A623220000
unkown
page read and write
7FF5ED755000
unkown
page readonly
564000
heap
page read and write
C4401A78000
unkown
page read and write
C4400EE8000
unkown
page read and write
C4400B34000
unkown
page read and write
1DE260A5000
heap
page read and write
C440018C000
unkown
page read and write
189000
stack
page read and write
2C300034C000
direct allocation
page read and write
4E668000
direct allocation
page read and write
6B0000
unkown
page readonly
3351000
heap
page read and write
564000
heap
page read and write
C4403801000
unkown
page read and write
2C3000354000
direct allocation
page read and write
1A623986000
unkown
page read and write
7FF5ED867000
unkown
page readonly
C4401104000
unkown
page read and write
4B90000
unkown
page read and write
57E000
heap
page read and write
B00A000
stack
page read and write
37AC000
unkown
page read and write
3351000
heap
page read and write
953B000
stack
page read and write
C4402A84000
unkown
page read and write
9875000
unkown
page read and write
7FF5ED4C6000
unkown
page readonly
BDC0000
unkown
page readonly
3351000
heap
page read and write
C4400504000
unkown
page read and write
3209000
stack
page read and write
818FF3000
stack
page read and write
41C70000
direct allocation
page read and write
3351000
heap
page read and write
C4400308000
unkown
page read and write
C4401AAC000
unkown
page read and write
7FF5ED1CF000
unkown
page readonly
7FF5ED8B4000
unkown
page readonly
994000
unkown
page write copy
7FF5ED80C000
unkown
page readonly
56B54000
direct allocation
page read and write
C846000
unkown
page read and write
FCE8000
unkown
page read and write
1E623C70000
heap
page read and write
F28000
heap
page read and write
7D0000
unkown
page readonly
3351000
heap
page read and write
C4401584000
unkown
page read and write
564000
heap
page read and write
1DE25012000
heap
page read and write
2EA0000
unkown
page readonly
7D1000
unkown
page execute read
678000
heap
page read and write
40A000
unkown
page readonly
1327000
heap
page read and write
DE0000
heap
page read and write
B140000
unkown
page readonly
7FF5ED781000
unkown
page readonly
A327000
unkown
page read and write
7D0000
unkown
page readonly
2E06C000
direct allocation
page read and write
4FB000
heap
page read and write
3351000
heap
page read and write
3351000
heap
page read and write
3351000
heap
page read and write
996000
unkown
page read and write
7B9000
stack
page read and write
7FF5ED43A000
unkown
page readonly
C49E000
stack
page read and write
C4400320000
unkown
page read and write
E80000
unkown
page read and write
558000
heap
page read and write
10F7E000
unkown
page read and write
69F000
unkown
page write copy
7FF5ED71E000
unkown
page readonly
1A623826000
unkown
page read and write
9877000
unkown
page read and write
136400201000
unkown
page read and write
7D1000
unkown
page execute read
5F0000
unkown
page read and write
C4402170000
unkown
page read and write
342D000
stack
page read and write
F10000
unkown
page readonly
D60000
unkown
page read and write
2BF6000
heap
page read and write
FCD4000
unkown
page read and write
C4400BE0000
unkown
page read and write
81A5FE000
stack
page read and write
56AB8000
direct allocation
page read and write
2150000
direct allocation
page read and write
C4400FCC000
unkown
page read and write
C440276C000
unkown
page read and write
1A61EBEA000
unkown
page read and write
83E000
stack
page read and write
7FF5ED505000
unkown
page readonly
ECE000
unkown
page readonly
4BE1000
unkown
page read and write
1A620F35000
unkown
page read and write
3CBE7FB000
unkown
page read and write
9881000
unkown
page read and write
3351000
heap
page read and write
1384000
heap
page read and write
7FF5ED476000
unkown
page readonly
1DE24FD2000
heap
page read and write
BDC0000
unkown
page readonly
C4401001000
unkown
page read and write
3CBFFFE000
unkown
page readonly
6F832000
unkown
page readonly
7FF5ED418000
unkown
page readonly
7FF5ED516000
unkown
page readonly
2AD0000
unkown
page read and write
C44028DC000
unkown
page read and write
7FF5ED810000
unkown
page readonly
7FF5ED50A000
unkown
page readonly
1DE2612F000
heap
page read and write
C4400401000
unkown
page read and write
EC0000
unkown
page readonly
3351000
heap
page read and write
6E0000
unkown
page readonly
7867000
unkown
page read and write
3351000
heap
page read and write
7CA0000
unkown
page read and write
1DE24FD3000
heap
page read and write
23414000
direct allocation
page read and write
7FF67B511000
unkown
page execute read
1A61E833000
heap
page read and write
CB0000
heap
page read and write
1DE24F52000
heap
page read and write
B5F000
unkown
page read and write
C4401FA4000
unkown
page read and write
EBC000
stack
page read and write
19C000
stack
page read and write
A11F000
stack
page read and write
C44005C4000
unkown
page read and write
77F0002C0000
direct allocation
page read and write
C4402D40000
unkown
page read and write
3351000
heap
page read and write
7DF4F3030000
unkown
page readonly
3351000
heap
page read and write
1A6211DD000
unkown
page read and write
7FF5ED882000
unkown
page readonly
47F4000
heap
page read and write
7FF5ED9BE000
unkown
page readonly
4630000
direct allocation
page read and write
C50A000
unkown
page read and write
1F0000
heap
page read and write
1A62383F000
unkown
page read and write
1DE24E80000
heap
page read and write
C4401AE8000
unkown
page read and write
40A000
unkown
page read and write
A4AE000
unkown
page read and write
170000
unkown
page readonly
9AD000
unkown
page readonly
23478000
direct allocation
page read and write
FE0000
unkown
page readonly
56AF8000
direct allocation
page read and write
1A622C89000
unkown
page read and write
7FF5ED692000
unkown
page readonly
C44014F8000
unkown
page read and write
C44000A8000
unkown
page read and write
F40000
unkown
page readonly
4E60C000
direct allocation
page read and write
546000
heap
page read and write
FCE0000
unkown
page read and write
C440060C000
unkown
page read and write
1DE260A5000
heap
page read and write
1A6238A1000
unkown
page read and write
C4401068000
unkown
page read and write
7FF5ED4B0000
unkown
page readonly
7FF5ED8C1000
unkown
page readonly
564000
heap
page read and write
2C30003EC000
direct allocation
page read and write
7FF5ED1CB000
unkown
page readonly
3351000
heap
page read and write
C440160C000
unkown
page read and write
5557000
stack
page read and write
3351000
heap
page read and write
4BE3000
unkown
page read and write
7FF5ED9D9000
unkown
page readonly
3748000
unkown
page read and write
787C000
unkown
page read and write
95D000
unkown
page readonly
7FF5ED412000
unkown
page readonly
64BF000
stack
page read and write
1321000
heap
page read and write
1DE23621000
heap
page read and write
7D0000
unkown
page read and write
EC1000
unkown
page execute read
7FF5ED46E000
unkown
page readonly
308A000
stack
page read and write
CAC3000
unkown
page read and write
C440287C000
unkown
page read and write
C4400E3C000
unkown
page read and write
41C14000
direct allocation
page read and write
2289000
heap
page read and write
CD2000
heap
page read and write
4E601000
direct allocation
page read and write
7FF5ED670000
unkown
page readonly
C44006C3000
unkown
page read and write
1220000
heap
page read and write
7FF5ED92C000
unkown
page readonly
500A000
heap
page read and write
7FF5ED695000
unkown
page readonly
C44010EE000
unkown
page read and write
35C68000
direct allocation
page read and write
C4400A88000
unkown
page read and write
23428000
direct allocation
page read and write
C4400868000
unkown
page read and write
7FF5EDA2A000
unkown
page readonly
ED5000
unkown
page read and write
3351000
heap
page read and write
3351000
heap
page read and write
3351000
heap
page read and write
7FF5ED534000
unkown
page readonly
400000
unkown
page readonly
56EE000
stack
page read and write
1A6237F4000
heap
page read and write
EA1000
unkown
page readonly
4E678000
direct allocation
page read and write
585E000
stack
page read and write
CD2000
heap
page read and write
564000
heap
page read and write
CA7C000
unkown
page read and write
CC9000
heap
page read and write
67E0000
heap
page read and write
52BE000
stack
page read and write
37A0000
unkown
page read and write
C700000
unkown
page read and write
69F000
unkown
page read and write
1A621140000
unkown
page read and write
3351000
heap
page read and write
140000
heap
page read and write
3351000
heap
page read and write
A4B8000
unkown
page read and write
1A620C80000
unkown
page readonly
36D3000
stack
page read and write
6F3F000
stack
page read and write
FD14000
unkown
page read and write
131F000
heap
page read and write
1A620B57000
unkown
page read and write
3CA3E7D000
unkown
page read and write
940000
unkown
page readonly
C4401994000
trusted library allocation
page read and write
9F0000
unkown
page readonly
EC1000
unkown
page execute read
1F0000
heap
page read and write
C4400983000
unkown
page read and write
3E46C000
direct allocation
page read and write
3351000
heap
page read and write
39CE000
stack
page read and write
7FF5ED9C8000
unkown
page readonly
1A622F04000
unkown
page read and write
6C0E7000
unkown
page readonly
3351000
heap
page read and write
E20000
unkown
page readonly
49A000
unkown
page write copy
9815000
unkown
page read and write
ECE000
unkown
page readonly
7FF5ED5F7000
unkown
page readonly
1710000
heap
page read and write
564000
heap
page read and write
50E000
heap
page read and write
1483000
heap
page read and write
3351000
heap
page read and write
564000
heap
page read and write
23494000
direct allocation
page read and write
15B0000
heap
page read and write
D8A000
stack
page read and write
790000
unkown
page readonly
71BF000
stack
page read and write
3351000
heap
page read and write
1A620F21000
unkown
page read and write
41C60000
direct allocation
page read and write
2E034000
direct allocation
page read and write
EC1000
unkown
page execute read
3351000
heap
page read and write
C4401380000
unkown
page read and write
FE9A000
heap
page read and write
F50000
unkown
page readonly
A00000
heap
page readonly
6CA56000
unkown
page readonly
2B2E000
stack
page read and write
F20000
heap
page read and write
15C0000
heap
page read and write
7FF5ED349000
unkown
page readonly
29EF000
stack
page read and write
FFE000
stack
page read and write
37BD000
unkown
page read and write
3E40C000
direct allocation
page read and write
32EE000
stack
page read and write
A391000
unkown
page read and write
7FF5EDA2A000
unkown
page readonly
C4400BA4000
unkown
page read and write
C44020BC000
unkown
page read and write
6C186000
unkown
page read and write
1A61AB0B000
heap
page read and write
3CC07FB000
unkown
page read and write
136A000
heap
page read and write
7FF5ED9D9000
unkown
page readonly
7FF5ED8FF000
unkown
page readonly
3290000
unkown
page read and write
564000
heap
page read and write
817F14000
stack
page read and write
3351000
heap
page read and write
730000
unkown
page readonly
7FF5ED7C4000
unkown
page readonly
C44010E9000
unkown
page read and write
3030000
heap
page read and write
7FF5ED4C2000
unkown
page readonly
C44028D0000
unkown
page read and write
C4400194000
unkown
page read and write
1480000
heap
page read and write
3351000
heap
page read and write
3351000
heap
page read and write
C4402A9C000
unkown
page read and write
419C00217000
unkown
page read and write
77F00024C000
direct allocation
page read and write
7DF4F3050000
unkown
page readonly
C4401B60000
unkown
page read and write
1DE260A5000
heap
page read and write
3351000
heap
page read and write
2840000
heap
page read and write
1278000
heap
page read and write
400000
unkown
page readonly
BAF9000
stack
page read and write
C30000
unkown
page readonly
3380000
unkown
page read and write
1F0000
heap
page read and write
3E4BC000
direct allocation
page read and write
9869000
unkown
page read and write
4FC48000
direct allocation
page read and write
8000000
unkown
page read and write
C4401110000
unkown
page read and write
400000
unkown
page readonly
E10000
heap
page read and write
A09C000
stack
page read and write
996000
unkown
page read and write
CC9000
heap
page read and write
77AF000
stack
page read and write
41CCC000
direct allocation
page read and write
45B0000
direct allocation
page read and write
4CB0000
unkown
page read and write
18C0000
unkown
page readonly
C4400DED000
unkown
page read and write
B22B000
stack
page read and write
9550000
unkown
page readonly
790000
unkown
page readonly
C4400628000
unkown
page read and write
7FF67BA6B000
unkown
page readonly
2E0A0000
direct allocation
page read and write
3351000
heap
page read and write
B7AB000
stack
page read and write
77F0002D4000
direct allocation
page read and write
C44010B0000
unkown
page read and write
204E000
stack
page read and write
3351000
heap
page read and write
7FF5ED5EB000
unkown
page readonly
7D0000
unkown
page readonly
C4401A70000
unkown
page read and write
6F921000
unkown
page execute read
1364007EC000
unkown
page read and write
41C5C000
direct allocation
page read and write
860000
heap
page read and write
C4401888000
unkown
page read and write
1DE2605D000
heap
page read and write
ED5000
unkown
page read and write
120F0000
unkown
page read and write
7FF5ED818000
unkown
page readonly
1940000
unkown
page readonly
C4402CD0000
unkown
page read and write
F9F4000
unkown
page read and write
46E14000
direct allocation
page read and write
3E518000
direct allocation
page read and write
1A621400000
unkown
page read and write
3318000
stack
page read and write
C44028A4000
trusted library allocation
page read and write
E8F000
unkown
page read and write
56B6C000
direct allocation
page read and write
A21E000
stack
page read and write
1DE25019000
heap
page read and write
EC1000
unkown
page execute read
960000
heap
page read and write
3E50C000
direct allocation
page read and write
7FF5ED779000
unkown
page readonly
9871000
unkown
page read and write
C30000
unkown
page readonly
F80000
unkown
page read and write
27F0000
heap
page read and write
9893000
unkown
page read and write
1DE24F25000
heap
page read and write
9873000
unkown
page read and write
D10000
unkown
page readonly
3351000
heap
page read and write
1A61A9B0000
heap
page read and write
EC1000
unkown
page execute read
3CCC7FD000
unkown
page read and write
3E4A4000
direct allocation
page read and write
1A6238CB000
unkown
page read and write
2C3000614000
direct allocation
page read and write
7F30000
unkown
page read and write
13A0000
heap
page read and write
1A61EAFD000
unkown
page read and write
C40000
unkown
page readonly
4BDC000
unkown
page read and write
9550000
unkown
page readonly
CC9000
heap
page read and write
CD0000
heap
page read and write
7FF5ED55F000
unkown
page readonly
404D000
stack
page read and write
56A78000
direct allocation
page read and write
C5AA000
unkown
page read and write
276F000
stack
page read and write
3351000
heap
page read and write
564000
heap
page read and write
C4402754000
unkown
page read and write
72E000
heap
page read and write
3351000
heap
page read and write
B08D000
stack
page read and write
52DF000
stack
page read and write
D90000
heap
page read and write
4FE8000
heap
page read and write
1311000
heap
page read and write
1A61C953000
heap
page read and write
3351000
heap
page read and write
C4401EAC000
unkown
page read and write
56AB8000
direct allocation
page read and write
25C6FE000
unkown
page readonly
C4402B34000
unkown
page read and write
DAC000
stack
page read and write
77F000201000
direct allocation
page read and write
7FF5ED8B4000
unkown
page readonly
7E60000
unkown
page read and write
3CA97FE000
unkown
page read and write
56B60000
direct allocation
page read and write
3351000
heap
page read and write
3351000
heap
page read and write
560000
unkown
page read and write
7FF5ED77E000
unkown
page readonly
C4401ED4000
unkown
page read and write
136400360000
unkown
page read and write
C4400B5C000
unkown
page read and write
940000
unkown
page readonly
C4402E01000
unkown
page read and write
7FF5ED342000
unkown
page readonly
923E000
stack
page read and write
15C8000
heap
page read and write
234D8000
direct allocation
page read and write
7863000
unkown
page read and write
1A61B3D0000
unkown
page readonly
900000
heap
page read and write
3351000
heap
page read and write
4F00000
heap
page readonly
7FF67B57D000
unkown
page readonly
C4402A0C000
trusted library allocation
page read and write
FCE8000
unkown
page read and write
896B000
stack
page read and write
C44004B8000
unkown
page read and write
C4400C01000
unkown
page read and write
EC1000
unkown
page execute read
3351000
heap
page read and write
527E000
stack
page read and write
1A620C91000
unkown
page readonly
6F4000
heap
page read and write
46E98000
direct allocation
page read and write
3E440000
direct allocation
page read and write
46E68000
direct allocation
page read and write
523C000
stack
page read and write
7C0000
heap
page read and write
7FF5ED602000
unkown
page readonly
63BE000
stack
page read and write
3351000
heap
page read and write
1A622F62000
unkown
page read and write
13640026C000
unkown
page read and write
C5AA000
unkown
page read and write
C4402058000
trusted library allocation
page read and write
4E6F8000
direct allocation
page read and write
7FF5ED8F9000
unkown
page readonly
91B5000
stack
page read and write
ED5000
unkown
page read and write
7FF5ED670000
unkown
page readonly
13640020C000
unkown
page read and write
4E64C000
direct allocation
page read and write
3527C000
direct allocation
page read and write
5920002A0000
unkown
page read and write
CA63000
unkown
page read and write
C4401A45000
unkown
page read and write
23FE000
stack
page read and write
3351000
heap
page read and write
3351000
heap
page read and write
8710000
unkown
page readonly
CA18000
unkown
page read and write
C4400998000
unkown
page read and write
C4400917000
unkown
page read and write
CEA000
heap
page read and write
C44001C4000
unkown
page read and write
7FF5ED986000
unkown
page readonly
819BFD000
stack
page read and write
C503000
unkown
page read and write
C440212C000
unkown
page read and write
7FF5ED7D6000
unkown
page readonly
2158000
direct allocation
page read and write
97A9000
unkown
page read and write
D40000
unkown
page readonly
40D000
unkown
page write copy
C44020F0000
unkown
page read and write
3E50C000
direct allocation
page read and write
FCD5000
unkown
page read and write
69F000
unkown
page write copy
4EE0000
heap
page read and write
46E000
stack
page read and write
AAF9000
unkown
page read and write
3351000
heap
page read and write
3CCA7FE000
unkown
page read and write
480C000
heap
page read and write
3CA3E5D000
unkown
page read and write
1A622F25000
unkown
page read and write
1A61EBFA000
unkown
page read and write
4FC14000
direct allocation
page read and write
480C000
heap
page read and write
7A34000
unkown
page read and write
995000
unkown
page write copy
7FF67B586000
unkown
page readonly
65A000
stack
page read and write
C4400C4B000
unkown
page read and write
7FF5ED412000
unkown
page readonly
C4400ED0000
unkown
page read and write
986B000
unkown
page read and write
3351000
heap
page read and write
C4401648000
unkown
page read and write
564000
heap
page read and write
7FF67BA6B000
unkown
page readonly
59200020C000
unkown
page read and write
7FF5ED279000
unkown
page readonly
86F000
stack
page read and write
EB0000
unkown
page read and write
1228000
heap
page read and write
ED5000
unkown
page read and write
400000
unkown
page readonly
419C0020C000
unkown
page read and write
EA0000
unkown
page read and write
3250000
heap
page read and write
56B6C000
direct allocation
page read and write
C4400818000
unkown
page read and write
ED7000
unkown
page readonly
5006000
heap
page read and write
CA42000
unkown
page read and write
FD05000
unkown
page read and write
56C3000
unkown
page read and write
7FF5ED433000
unkown
page readonly
3351000
heap
page read and write
13640034C000
unkown
page read and write
CB0000
unkown
page read and write
3351000
heap
page read and write
2770000
heap
page read and write
C44000E0000
unkown
page read and write
3351000
heap
page read and write
9EC000
stack
page read and write
FCA0000
unkown
page read and write
9AE0000
heap
page read and write
56B04000
direct allocation
page read and write
7FF5ED942000
unkown
page readonly
EB0000
unkown
page read and write
143B000
stack
page read and write
1A620A32000
unkown
page read and write
4BA6000
unkown
page read and write
6B1000
unkown
page execute and read and write
C6CF000
unkown
page read and write
2E080000
direct allocation
page read and write
56AAC000
direct allocation
page read and write
6E0000
heap
page read and write
1DE26111000
heap
page read and write
B7AB000
stack
page read and write
7FF5ED530000
unkown
page readonly
6F0000
unkown
page readonly
785B000
unkown
page read and write
2830000
heap
page read and write
1114000
unkown
page write copy
7CC0000
unkown
page readonly
6CA36000
unkown
page read and write
1DE236B0000
heap
page read and write
3351000
heap
page read and write
564000
heap
page read and write
1A622E4F000
unkown
page read and write
1B0000
heap
page read and write
3406000
heap
page read and write
7FF5ED849000
unkown
page readonly
97D4000
unkown
page read and write
5930000
direct allocation
page read and write
23434000
direct allocation
page read and write
C4400380000
unkown
page read and write
6DFB000
stack
page read and write
2C30003D4000
direct allocation
page read and write
C4402B9C000
unkown
page read and write
4FC0C000
direct allocation
page read and write
B50000
unkown
page readonly
ED7000
unkown
page readonly
C4401370000
unkown
page read and write
C89A000
unkown
page read and write
7FF5ED849000
unkown
page readonly
35244000
direct allocation
page read and write
8000000
unkown
page read and write
3351000
heap
page read and write
735000
heap
page read and write
2C30002B0000
direct allocation
page read and write
7FF5ED9CC000
unkown
page readonly
6EFD000
stack
page read and write
56AB8000
direct allocation
page read and write
1A61E8D7000
unkown
page read and write
3351000
heap
page read and write
673D000
stack
page read and write
564000
heap
page read and write
10A0000
unkown
page read and write
564000
heap
page read and write
7FF5ED4EF000
unkown
page readonly
3351000
heap
page read and write
3351000
heap
page read and write
FCEE000
unkown
page read and write
46E28000
direct allocation
page read and write
1DE26077000
heap
page read and write
5D0000
heap
page read and write
564000
heap
page read and write
C4400752000
unkown
page read and write
1D0000
unkown
page readonly
B60000
unkown
page readonly
3351000
heap
page read and write
1DE234D0000
heap
page read and write
2170000
direct allocation
page read and write
3351000
heap
page read and write
C440034C000
trusted library allocation
page read and write
C4401F50000
unkown
page read and write
4C5000
heap
page read and write
4C1E000
unkown
page read and write
C4400DAC000
unkown
page read and write
2564000
heap
page read and write
35CD4000
direct allocation
page read and write
15C0000
heap
page read and write
1A622C84000
unkown
page read and write
1A621165000
unkown
page read and write
3351000
heap
page read and write
C4400F08000
unkown
page read and write
1505000
heap
page read and write
2151000
direct allocation
page read and write
7FF5ED942000
unkown
page readonly
C4403674000
trusted library allocation
page read and write
3351000
heap
page read and write
56A64000
direct allocation
page read and write
1240000
heap
page read and write
1CA000
unkown
page execute and read and write
EC0000
unkown
page readonly
3351000
heap
page read and write
565000
heap
page read and write
7FF67B561000
unkown
page readonly
4026000
heap
page read and write
B4E000
stack
page read and write
C4401FCC000
unkown
page read and write
1325000
heap
page read and write
4C1E000
unkown
page read and write
1A6211E3000
unkown
page read and write
69B000
unkown
page execute and read and write
8DA0000
unkown
page read and write
9AD000
unkown
page readonly
4B8B000
unkown
page read and write
ED5000
unkown
page read and write
46ED8000
direct allocation
page read and write
3351000
heap
page read and write
3351000
heap
page read and write
E71E000
stack
page read and write
C4401BAC000
trusted library allocation
page read and write
7FF5ED55F000
unkown
page readonly
6BF000
stack
page read and write
564000
heap
page read and write
3351000
heap
page read and write
13B0000
heap
page read and write
C6F2000
unkown
page read and write
4C34000
unkown
page read and write
7DF4F3031000
unkown
page execute read
C440205C000
unkown
page read and write
419C00230000
unkown
page read and write
7FF5ED8E7000
unkown
page readonly
B6A0000
heap
page read and write
7FF5ED933000
unkown
page readonly
136E000
heap
page read and write
8720000
unkown
page readonly
C4401434000
unkown
page read and write
419C0025C000
unkown
page read and write
C20000
unkown
page readonly
FD05000
unkown
page read and write
7FF5ED39E000
unkown
page readonly
B30000
unkown
page readonly
3351000
heap
page read and write
EF0000
unkown
page readonly
7FF5ED8AC000
unkown
page readonly
6BC000
heap
page read and write
FCD8000
unkown
page read and write
1311000
heap
page read and write
C4402900000
unkown
page read and write
131E000
heap
page read and write
7D53000
unkown
page read and write
4FC94000
direct allocation
page read and write
10D8000
heap
page read and write
2C3000314000
direct allocation
page read and write
7FF5ED4EF000
unkown
page readonly
5610000
heap
page read and write
9510000
unkown
page read and write
1DE2369B000
heap
page read and write
ED7000
unkown
page readonly
1243000
heap
page read and write
5E0000
heap
page read and write
906E000
stack
page read and write
592000270000
unkown
page read and write
592000201000
unkown
page read and write
F50000
heap
page read and write
C44009B1000
unkown
page read and write
1324000
heap
page read and write
52A000
heap
page read and write
7D1000
unkown
page execute read
9E6C000
stack
page read and write
136E000
heap
page read and write
F9D000
stack
page read and write
A09D000
stack
page read and write
33EF000
stack
page read and write
EF0000
unkown
page readonly
3431000
unkown
page read and write
2AD4000
heap
page read and write
5C0000
heap
page read and write
C4401160000
unkown
page read and write
7FF5ED74A000
unkown
page readonly
1DE26148000
heap
page read and write
1DE23619000
heap
page read and write
750000
unkown
page readonly
401000
unkown
page execute read
3CB17FB000
unkown
page read and write
77F000220000
direct allocation
page read and write
7FF5ED1D6000
unkown
page readonly
1A61EA3D000
unkown
page read and write
25A0000
heap
page read and write
C78000
heap
page read and write
46EB0000
direct allocation
page read and write
FD16000
unkown
page read and write
FCE0000
unkown
page read and write
12D0000
unkown
page readonly
3E530000
direct allocation
page read and write
1A61E657000
unkown
page read and write
56B98000
direct allocation
page read and write
C4A0000
unkown
page read and write
7FF5EDA69000
unkown
page readonly
785D000
unkown
page read and write
2C3000624000
direct allocation
page read and write
C440113C000
unkown
page read and write
5BE000
stack
page read and write
7FF5ED433000
unkown
page readonly
FCD8000
unkown
page read and write
C4400FE0000
unkown
page read and write
3351000
heap
page read and write
7FF5ED507000
unkown
page readonly
10D0000
heap
page read and write
7FF5ED349000
unkown
page readonly
B10D000
stack
page read and write
F50000
unkown
page readonly
401000
unkown
page execute read
C4401A01000
unkown
page read and write
1325000
heap
page read and write
1308000
heap
page read and write
564000
heap
page read and write
1114000
unkown
page read and write
8195FE000
stack
page read and write
3351000
heap
page read and write
2AE4000
heap
page read and write
C44027B5000
unkown
page read and write
35CCC000
direct allocation
page read and write
7FF5ED7DB000
unkown
page readonly
41C7C000
direct allocation
page read and write
4CE0000
unkown
page read and write
C4400CC8000
unkown
page read and write
C4400C8C000
unkown
page read and write
4E6AC000
direct allocation
page read and write
8EA000
stack
page read and write
27BF000
stack
page read and write
F97B000
unkown
page read and write
25D6FE000
unkown
page readonly
C4401558000
unkown
page read and write
C440146C000
unkown
page read and write
C4402078000
unkown
page read and write
7BE000
stack
page read and write
2C3000260000
direct allocation
page read and write
C4401788000
unkown
page read and write
CDC000
stack
page read and write
C44008C8000
unkown
page read and write
7D0000
unkown
page readonly
DF0000
unkown
page readonly
400000
unkown
page readonly
994000
unkown
page read and write
7FF5ED8E2000
unkown
page readonly
1A61EA37000
unkown
page read and write
C4401B58000
unkown
page read and write
FB1000
unkown
page readonly
8F1000
unkown
page readonly
3351000
heap
page read and write
564000
heap
page read and write
B650000
unkown
page read and write
6DF000
heap
page read and write
EC0000
unkown
page readonly
4809000
heap
page read and write
7861000
unkown
page read and write
CFB000
stack
page read and write
7FF67B57D000
unkown
page readonly
7FF5ED68F000
unkown
page readonly
1301000
heap
page read and write
F976000
unkown
page read and write
136400601000
unkown
page read and write
1DE24F3C000
heap
page read and write
7C0000
unkown
page readonly
1A622C81000
unkown
page read and write
994000
unkown
page write copy
47EF000
heap
page read and write
3351000
heap
page read and write
7FF5ED97E000
unkown
page readonly
3351000
heap
page read and write
7FF5ED451000
unkown
page readonly
C44000F0000
unkown
page read and write
2C3000308000
direct allocation
page read and write
7FF5ED735000
unkown
page readonly
56B64000
direct allocation
page read and write
564000
heap
page read and write
1A620B20000
trusted library section
page read and write
7CA0000
unkown
page read and write
2C300040C000
direct allocation
page read and write
7FF5ED779000
unkown
page readonly
FCE0000
unkown
page read and write
F10000
unkown
page readonly
52C0000
heap
page read and write
3CC97FE000
unkown
page readonly
1365000
heap
page read and write
FCE0000
unkown
page read and write
6CC26000
unkown
page readonly
C20000
unkown
page readonly
EAE000
stack
page read and write
419C00308000
unkown
page read and write
1DE24F4D000
heap
page read and write
FD17000
unkown
page read and write
1480000
heap
page read and write
784A000
unkown
page read and write
A364000
unkown
page read and write
1116000
unkown
page read and write
3210000
unkown
page read and write
3E540000
direct allocation
page read and write
136D000
heap
page read and write
400000
unkown
page readonly
444D000
stack
page read and write
8196FE000
unkown
page readonly
C51E000
unkown
page read and write
7DF4F3051000
unkown
page execute read
1F0000
heap
page read and write
F28000
heap
page read and write
2AD4000
heap
page read and write
1490000
unkown
page read and write
56B04000
direct allocation
page read and write
77F000244000
direct allocation
page read and write
7FF5ED8F9000
unkown
page readonly
20D4000
heap
page read and write
3E470000
direct allocation
page read and write
1BB000
stack
page read and write
56A98000
direct allocation
page read and write
ED7000
unkown
page readonly
7FF5ED4E8000
unkown
page readonly
1384000
heap
page read and write
37AE000
unkown
page read and write
3351000
heap
page read and write
EC0000
unkown
page readonly
7FF67B586000
unkown
page readonly
7FF5ED449000
unkown
page readonly
592000260000
unkown
page read and write
7B0000
heap
page readonly
FEC000
stack
page read and write
6BF0000
heap
page read and write
3CBAFFE000
unkown
page readonly
C4400E8C000
unkown
page read and write
1451000
unkown
page readonly
1A61EAF7000
unkown
page read and write
56AD8000
direct allocation
page read and write
56A88000
direct allocation
page read and write
C44009D0000
unkown
page read and write
564000
heap
page read and write
870000
unkown
page readonly
FCD5000
unkown
page read and write
7FF5ED695000
unkown
page readonly
1420000
heap
page read and write
C4400BC4000
unkown
page read and write
1A622600000
unkown
page read and write
1080000
unkown
page readonly
FA0000
unkown
page read and write
E60000
unkown
page read and write
7FF5ED91A000
unkown
page readonly
56AB8000
direct allocation
page read and write
FD17000
unkown
page read and write
35C38000
direct allocation
page read and write
C44002B9000
unkown
page read and write
3CB3FFE000
unkown
page readonly
C44010D4000
unkown
page read and write
978E000
unkown
page read and write
2160000
direct allocation
page read and write
25CAFE000
unkown
page readonly
2DD0000
unkown
page readonly
4EDE000
stack
page read and write
FA0000
unkown
page read and write
33B9000
stack
page read and write
5641000
unkown
page read and write
7FF5ED660000
unkown
page readonly
CA0C000
unkown
page read and write
35240000
direct allocation
page read and write
7FF5ED7C4000
unkown
page readonly
32D0000
heap
page read and write
2C3000320000
direct allocation
page read and write
1DE26111000
heap
page read and write
28E4000
heap
page read and write
C4402090000
unkown
page read and write
16C0000
unkown
page readonly
2154000
direct allocation
page read and write
B10000
heap
page read and write
56B7C000
direct allocation
page read and write
C4401AA0000
unkown
page read and write
9AD000
unkown
page readonly
C4400B48000
unkown
page read and write
1350000
unkown
page readonly
575E000
stack
page read and write
C44010F4000
unkown
page read and write
1A623829000
unkown
page read and write
3351000
heap
page read and write
EC0000
unkown
page readonly
136E000
heap
page read and write
A01B000
stack
page read and write
5D0000
unkown
page readonly
7FF5ED8C6000
unkown
page readonly
13640024C000
unkown
page read and write
7FF5ED26E000
unkown
page readonly
401000
unkown
page execute read
56B20000
direct allocation
page read and write
7FF5ED4C2000
unkown
page readonly
C89C000
unkown
page read and write
2C3000320000
direct allocation
page read and write
EF0000
unkown
page readonly
7FF5ED9AE000
unkown
page readonly
3CAC7F9000
unkown
page read and write
8E0000
unkown
page read and write
ECE000
unkown
page readonly
1A620C83000
unkown
page readonly
3351000
heap
page read and write
1326000
heap
page read and write
BC9B000
stack
page read and write
35A0000
unkown
page readonly
1A61AC10000
unkown
page readonly
FE9A000
heap
page read and write
BC9000
stack
page read and write
564000
heap
page read and write
7D0000
unkown
page readonly
56A14000
direct allocation
page read and write
1A6239AD000
unkown
page read and write
1A61E840000
trusted library section
page read and write
C4403730000
unkown
page read and write
FCE8000
unkown
page read and write
408000
unkown
page write copy
C44017B0000
unkown
page read and write
7FF5ED7FD000
unkown
page readonly
302E000
stack
page read and write
AAD1000
unkown
page read and write
77C000
stack
page read and write
56B70000
direct allocation
page read and write
1A622E39000
unkown
page read and write
3351000
heap
page read and write
3CC3FFE000
unkown
page readonly
4FC70000
direct allocation
page read and write
7FF5ED5A8000
unkown
page readonly
3351000
heap
page read and write
1329000
heap
page read and write
13CF000
stack
page read and write
C4400FA8000
unkown
page read and write
3351000
heap
page read and write
FEC000
stack
page read and write
35C98000
direct allocation
page read and write
3351000
heap
page read and write
1301000
heap
page read and write
6E0000
unkown
page readonly
565000
heap
page read and write
2C3000610000
direct allocation
page read and write
1A622EBB000
unkown
page read and write
4E63C000
direct allocation
page read and write
EC0000
unkown
page readonly
3351000
heap
page read and write
55C0000
heap
page read and write
F30000
unkown
page readonly
7FF5ED9F2000
unkown
page readonly
987B000
unkown
page read and write
3D7000
unkown
page execute and write copy
550000
heap
page read and write
1080000
unkown
page readonly
819AFE000
unkown
page readonly
1DE23609000
heap
page read and write
C4401078000
unkown
page read and write
C4402218000
unkown
page read and write
136A000
heap
page read and write
C4401658000
unkown
page read and write
1A62389D000
unkown
page read and write
7FF5ED471000
unkown
page readonly
564000
heap
page read and write
EF0000
unkown
page readonly
1A620602000
unkown
page read and write
BDF000
unkown
page read and write
1308000
heap
page read and write
56B70000
direct allocation
page read and write
136400236000
unkown
page read and write
C4402CBC000
unkown
page read and write
C4400A0C000
unkown
page read and write
C4400D60000
unkown
page read and write
2C30003E8000
direct allocation
page read and write
CA20000
unkown
page read and write
6CC06000
unkown
page read and write
3EBF000
stack
page read and write
1A61AC00000
unkown
page read and write
7FF5ED915000
unkown
page readonly
CBD7000
unkown
page read and write
6BDB0000
unkown
page readonly
3351000
heap
page read and write
4FCC0000
direct allocation
page read and write
6C16F000
unkown
page read and write
7FF5ED9A6000
unkown
page readonly
7FF5ED4B4000
unkown
page readonly
DAC000
stack
page read and write
C44017D0000
unkown
page read and write
69E000
unkown
page execute and write copy
2C30002A0000
direct allocation
page read and write
77F00025C000
direct allocation
page read and write
3351000
heap
page read and write
C4400894000
unkown
page read and write
3CA3E4D000
unkown
page read and write
3D70000
heap
page read and write
EC1000
unkown
page execute read
45E000
heap
page read and write
FD04000
unkown
page read and write
56B000
stack
page read and write
868000
heap
page read and write
2F20000
heap
page read and write
1329000
heap
page read and write
11BC000
unkown
page readonly
7FF5ED814000
unkown
page readonly
4E624000
direct allocation
page read and write
3CB07FC000
unkown
page read and write
32D0000
heap
page read and write
9871000
unkown
page read and write
2C30003DC000
direct allocation
page read and write
59200025C000
unkown
page read and write
786B000
unkown
page read and write
D90000
heap
page read and write
There are 4747 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://www.cutepdf-editor.com/support/writer.asp
https://www.cutepdf-editor.com/support/writer.asp
https://www.cutepdf-editor.com/support/writer.asp
https://googleads.g.doubleclick.net/pagead/drt/si?st=NO_DATA
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-6555658820068848&output=html&adk=1812271804&adf=3025194257&lmt=1713386480&plat=9%3A32776%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C41%3A32%2C42%3A32&plas=174x714_l%7C193x714_r&format=0x0&url=https%3A%2F%2Fwww.cutepdf-editor.com%2Fsupport%2Fwriter.asp&pra=7&wgl=1&easpi=0&asro=0&uach=WyJXaW5kb3dzIiwiMTAuMC4wIiwieDg2IiwiIiwiMTE3LjAuNTkzOC4xMzIiLG51bGwsMCxudWxsLCI2NCIsW1siR29vZ2xlIENocm9tZSIsIjExNy4wLjU5MzguMTMyIl0sWyJOb3Q7QT1CcmFuZCIsIjguMC4wLjAiXSxbIkNocm9taXVtIiwiMTE3LjAuNTkzOC4xMzIiXV0sMF0.&dt=1713386479210&bpp=2&bdt=1020&idt=1080&shv=r20240415&mjsv=m202404160101&ptt=9&saldr=aa&abxe=1&eoidce=1&prev_fmts=728x90%2C160x600%2C336x280&nras=1&correlator=464567931983&frm=20&pv=1&ga_vid=983432702.1713386479&ga_sid=1713386480&ga_hid=274577743&ga_fc=1&u_tz=120&u_his=1&u_h=1024&u_w=1280&u_ah=984&u_aw=1280&u_cd=24&u_sd=1&dmc=8&adx=-12245933&ady=-12245933&biw=1263&bih=907&scr_x=0&scr_y=0&eid=44759876%2C44759927%2C44759837%2C31082771
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-6555658820068848&output=html&h=600&slotname=8138180617&adk=373269726&adf=126291155&pi=t.ma~as.8138180617&w=160&lmt=1713386480&format=160x600&url=https%3A%2F%2Fwww.cutepdf-editor.com%2Fsupport%2Fwriter.asp&wgl=1&uach=WyJXaW5kb3dzIiwiMTAuMC4wIiwieDg2IiwiIiwiMTE3LjAuNTkzOC4xMzIiLG51bGwsMCxudWxsLCI2NCIsW1siR29vZ2xlIENocm9tZSIsIjExNy4wLjU5MzguMTMyIl0sWyJOb3Q7QT1CcmFuZCIsIjguMC4wLjAiXSxbIkNocm9taXVtIiwiMTE3LjAuNTkzOC4xMzIiXV0sMF0.&dt=1713386479208&bpp=1&bdt=1018&idt=1057&shv=r20240415&mjsv=m202404160101&ptt=9&saldr=aa&abxe=1&eoidce=1&prev_fmts=728x90&correlator=464567931983&frm=20&pv=1&ga_vid=983432702.1713386479&ga_sid=1713386480&ga_hid=274577743&ga_fc=1&u_tz=120&u_his=1&u_h=1024&u_w=1280&u_ah=984&u_aw=1280&u_cd=24&u_sd=1&dmc=8&adx=867&ady=420&biw=1263&bih=907&scr_x=0&scr_y=0&eid=44759876%2C44759927%2C44759837%2C31082771%2C42532523%2C44798934%2C95328467%2C95329428%2C31082835%2C95322329%2C95329830&oid=2&pvsid=1167234827264558&tmod=1431185080&uas=0&nvt=1&f
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-6555658820068848&output=html&h=600&slotname=8138180617&adk=373269726&adf=126291155&pi=t.ma~as.8138180617&w=160&lmt=1713386480&format=160x600&url=https%3A%2F%2Fwww.cutepdf-editor.com%2Fsupport%2Fwriter.asp&wgl=1&uach=WyJXaW5kb3dzIiwiMTAuMC4wIiwieDg2IiwiIiwiMTE3LjAuNTkzOC4xMzIiLG51bGwsMCxudWxsLCI2NCIsW1siR29vZ2xlIENocm9tZSIsIjExNy4wLjU5MzguMTMyIl0sWyJOb3Q7QT1CcmFuZCIsIjguMC4wLjAiXSxbIkNocm9taXVtIiwiMTE3LjAuNTkzOC4xMzIiXV0sMF0.&dt=1713386479208&bpp=1&bdt=1018&idt=1057&shv=r20240415&mjsv=m202404160101&ptt=9&saldr=aa&abxe=1&eoidce=1&prev_fmts=728x90&correlator=464567931983&frm=20&pv=1&ga_vid=983432702.1713386479&ga_sid=1713386480&ga_hid=274577743&ga_fc=1&u_tz=120&u_his=1&u_h=1024&u_w=1280&u_ah=984&u_aw=1280&u_cd=24&u_sd=1&dmc=8&adx=867&ady=420&biw=1263&bih=907&scr_x=0&scr_y=0&eid=44759876%2C44759927%2C44759837%2C31082771%2C42532523%2C44798934%2C95328467%2C95329428%2C31082835%2C95322329%2C95329830&oid=2&pvsid=1167234827264558&tmod=1431185080&uas=0&nvt=1&f
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-6555658820068848&output=html&h=280&slotname=4387574616&adk=1818151991&adf=1925678805&pi=t.ma~as.4387574616&w=336&lmt=1713386480&format=336x280&url=https%3A%2F%2Fwww.cutepdf-editor.com%2Fsupport%2Fwriter.asp&wgl=1&uach=WyJXaW5kb3dzIiwiMTAuMC4wIiwieDg2IiwiIiwiMTE3LjAuNTkzOC4xMzIiLG51bGwsMCxudWxsLCI2NCIsW1siR29vZ2xlIENocm9tZSIsIjExNy4wLjU5MzguMTMyIl0sWyJOb3Q7QT1CcmFuZCIsIjguMC4wLjAiXSxbIkNocm9taXVtIiwiMTE3LjAuNTkzOC4xMzIiXV0sMF0.&dt=1713386479209&bpp=1&bdt=1019&idt=1068&shv=r20240415&mjsv=m202404160101&ptt=9&saldr=aa&abxe=1&eoidce=1&prev_fmts=728x90%2C160x600&correlator=464567931983&frm=20&pv=1&ga_vid=983432702.1713386479&ga_sid=1713386480&ga_hid=274577743&ga_fc=1&u_tz=120&u_his=1&u_h=1024&u_w=1280&u_ah=984&u_aw=1280&u_cd=24&u_sd=1&dmc=8&adx=464&ady=1814&biw=1263&bih=907&scr_x=0&scr_y=0&eid=44759876%2C44759927%2C44759837%2C31082771%2C42532523%2C44798934%2C95328467%2C95329428%2C31082835%2C95322329%2C95329830&oid=2&pvsid=1167234827264558&tmod=1431185080&
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-6555658820068848&output=html&h=280&slotname=4387574616&adk=1818151991&adf=1925678805&pi=t.ma~as.4387574616&w=336&lmt=1713386480&format=336x280&url=https%3A%2F%2Fwww.cutepdf-editor.com%2Fsupport%2Fwriter.asp&wgl=1&uach=WyJXaW5kb3dzIiwiMTAuMC4wIiwieDg2IiwiIiwiMTE3LjAuNTkzOC4xMzIiLG51bGwsMCxudWxsLCI2NCIsW1siR29vZ2xlIENocm9tZSIsIjExNy4wLjU5MzguMTMyIl0sWyJOb3Q7QT1CcmFuZCIsIjguMC4wLjAiXSxbIkNocm9taXVtIiwiMTE3LjAuNTkzOC4xMzIiXV0sMF0.&dt=1713386479209&bpp=1&bdt=1019&idt=1068&shv=r20240415&mjsv=m202404160101&ptt=9&saldr=aa&abxe=1&eoidce=1&prev_fmts=728x90%2C160x600&correlator=464567931983&frm=20&pv=1&ga_vid=983432702.1713386479&ga_sid=1713386480&ga_hid=274577743&ga_fc=1&u_tz=120&u_his=1&u_h=1024&u_w=1280&u_ah=984&u_aw=1280&u_cd=24&u_sd=1&dmc=8&adx=464&ady=1814&biw=1263&bih=907&scr_x=0&scr_y=0&eid=44759876%2C44759927%2C44759837%2C31082771%2C42532523%2C44798934%2C95328467%2C95329428%2C31082835%2C95322329%2C95329830&oid=2&pvsid=1167234827264558&tmod=1431185080&
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-6555658820068848&output=html&h=90&slotname=6092711011&adk=1854165047&adf=3987798746&pi=t.ma~as.6092711011&w=728&lmt=1713386480&format=728x90&url=https%3A%2F%2Fwww.cutepdf-editor.com%2Fsupport%2Fwriter.asp&wgl=1&uach=WyJXaW5kb3dzIiwiMTAuMC4wIiwieDg2IiwiIiwiMTE3LjAuNTkzOC4xMzIiLG51bGwsMCxudWxsLCI2NCIsW1siR29vZ2xlIENocm9tZSIsIjExNy4wLjU5MzguMTMyIl0sWyJOb3Q7QT1CcmFuZCIsIjguMC4wLjAiXSxbIkNocm9taXVtIiwiMTE3LjAuNTkzOC4xMzIiXV0sMF0.&dt=1713386479204&bpp=4&bdt=1014&idt=1034&shv=r20240415&mjsv=m202404160101&ptt=9&saldr=aa&abxe=1&eoidce=1&correlator=464567931983&frm=20&pv=2&ga_vid=983432702.1713386479&ga_sid=1713386480&ga_hid=274577743&ga_fc=1&u_tz=120&u_his=1&u_h=1024&u_w=1280&u_ah=984&u_aw=1280&u_cd=24&u_sd=1&dmc=8&adx=268&ady=144&biw=1263&bih=907&scr_x=0&scr_y=0&eid=44759876%2C44759927%2C44759837%2C31082771%2C42532523%2C44798934%2C95328467%2C95329428%2C31082835%2C95322329%2C95329830&oid=2&pvsid=1167234827264558&tmod=1431185080&uas=0&nvt=1&fc=896&brdim=0%2C0
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-6555658820068848&output=html&h=90&slotname=6092711011&adk=1854165047&adf=3987798746&pi=t.ma~as.6092711011&w=728&lmt=1713386480&format=728x90&url=https%3A%2F%2Fwww.cutepdf-editor.com%2Fsupport%2Fwriter.asp&wgl=1&uach=WyJXaW5kb3dzIiwiMTAuMC4wIiwieDg2IiwiIiwiMTE3LjAuNTkzOC4xMzIiLG51bGwsMCxudWxsLCI2NCIsW1siR29vZ2xlIENocm9tZSIsIjExNy4wLjU5MzguMTMyIl0sWyJOb3Q7QT1CcmFuZCIsIjguMC4wLjAiXSxbIkNocm9taXVtIiwiMTE3LjAuNTkzOC4xMzIiXV0sMF0.&dt=1713386479204&bpp=4&bdt=1014&idt=1034&shv=r20240415&mjsv=m202404160101&ptt=9&saldr=aa&abxe=1&eoidce=1&correlator=464567931983&frm=20&pv=2&ga_vid=983432702.1713386479&ga_sid=1713386480&ga_hid=274577743&ga_fc=1&u_tz=120&u_his=1&u_h=1024&u_w=1280&u_ah=984&u_aw=1280&u_cd=24&u_sd=1&dmc=8&adx=268&ady=144&biw=1263&bih=907&scr_x=0&scr_y=0&eid=44759876%2C44759927%2C44759837%2C31082771%2C42532523%2C44798934%2C95328467%2C95329428%2C31082835%2C95322329%2C95329830&oid=2&pvsid=1167234827264558&tmod=1431185080&uas=0&nvt=1&fc=896&brdim=0%2C0
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-6555658820068848&output=html&h=90&slotname=6092711011&adk=1854165047&adf=3987798746&pi=t.ma~as.6092711011&w=728&lmt=1713386480&format=728x90&url=https%3A%2F%2Fwww.cutepdf-editor.com%2Fsupport%2Fwriter.asp&wgl=1&uach=WyJXaW5kb3dzIiwiMTAuMC4wIiwieDg2IiwiIiwiMTE3LjAuNTkzOC4xMzIiLG51bGwsMCxudWxsLCI2NCIsW1siR29vZ2xlIENocm9tZSIsIjExNy4wLjU5MzguMTMyIl0sWyJOb3Q7QT1CcmFuZCIsIjguMC4wLjAiXSxbIkNocm9taXVtIiwiMTE3LjAuNTkzOC4xMzIiXV0sMF0.&dt=1713386479204&bpp=4&bdt=1014&idt=1034&shv=r20240415&mjsv=m202404160101&ptt=9&saldr=aa&abxe=1&eoidce=1&correlator=464567931983&frm=20&pv=2&ga_vid=983432702.1713386479&ga_sid=1713386480&ga_hid=274577743&ga_fc=1&u_tz=120&u_his=1&u_h=1024&u_w=1280&u_ah=984&u_aw=1280&u_cd=24&u_sd=1&dmc=8&adx=268&ady=144&biw=1263&bih=907&scr_x=0&scr_y=0&eid=44759876%2C44759927%2C44759837%2C31082771%2C42532523%2C44798934%2C95328467%2C95329428%2C31082835%2C95322329%2C95329830&oid=2&pvsid=1167234827264558&tmod=1431185080&uas=0&nvt=1&fc=896&brdim=0%2C0
https://googleads.g.doubleclick.net/pagead/html/r20240415/r20110914/zrt_lookup_fy2021.html
https://googleads.g.doubleclick.net/pagead/html/r20240415/r20110914/zrt_lookup_fy2021.html
https://googleads.g.doubleclick.net/pagead/html/r20240415/r20110914/zrt_lookup_fy2021.html
https://googleads.g.doubleclick.net/pagead/html/r20240415/r20110914/zrt_lookup_fy2021.html
https://googleads.g.doubleclick.net/pagead/html/r20240415/r20110914/zrt_lookup_fy2021.html#RS-1-&adk=1812271803&client=ca-pub-6555658820068848&fa=3&ifi=7&uci=a!7&btvi=2
https://googleads.g.doubleclick.net/pagead/drt/s?v=r20120211
about:blank
https://googleads.g.doubleclick.net/pagead/html/r20240415/r20110914/zrt_lookup_fy2021.html#RS-2-&adk=1812271804&client=ca-pub-6555658820068848&fa=4&ifi=8&uci=a!8&btvi=3
https://googleads.g.doubleclick.net/pagead/html/r20240415/r20110914/zrt_lookup_fy2021.html#RS-2-&adk=1812271804&client=ca-pub-6555658820068848&fa=4&ifi=8&uci=a!8&btvi=3
https://googleads.g.doubleclick.net/pagead/html/r20240415/r20110914/zrt_lookup_fy2021.html#RS-2-&adk=1812271804&client=ca-pub-6555658820068848&fa=4&ifi=8&uci=a!8&btvi=3
https://googleads.g.doubleclick.net/pagead/html/r20240415/r20110914/zrt_lookup_fy2021.html#RS-0-&adk=1812271808&client=ca-pub-6555658820068848&fa=8&ifi=6&uci=a!6
https://googleads.g.doubleclick.net/pagead/html/r20240415/r20110914/zrt_lookup_fy2021.html#RS-0-&adk=1812271808&client=ca-pub-6555658820068848&fa=8&ifi=6&uci=a!6
https://p4-aw7vdoaqd4hlw-pa4eu276oujsn2dp-if-v6exp3-v4.metric.gstatic.com/v6exp3/iframe.html
https://googleads.g.doubleclick.net/pagead/html/r20240415/r20110914/zrt_lookup_fy2021.html#RS-3-&adk=1812271801&client=ca-pub-6555658820068848&fa=1&ifi=9&uci=a!9&btvi=4
https://googleads.g.doubleclick.net/pagead/html/r20240415/r20110914/zrt_lookup_fy2021.html#RS-3-&adk=1812271801&client=ca-pub-6555658820068848&fa=1&ifi=9&uci=a!9&btvi=4
https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
https://www.google.com/recaptcha/api2/aframe
https://www.cutepdf-editor.com/support/writer.asp#google_vignette
There are 20 hidden doms, click here to show them.