Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C:\Users\user\Desktop\Free PDF Creator.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working
directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:37:50 2024,
atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C5C8CC0A7FE31816B4641D0465402560
|
Certificate, Version=3
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C5C8CC0A7FE31816B4641D0465402560
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML
|
exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.bak
|
exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNSD.XML
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\PDFConverter\FreePDFInstallerVideo.wmv
|
Microsoft ASF
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\free-pdf-creator\e90\D3DCompiler_47_cor3.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\free-pdf-creator\e90\PenImc_cor3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\free-pdf-creator\e90\PresentationNative_cor3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\free-pdf-creator\e90\vcruntime140_cor3.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\free-pdf-creator\e90\wpfgfx_cor3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Free PDF Creator.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working
directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:38:17 2024,
atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:37:37 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Free PDF Creator.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working
directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:38:17 2024,
atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:37:37 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:37:37 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:37:37 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 16:37:36 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\Downloads\1f4527b0-ea2c-485b-a693-22c42c540383.tmp
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\Downloads\3a415442-9784-4925-b93b-3fc629b16ecb.tmp
|
HTML document, ASCII text, with very long lines (1107), with no line terminators
|
dropped
|
||
C:\Users\user\Downloads\Unconfirmed 395789.crdownload
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\Downloads\download (1).htm (copy)
|
HTML document, ASCII text, with very long lines (1107), with no line terminators
|
dropped
|
||
C:\Users\user\Downloads\download (1).htm.crdownload (copy)
|
HTML document, ASCII text, with very long lines (1107), with no line terminators
|
dropped
|
||
C:\Users\user\Downloads\download.htm (copy)
|
HTML document, ASCII text, with very long lines (1107), with no line terminators
|
dropped
|
||
C:\Users\user\Downloads\download.htm.crdownload (copy)
|
HTML document, ASCII text, with very long lines (1107), with no line terminators
|
dropped
|
||
C:\Users\user\Downloads\f31152c9-f4dc-4293-a2e0-88b4317cc86f.tmp
|
HTML document, ASCII text, with very long lines (1107), with no line terminators
|
dropped
|
||
C:\Users\user\Downloads\free-pdf-creator.exe (copy)
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
Chrome Cache Entry: 123
|
Web Open Font Format (Version 2), TrueType, length 15860, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 124
|
ASCII text, with very long lines (10943), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 125
|
PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 126
|
Web Open Font Format (Version 2), TrueType, length 15920, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 127
|
ASCII text, with very long lines (65350)
|
downloaded
|
||
Chrome Cache Entry: 128
|
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 129
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 130
|
ASCII text, with very long lines (55375)
|
downloaded
|
||
Chrome Cache Entry: 131
|
Unicode text, UTF-8 text, with very long lines (560)
|
downloaded
|
||
Chrome Cache Entry: 132
|
Web Open Font Format (Version 2), TrueType, length 14712, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 133
|
Web Open Font Format (Version 2), TrueType, length 15744, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 134
|
ASCII text, with very long lines (1342), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 135
|
Web Open Font Format (Version 2), TrueType, length 14892, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 136
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1900x1268, components
3
|
downloaded
|
||
Chrome Cache Entry: 137
|
MS Windows icon resource - 1 icon, -66x256, 32 bits/pixel
|
downloaded
|
||
Chrome Cache Entry: 138
|
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 139
|
Web Open Font Format (Version 2), TrueType, length 14780, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 140
|
MS Windows icon resource - 1 icon, -66x256, 32 bits/pixel
|
dropped
|
||
Chrome Cache Entry: 141
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 142
|
Web Open Font Format (Version 2), TrueType, length 30064, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 143
|
Web Open Font Format (Version 2), TrueType, length 14160, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 144
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 145
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1900x1268, components
3
|
dropped
|
||
Chrome Cache Entry: 146
|
ASCII text, with very long lines (5857), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 147
|
HTML document, ASCII text
|
downloaded
|
||
Chrome Cache Entry: 148
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 149
|
ASCII text, with very long lines (7934)
|
downloaded
|
||
Chrome Cache Entry: 150
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 151
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1900x1268, components
3
|
dropped
|
||
Chrome Cache Entry: 152
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 153
|
Unicode text, UTF-8 text, with very long lines (59668)
|
downloaded
|
||
Chrome Cache Entry: 154
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 155
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 156
|
Web Open Font Format (Version 2), TrueType, length 14200, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 157
|
OpenType font data
|
downloaded
|
||
Chrome Cache Entry: 158
|
PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 159
|
HTML document, ASCII text, with very long lines (1107), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 160
|
HTML document, ASCII text
|
downloaded
|
||
Chrome Cache Entry: 161
|
ASCII text, with very long lines (32086)
|
downloaded
|
||
Chrome Cache Entry: 162
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 163
|
ASCII text, with very long lines (827)
|
downloaded
|
||
Chrome Cache Entry: 164
|
ASCII text, with very long lines (65299)
|
downloaded
|
||
Chrome Cache Entry: 165
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1900x1268, components
3
|
downloaded
|
There are 67 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://www.free-pdf-creator.com/
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=1940,i,986595434633665258,420894585385562774,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US
--service-sandbox-type=icon_reader --mojo-platform-channel-handle=5576 --field-trial-handle=1940,i,986595434633665258,420894585385562774,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Users\user\Downloads\free-pdf-creator.exe
|
"C:\Users\user\Downloads\free-pdf-creator.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.free-pdf-creator.com/lps/typ/?offer=false
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.free-pdf-creator.com
|
|||
http://html4/loose.dtd
|
unknown
|
||
https://cdn.jsdelivr.net/npm/
|
unknown
|
||
https://github.com/mono/linker/issues/1731
|
unknown
|
||
https://www.amazing-search.com/legal/contact.html
|
unknown
|
||
https://aka.ms/dotnet/info
|
unknown
|
||
https://www.free-pdf-creator.com/lps/typ/not-completed.html?screen=second
|
unknown
|
||
https://www.pdf.smart-websearch.com/legal/uninstallation.html
|
unknown
|
||
http://foo/bar/resources/images/nextwhite.pngP
|
unknown
|
||
https://www.free-pdf-creator.com/legal/privacy.html
|
unknown
|
||
http://foo/Resources/Images/ShutDownWhite.png
|
unknown
|
||
https://www.free-pdf-creator.com/lps/typ/
|
unknown
|
||
https://aka.ms/dotnet/app-launch-failed
|
unknown
|
||
https://api.free-pdf-creator.com/first_run.php
|
unknown
|
||
https://startbootstrap.com/theme/stylish-portfolio)
|
unknown
|
||
http://.css
|
unknown
|
||
https://github.com/mono/linker/issues/1895v
|
unknown
|
||
https://aka.ms/dotnet-core-applaunch?
|
unknown
|
||
https://fontawesome.com/license/free
|
unknown
|
||
https://github.com/dotnet/runtime
|
unknown
|
||
https://pdf.activegn.com/
|
|||
http://foo/bar/resources/images/nextwhite.png
|
unknown
|
||
https://fontawesome.com
|
unknown
|
||
https://github.com/twbs/bootstrap/graphs/contributors)
|
unknown
|
||
https://api.cloudconvert.com/v2/tasks/008027f8-d08d-418b-a1df-890060f3486a
|
unknown
|
||
https://aka.ms/dotnet-warnings/
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
http://defaultcontainer/PDFConfigurator;component/Resources/Images/NextWhite.pngP
|
unknown
|
||
https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.1/jquery.min.js
|
unknown
|
||
https://aka.ms/nativeaot-compatibility
|
unknown
|
||
https://github.com/dotnet/runtime/issues/71847
|
unknown
|
||
https://aka.ms/serializationformat-binary-obsolete
|
unknown
|
||
https://aka.ms/dotnet/sdk-not-found
|
unknown
|
||
https://aka.ms/binaryformatter
|
unknown
|
||
https://www.amazing-search.com/legal/license.html
|
unknown
|
||
https://github.com/mono/linker/pull/649
|
unknown
|
||
https://www.free-pdf-creator.com/lps/typ/?offer=false
|
|||
https://aka.ms/dotnet-core-applaunch?Description:
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://www.pdf.smart-websearch.com/legal/contact.html
|
unknown
|
||
http://foo/Resources/Images/NextWhite.pngP
|
unknown
|
||
http://foo/bar/resources/images/shutdownwhite.png
|
unknown
|
||
file:///C:/Users/user/Downloads/download.htm
|
|||
https://www.free-pdf-creator.com/lps/typ/?offer=true
|
unknown
|
||
http://nsis.sourceforge.net/Docs/AppendixG.html
|
unknown
|
||
https://www.amazing-search.com/legal/privacy.html
|
unknown
|
||
https://aka.ms/dotnet/download%s%sInstall
|
unknown
|
||
https://github.com/dotnet/runtime/blob/bbc898f3e5678135b242faeb6eefd8b24bf04f3c/src/native/corehost/
|
unknown
|
||
https://github.com/dotnet/wpf
|
unknown
|
||
https://github.com/twbs/bootstrap/blob/main/LICENSE)
|
unknown
|
||
http://www.fontfont.com/https://www.fontfont.com/licensingAlternate
|
unknown
|
||
http://ocsp.thawte.com0
|
unknown
|
||
https://github.com/mono/linker/issues/1416.
|
unknown
|
||
https://aka.ms/dotnet-illink/com
|
unknown
|
||
https://pc.amazing-search.com
|
unknown
|
||
https://www.free-pdf-creator.com/lps/typ/?offer=falseC:
|
unknown
|
||
https://www.free-pdf-creator.com/lps/typ/?offer=falsePSModulePath=C:
|
unknown
|
||
https://getbootstrap.com/)
|
unknown
|
||
http://www.symauth.com/cps0(
|
unknown
|
||
https://aka.ms/dotnet-illink/nativehostt
|
unknown
|
||
https://github.com/mono/linker/issues/378
|
unknown
|
||
https://www.free-pdf-creator.com/lps/typ/not-completed.html?screen=first
|
unknown
|
||
https://www.pdf.smart-websearch.com/legal/privacy.html.
|
unknown
|
||
https://www.free-pdf-creator.com/lps/typ/uninstall.htmlhtml
|
unknown
|
||
https://marketplace.firefox.com/developers/docs/policies/agreement
|
unknown
|
||
https://github.com/mono/linker/issues/1981
|
unknown
|
||
https://netjs.org/conversion.js?p=ic_cfpp&r=
|
unknown
|
||
https://www.free-pdf-creator.com/lps/typ/?offer=false0
|
unknown
|
||
http://api.free-pdf-creator.com:443/P
|
unknown
|
||
http://www.symauth.com/rpa00
|
unknown
|
||
https://github.com/dotnet/wpf4
|
unknown
|
||
http://defaultcontainer/PDFConfigurator;component/Resources/Images/ShutDownWhite.pngP
|
unknown
|
||
https://github.com/dotnet/runtime%
|
unknown
|
||
https://github.com/mono/linker/issues/1906.
|
unknown
|
||
file:///C:/Users/user/Downloads/download%20(1).htm
|
|||
https://www.free-pdf-creator.com/legal/eula.html
|
unknown
|
||
https://aka.ms/GlobalizationInvariantMode
|
unknown
|
||
https://github.com/dotnet/runtime/issues/50821
|
unknown
|
||
https://www.free-pdf-creator.com/
|
|||
https://www.free-pdf-creator.com/legal/terms.html
|
unknown
|
||
https://v.compiler.pw/conversion.js?cid=
|
unknown
|
||
https://github.com/dotnet/runtimeVL
|
unknown
|
||
https://aka.ms/dotnet-illink/nativehost
|
unknown
|
||
https://aka.ms/dotnet/download
|
unknown
|
||
https://github.com/mono/linker/issues/1187
|
unknown
|
||
https://github.com/StartBootstrap/startbootstrap-stylish-portfolio/blob/master/LICENSE)
|
unknown
|
There are 75 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
18.158.22.207
|
unknown
|
United States
|
||
142.251.167.147
|
unknown
|
United States
|
||
192.168.2.16
|
unknown
|
unknown
|
||
34.196.146.107
|
unknown
|
United States
|
||
142.251.16.138
|
unknown
|
United States
|
||
192.168.2.5
|
unknown
|
unknown
|
||
142.251.167.94
|
unknown
|
United States
|
||
142.251.167.95
|
unknown
|
United States
|
||
104.21.20.130
|
unknown
|
United States
|
||
172.67.192.232
|
unknown
|
United States
|
||
104.21.69.128
|
unknown
|
United States
|
||
142.251.163.94
|
unknown
|
United States
|
||
172.253.62.102
|
unknown
|
United States
|
||
151.101.1.229
|
unknown
|
United States
|
||
1.1.1.1
|
unknown
|
Australia
|
||
18.159.237.166
|
unknown
|
United States
|
||
172.253.63.95
|
unknown
|
United States
|
||
172.253.63.94
|
unknown
|
United States
|
||
151.101.65.229
|
unknown
|
United States
|
||
104.18.21.226
|
unknown
|
United States
|
||
23.53.35.206
|
unknown
|
United States
|
||
52.217.133.9
|
unknown
|
United States
|
||
172.253.122.94
|
unknown
|
United States
|
||
18.165.98.53
|
unknown
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.251.16.95
|
unknown
|
United States
|
||
104.17.25.14
|
unknown
|
United States
|
||
142.251.163.84
|
unknown
|
United States
|
||
172.64.207.38
|
unknown
|
United States
|
There are 19 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\General
|
UniqueID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\General
|
ComputerName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\General
|
VolumeSerialNumber
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\Namespace
|
LocalBase
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\Namespace
|
DTDFile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\Namespace
|
LocalDelta
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Media\WMSDK\Namespace
|
RemoteDelta
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences\ProxySettings\HTTP
|
ProxyStyle
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences\ProxySettings\HTTP
|
ProxyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences\ProxySettings\HTTP
|
ProxyPort
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences\ProxySettings\HTTP
|
ProxyBypass
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences\ProxySettings\HTTP
|
ProxyExclude
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences\ProxySettings\RTSP
|
ProxyStyle
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences\ProxySettings\RTSP
|
ProxyName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences\ProxySettings\RTSP
|
ProxyPort
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences\ProxySettings\RTSP
|
ProxyBypass
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences\ProxySettings\RTSP
|
ProxyExclude
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Player\Tasks\NowPlaying
|
InitFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
MediaLibraryCreateNewDatabase
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
AutoMetadataCurrentDownloadCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
AutoMetadataCurrent500ServerErrorCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
AutoMetadataCurrent503ServerErrorCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
AutoMetadataCurrentOtherServerErrorCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
AutoMetadataCurrentNetworkErrorCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
AutoMetadataLastResetTime
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
SyncPlaylistsAdded
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
MLSChangeIndexMusic
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
MLSChangeIndexVideo
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
MLSChangeIndexPhoto
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
MLSChangeIndexList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
MLSChangeIndexOther
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
MostRecentFileAddOrRemove
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences\HME
|
LocalLibraryID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
LibraryHasBeenRun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{AEB16279-B750-48F1-8586-97956060175A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
LastScreensaverSetThreadExecutionState
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
LastScreensaverState
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\CUAS\DefaultCompositionWindow
|
Left
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\CUAS\DefaultCompositionWindow
|
Top
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
MediaLibraryCreateNewDatabase
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
MLSChangeIndexList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
MLSChangeIndexList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
MLSChangeIndexList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
MLSChangeIndexList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
MLSChangeIndexList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
SyncPlaylistsAdded
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
LastScreensaverSetThreadExecutionState
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
LastScreensaverState
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
LastScreensaverSetThreadExecutionState
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
LastScreensaverState
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
LastScreensaverSetThreadExecutionState
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
|
LastScreensaverState
|
There are 42 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1E773EE8000
|
heap
|
page read and write
|
||
13D804A0000
|
trusted library allocation
|
page read and write
|
||
1E7713B3000
|
direct allocation
|
page read and write
|
||
16C0002C4000
|
trusted library allocation
|
page read and write
|
||
1E765337000
|
heap
|
page read and write
|
||
1E777816000
|
heap
|
page read and write
|
||
1E777928000
|
heap
|
page read and write
|
||
1E771190000
|
trusted library allocation
|
page read and write
|
||
1E777968000
|
heap
|
page read and write
|
||
1E762A9A000
|
unkown
|
page readonly
|
||
1A6CD800000
|
direct allocation
|
page read and write
|
||
1E77796A000
|
heap
|
page read and write
|
||
1E760458000
|
unkown
|
page readonly
|
||
1E77405D000
|
heap
|
page read and write
|
||
1E770053000
|
trusted library allocation
|
page read and write
|
||
1E76E1F6000
|
heap
|
page read and write
|
||
1E777884000
|
heap
|
page read and write
|
||
9ABD27E000
|
stack
|
page read and write
|
||
9ABD87D000
|
stack
|
page read and write
|
||
1E777A6B000
|
heap
|
page read and write
|
||
1E7776CC000
|
heap
|
page read and write
|
||
1E7654FA000
|
heap
|
page read and write
|
||
1E7654C7000
|
heap
|
page read and write
|
||
1E769A65000
|
heap
|
page read and write
|
||
1E761170000
|
direct allocation
|
page read and write
|
||
9AC1DFE000
|
stack
|
page read and write
|
||
1E77129F000
|
heap
|
page read and write
|
||
1E7654B9000
|
heap
|
page read and write
|
||
1E77785A000
|
heap
|
page read and write
|
||
1A6C8FD0000
|
heap
|
page read and write
|
||
1E76BEA0000
|
trusted library allocation
|
page read and write
|
||
1E777B3F000
|
heap
|
page read and write
|
||
1E77783A000
|
heap
|
page read and write
|
||
1E76AA2E000
|
heap
|
page read and write
|
||
1E7715E5000
|
heap
|
page read and write
|
||
13D807E0000
|
heap
|
page read and write
|
||
1E77781F000
|
heap
|
page read and write
|
||
9AC05FB000
|
stack
|
page read and write
|
||
16C0002E4000
|
trusted library allocation
|
page read and write
|
||
1E777AFA000
|
heap
|
page read and write
|
||
9ABFFFB000
|
stack
|
page read and write
|
||
1E7779B5000
|
heap
|
page read and write
|
||
1E76E505000
|
heap
|
page read and write
|
||
1E7715E2000
|
heap
|
page read and write
|
||
9ABED7F000
|
stack
|
page read and write
|
||
1E777B61000
|
heap
|
page read and write
|
||
1E7654C7000
|
heap
|
page read and write
|
||
1E770040000
|
trusted library allocation
|
page read and write
|
||
9AC0EFF000
|
stack
|
page read and write
|
||
1E76A631000
|
trusted library allocation
|
page read and write
|
||
1E7712E2000
|
heap
|
page read and write
|
||
1E7654F6000
|
heap
|
page read and write
|
||
1E773EB3000
|
heap
|
page read and write
|
||
1E777B25000
|
heap
|
page read and write
|
||
2BB800298000
|
direct allocation
|
page read and write
|
||
1E7712B0000
|
heap
|
page read and write
|
||
1E7690A1000
|
heap
|
page read and write
|
||
1E771290000
|
trusted library allocation
|
page read and write
|
||
1E76FFE0000
|
trusted library allocation
|
page read and write
|
||
1E762A8F000
|
unkown
|
page readonly
|
||
1E7776CE000
|
heap
|
page read and write
|
||
1E7715DF000
|
heap
|
page read and write
|
||
1E777B52000
|
heap
|
page read and write
|
||
1E7712BD000
|
heap
|
page read and write
|
||
1E7778D0000
|
heap
|
page read and write
|
||
1E77780C000
|
heap
|
page read and write
|
||
1E77A6F2000
|
heap
|
page read and write
|
||
1E7776CE000
|
heap
|
page read and write
|
||
1E777A22000
|
heap
|
page read and write
|
||
1E765427000
|
heap
|
page read and write
|
||
1E760445000
|
unkown
|
page readonly
|
||
2BB80026C000
|
direct allocation
|
page read and write
|
||
1E777AE3000
|
heap
|
page read and write
|
||
1E76E656000
|
heap
|
page read and write
|
||
9ABF073000
|
stack
|
page read and write
|
||
1E76E0D1000
|
heap
|
page read and write
|
||
1E7749DC000
|
heap
|
page read and write
|
||
1A6C91B7000
|
heap
|
page read and write
|
||
1E777B5F000
|
heap
|
page read and write
|
||
1E773D4E000
|
heap
|
page read and write
|
||
16C000288000
|
trusted library allocation
|
page read and write
|
||
1A6CB000000
|
direct allocation
|
page read and write
|
||
1E7777D3000
|
heap
|
page read and write
|
||
1E76A620000
|
trusted library allocation
|
page read and write
|
||
2BB80028C000
|
direct allocation
|
page read and write
|
||
1A6C91F6000
|
heap
|
page read and write
|
||
1E77784D000
|
heap
|
page read and write
|
||
13D80430000
|
heap
|
page readonly
|
||
1E77784F000
|
heap
|
page read and write
|
||
1E76E401000
|
heap
|
page read and write
|
||
1E771340000
|
heap
|
page read and write
|
||
9AC197F000
|
stack
|
page read and write
|
||
1E770060000
|
trusted library allocation
|
page read and write
|
||
1E777B88000
|
heap
|
page read and write
|
||
1E76FFEF000
|
trusted library allocation
|
page read and write
|
||
1A6C91D2000
|
heap
|
page read and write
|
||
1E7711F0000
|
trusted library allocation
|
page read and write
|
||
1E777B7B000
|
heap
|
page read and write
|
||
1E76913A000
|
heap
|
page read and write
|
||
1E7777B1000
|
heap
|
page read and write
|
||
1E7776C2000
|
heap
|
page read and write
|
||
1E769A8D000
|
heap
|
page read and write
|
||
1E7711AF000
|
trusted library allocation
|
page read and write
|
||
1E774B53000
|
heap
|
page read and write
|
||
1E7776CA000
|
heap
|
page read and write
|
||
9ABFCBF000
|
stack
|
page read and write
|
||
1E7712A7000
|
heap
|
page read and write
|
||
1E777B23000
|
heap
|
page read and write
|
||
1E773EAC000
|
heap
|
page read and write
|
||
1E7654E9000
|
heap
|
page read and write
|
||
1E765403000
|
heap
|
page read and write
|
||
9AC107E000
|
stack
|
page read and write
|
||
1E7716A6000
|
heap
|
page read and write
|
||
1E770013000
|
trusted library allocation
|
page read and write
|
||
1E7654CA000
|
heap
|
page read and write
|
||
1E773D9D000
|
heap
|
page read and write
|
||
1E770080000
|
trusted library allocation
|
page read and write
|
||
1E7654A7000
|
heap
|
page read and write
|
||
1E777AE7000
|
heap
|
page read and write
|
||
1E774125000
|
heap
|
page read and write
|
||
1E7776C5000
|
heap
|
page read and write
|
||
1E773EBB000
|
heap
|
page read and write
|
||
1E7711B0000
|
trusted library allocation
|
page read and write
|
||
1E777780000
|
heap
|
page read and write
|
||
1E7713B0000
|
direct allocation
|
page read and write
|
||
1E7778C8000
|
heap
|
page read and write
|
||
1E76E6BD000
|
heap
|
page read and write
|
||
1A6CAD00000
|
heap
|
page execute and read and write
|
||
1E7778CC000
|
heap
|
page read and write
|
||
1E76E41D000
|
heap
|
page read and write
|
||
1E76A62B000
|
trusted library allocation
|
page read and write
|
||
1E7712E0000
|
heap
|
page read and write
|
||
1E7778CE000
|
heap
|
page read and write
|
||
1E777B6E000
|
heap
|
page read and write
|
||
1E777D69000
|
heap
|
page read and write
|
||
1E7653D2000
|
heap
|
page read and write
|
||
1E7749C0000
|
heap
|
page read and write
|
||
16C000230000
|
trusted library allocation
|
page read and write
|
||
1E76E6AF000
|
heap
|
page read and write
|
||
1A6C918C000
|
heap
|
page read and write
|
||
1E7712A7000
|
heap
|
page read and write
|
||
1E777A60000
|
heap
|
page read and write
|
||
1E76E64E000
|
heap
|
page read and write
|
||
1E763A56000
|
unkown
|
page read and write
|
||
1E7776C2000
|
heap
|
page read and write
|
||
1A6C923A000
|
heap
|
page read and write
|
||
1E7654E0000
|
heap
|
page read and write
|
||
1E771290000
|
heap
|
page read and write
|
||
1E76E6B1000
|
heap
|
page read and write
|
||
1E76A630000
|
trusted library allocation
|
page read and write
|
||
9ABD0FF000
|
stack
|
page read and write
|
||
1E773EE8000
|
heap
|
page read and write
|
||
1E7654CD000
|
heap
|
page read and write
|
||
1E765403000
|
heap
|
page read and write
|
||
9ABF675000
|
stack
|
page read and write
|
||
1E771330000
|
trusted library allocation
|
page read and write
|
||
1E7777F5000
|
heap
|
page read and write
|
||
1E77412F000
|
heap
|
page read and write
|
||
1E777808000
|
heap
|
page read and write
|
||
1E7777AF000
|
heap
|
page read and write
|
||
9ABCF7E000
|
stack
|
page read and write
|
||
1A6C91DB000
|
heap
|
page read and write
|
||
1E7778D2000
|
heap
|
page read and write
|
||
1E773D31000
|
heap
|
page read and write
|
||
1E769ACC000
|
heap
|
page read and write
|
||
1E777A15000
|
heap
|
page read and write
|
||
1E76A410000
|
heap
|
page read and write
|
||
9ABC7FE000
|
stack
|
page read and write
|
||
1E777B4C000
|
heap
|
page read and write
|
||
1E76534B000
|
heap
|
page read and write
|
||
1E7778C0000
|
heap
|
page read and write
|
||
1E77780E000
|
heap
|
page read and write
|
||
1E777A0A000
|
heap
|
page read and write
|
||
13D80450000
|
heap
|
page read and write
|
||
1E76546C000
|
heap
|
page read and write
|
||
1E7749D1000
|
heap
|
page read and write
|
||
1E7711A0000
|
trusted library allocation
|
page read and write
|
||
1E7778BB000
|
heap
|
page read and write
|
||
1E76E6B7000
|
heap
|
page read and write
|
||
1E771433000
|
direct allocation
|
page read and write
|
||
1A6CAC98000
|
unkown
|
page readonly
|
||
1E777B7F000
|
heap
|
page read and write
|
||
2BB80023C000
|
direct allocation
|
page read and write
|
||
1E777A5C000
|
heap
|
page read and write
|
||
1E777937000
|
heap
|
page read and write
|
||
1E777B32000
|
heap
|
page read and write
|
||
1E7779D9000
|
heap
|
page read and write
|
||
1E76E0BC000
|
heap
|
page read and write
|
||
1E773EC9000
|
heap
|
page read and write
|
||
1E77771F000
|
heap
|
page read and write
|
||
1E773DF3000
|
heap
|
page read and write
|
||
9ABC37E000
|
stack
|
page read and write
|
||
16C0002B4000
|
trusted library allocation
|
page read and write
|
||
13D804DB000
|
heap
|
page read and write
|
||
1E777879000
|
heap
|
page read and write
|
||
2BB8002BC000
|
direct allocation
|
page read and write
|
||
1E7776D1000
|
heap
|
page read and write
|
||
1E7654C8000
|
heap
|
page read and write
|
||
1A6C91C3000
|
heap
|
page read and write
|
||
9AC0BFE000
|
stack
|
page read and write
|
||
1E7712B0000
|
heap
|
page read and write
|
||
1E77780A000
|
heap
|
page read and write
|
||
1E7779B9000
|
heap
|
page read and write
|
||
1A6C918E000
|
heap
|
page read and write
|
||
1E777970000
|
heap
|
page read and write
|
||
1E771190000
|
direct allocation
|
page read and write
|
||
1E7654A7000
|
heap
|
page read and write
|
||
1E777847000
|
heap
|
page read and write
|
||
9ABEEFE000
|
stack
|
page read and write
|
||
1E76A622000
|
trusted library allocation
|
page read and write
|
||
1E773F80000
|
heap
|
page read and write
|
||
2307FFE000
|
unkown
|
page readonly
|
||
1E769AA0000
|
heap
|
page read and write
|
||
1E77143C000
|
direct allocation
|
page read and write
|
||
1E773E39000
|
heap
|
page read and write
|
||
1E7654B7000
|
heap
|
page read and write
|
||
1E7711C0000
|
trusted library allocation
|
page read and write
|
||
1E76E69E000
|
heap
|
page read and write
|
||
1E7777AD000
|
heap
|
page read and write
|
||
1E771292000
|
heap
|
page read and write
|
||
1E7712B9000
|
heap
|
page read and write
|
||
1E76E6A0000
|
heap
|
page read and write
|
||
1E777767000
|
heap
|
page read and write
|
||
1E777A19000
|
heap
|
page read and write
|
||
1E771310000
|
trusted library allocation
|
page read and write
|
||
16C0002F0000
|
trusted library allocation
|
page read and write
|
||
1E76E066000
|
heap
|
page read and write
|
||
1E777AF2000
|
heap
|
page read and write
|
||
1E773FC0000
|
heap
|
page read and write
|
||
1E773EB0000
|
heap
|
page read and write
|
||
1E7711D0000
|
trusted library allocation
|
page read and write
|
||
1E77795B000
|
heap
|
page read and write
|
||
1E7779EA000
|
heap
|
page read and write
|
||
1E765442000
|
heap
|
page read and write
|
||
1E7778B3000
|
heap
|
page read and write
|
||
1E77785C000
|
heap
|
page read and write
|
||
1E771409000
|
heap
|
page read and write
|
||
1E773F3A000
|
heap
|
page read and write
|
||
9ABF4FE000
|
stack
|
page read and write
|
||
9AC047E000
|
stack
|
page read and write
|
||
1E75F840000
|
unkown
|
page readonly
|
||
1E7779CA000
|
heap
|
page read and write
|
||
1E777776000
|
heap
|
page read and write
|
||
1E777B5B000
|
heap
|
page read and write
|
||
1E773D5C000
|
heap
|
page read and write
|
||
1A6CAB01000
|
unkown
|
page execute read
|
||
1E7778B7000
|
heap
|
page read and write
|
||
7FF7D7F74000
|
unkown
|
page readonly
|
||
1E76E551000
|
heap
|
page read and write
|
||
1E76BEAF000
|
trusted library allocation
|
page read and write
|
||
1E76E0CD000
|
heap
|
page read and write
|
||
1E765449000
|
heap
|
page read and write
|
||
1A6C9195000
|
heap
|
page read and write
|
||
1E76E6AD000
|
heap
|
page read and write
|
||
1E7778C6000
|
heap
|
page read and write
|
||
1E777898000
|
heap
|
page read and write
|
||
1E7654C7000
|
heap
|
page read and write
|
||
1E777B16000
|
heap
|
page read and write
|
||
1A6CAB20000
|
heap
|
page read and write
|
||
1E773EBF000
|
heap
|
page read and write
|
||
1E7712BA000
|
heap
|
page read and write
|
||
1E777863000
|
heap
|
page read and write
|
||
9ABFB3E000
|
stack
|
page read and write
|
||
1E771774000
|
heap
|
page read and write
|
||
1E777B8A000
|
heap
|
page read and write
|
||
9ABC97E000
|
stack
|
page read and write
|
||
1A6C9160000
|
heap
|
page read and write
|
||
1E7712BC000
|
heap
|
page read and write
|
||
1E770060000
|
trusted library allocation
|
page read and write
|
||
1E7654BD000
|
heap
|
page read and write
|
||
1E7778D9000
|
heap
|
page read and write
|
||
1E777886000
|
heap
|
page read and write
|
||
1A6C90D0000
|
heap
|
page read and write
|
||
1E7777C6000
|
heap
|
page read and write
|
||
1E76E5CD000
|
heap
|
page read and write
|
||
1E77792A000
|
heap
|
page read and write
|
||
1E7711B0000
|
trusted library allocation
|
page read and write
|
||
1E777B41000
|
heap
|
page read and write
|
||
1E765528000
|
heap
|
page read and write
|
||
1E770043000
|
trusted library allocation
|
page read and write
|
||
1E77411B000
|
heap
|
page read and write
|
||
1E7712A7000
|
heap
|
page read and write
|
||
9ABFCFD000
|
stack
|
page read and write
|
||
1E7654E2000
|
heap
|
page read and write
|
||
9ABD3FB000
|
stack
|
page read and write
|
||
1E771738000
|
heap
|
page read and write
|
||
1E769A41000
|
heap
|
page read and write
|
||
1E77129F000
|
heap
|
page read and write
|
||
1E777B8C000
|
heap
|
page read and write
|
||
1E777B72000
|
heap
|
page read and write
|
||
1E76A627000
|
trusted library allocation
|
page read and write
|
||
1E76AA20000
|
heap
|
page read and write
|
||
1E777935000
|
heap
|
page read and write
|
||
1A6C91EB000
|
heap
|
page read and write
|
||
2BB8002A8000
|
direct allocation
|
page read and write
|
||
1E777AC5000
|
heap
|
page read and write
|
||
1E76A621000
|
trusted library allocation
|
page read and write
|
||
16C000201000
|
trusted library allocation
|
page read and write
|
||
1E771200000
|
trusted library allocation
|
page read and write
|
||
1E773EBF000
|
heap
|
page read and write
|
||
1A6C91C6000
|
heap
|
page read and write
|
||
1E777B27000
|
heap
|
page read and write
|
||
1E76E69E000
|
heap
|
page read and write
|
||
1E7779C6000
|
heap
|
page read and write
|
||
1E7712E3000
|
heap
|
page read and write
|
||
1A6CDA0B000
|
direct allocation
|
page read and write
|
||
1E774B50000
|
heap
|
page read and write
|
||
1E77781A000
|
heap
|
page read and write
|
||
1E76E457000
|
heap
|
page read and write
|
||
1E7740A8000
|
heap
|
page read and write
|
||
1E7749E5000
|
heap
|
page read and write
|
||
9ABEA7F000
|
stack
|
page read and write
|
||
1E7654B8000
|
heap
|
page read and write
|
||
1E77788B000
|
heap
|
page read and write
|
||
1E771440000
|
direct allocation
|
page read and write
|
||
1E7778CA000
|
heap
|
page read and write
|
||
9ABDCFE000
|
stack
|
page read and write
|
||
1E7653E4000
|
heap
|
page read and write
|
||
1E7777A4000
|
heap
|
page read and write
|
||
1E773E9D000
|
heap
|
page read and write
|
||
1E76A130000
|
heap
|
page read and write
|
||
1A6C91B9000
|
heap
|
page read and write
|
||
1E76E470000
|
heap
|
page read and write
|
||
1E76A62C000
|
trusted library allocation
|
page read and write
|
||
1E777A26000
|
heap
|
page read and write
|
||
1E7711C0000
|
trusted library allocation
|
page read and write
|
||
1E761570000
|
unkown
|
page readonly
|
||
1E7779C4000
|
heap
|
page read and write
|
||
1E769A83000
|
heap
|
page read and write
|
||
1E76E542000
|
heap
|
page read and write
|
||
1E76E0A0000
|
heap
|
page read and write
|
||
1E777806000
|
heap
|
page read and write
|
||
1E7740B7000
|
heap
|
page read and write
|
||
2BB800234000
|
direct allocation
|
page read and write
|
||
1E771290000
|
heap
|
page read and write
|
||
1E7654B7000
|
heap
|
page read and write
|
||
1E770010000
|
trusted library allocation
|
page read and write
|
||
1E771190000
|
direct allocation
|
page read and write
|
||
1E77143C000
|
direct allocation
|
page read and write
|
||
1E7740FF000
|
heap
|
page read and write
|
||
1A6C91D0000
|
heap
|
page read and write
|
||
1E7712BF000
|
heap
|
page read and write
|
||
1E77785E000
|
heap
|
page read and write
|
||
1E76E0E2000
|
heap
|
page read and write
|
||
1E771436000
|
direct allocation
|
page read and write
|
||
1E777B34000
|
heap
|
page read and write
|
||
1A6C91E7000
|
heap
|
page read and write
|
||
1E774053000
|
heap
|
page read and write
|
||
1E777875000
|
heap
|
page read and write
|
||
1E7778B1000
|
heap
|
page read and write
|
||
16C000210000
|
trusted library allocation
|
page read and write
|
||
2BB800288000
|
direct allocation
|
page read and write
|
||
1E771339000
|
heap
|
page read and write
|
||
1A6CD000000
|
direct allocation
|
page read and write
|
||
16C0002AC000
|
trusted library allocation
|
page read and write
|
||
7FF7D7F36000
|
unkown
|
page readonly
|
||
1E76A626000
|
trusted library allocation
|
page read and write
|
||
1E777813000
|
heap
|
page read and write
|
||
1E76A0E0000
|
trusted library allocation
|
page read and write
|
||
23057FA000
|
stack
|
page read and write
|
||
1E76549B000
|
heap
|
page read and write
|
||
1E762AF5000
|
unkown
|
page readonly
|
||
1E7610DF000
|
unkown
|
page read and write
|
||
1E77183F000
|
heap
|
page read and write
|
||
1E76A320000
|
heap
|
page read and write
|
||
1E7778B9000
|
heap
|
page read and write
|
||
9ABD6FD000
|
stack
|
page read and write
|
||
1E771360000
|
heap
|
page read and write
|
||
1A6C9140000
|
heap
|
page readonly
|
||
9ABC4FE000
|
stack
|
page read and write
|
||
1E7712C0000
|
trusted library allocation
|
page read and write
|
||
1E771298000
|
heap
|
page read and write
|
||
1E770070000
|
trusted library allocation
|
page read and write
|
||
1E76548E000
|
heap
|
page read and write
|
||
1E777933000
|
heap
|
page read and write
|
||
1E773EE8000
|
heap
|
page read and write
|
||
1E77796E000
|
heap
|
page read and write
|
||
1E7779C8000
|
heap
|
page read and write
|
||
1E6D2D13000
|
direct allocation
|
page read and write
|
||
1E7777B3000
|
heap
|
page read and write
|
||
1E7778DD000
|
heap
|
page read and write
|
||
1E77781C000
|
heap
|
page read and write
|
||
1E76A62E000
|
trusted library allocation
|
page read and write
|
||
1E7776C3000
|
heap
|
page read and write
|
||
1A6C9110000
|
direct allocation
|
page read and write
|
||
1E76E46C000
|
heap
|
page read and write
|
||
2BB800201000
|
direct allocation
|
page read and write
|
||
1E777AEB000
|
heap
|
page read and write
|
||
1E76E0C4000
|
heap
|
page read and write
|
||
1E7717FF000
|
heap
|
page read and write
|
||
1E770070000
|
trusted library allocation
|
page read and write
|
||
9ABF7FB000
|
stack
|
page read and write
|
||
1E773DF5000
|
heap
|
page read and write
|
||
1E773EA5000
|
heap
|
page read and write
|
||
1E77789A000
|
heap
|
page read and write
|
||
1A6C91C5000
|
heap
|
page read and write
|
||
1E771320000
|
trusted library allocation
|
page read and write
|
||
1E7716C4000
|
heap
|
page read and write
|
||
1E771210000
|
trusted library allocation
|
page read and write
|
||
1A6CD5A1000
|
direct allocation
|
page read and write
|
||
1E7740AA000
|
heap
|
page read and write
|
||
1E777A20000
|
heap
|
page read and write
|
||
1E7778AA000
|
heap
|
page read and write
|
||
16C000290000
|
trusted library allocation
|
page read and write
|
||
1E771A3F000
|
heap
|
page read and write
|
||
1E7654D0000
|
heap
|
page read and write
|
||
1E7740AA000
|
heap
|
page read and write
|
||
1E7654A9000
|
heap
|
page read and write
|
||
1E777AD4000
|
heap
|
page read and write
|
||
1A6C91E0000
|
heap
|
page read and write
|
||
1E7777F7000
|
heap
|
page read and write
|
||
1E773F38000
|
heap
|
page read and write
|
||
1E7778D7000
|
heap
|
page read and write
|
||
1E76E319000
|
heap
|
page read and write
|
||
16C000238000
|
trusted library allocation
|
page read and write
|
||
1E77786A000
|
heap
|
page read and write
|
||
1A6CD400000
|
direct allocation
|
page read and write
|
||
1E76E656000
|
heap
|
page read and write
|
||
1A6C9130000
|
trusted library allocation
|
page read and write
|
||
1E77134D000
|
heap
|
page read and write
|
||
1E7610F4000
|
unkown
|
page read and write
|
||
1E76AA24000
|
heap
|
page read and write
|
||
1E777B21000
|
heap
|
page read and write
|
||
1E771300000
|
trusted library allocation
|
page read and write
|
||
1E771419000
|
heap
|
page read and write
|
||
1E76A610000
|
heap
|
page read and write
|
||
1E7654D2000
|
heap
|
page read and write
|
||
1A6C90B0000
|
heap
|
page read and write
|
||
1E777A5E000
|
heap
|
page read and write
|
||
1E771293000
|
trusted library allocation
|
page read and write
|
||
1E7776CE000
|
heap
|
page read and write
|
||
1E773EC3000
|
heap
|
page read and write
|
||
1E7778A6000
|
heap
|
page read and write
|
||
1E7779E8000
|
heap
|
page read and write
|
||
1E6CAD14000
|
direct allocation
|
page read and write
|
||
1E76E6C0000
|
trusted library allocation
|
page read and write
|
||
1E771200000
|
trusted library allocation
|
page read and write
|
||
1E773DF1000
|
heap
|
page read and write
|
||
9ABD575000
|
stack
|
page read and write
|
||
1E777A17000
|
heap
|
page read and write
|
||
1E773D34000
|
heap
|
page read and write
|
||
1E7779D7000
|
heap
|
page read and write
|
||
1E76552B000
|
heap
|
page read and write
|
||
1E76A62F000
|
trusted library allocation
|
page read and write
|
||
1A6CD9EF000
|
direct allocation
|
page read and write
|
||
1E77776B000
|
heap
|
page read and write
|
||
1E7777A2000
|
heap
|
page read and write
|
||
1E771420000
|
direct allocation
|
page read and write
|
||
1E7779D5000
|
heap
|
page read and write
|
||
1E769ABD000
|
heap
|
page read and write
|
||
1E7653BF000
|
heap
|
page read and write
|
||
1E770063000
|
trusted library allocation
|
page read and write
|
||
1E771357000
|
heap
|
page read and write
|
||
1E7711A3000
|
trusted library allocation
|
page read and write
|
||
1E7776C3000
|
heap
|
page read and write
|
||
1E7654EF000
|
heap
|
page read and write
|
||
1E76A62A000
|
trusted library allocation
|
page read and write
|
||
1E76A0D0000
|
heap
|
page read and write
|
||
9ABF97B000
|
stack
|
page read and write
|
||
1A6CD9FF000
|
direct allocation
|
page read and write
|
||
1A6CAB00000
|
unkown
|
page readonly
|
||
7FF7D7F6F000
|
unkown
|
page readonly
|
||
1E777B3D000
|
heap
|
page read and write
|
||
1E77155C000
|
heap
|
page read and write
|
||
1E7779CC000
|
heap
|
page read and write
|
||
1E7749EE000
|
heap
|
page read and write
|
||
1E771562000
|
heap
|
page read and write
|
||
1E76E700000
|
trusted library allocation
|
page read and write
|
||
1A6C91EF000
|
heap
|
page read and write
|
||
1E770010000
|
trusted library allocation
|
page read and write
|
||
13D80470000
|
heap
|
page read and write
|
||
1E777B4E000
|
heap
|
page read and write
|
||
1E762732000
|
unkown
|
page readonly
|
||
1E76E6F0000
|
trusted library allocation
|
page read and write
|
||
1E762AA7000
|
unkown
|
page readonly
|
||
1E765438000
|
heap
|
page read and write
|
||
9AC167F000
|
stack
|
page read and write
|
||
1E777858000
|
heap
|
page read and write
|
||
1E7654E2000
|
heap
|
page read and write
|
||
7FF7D7D98000
|
unkown
|
page readonly
|
||
1A6CAAC9000
|
heap
|
page read and write
|
||
1E777B45000
|
heap
|
page read and write
|
||
1E777AE5000
|
heap
|
page read and write
|
||
16C00027C000
|
trusted library allocation
|
page read and write
|
||
1E777961000
|
heap
|
page read and write
|
||
1E765463000
|
heap
|
page read and write
|
||
1A6C91C6000
|
heap
|
page read and write
|
||
1E76E12B000
|
heap
|
page read and write
|
||
1E7779E6000
|
heap
|
page read and write
|
||
1E76E45F000
|
heap
|
page read and write
|
||
1E771390000
|
trusted library allocation
|
page read and write
|
||
16C000248000
|
trusted library allocation
|
page read and write
|
||
1E76E720000
|
trusted library allocation
|
page read and write
|
||
1E777A11000
|
heap
|
page read and write
|
||
1E77786C000
|
heap
|
page read and write
|
||
1E75FFB9000
|
unkown
|
page readonly
|
||
1A6C9150000
|
heap
|
page read and write
|
||
1E763AE0000
|
unkown
|
page readonly
|
||
1E7654D2000
|
heap
|
page read and write
|
||
1E76A629000
|
trusted library allocation
|
page read and write
|
||
1E7779DB000
|
heap
|
page read and write
|
||
1E761C10000
|
unkown
|
page readonly
|
||
1E77786E000
|
heap
|
page read and write
|
||
1E765363000
|
heap
|
page read and write
|
||
1E777B09000
|
heap
|
page read and write
|
||
1E777AA0000
|
heap
|
page read and write
|
||
1A6C91F6000
|
heap
|
page read and write
|
||
1A6C91CE000
|
heap
|
page read and write
|
||
1E7779CE000
|
heap
|
page read and write
|
||
1A6C91DA000
|
heap
|
page read and write
|
||
1E773E7D000
|
heap
|
page read and write
|
||
1E76A625000
|
trusted library allocation
|
page read and write
|
||
1E777A51000
|
heap
|
page read and write
|
||
1A6CAAC0000
|
heap
|
page read and write
|
||
1E7712D0000
|
trusted library allocation
|
page read and write
|
||
1A6CD9F6000
|
direct allocation
|
page read and write
|
||
1E7778DF000
|
heap
|
page read and write
|
||
1E777867000
|
heap
|
page read and write
|
||
1A6CACB0000
|
unkown
|
page readonly
|
||
9ABD9FB000
|
stack
|
page read and write
|
||
9ABDE7F000
|
stack
|
page read and write
|
||
16C00026C000
|
trusted library allocation
|
page read and write
|
||
16C000250000
|
trusted library allocation
|
page read and write
|
||
1E77792C000
|
heap
|
page read and write
|
||
1E7777F3000
|
heap
|
page read and write
|
||
1E777856000
|
heap
|
page read and write
|
||
1A6C91E0000
|
heap
|
page read and write
|
||
1E765406000
|
heap
|
page read and write
|
||
1E76E62B000
|
heap
|
page read and write
|
||
1E777889000
|
heap
|
page read and write
|
||
1E77A6B1000
|
heap
|
page read and write
|
||
1E77779E000
|
heap
|
page read and write
|
||
1E777881000
|
heap
|
page read and write
|
||
1E7653F9000
|
heap
|
page read and write
|
||
1E774008000
|
heap
|
page read and write
|
||
1E7749C8000
|
heap
|
page read and write
|
||
1E77793B000
|
heap
|
page read and write
|
||
1A6C91CE000
|
heap
|
page read and write
|
||
1E77778F000
|
heap
|
page read and write
|
||
1E771568000
|
heap
|
page read and write
|
||
1E7712B0000
|
heap
|
page read and write
|
||
1E7749EC000
|
heap
|
page read and write
|
||
1E77410F000
|
heap
|
page read and write
|
||
1E760478000
|
unkown
|
page readonly
|
||
1E7776C5000
|
heap
|
page read and write
|
||
1E773D5A000
|
heap
|
page read and write
|
||
1E7777B7000
|
heap
|
page read and write
|
||
1E7712A0000
|
trusted library allocation
|
page read and write
|
||
1E771340000
|
trusted library allocation
|
page read and write
|
||
9ABE77F000
|
stack
|
page read and write
|
||
9AC077E000
|
stack
|
page read and write
|
||
1A6C91B5000
|
heap
|
page read and write
|
||
7FF7D7781000
|
unkown
|
page execute read
|
||
1E7654CA000
|
heap
|
page read and write
|
||
1E777A4D000
|
heap
|
page read and write
|
||
1E7653FC000
|
heap
|
page read and write
|
||
1E76E730000
|
trusted library allocation
|
page read and write
|
||
1E7715C9000
|
heap
|
page read and write
|
||
9ABE5FE000
|
stack
|
page read and write
|
||
1E7654CE000
|
heap
|
page read and write
|
||
1E76A62D000
|
trusted library allocation
|
page read and write
|
||
1E7779BD000
|
heap
|
page read and write
|
||
1E77787B000
|
heap
|
page read and write
|
||
1E7711C3000
|
trusted library allocation
|
page read and write
|
||
23067FE000
|
unkown
|
page read and write
|
||
1E773DAD000
|
heap
|
page read and write
|
||
1E771190000
|
direct allocation
|
page read and write
|
||
1E76E484000
|
heap
|
page read and write
|
||
1E774053000
|
heap
|
page read and write
|
||
1E777838000
|
heap
|
page read and write
|
||
1E76E542000
|
heap
|
page read and write
|
||
1A6CB011000
|
direct allocation
|
page read and write
|
||
1E77775E000
|
heap
|
page read and write
|
||
1E76E6B7000
|
heap
|
page read and write
|
||
1E777865000
|
heap
|
page read and write
|
||
1E771230000
|
trusted library allocation
|
page read and write
|
||
2BB800278000
|
direct allocation
|
page read and write
|
||
9AC11FC000
|
stack
|
page read and write
|
||
1E777774000
|
heap
|
page read and write
|
||
1E7711A3000
|
trusted library allocation
|
page read and write
|
||
1A6CAC9F000
|
unkown
|
page readonly
|
||
1E76E4BE000
|
heap
|
page read and write
|
||
1E777B2E000
|
heap
|
page read and write
|
||
1A6C91D9000
|
heap
|
page read and write
|
||
1A6C91D7000
|
heap
|
page read and write
|
||
1E76E476000
|
heap
|
page read and write
|
||
16C0002C4000
|
trusted library allocation
|
page read and write
|
||
1E771330000
|
heap
|
page read and write
|
||
1A6C910F000
|
trusted library allocation
|
page read and write
|
||
16C0002B4000
|
trusted library allocation
|
page read and write
|
||
1E76E6B7000
|
heap
|
page read and write
|
||
1E77776D000
|
heap
|
page read and write
|
||
1E7776E0000
|
heap
|
page read and write
|
||
1E777AF4000
|
heap
|
page read and write
|
||
1E7711D0000
|
trusted library allocation
|
page read and write
|
||
1E777B81000
|
heap
|
page read and write
|
||
1E7715C4000
|
heap
|
page read and write
|
||
1E7712C0000
|
heap
|
page read and write
|
||
1A6C91B6000
|
heap
|
page read and write
|
||
1E7711B0000
|
trusted library allocation
|
page read and write
|
||
1E777822000
|
heap
|
page read and write
|
||
1E769A86000
|
heap
|
page read and write
|
||
1A6C9143000
|
heap
|
page readonly
|
||
1E7717A7000
|
heap
|
page read and write
|
||
1E777B50000
|
heap
|
page read and write
|
||
1A6CAAE8000
|
heap
|
page read and write
|
||
1E7778A8000
|
heap
|
page read and write
|
||
1E777B43000
|
heap
|
page read and write
|
||
1E7690E8000
|
heap
|
page read and write
|
||
9AC0A7E000
|
stack
|
page read and write
|
||
1E7779E4000
|
heap
|
page read and write
|
||
1E773EBA000
|
heap
|
page read and write
|
||
1E7779B7000
|
heap
|
page read and write
|
||
1E7690E4000
|
heap
|
page read and write
|
||
1A6C91F0000
|
heap
|
page read and write
|
||
1E771190000
|
direct allocation
|
page read and write
|
||
9ABCAFA000
|
stack
|
page read and write
|
||
1E770070000
|
trusted library allocation
|
page read and write
|
||
1E765463000
|
heap
|
page read and write
|
||
1E7779BF000
|
heap
|
page read and write
|
||
9AC137C000
|
stack
|
page read and write
|
||
1E771220000
|
trusted library allocation
|
page read and write
|
||
1A6C91E4000
|
heap
|
page read and write
|
||
1E77795F000
|
heap
|
page read and write
|
||
1A6C91D2000
|
heap
|
page read and write
|
||
9AC08FE000
|
stack
|
page read and write
|
||
1E7778BE000
|
heap
|
page read and write
|
||
1E771741000
|
heap
|
page read and write
|
||
1E762AB6000
|
unkown
|
page readonly
|
||
1E7778DB000
|
heap
|
page read and write
|
||
1E76E586000
|
heap
|
page read and write
|
||
1E777861000
|
heap
|
page read and write
|
||
1E774980000
|
heap
|
page read and write
|
||
1E777A9E000
|
heap
|
page read and write
|
||
1A6C9195000
|
heap
|
page read and write
|
||
1E7654A4000
|
heap
|
page read and write
|
||
1E7778A0000
|
heap
|
page read and write
|
||
1E771410000
|
direct allocation
|
page read and write
|
||
1E773D58000
|
heap
|
page read and write
|
||
1A6C91D7000
|
heap
|
page read and write
|
||
1E777852000
|
heap
|
page read and write
|
||
1E7654AE000
|
heap
|
page read and write
|
||
1E76E6C3000
|
trusted library allocation
|
page read and write
|
||
1E777A62000
|
heap
|
page read and write
|
||
1E7654A7000
|
heap
|
page read and write
|
||
1E76E6B7000
|
heap
|
page read and write
|
||
1E77410F000
|
heap
|
page read and write
|
||
1A6C91F6000
|
heap
|
page read and write
|
||
1E773F7F000
|
heap
|
page read and write
|
||
1E770080000
|
trusted library allocation
|
page read and write
|
||
9AC1AFF000
|
stack
|
page read and write
|
||
1E76A190000
|
heap
|
page read and write
|
||
1E77129C000
|
heap
|
page read and write
|
||
1E773F7F000
|
heap
|
page read and write
|
||
1E77787D000
|
heap
|
page read and write
|
||
1E76E2F2000
|
heap
|
page read and write
|
||
1E777926000
|
heap
|
page read and write
|
||
1E765449000
|
heap
|
page read and write
|
||
23087FE000
|
stack
|
page read and write
|
||
1E771240000
|
trusted library allocation
|
page read and write
|
||
1E76E5A4000
|
heap
|
page read and write
|
||
16C0002B4000
|
trusted library allocation
|
page read and write
|
||
1E76E0D1000
|
heap
|
page read and write
|
||
1E763A50000
|
unkown
|
page read and write
|
||
1E762610000
|
unkown
|
page readonly
|
||
9ABBFDB000
|
stack
|
page read and write
|
||
1E771400000
|
heap
|
page read and write
|
||
1E771348000
|
heap
|
page read and write
|
||
1E76E106000
|
heap
|
page read and write
|
||
1E777765000
|
heap
|
page read and write
|
||
1E77136F000
|
heap
|
page read and write
|
||
1E777AF8000
|
heap
|
page read and write
|
||
1E76A623000
|
trusted library allocation
|
page read and write
|
||
1E771578000
|
heap
|
page read and write
|
||
1E7711A0000
|
trusted library allocation
|
page read and write
|
||
1E76FFF9000
|
heap
|
page read and write
|
||
1A6C91CE000
|
heap
|
page read and write
|
||
9ABDFFE000
|
stack
|
page read and write
|
||
1A6C91DE000
|
heap
|
page read and write
|
||
1E777B54000
|
heap
|
page read and write
|
||
9ABF1F7000
|
stack
|
page read and write
|
||
1E76A624000
|
trusted library allocation
|
page read and write
|
||
1E7654BD000
|
heap
|
page read and write
|
||
1E773E96000
|
heap
|
page read and write
|
||
1E774125000
|
heap
|
page read and write
|
||
16C0002A0000
|
trusted library allocation
|
page read and write
|
||
1E76E09B000
|
heap
|
page read and write
|
||
1E777896000
|
heap
|
page read and write
|
||
1E773EC9000
|
heap
|
page read and write
|
||
1E777B07000
|
heap
|
page read and write
|
||
1E769AC4000
|
heap
|
page read and write
|
||
1E777770000
|
heap
|
page read and write
|
||
1E7778D5000
|
heap
|
page read and write
|
||
1A6CAA6E000
|
heap
|
page read and write
|
||
1E7777A8000
|
heap
|
page read and write
|
||
1E7711A0000
|
trusted library allocation
|
page read and write
|
||
2BB800220000
|
direct allocation
|
page read and write
|
||
1A6CAB30000
|
unkown
|
page readonly
|
||
1E771813000
|
heap
|
page read and write
|
||
1E76E586000
|
heap
|
page read and write
|
||
1A6C9195000
|
heap
|
page read and write
|
||
1E7711A0000
|
trusted library allocation
|
page read and write
|
||
1E7777FD000
|
heap
|
page read and write
|
||
1E76E117000
|
heap
|
page read and write
|
||
1E76E6CF000
|
trusted library allocation
|
page read and write
|
||
1E77787F000
|
heap
|
page read and write
|
||
1E7740B4000
|
heap
|
page read and write
|
||
1E771639000
|
heap
|
page read and write
|
||
2BB80024C000
|
direct allocation
|
page read and write
|
||
13D80420000
|
heap
|
page read and write
|
||
1E77143F000
|
direct allocation
|
page read and write
|
||
1E771300000
|
trusted library allocation
|
page read and write
|
||
1E77134F000
|
heap
|
page read and write
|
||
1E76FFF0000
|
heap
|
page read and write
|
||
1E7690D0000
|
heap
|
page read and write
|
||
16C00028C000
|
trusted library allocation
|
page read and write
|
||
1E777A53000
|
heap
|
page read and write
|
||
1E777870000
|
heap
|
page read and write
|
||
9ABBF90000
|
stack
|
page read and write
|
||
1E76E6C0000
|
trusted library allocation
|
page read and write
|
||
1E7711D0000
|
trusted library allocation
|
page read and write
|
||
1E771390000
|
direct allocation
|
page read and write
|
||
1E7712D0000
|
trusted library allocation
|
page read and write
|
||
1E6DED3F000
|
direct allocation
|
page read and write
|
||
1E77161A000
|
heap
|
page read and write
|
||
1E7654A7000
|
heap
|
page read and write
|
||
1E7740BF000
|
heap
|
page read and write
|
||
1E7711D3000
|
trusted library allocation
|
page read and write
|
||
1A6C91C0000
|
heap
|
page read and write
|
||
1E7654FE000
|
heap
|
page read and write
|
||
1E76E6C0000
|
trusted library allocation
|
page read and write
|
||
9ABCC74000
|
stack
|
page read and write
|
||
16C00020C000
|
trusted library allocation
|
page read and write
|
||
1E7712BA000
|
heap
|
page read and write
|
||
1E7715DC000
|
heap
|
page read and write
|
||
1E76E4BD000
|
heap
|
page read and write
|
||
1E777761000
|
heap
|
page read and write
|
||
1E777877000
|
heap
|
page read and write
|
||
1E777B30000
|
heap
|
page read and write
|
||
1E777872000
|
heap
|
page read and write
|
||
1A6C91D2000
|
heap
|
page read and write
|
||
1E777B6C000
|
heap
|
page read and write
|
||
16C00025C000
|
trusted library allocation
|
page read and write
|
||
1A6CD9A1000
|
direct allocation
|
page read and write
|
||
1E769A74000
|
heap
|
page read and write
|
||
16C0002AC000
|
trusted library allocation
|
page read and write
|
||
1E777802000
|
heap
|
page read and write
|
||
1E77412F000
|
heap
|
page read and write
|
||
1E76E10F000
|
heap
|
page read and write
|
||
9AC017C000
|
stack
|
page read and write
|
||
1E760453000
|
unkown
|
page readonly
|
||
9ABE47F000
|
stack
|
page read and write
|
||
1E770080000
|
trusted library allocation
|
page read and write
|
||
1E773EAA000
|
heap
|
page read and write
|
||
1E777804000
|
heap
|
page read and write
|
||
1E76E143000
|
heap
|
page read and write
|
||
1A6C9166000
|
heap
|
page read and write
|
||
1E777A91000
|
heap
|
page read and write
|
||
1E7654D3000
|
heap
|
page read and write
|
||
23077FE000
|
stack
|
page read and write
|
||
1E7654FA000
|
heap
|
page read and write
|
||
1E777849000
|
heap
|
page read and write
|
||
1E762AD6000
|
unkown
|
page readonly
|
||
1E77129D000
|
heap
|
page read and write
|
||
9AC1C7E000
|
stack
|
page read and write
|
||
1E777B70000
|
heap
|
page read and write
|
||
1A6C91E1000
|
heap
|
page read and write
|
||
1E777778000
|
heap
|
page read and write
|
||
1E76E547000
|
heap
|
page read and write
|
||
1E777772000
|
heap
|
page read and write
|
||
1E7654B8000
|
heap
|
page read and write
|
||
1E777B5D000
|
heap
|
page read and write
|
||
9ABE17F000
|
stack
|
page read and write
|
||
1E76E171000
|
heap
|
page read and write
|
||
1A6CD5C3000
|
direct allocation
|
page read and write
|
||
1E77410F000
|
heap
|
page read and write
|
||
1A6CAB50000
|
unkown
|
page readonly
|
||
1E7654A2000
|
heap
|
page read and write
|
||
1E7654E2000
|
heap
|
page read and write
|
||
2BB800248000
|
direct allocation
|
page read and write
|
||
7FF7D7780000
|
unkown
|
page readonly
|
||
1E7711B0000
|
trusted library allocation
|
page read and write
|
||
16C0002C4000
|
trusted library allocation
|
page read and write
|
||
1E7776CF000
|
heap
|
page read and write
|
||
1E7711C0000
|
trusted library allocation
|
page read and write
|
||
9ABFAFB000
|
stack
|
page read and write
|
||
1E7653BF000
|
heap
|
page read and write
|
||
1E777B6A000
|
heap
|
page read and write
|
||
1E76E587000
|
heap
|
page read and write
|
||
1E7713B8000
|
direct allocation
|
page read and write
|
||
1E7654E0000
|
heap
|
page read and write
|
||
1E777B8E000
|
heap
|
page read and write
|
||
16C0002D8000
|
trusted library allocation
|
page read and write
|
||
1E769A62000
|
heap
|
page read and write
|
||
1E771625000
|
heap
|
page read and write
|
||
1E777B79000
|
heap
|
page read and write
|
||
1E773E88000
|
heap
|
page read and write
|
||
1E777AE9000
|
heap
|
page read and write
|
||
9AC02F9000
|
stack
|
page read and write
|
||
9ABFE7D000
|
stack
|
page read and write
|
||
1E763A3A000
|
unkown
|
page read and write
|
||
1E777A28000
|
heap
|
page read and write
|
||
1A6C9100000
|
trusted library allocation
|
page read and write
|
||
1E7777A0000
|
heap
|
page read and write
|
||
1E771447000
|
direct allocation
|
page read and write
|
||
1E7777F9000
|
heap
|
page read and write
|
||
1E777B18000
|
heap
|
page read and write
|
||
9ABE8FF000
|
stack
|
page read and write
|
||
1E765449000
|
heap
|
page read and write
|
||
1A6CAB52000
|
unkown
|
page readonly
|
||
16C0002C8000
|
trusted library allocation
|
page read and write
|
||
1E76E61A000
|
heap
|
page read and write
|
||
1E7778B5000
|
heap
|
page read and write
|
||
9AC0D7C000
|
stack
|
page read and write
|
||
1E770073000
|
trusted library allocation
|
page read and write
|
||
1A6C9154000
|
heap
|
page read and write
|
||
1E77789E000
|
heap
|
page read and write
|
||
1E7713C1000
|
direct allocation
|
page read and write
|
||
1E7779FB000
|
heap
|
page read and write
|
||
1E771250000
|
trusted library allocation
|
page read and write
|
||
1E7653EA000
|
heap
|
page read and write
|
||
1E76E505000
|
heap
|
page read and write
|
||
1E770050000
|
trusted library allocation
|
page read and write
|
||
1E773EC5000
|
heap
|
page read and write
|
||
1E7777C4000
|
heap
|
page read and write
|
||
1E771434000
|
direct allocation
|
page read and write
|
||
1E76E710000
|
trusted library allocation
|
page read and write
|
||
1E774054000
|
heap
|
page read and write
|
||
1E76E23A000
|
heap
|
page read and write
|
||
1E76E3F7000
|
heap
|
page read and write
|
||
1A6CAB0D000
|
direct allocation
|
page readonly
|
||
16C000220000
|
trusted library allocation
|
page read and write
|
||
1A6C91B5000
|
heap
|
page read and write
|
||
1A6CDA17000
|
direct allocation
|
page read and write
|
||
1E777763000
|
heap
|
page read and write
|
||
16C000260000
|
trusted library allocation
|
page read and write
|
||
1A6CAA00000
|
heap
|
page read and write
|
||
1E773E93000
|
heap
|
page read and write
|
||
1E7777FB000
|
heap
|
page read and write
|
||
1E76E0D3000
|
heap
|
page read and write
|
||
9ABF37F000
|
stack
|
page read and write
|
||
1E773FC1000
|
heap
|
page read and write
|
||
1E7654B7000
|
heap
|
page read and write
|
||
9ABDB7F000
|
stack
|
page read and write
|
||
2306FFE000
|
unkown
|
page readonly
|
||
1E771410000
|
heap
|
page read and write
|
||
1E7654D0000
|
heap
|
page read and write
|
||
1E777B36000
|
heap
|
page read and write
|
||
13D807E4000
|
heap
|
page read and write
|
||
1E7654D0000
|
heap
|
page read and write
|
||
1E773EBB000
|
heap
|
page read and write
|
||
1E77788D000
|
heap
|
page read and write
|
||
1E7654D4000
|
heap
|
page read and write
|
||
1E777B7D000
|
heap
|
page read and write
|
||
1A6CAB0C000
|
unkown
|
page read and write
|
||
1E7654D0000
|
heap
|
page read and write
|
||
1E77143A000
|
direct allocation
|
page read and write
|
||
1E76294C000
|
unkown
|
page readonly
|
||
1E7779BB000
|
heap
|
page read and write
|
||
1E771346000
|
heap
|
page read and write
|
||
1E774130000
|
heap
|
page read and write
|
||
1E76E15E000
|
heap
|
page read and write
|
||
1E771633000
|
heap
|
page read and write
|
||
1E77789C000
|
heap
|
page read and write
|
||
1E769A68000
|
heap
|
page read and write
|
||
1A6CB014000
|
direct allocation
|
page read and write
|
||
1E765406000
|
heap
|
page read and write
|
||
1E7778C2000
|
heap
|
page read and write
|
||
9ABC67D000
|
stack
|
page read and write
|
||
1E777B63000
|
heap
|
page read and write
|
||
1E771369000
|
heap
|
page read and write
|
||
1E76E6F3000
|
trusted library allocation
|
page read and write
|
||
1E777B90000
|
heap
|
page read and write
|
||
2BB800230000
|
direct allocation
|
page read and write
|
||
1E773F2B000
|
heap
|
page read and write
|
||
9AC17FE000
|
stack
|
page read and write
|
||
2BB80029C000
|
direct allocation
|
page read and write
|
||
1E773E92000
|
heap
|
page read and write
|
||
1E777A4F000
|
heap
|
page read and write
|
||
7FF7D7F16000
|
unkown
|
page write copy
|
||
1E76E740000
|
trusted library allocation
|
page read and write
|
||
9ABEBFE000
|
stack
|
page read and write
|
||
1E77796C000
|
heap
|
page read and write
|
||
1A6C91A6000
|
heap
|
page read and write
|
||
1E77411B000
|
heap
|
page read and write
|
||
1A6C91B5000
|
heap
|
page read and write
|
||
1E771298000
|
heap
|
page read and write
|
||
1E777B1F000
|
heap
|
page read and write
|
||
1E7712DF000
|
heap
|
page read and write
|
||
1E7653D0000
|
heap
|
page read and write
|
||
9AC14FE000
|
stack
|
page read and write
|
||
1E7712C0000
|
trusted library allocation
|
page read and write
|
||
1E774115000
|
heap
|
page read and write
|
||
1A6CB01A000
|
direct allocation
|
page read and write
|
||
1E7654F6000
|
heap
|
page read and write
|
||
1E77775C000
|
heap
|
page read and write
|
||
1E774008000
|
heap
|
page read and write
|
||
1E771798000
|
heap
|
page read and write
|
||
1E76E5AD000
|
heap
|
page read and write
|
||
1E7717E4000
|
heap
|
page read and write
|
||
1E76E60B000
|
heap
|
page read and write
|
||
1A6C91EF000
|
heap
|
page read and write
|
||
1E76A628000
|
trusted library allocation
|
page read and write
|
||
1E7654E9000
|
heap
|
page read and write
|
||
1E771294000
|
heap
|
page read and write
|
||
1E771303000
|
trusted library allocation
|
page read and write
|
||
1E777AF6000
|
heap
|
page read and write
|
||
1A6CAAC9000
|
heap
|
page read and write
|
||
1E7779B2000
|
heap
|
page read and write
|
||
1E7749F7000
|
heap
|
page read and write
|
||
1E7654BD000
|
heap
|
page read and write
|
||
1A6C9196000
|
heap
|
page read and write
|
||
1E77795D000
|
heap
|
page read and write
|
||
1A6CDA41000
|
direct allocation
|
page read and write
|
||
1E76A632000
|
trusted library allocation
|
page read and write
|
||
1E777854000
|
heap
|
page read and write
|
||
1E7778FF000
|
heap
|
page read and write
|
||
1E76E551000
|
heap
|
page read and write
|
||
1E777A13000
|
heap
|
page read and write
|
||
2BB80025C000
|
direct allocation
|
page read and write
|
||
1E7639F3000
|
unkown
|
page read and write
|
||
1E76E54A000
|
heap
|
page read and write
|
||
1E7778AC000
|
heap
|
page read and write
|
||
1E771203000
|
trusted library allocation
|
page read and write
|
||
13D804D0000
|
heap
|
page read and write
|
||
1E771426000
|
direct allocation
|
page read and write
|
||
1E760450000
|
unkown
|
page readonly
|
||
1E771290000
|
heap
|
page read and write
|
||
1E7777FF000
|
heap
|
page read and write
|
||
1E76A220000
|
heap
|
page read and write
|
||
1E777939000
|
heap
|
page read and write
|
||
1E7654D7000
|
heap
|
page read and write
|
||
1E777769000
|
heap
|
page read and write
|
||
1E7713A3000
|
direct allocation
|
page read and write
|
||
1A6CDA1D000
|
direct allocation
|
page read and write
|
||
1E765452000
|
heap
|
page read and write
|
||
1E771203000
|
trusted library allocation
|
page read and write
|
||
1A6CD9FD000
|
direct allocation
|
page read and write
|
||
1E773EAA000
|
heap
|
page read and write
|
||
9ABE2FE000
|
stack
|
page read and write
|
||
1E7778AF000
|
heap
|
page read and write
|
||
1E777A24000
|
heap
|
page read and write
|
There are 932 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://www.free-pdf-creator.com/
|
||
https://www.free-pdf-creator.com/lps/typ/?offer=false
|
||
https://www.free-pdf-creator.com/lps/typ/?offer=false
|
||
https://www.free-pdf-creator.com/lps/typ/?offer=false
|
||
https://pdf.activegn.com/
|
||
https://pdf.activegn.com/
|
||
https://pdf.activegn.com/
|
||
file:///C:/Users/user/Downloads/download.htm
|
||
file:///C:/Users/user/Downloads/download%20(1).htm
|