Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Program.Unwanted.5320.27373.27791.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\PC Cleaner\Animation.gif (copy)
|
GIF image data, version 89a, 48 x 48
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\Brazilian.ini (copy)
|
Generic INItialization configuration [Actions]
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\Cookies.txt (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\Danish.ini (copy)
|
Generic INItialization configuration [Actions]
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\Dutch.ini (copy)
|
Unicode text, UTF-8 (with BOM) text, with very long lines (465), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\English.ini (copy)
|
Generic INItialization configuration [Actions]
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\Finnish.ini (copy)
|
Unicode text, UTF-8 (with BOM) text, with very long lines (408), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\French.ini (copy)
|
Unicode text, UTF-8 (with BOM) text, with very long lines (410), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\GExts.txt (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\German.ini (copy)
|
Unicode text, UTF-8 (with BOM) text, with very long lines (479), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\HomePage.url (copy)
|
MS Windows 95 Internet shortcut text (URL=<https://www.pchelpsoft.com/>), ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\Ids.txt (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\Italian.ini (copy)
|
Unicode text, UTF-8 (with BOM) text, with very long lines (451), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\Japanese.ini (copy)
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\Norwegian.ini (copy)
|
Unicode text, UTF-8 (with BOM) text, with very long lines (382), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\PCCNotifications.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\PCCleaner.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\PCHSUninstaller.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\PlayaSDK.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\Polish.ini (copy)
|
Unicode text, UTF-8 (with BOM) text, with very long lines (456), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\Portuguese.ini (copy)
|
Unicode text, UTF-8 (with BOM) text, with very long lines (413), with CRLF, CR line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\Russian.ini (copy)
|
Unicode text, UTF-8 (with BOM) text, with very long lines (357), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\SList.db (copy)
|
SQLite 3.x database, last written using SQLite version 3011000, page size 1024, file counter 3, database pages 1069, cookie
0x18, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\SList.txt (copy)
|
Non-ISO extended-ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\SchedTasks.txt (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\Services1.txt (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\Services2.txt (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\SiteNtf.txt (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\Spanish.ini (copy)
|
Unicode text, UTF-8 (with BOM) text, with very long lines (404), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\Swedish.ini (copy)
|
Unicode text, UTF-8 (with BOM) text, with very long lines (388), with CRLF, CR line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\Turkish.ini (copy)
|
Unicode text, UTF-8 (with BOM) text, with very long lines (424), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-0OI5S.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-247E9.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-31H0L.tmp
|
Unicode text, UTF-8 (with BOM) text, with very long lines (357), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-59DFD.tmp
|
Unicode text, UTF-8 (with BOM) text, with very long lines (388), with CRLF, CR line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-5GPCL.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-5HH89.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-6HMCK.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-72708.tmp
|
Unicode text, UTF-8 (with BOM) text, with very long lines (465), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-8E9R8.tmp
|
Unicode text, UTF-8 (with BOM) text, with very long lines (410), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-8F6BD.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-936N5.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-9B3TS.tmp
|
Generic INItialization configuration [Actions]
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-BLHN8.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-BOR76.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-D8QT2.tmp
|
Generic INItialization configuration [Actions]
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-DSLRT.tmp
|
Unicode text, UTF-8 (with BOM) text, with very long lines (404), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-E1UCS.tmp
|
Unicode text, UTF-8 (with BOM) text, with very long lines (451), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-EMTEG.tmp
|
Unicode text, UTF-8 (with BOM) text, with very long lines (408), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-GSPK3.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-HC9LK.tmp
|
Unicode text, UTF-8 (with BOM) text, with very long lines (456), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-I3BOT.tmp
|
MS Windows 95 Internet shortcut text (URL=<https://www.pchelpsoft.com/>), ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-IJSKU.tmp
|
Unicode text, UTF-8 (with BOM) text, with very long lines (382), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-KDE3K.tmp
|
GIF image data, version 89a, 48 x 48
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-KMOL8.tmp
|
Unicode text, UTF-8 (with BOM) text, with very long lines (413), with CRLF, CR line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-L9510.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-MKA8K.tmp
|
SQLite 3.x database, last written using SQLite version 3011000, page size 1024, file counter 3, database pages 1069, cookie
0x18, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-PIESJ.tmp
|
SQLite 3.x database, last written using SQLite version 3034000, file counter 37, database pages 366, cookie 0x1a, schema 4,
UTF-8, version-valid-for 37
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-QSUE4.tmp
|
Unicode text, UTF-8 (with BOM) text, with very long lines (479), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-R89KD.tmp
|
Generic INItialization configuration [Actions]
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-TE37R.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-TQTDS.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-UC71B.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-UL898.tmp
|
Unicode text, UTF-8 (with BOM) text, with very long lines (424), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\is-VS3FJ.tmp
|
Non-ISO extended-ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\net.db
|
SQLite 3.x database, last written using SQLite version 3022000, file counter 46, database pages 495, cookie 0x23, schema 4,
UTF-8, version-valid-for 46
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\net.db-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\sqlite3.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\unins000.dat
|
InnoSetup Log PC Cleaner, version 0x418, 38060 bytes, 301389\37\user\376, C:\Program Files (x86)\PC Cleaner\376\377\
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\unins000.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\PC Cleaner\unins000.msg
|
InnoSetup messages, version 6.0.0, 261 messages (UTF-16), Cancel installation
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PC Cleaner\PC Cleaner on the Web.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Wed Apr 24 09:30:12 2024, mtime=Wed Apr 24 09:30:12 2024, atime=Thu Nov 2 10:38:22 2023, length=53, window=hide
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PC Cleaner\PC Cleaner.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Wed Apr 24 09:30:11 2024, mtime=Wed Apr 24 09:30:12 2024, atime=Wed Apr 3 10:32:12 2024, length=10560360, window=hide
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PC Cleaner\Uninstall PC Cleaner.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Wed Apr 24 09:30:11 2024, mtime=Wed Apr 24 09:30:11 2024, atime=Wed Apr 24 09:30:07 2024, length=3204968, window=hide
|
dropped
|
||
C:\ProgramData\PC Cleaner\CookieExclusions.txt
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\ProgramData\PC Cleaner\Cookies.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\PC Cleaner\IDs.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\PC Cleaner\SiteNtf.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\install[1].htm
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\etilqs_21VpiMtiVJlr4vv
|
SQLite 3.x database, last written using SQLite version 3022000, file counter 1, database pages 495, cookie 0x21, schema 4,
UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\etilqs_QOBcOyRp4Oo6lrg
|
SQLite 3.x database, last written using SQLite version 3022000, file counter 1, database pages 495, cookie 0x20, schema 4,
UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\etilqs_v0kBdD5gRFdYt58
|
SQLite 3.x database, last written using SQLite version 3022000, file counter 1, database pages 495, cookie 0x22, schema 4,
UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\etilqs_wgwuzVwgpK883Yd
|
SQLite 3.x database, last written using SQLite version 3022000, file counter 1, database pages 495, cookie 0x23, schema 4,
UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-BVGJ6.tmp\PCCleaner.bmp
|
PC bitmap, Windows 3.x format, 455 x 56 x 24, image size 76608, resolution 2834 x 2834 px/m, cbSize 76662, bits offset 54
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-BVGJ6.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-HLNI5.tmp\SecuriteInfo.com.Program.Unwanted.5320.27373.27791.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\PC Cleaner\Log\Tasks.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\PC Cleaner.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Wed Apr 24 09:30:11 2024, mtime=Wed Apr 24 09:30:11 2024, atime=Wed Apr 3 10:32:12 2024, length=10560360, window=hide
|
dropped
|
There are 80 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5320.27373.27791.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5320.27373.27791.exe"
|
||
C:\Program Files (x86)\PC Cleaner\PCCNotifications.exe
|
"C:\Program Files (x86)\PC Cleaner\PCCNotifications.exe"
|
||
C:\Program Files (x86)\PC Cleaner\PCCleaner.exe
|
"C:\Program Files (x86)\PC Cleaner\PCCleaner" /START
|
||
C:\Program Files (x86)\PC Cleaner\PCCNotifications.exe
|
"C:\Program Files (x86)\PC Cleaner\PCCNotifications.exe"
|
||
C:\Users\user\AppData\Local\Temp\is-HLNI5.tmp\SecuriteInfo.com.Program.Unwanted.5320.27373.27791.tmp
|
"C:\Users\user\AppData\Local\Temp\is-HLNI5.tmp\SecuriteInfo.com.Program.Unwanted.5320.27373.27791.tmp" /SL5="$20450,6944918,831488,C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5320.27373.27791.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
|
unknown
|
||
https://www.pchelpsoft.comm/api/collectn
|
unknown
|
||
https://notifications.avqtools.com/executed/
|
unknown
|
||
https://cloud.pchelpsoft.com/desktop/install_complete
|
216.239.32.21
|
||
https://collect.avqtools.com/api/collectd
|
unknown
|
||
https://pchelpsoft.upclick.com/clickgate/join.aspx?ref=crm.pchelpsoft.com/cleaner&ujid=20s3lABRVNE=&
|
unknown
|
||
https://collect.avqtools.com/t.co
|
unknown
|
||
https://pchelpsoft.upclick.com/clickgate/join.aspx?ref=crm.pchelpsoft.com/cleaner&ujid=2GD9HaP
|
unknown
|
||
https://store.pchelpsoft.com/clickgate/join.aspx?ref=pchelpsoft.com&ujid=TqA1Vm9ge5o=
|
unknown
|
||
https://notifications.avqtools.com/exit-xml/PCHELPSOFT
|
unknown
|
||
https://upgrades.avqtools.com
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/
|
unknown
|
||
https://www.pchelpsoft.com/Q
|
unknown
|
||
https://www.pchelpsoft.com/images/build-phone-banners/phone_activation.png.co
|
unknown
|
||
https://www.pchelpsoft.com/images/build-phone-banners/phone_activation.png
|
104.26.1.116
|
||
https://notifications.avqtools.com/confirmed/
|
unknown
|
||
https://pchelpsoft.com/company/privacy-policy/
|
unknown
|
||
http://www.playanext.com/U
|
unknown
|
||
https://pchelpsoft.com/support/pc-cleaner/how-to-uninstall/
|
unknown
|
||
https://store.pchelpsoft.com/clickgate/join.aspx?ref=pchelpsoft.com&ujid=TqA1Vm9ge5o=1AJ
|
unknown
|
||
http://www.indyproject.org/
|
unknown
|
||
https://www.pchelpsoft.com/company/privacy-policy/S
|
unknown
|
||
https://files.playanext.com/Installer/
|
unknown
|
||
https://store.pchelpsoft.com/clickgate/join.aspx?ref=pchelpsoft.com&ujid=TqA1Vm9ge5o=&src=default_re
|
unknown
|
||
https://subscriptions.avqtools.com0
|
unknown
|
||
https://collect.avqtools.com/api/collectU
|
unknown
|
||
https://notifications.avqtools.comaPr
|
unknown
|
||
https://us.trustpilot.com/evaluate/www.pchelpsoft.com
|
unknown
|
||
https://curl.haxx.se/docs/http-cookies.html
|
unknown
|
||
https://curl.haxx.se/docs/http-cookies.html#
|
unknown
|
||
https://pchelpsoft.com/rpf
|
unknown
|
||
https://webtools.avanquest.com/redirect.cfm?eredirectId=pchelpsoft/pc_cleaner_router_missing_passwor
|
unknown
|
||
https://pchelpsoft.upclick.com/clickgate/join.aspx?ref=crm.pchelpsoft.com/cleaner&ujid=epIz41GP07U=&
|
unknown
|
||
https://www.pchelpsoft.com/
|
unknown
|
||
https://pchelpsoft.com/pc-cleaner/install
|
172.67.73.195
|
||
https://www.remobjects.com/ps
|
unknown
|
||
https://collect.avqtools.com/api/debugU
|
unknown
|
||
https://pchelpsoft.com/pc-cleaner/installO
|
unknown
|
||
https://pchelpsoft.com/pc-cleaner/installU
|
unknown
|
||
https://www.innosetup.com/
|
unknown
|
||
https://www.pchelpsoft.com/images/build-phone-banners/phone_activation.png$
|
unknown
|
||
https://offers.playanext.com/offer
|
unknown
|
||
https://pchelpsoft.com/company/eula/a
|
unknown
|
||
http://api.playanext.com/httpapi
|
108.138.246.21
|
||
https://www.pchelpsoft.com/LMEM
|
unknown
|
||
https://www.pchelpsoft.com/company/eula/U
|
unknown
|
||
https://support.pchelpsoft.com/hc/0
|
unknown
|
||
https://notifications.avqtools.com/clicked/
|
unknown
|
||
https://pchelpsoft.com/pc-cleaner/install-
|
unknown
|
||
https://store.pchelpsoft.com/clickgate/join.aspx?ref=pchelpsoft.com&ujid=Pxo3UeCZAEo=&step=2&cmp=UNI
|
unknown
|
||
https://support.pchelpsoft.com/hc/9QO
|
unknown
|
||
http://cdn.pchelpsoft.com/pchelpsoft/Driver_Updater_CS.exe?mkey1=PH_CRS_PCC_TO_DU_DL&cmp=CROSSELLtmp
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
https://collect.avqtools.com/2
|
unknown
|
||
https://www.pchelpsoft.com/pc-cleaner/installite
|
unknown
|
||
https://pchelpsoft.com/company/eula/
|
unknown
|
||
https://partner-tracking.lavasoft.com/api/tracking/pccleaner?downloadedDate=2024-04-24T10%3A30%3A06.678Z
|
104.16.148.130
|
||
https://collect.avqtools.com/6
|
unknown
|
||
https://pchelpsoft.com/
|
unknown
|
||
http://www.google.com/search?q=
|
unknown
|
||
https://techsupport.avqtools.com/feedback
|
unknown
|
||
https://www.pchelpsoft.com/company/privacy-policy/
|
unknown
|
||
https://www.pchelpsoft.com/images/build-phone-banners/phone_activation.pngo
|
unknown
|
||
https://partner-tracking.lavasoft.com/api/tracking/pccleaner?downloadedDate=
|
unknown
|
||
https://services.avanquest.com/pchelpsoft/trustedPilot_cleaner.php?data=
|
unknown
|
||
https://collect.avqtools.com/api/debug?program=pchs_cleaner_v
|
unknown
|
||
http://www.dk-soft.org/
|
unknown
|
||
https://collect.avqtools.com/
|
unknown
|
||
https://www.pchelpsoft.com/a
|
unknown
|
||
https://www.pchelpsoft.com/c
|
unknown
|
||
https://support.pchelpsoft.com/hc/
|
unknown
|
||
https://collect.avqtools.com/debug.txt
|
116.203.251.147
|
||
https://collect.avqtools.com/api/collect
|
116.203.251.147
|
||
http://cdn.pchelpsoft.com/pchelpsoft/Driver_Updater_CS.exe?mkey1=PH_CRS_PCC_TO_DU_DL&cmp=CROSSELL
|
unknown
|
||
http://api.playanext.com/httpapib%22distributor%22%3a%22%22%2c%
|
unknown
|
||
https://offers.playanext.com/offer0
|
unknown
|
||
https://subscriptions.avqtools.com
|
unknown
|
||
https://upgrades.avqtools.comS
|
unknown
|
||
https://pchelpsoft.upclick.com/clickgate/join.aspx?ref=crm.pchelpsoft.com/cleaner&ujid=hv6Az34OCw8=&
|
unknown
|
||
https://www.pchelpsoft.com/pc-cleaner/install
|
104.26.1.116
|
There are 70 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cloud.pchelpsoft.com
|
216.239.32.21
|
||
d1atxff5avezsq.cloudfront.net
|
108.138.246.21
|
||
www.pchelpsoft.com
|
104.26.1.116
|
||
b217xlnyk0.execute-api.us-west-2.amazonaws.com
|
18.239.199.80
|
||
collect.avqtools.com
|
116.203.251.147
|
||
pchelpsoft.com
|
172.67.73.195
|
||
partner-tracking.lavasoft.com
|
104.16.148.130
|
||
api.playanext.com
|
unknown
|
||
offers.playanext.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.26.1.116
|
www.pchelpsoft.com
|
United States
|
||
108.138.246.21
|
d1atxff5avezsq.cloudfront.net
|
United States
|
||
216.239.32.21
|
cloud.pchelpsoft.com
|
United States
|
||
116.203.251.147
|
collect.avqtools.com
|
Germany
|
||
104.16.148.130
|
partner-tracking.lavasoft.com
|
United States
|
||
18.239.199.80
|
b217xlnyk0.execute-api.us-west-2.amazonaws.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
172.67.73.195
|
pchelpsoft.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
IsUpgrade
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
Language
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
InstallerName
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
BuildID
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
UpgradeID
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
PartnerID
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
Phones
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
SendDebugLogs
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
HomePageURL
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
SupportURL
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
BuyNowURL
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
AfterInstallURL
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
AfterInstallURL2
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
ProURL
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
RenewURL
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
UninstallURL
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
AdsDownloadURL
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
EulaURL
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
PrivacyURL
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
BuyNowURL_UPG
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
BuyNowURL_CS
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.ppc_encrypted\OpenWithProgids
|
PCCleaner.ppc_encrypted
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\PCCleaner.ppc_encrypted
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\PCCleaner.ppc_encrypted\DefaultIcon
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\PCCleaner.ppc_encrypted\shell\open\command
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\PCCleaner.exe\SupportedTypes
|
.ppc_encrypted
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PC Cleaner_is1
|
Inno Setup: Setup Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PC Cleaner_is1
|
Inno Setup: App Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PC Cleaner_is1
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PC Cleaner_is1
|
Inno Setup: Icon Group
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PC Cleaner_is1
|
Inno Setup: User
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PC Cleaner_is1
|
Inno Setup: Selected Tasks
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PC Cleaner_is1
|
Inno Setup: Deselected Tasks
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PC Cleaner_is1
|
Inno Setup: Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PC Cleaner_is1
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PC Cleaner_is1
|
DisplayIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PC Cleaner_is1
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PC Cleaner_is1
|
QuietUninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PC Cleaner_is1
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PC Cleaner_is1
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PC Cleaner_is1
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PC Cleaner_is1
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PC Cleaner_is1
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PC Cleaner_is1
|
MajorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PC Cleaner_is1
|
MinorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PC Cleaner_is1
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PC Cleaner_is1
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PC Cleaner_is1
|
EstimatedSize
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
chkLaunch
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
chkStartScan
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
|
GlobalAssocChangedCounter
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
TrayAllowed
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
OnWinStartup
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
sch_enabled
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
s_SmartEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
s_SmartDate
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
s_Mode
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
s_Date
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
s_Time
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
s_Exec
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
MonitorNotifications
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
LastNotification
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
ShownNotifications
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
NewAppNotifications
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
NewExtNotifications
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
StartupNotifications
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
LowDiskSpaceNotifications
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
LowFreeMemNotifications
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
CrashNotifications
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
NoAVNotifications
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
BigCacheSizeNotifications
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
CookieNotifications
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
SlowStartupNotifications
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
RecycleBinNotifications
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
BigDownloadsSizeNotifications
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
s_SmartMode
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
UninstallNotifications
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
MinFreeDiskSpace
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
MinFreeMemory
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
MinCacheSize
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
MinCookieNumber
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
CheckUpdates
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
LastUpdCheck
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
SoftwareNotifications
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
LastSrvNotification
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
LastSrvCheck
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
LastLive
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
LastDebug
|
||
HKEY_CURRENT_USER\SOFTWARE\Licenses\d245d16c219a0913f2cb2177b11da31a
|
AC_Enabled
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
AC_Check1
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
AC_Check2
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
AC_Check3
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
AC_Check4
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
AC_Skip1
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
AC_Skip2
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
AC_Interval
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
AC_Date
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
AllowTechInfo
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
AllowSilentUpgrade
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
AllowOffers
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
UsageReportShown
|
||
HKEY_CURRENT_USER\SOFTWARE\Licenses\d245d16c219a0913f2cb2177b11da31a
|
HI
|
||
HKEY_CURRENT_USER\SOFTWARE\Licenses\d245d16c219a0913f2cb2177b11da31a
|
AI1
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
ActiveBrowser
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
SI2
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
LastLive
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
LastDebug
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
BackupDir
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Licenses\d245d16c219a0913f2cb2177b11da31a
|
InstallationDate
|
||
HKEY_CURRENT_USER\SOFTWARE\Licenses\d245d16c219a0913f2cb2177b11da31a
|
TrialDate
|
||
HKEY_CURRENT_USER_Classes\pchscleaner
|
NULL
|
||
HKEY_CURRENT_USER_Classes\pchscleaner
|
URL Protocol
|
||
HKEY_CURRENT_USER_Classes\pchscleaner\shell\open\command
|
NULL
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
NLaunches
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
LogDir
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
UndoDir
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
ItemsToMainScan
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
ItemsToRegistryScan
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
ItemsToPrivacyScan
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
ItemsToRecoveryScan
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
UseExclusions
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
ShowRebootMessage
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
ShowRecycleBin
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
ShowTips
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
SI1
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
LastScanCanceled
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
LastCleanExecuted
|
||
HKEY_CURRENT_USER\SOFTWARE\Licenses\d245d16c219a0913f2cb2177b11da31a
|
JsonParams
|
||
HKEY_CURRENT_USER\SOFTWARE\Licenses\d245d16c219a0913f2cb2177b11da31a
|
Params
|
||
HKEY_CURRENT_USER\SOFTWARE\Licenses\d245d16c219a0913f2cb2177b11da31a
|
DC_Ext
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
LastScanDate
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
LastScanFound
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
ItemsToFix
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
ItemsFixed
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
SizeToClean
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
SizeToCleanInt
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
ScanRes1
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
ScanRes2
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
ScanRes3
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
ScanRes4
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
ScanRes5
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
s_SmartDate
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
BuyNowURL
|
||
HKEY_CURRENT_USER\SOFTWARE\PC Cleaner
|
UninstallURL
|
There are 141 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
25A0000
|
direct allocation
|
page read and write
|
||
43DF000
|
stack
|
page read and write
|
||
2D90000
|
trusted library allocation
|
page read and write
|
||
656F000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
7B8000
|
unkown
|
page write copy
|
||
7A56000
|
heap
|
page read and write
|
||
72A9000
|
direct allocation
|
page read and write
|
||
2BED000
|
direct allocation
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
231F000
|
direct allocation
|
page read and write
|
||
6932000
|
heap
|
page read and write
|
||
2716000
|
direct allocation
|
page read and write
|
||
6A02000
|
heap
|
page read and write
|
||
6644000
|
heap
|
page read and write
|
||
6437000
|
heap
|
page read and write
|
||
EEB000
|
heap
|
page read and write
|
||
6C0E4000
|
unkown
|
page write copy
|
||
7C7000
|
unkown
|
page read and write
|
||
662A000
|
heap
|
page read and write
|
||
7A93000
|
heap
|
page read and write
|
||
7A46000
|
heap
|
page read and write
|
||
6496000
|
heap
|
page read and write
|
||
52D0000
|
heap
|
page read and write
|
||
64AE000
|
heap
|
page read and write
|
||
6486000
|
heap
|
page read and write
|
||
63C1000
|
heap
|
page read and write
|
||
B5E000
|
unkown
|
page readonly
|
||
7A27000
|
heap
|
page read and write
|
||
670B000
|
heap
|
page read and write
|
||
A1F000
|
heap
|
page read and write
|
||
61E8F000
|
unkown
|
page read and write
|
||
329E000
|
stack
|
page read and write
|
||
339D000
|
stack
|
page read and write
|
||
6590000
|
heap
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
6C7000
|
unkown
|
page read and write
|
||
2358000
|
direct allocation
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
36B8000
|
direct allocation
|
page read and write
|
||
61E8F000
|
unkown
|
page read and write
|
||
3ADD000
|
heap
|
page read and write
|
||
7A6000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
3B37000
|
heap
|
page read and write
|
||
37AC000
|
direct allocation
|
page read and write
|
||
F6C000
|
heap
|
page read and write
|
||
7A61000
|
heap
|
page read and write
|
||
6900000
|
heap
|
page read and write
|
||
D6C000
|
unkown
|
page readonly
|
||
6486000
|
heap
|
page read and write
|
||
794000
|
heap
|
page read and write
|
||
EF5000
|
heap
|
page read and write
|
||
668A000
|
heap
|
page read and write
|
||
5291000
|
heap
|
page read and write
|
||
773000
|
heap
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
EE3000
|
heap
|
page read and write
|
||
A8F000
|
heap
|
page read and write
|
||
69B1000
|
heap
|
page read and write
|
||
129D000
|
heap
|
page read and write
|
||
5B3C000
|
direct allocation
|
page read and write
|
||
6958000
|
heap
|
page read and write
|
||
5BA2000
|
direct allocation
|
page read and write
|
||
129D000
|
heap
|
page read and write
|
||
7AB7000
|
heap
|
page read and write
|
||
3A6E000
|
heap
|
page read and write
|
||
7D5000
|
heap
|
page read and write
|
||
7FE33000
|
direct allocation
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
34F0000
|
direct allocation
|
page read and write
|
||
6906000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3630000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
64E3000
|
heap
|
page read and write
|
||
64A4000
|
heap
|
page read and write
|
||
3A79000
|
heap
|
page read and write
|
||
76D000
|
heap
|
page read and write
|
||
7D1000
|
unkown
|
page write copy
|
||
3A65000
|
heap
|
page read and write
|
||
671B000
|
heap
|
page read and write
|
||
66B2000
|
heap
|
page read and write
|
||
7A33000
|
heap
|
page read and write
|
||
26A7000
|
direct allocation
|
page read and write
|
||
3A81000
|
heap
|
page read and write
|
||
401F000
|
stack
|
page read and write
|
||
3A51000
|
heap
|
page read and write
|
||
68E0000
|
heap
|
page read and write
|
||
6402000
|
heap
|
page read and write
|
||
63C0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3AA7000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
A0D000
|
heap
|
page read and write
|
||
139F000
|
stack
|
page read and write
|
||
27F4000
|
direct allocation
|
page read and write
|
||
6585000
|
heap
|
page read and write
|
||
2220000
|
direct allocation
|
page read and write
|
||
650D000
|
heap
|
page read and write
|
||
762000
|
heap
|
page read and write
|
||
3D9F000
|
stack
|
page read and write
|
||
6900000
|
heap
|
page read and write
|
||
6581000
|
heap
|
page read and write
|
||
52A5000
|
direct allocation
|
page read and write
|
||
667F000
|
heap
|
page read and write
|
||
6531000
|
heap
|
page read and write
|
||
7A46000
|
heap
|
page read and write
|
||
375F000
|
stack
|
page read and write
|
||
2326000
|
direct allocation
|
page read and write
|
||
36E1000
|
direct allocation
|
page read and write
|
||
66F4000
|
heap
|
page read and write
|
||
BBF000
|
stack
|
page read and write
|
||
6C0E3000
|
unkown
|
page read and write
|
||
24A2000
|
direct allocation
|
page read and write
|
||
3AB0000
|
heap
|
page read and write
|
||
6220000
|
direct allocation
|
page read and write
|
||
224B000
|
direct allocation
|
page read and write
|
||
3A81000
|
heap
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
3713000
|
direct allocation
|
page read and write
|
||
6659000
|
heap
|
page read and write
|
||
3A6B000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
2494000
|
direct allocation
|
page read and write
|
||
64D4000
|
heap
|
page read and write
|
||
6540000
|
heap
|
page read and write
|
||
6444000
|
heap
|
page read and write
|
||
389F000
|
stack
|
page read and write
|
||
6319000
|
direct allocation
|
page read and write
|
||
6489000
|
heap
|
page read and write
|
||
773000
|
heap
|
page read and write
|
||
26A6000
|
direct allocation
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
36F2000
|
direct allocation
|
page read and write
|
||
2822000
|
direct allocation
|
page read and write
|
||
7A8B000
|
heap
|
page read and write
|
||
EEA000
|
heap
|
page read and write
|
||
234A000
|
direct allocation
|
page read and write
|
||
F62000
|
heap
|
page read and write
|
||
652D000
|
heap
|
page read and write
|
||
51D0000
|
heap
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
6903000
|
heap
|
page read and write
|
||
7A74000
|
heap
|
page read and write
|
||
3A79000
|
heap
|
page read and write
|
||
6647000
|
heap
|
page read and write
|
||
3AD8000
|
heap
|
page read and write
|
||
5187000
|
direct allocation
|
page read and write
|
||
E5C000
|
stack
|
page read and write
|
||
72F1000
|
direct allocation
|
page read and write
|
||
39DF000
|
stack
|
page read and write
|
||
AA1000
|
heap
|
page read and write
|
||
6487000
|
heap
|
page read and write
|
||
1295000
|
heap
|
page read and write
|
||
2C04000
|
direct allocation
|
page read and write
|
||
6593000
|
heap
|
page read and write
|
||
6975000
|
heap
|
page read and write
|
||
2B46000
|
direct allocation
|
page read and write
|
||
D64000
|
unkown
|
page readonly
|
||
6282000
|
direct allocation
|
page read and write
|
||
6900000
|
heap
|
page read and write
|
||
2301000
|
direct allocation
|
page read and write
|
||
B27000
|
unkown
|
page read and write
|
||
2646000
|
direct allocation
|
page read and write
|
||
24AA000
|
direct allocation
|
page read and write
|
||
C25000
|
heap
|
page read and write
|
||
A8F000
|
heap
|
page read and write
|
||
3731000
|
direct allocation
|
page read and write
|
||
5508000
|
direct allocation
|
page read and write
|
||
3AEF000
|
heap
|
page read and write
|
||
786000
|
heap
|
page read and write
|
||
61E00000
|
unkown
|
page readonly
|
||
7D8000
|
unkown
|
page readonly
|
||
2700000
|
direct allocation
|
page read and write
|
||
EC7000
|
heap
|
page read and write
|
||
3ABE000
|
heap
|
page read and write
|
||
6603000
|
heap
|
page read and write
|
||
3A65000
|
heap
|
page read and write
|
||
F6C000
|
heap
|
page read and write
|
||
7AF000
|
unkown
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
3B2E000
|
heap
|
page read and write
|
||
634C000
|
direct allocation
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
36D1000
|
direct allocation
|
page read and write
|
||
3360000
|
remote allocation
|
page read and write
|
||
6597000
|
heap
|
page read and write
|
||
3AE5000
|
heap
|
page read and write
|
||
64CC000
|
heap
|
page read and write
|
||
EEF000
|
heap
|
page read and write
|
||
3A82000
|
heap
|
page read and write
|
||
6497000
|
heap
|
page read and write
|
||
64CC000
|
heap
|
page read and write
|
||
649C000
|
heap
|
page read and write
|
||
264D000
|
direct allocation
|
page read and write
|
||
7220000
|
heap
|
page read and write
|
||
E66000
|
heap
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
650E000
|
heap
|
page read and write
|
||
3517000
|
direct allocation
|
page read and write
|
||
675C000
|
heap
|
page read and write
|
||
6CEF000
|
heap
|
page read and write
|
||
77F000
|
heap
|
page read and write
|
||
767000
|
heap
|
page read and write
|
||
6444000
|
heap
|
page read and write
|
||
64B9000
|
heap
|
page read and write
|
||
2459000
|
direct allocation
|
page read and write
|
||
7A5B000
|
heap
|
page read and write
|
||
675C000
|
heap
|
page read and write
|
||
6427000
|
heap
|
page read and write
|
||
7A9000
|
unkown
|
page read and write
|
||
6445000
|
heap
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
61EA0000
|
unkown
|
page readonly
|
||
3AEB000
|
heap
|
page read and write
|
||
5C2A000
|
direct allocation
|
page read and write
|
||
6902000
|
heap
|
page read and write
|
||
6578000
|
heap
|
page read and write
|
||
66E4000
|
heap
|
page read and write
|
||
4FD0000
|
direct allocation
|
page read and write
|
||
3AF7000
|
heap
|
page read and write
|
||
6644000
|
heap
|
page read and write
|
||
6402000
|
heap
|
page read and write
|
||
66B4000
|
heap
|
page read and write
|
||
18D000
|
stack
|
page read and write
|
||
3AFF000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
EED000
|
heap
|
page read and write
|
||
B25000
|
unkown
|
page write copy
|
||
7A9E000
|
heap
|
page read and write
|
||
7D6000
|
unkown
|
page readonly
|
||
6576000
|
heap
|
page read and write
|
||
6560000
|
heap
|
page read and write
|
||
3A7E000
|
heap
|
page read and write
|
||
670D000
|
heap
|
page read and write
|
||
246F000
|
direct allocation
|
page read and write
|
||
63C1000
|
heap
|
page read and write
|
||
656F000
|
heap
|
page read and write
|
||
6429000
|
heap
|
page read and write
|
||
65C2000
|
heap
|
page read and write
|
||
24F3000
|
direct allocation
|
page read and write
|
||
A8F000
|
heap
|
page read and write
|
||
7FB40000
|
direct allocation
|
page read and write
|
||
78E000
|
heap
|
page read and write
|
||
129E000
|
heap
|
page read and write
|
||
2CDD000
|
direct allocation
|
page read and write
|
||
64D6000
|
heap
|
page read and write
|
||
7C7000
|
unkown
|
page read and write
|
||
26AD000
|
direct allocation
|
page read and write
|
||
7EFD000
|
stack
|
page read and write
|
||
6942000
|
heap
|
page read and write
|
||
2318000
|
direct allocation
|
page read and write
|
||
62FD000
|
direct allocation
|
page read and write
|
||
7A5000
|
heap
|
page read and write
|
||
775000
|
heap
|
page read and write
|
||
EFC000
|
heap
|
page read and write
|
||
7227000
|
heap
|
page read and write
|
||
6560000
|
heap
|
page read and write
|
||
7A10000
|
heap
|
page read and write
|
||
22DB000
|
direct allocation
|
page read and write
|
||
7FDF0000
|
direct allocation
|
page read and write
|
||
7CE000
|
unkown
|
page read and write
|
||
2766000
|
direct allocation
|
page read and write
|
||
2E8D000
|
stack
|
page read and write
|
||
7A46000
|
heap
|
page read and write
|
||
3A82000
|
heap
|
page read and write
|
||
320E000
|
stack
|
page read and write
|
||
7A7000
|
unkown
|
page write copy
|
||
641D000
|
heap
|
page read and write
|
||
6449000
|
heap
|
page read and write
|
||
3AE6000
|
heap
|
page read and write
|
||
6942000
|
heap
|
page read and write
|
||
6565000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
645F000
|
heap
|
page read and write
|
||
6963000
|
heap
|
page read and write
|
||
7AC9000
|
heap
|
page read and write
|
||
6A02000
|
heap
|
page read and write
|
||
6DE000
|
unkown
|
page readonly
|
||
3B25000
|
heap
|
page read and write
|
||
11AE000
|
stack
|
page read and write
|
||
273A000
|
direct allocation
|
page read and write
|
||
275E000
|
direct allocation
|
page read and write
|
||
5B53000
|
direct allocation
|
page read and write
|
||
5291000
|
heap
|
page read and write
|
||
246C000
|
direct allocation
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
3B48000
|
heap
|
page read and write
|
||
61E90000
|
unkown
|
page readonly
|
||
AA2000
|
heap
|
page read and write
|
||
69A0000
|
heap
|
page read and write
|
||
67FE000
|
stack
|
page read and write
|
||
6435000
|
heap
|
page read and write
|
||
3480000
|
direct allocation
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
27D0000
|
direct allocation
|
page read and write
|
||
3739000
|
direct allocation
|
page read and write
|
||
26C3000
|
direct allocation
|
page read and write
|
||
3B2B000
|
heap
|
page read and write
|
||
37C8000
|
direct allocation
|
page read and write
|
||
531F000
|
direct allocation
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
A98000
|
heap
|
page read and write
|
||
6444000
|
heap
|
page read and write
|
||
2CE5000
|
direct allocation
|
page read and write
|
||
2CDD000
|
direct allocation
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
A95000
|
heap
|
page read and write
|
||
6A35000
|
heap
|
page read and write
|
||
7A61000
|
heap
|
page read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
787000
|
heap
|
page read and write
|
||
6A02000
|
heap
|
page read and write
|
||
52D1000
|
heap
|
page read and write
|
||
86E000
|
stack
|
page read and write
|
||
A98000
|
heap
|
page read and write
|
||
A7C000
|
heap
|
page read and write
|
||
68C0000
|
heap
|
page read and write
|
||
6455000
|
heap
|
page read and write
|
||
6573000
|
heap
|
page read and write
|
||
379D000
|
direct allocation
|
page read and write
|
||
7B6E000
|
stack
|
page read and write
|
||
7A7000
|
unkown
|
page read and write
|
||
7A6F000
|
heap
|
page read and write
|
||
3EDF000
|
stack
|
page read and write
|
||
A8D000
|
heap
|
page read and write
|
||
7A6E000
|
heap
|
page read and write
|
||
6932000
|
heap
|
page read and write
|
||
419C000
|
stack
|
page read and write
|
||
7A49000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
61EA2000
|
unkown
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
7A76000
|
heap
|
page read and write
|
||
7A9000
|
unkown
|
page read and write
|
||
6486000
|
heap
|
page read and write
|
||
3A90000
|
heap
|
page read and write
|
||
65AD000
|
heap
|
page read and write
|
||
69A0000
|
heap
|
page read and write
|
||
3360000
|
remote allocation
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
27D7000
|
direct allocation
|
page read and write
|
||
D6F000
|
stack
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
6A97000
|
heap
|
page read and write
|
||
3AF9000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
6911000
|
heap
|
page read and write
|
||
280B000
|
direct allocation
|
page read and write
|
||
3AFE000
|
heap
|
page read and write
|
||
6492000
|
heap
|
page read and write
|
||
26A0000
|
direct allocation
|
page read and write
|
||
76D000
|
heap
|
page read and write
|
||
5BC4000
|
direct allocation
|
page read and write
|
||
3AC1000
|
heap
|
page read and write
|
||
3AA0000
|
heap
|
page read and write
|
||
BD3000
|
heap
|
page read and write
|
||
A8F000
|
heap
|
page read and write
|
||
5BB1000
|
direct allocation
|
page read and write
|
||
652D000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
66C5000
|
heap
|
page read and write
|
||
691F000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
A8D000
|
heap
|
page read and write
|
||
3B46000
|
heap
|
page read and write
|
||
C10000
|
direct allocation
|
page execute and read and write
|
||
3B49000
|
heap
|
page read and write
|
||
696F000
|
heap
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
A9C000
|
heap
|
page read and write
|
||
6488000
|
heap
|
page read and write
|
||
36B0000
|
direct allocation
|
page read and write
|
||
97F000
|
stack
|
page read and write
|
||
63C1000
|
heap
|
page read and write
|
||
375C000
|
direct allocation
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
2D5F000
|
direct allocation
|
page read and write
|
||
6C0E8000
|
unkown
|
page readonly
|
||
6911000
|
heap
|
page read and write
|
||
2776000
|
direct allocation
|
page read and write
|
||
365E000
|
stack
|
page read and write
|
||
1298000
|
heap
|
page read and write
|
||
6984000
|
heap
|
page read and write
|
||
267B000
|
direct allocation
|
page read and write
|
||
6688000
|
heap
|
page read and write
|
||
656F000
|
heap
|
page read and write
|
||
658A000
|
heap
|
page read and write
|
||
788000
|
heap
|
page read and write
|
||
644E000
|
heap
|
page read and write
|
||
694E000
|
heap
|
page read and write
|
||
3AF6000
|
heap
|
page read and write
|
||
6643000
|
heap
|
page read and write
|
||
677E000
|
heap
|
page read and write
|
||
7A61000
|
heap
|
page read and write
|
||
26CA000
|
direct allocation
|
page read and write
|
||
3AE4000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
26D1000
|
direct allocation
|
page read and write
|
||
795000
|
heap
|
page read and write
|
||
F47000
|
heap
|
page read and write
|
||
5C17000
|
direct allocation
|
page read and write
|
||
42DC000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
6554000
|
heap
|
page read and write
|
||
6305000
|
direct allocation
|
page read and write
|
||
3B43000
|
heap
|
page read and write
|
||
7A37000
|
heap
|
page read and write
|
||
2D66000
|
direct allocation
|
page read and write
|
||
6618000
|
heap
|
page read and write
|
||
69D2000
|
heap
|
page read and write
|
||
66A9000
|
heap
|
page read and write
|
||
B52000
|
unkown
|
page read and write
|
||
6A48000
|
heap
|
page read and write
|
||
7223000
|
heap
|
page read and write
|
||
35A0000
|
heap
|
page read and write
|
||
A2F000
|
heap
|
page read and write
|
||
66A7000
|
heap
|
page read and write
|
||
EEC000
|
heap
|
page read and write
|
||
429F000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3B45000
|
heap
|
page read and write
|
||
285C000
|
direct allocation
|
page read and write
|
||
6903000
|
heap
|
page read and write
|
||
B78000
|
heap
|
page read and write
|
||
66A2000
|
heap
|
page read and write
|
||
37A4000
|
direct allocation
|
page read and write
|
||
A95000
|
heap
|
page read and write
|
||
6CF7000
|
heap
|
page read and write
|
||
690C000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
6670000
|
heap
|
page read and write
|
||
379D000
|
direct allocation
|
page read and write
|
||
247D000
|
direct allocation
|
page read and write
|
||
6562000
|
heap
|
page read and write
|
||
2838000
|
direct allocation
|
page read and write
|
||
3B27000
|
heap
|
page read and write
|
||
7A7A000
|
heap
|
page read and write
|
||
22FA000
|
direct allocation
|
page read and write
|
||
2748000
|
direct allocation
|
page read and write
|
||
2724000
|
direct allocation
|
page read and write
|
||
225A000
|
direct allocation
|
page read and write
|
||
7B3000
|
heap
|
page read and write
|
||
5B30000
|
direct allocation
|
page read and write
|
||
675C000
|
heap
|
page read and write
|
||
7AE000
|
unkown
|
page read and write
|
||
5B9A000
|
direct allocation
|
page read and write
|
||
6441000
|
heap
|
page read and write
|
||
6414000
|
heap
|
page read and write
|
||
ABF000
|
stack
|
page read and write
|
||
764000
|
heap
|
page read and write
|
||
27E6000
|
direct allocation
|
page read and write
|
||
3721000
|
direct allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
6472000
|
heap
|
page read and write
|
||
6AFE000
|
stack
|
page read and write
|
||
36F9000
|
direct allocation
|
page read and write
|
||
27D7000
|
direct allocation
|
page read and write
|
||
8E6000
|
heap
|
page read and write
|
||
9A5000
|
heap
|
page read and write
|
||
36DA000
|
direct allocation
|
page read and write
|
||
DD0000
|
direct allocation
|
page execute and read and write
|
||
5322000
|
direct allocation
|
page read and write
|
||
641C000
|
heap
|
page read and write
|
||
374D000
|
direct allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
3AA2000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
6BFF000
|
stack
|
page read and write
|
||
6604000
|
heap
|
page read and write
|
||
79B000
|
heap
|
page read and write
|
||
794000
|
heap
|
page read and write
|
||
3AC1000
|
heap
|
page read and write
|
||
3AE1000
|
heap
|
page read and write
|
||
192000
|
stack
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
A92000
|
heap
|
page read and write
|
||
B2D000
|
unkown
|
page read and write
|
||
A1C000
|
heap
|
page read and write
|
||
66D8000
|
heap
|
page read and write
|
||
129D000
|
heap
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
379E000
|
stack
|
page read and write
|
||
3490000
|
direct allocation
|
page read and write
|
||
3B43000
|
heap
|
page read and write
|
||
3B39000
|
heap
|
page read and write
|
||
6644000
|
heap
|
page read and write
|
||
701000
|
unkown
|
page readonly
|
||
AA0000
|
heap
|
page read and write
|
||
B5C000
|
unkown
|
page read and write
|
||
2784000
|
direct allocation
|
page read and write
|
||
675B000
|
heap
|
page read and write
|
||
2476000
|
direct allocation
|
page read and write
|
||
7A3000
|
heap
|
page read and write
|
||
3AA2000
|
heap
|
page read and write
|
||
774000
|
heap
|
page read and write
|
||
64A5000
|
heap
|
page read and write
|
||
656F000
|
heap
|
page read and write
|
||
F59000
|
heap
|
page read and write
|
||
6942000
|
heap
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
2610000
|
direct allocation
|
page read and write
|
||
2CEF000
|
direct allocation
|
page read and write
|
||
3C5F000
|
stack
|
page read and write
|
||
3A50000
|
heap
|
page read and write
|
||
2308000
|
direct allocation
|
page read and write
|
||
3A84000
|
heap
|
page read and write
|
||
7D5000
|
unkown
|
page read and write
|
||
6413000
|
heap
|
page read and write
|
||
3A1E000
|
stack
|
page read and write
|
||
6686000
|
heap
|
page read and write
|
||
6A9E000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
6CF000
|
unkown
|
page read and write
|
||
3AD5000
|
heap
|
page read and write
|
||
693D000
|
heap
|
page read and write
|
||
7C6F000
|
stack
|
page read and write
|
||
B45000
|
unkown
|
page read and write
|
||
222D000
|
direct allocation
|
page read and write
|
||
2234000
|
direct allocation
|
page read and write
|
||
6605000
|
heap
|
page read and write
|
||
66D8000
|
heap
|
page read and write
|
||
6C001000
|
unkown
|
page execute read
|
||
3A7B000
|
heap
|
page read and write
|
||
668E000
|
heap
|
page read and write
|
||
6A24000
|
heap
|
page read and write
|
||
4B7000
|
unkown
|
page write copy
|
||
F4B000
|
heap
|
page read and write
|
||
ECF000
|
heap
|
page read and write
|
||
782000
|
heap
|
page read and write
|
||
669D000
|
heap
|
page read and write
|
||
3B47000
|
heap
|
page read and write
|
||
69E2000
|
heap
|
page read and write
|
||
286A000
|
direct allocation
|
page read and write
|
||
B2F000
|
unkown
|
page read and write
|
||
37B3000
|
direct allocation
|
page read and write
|
||
3B45000
|
heap
|
page read and write
|
||
4520000
|
heap
|
page read and write
|
||
68C8000
|
heap
|
page read and write
|
||
6A03000
|
heap
|
page read and write
|
||
6486000
|
heap
|
page read and write
|
||
7A30000
|
heap
|
page read and write
|
||
2B5D000
|
direct allocation
|
page read and write
|
||
66AB000
|
heap
|
page read and write
|
||
129D000
|
heap
|
page read and write
|
||
6CC000
|
unkown
|
page read and write
|
||
2740000
|
direct allocation
|
page read and write
|
||
36E8000
|
direct allocation
|
page read and write
|
||
2508000
|
direct allocation
|
page read and write
|
||
640B000
|
heap
|
page read and write
|
||
3C9E000
|
stack
|
page read and write
|
||
6999000
|
heap
|
page read and write
|
||
7A3E000
|
heap
|
page read and write
|
||
2261000
|
direct allocation
|
page read and write
|
||
6228000
|
direct allocation
|
page read and write
|
||
6648000
|
heap
|
page read and write
|
||
308F000
|
stack
|
page read and write
|
||
6402000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
654C000
|
heap
|
page read and write
|
||
520F000
|
heap
|
page read and write
|
||
2460000
|
direct allocation
|
page read and write
|
||
66C2000
|
heap
|
page read and write
|
||
3779000
|
direct allocation
|
page read and write
|
||
7C9000
|
unkown
|
page read and write
|
||
26B4000
|
direct allocation
|
page read and write
|
||
2B40000
|
direct allocation
|
page read and write
|
||
779000
|
heap
|
page read and write
|
||
6538000
|
heap
|
page read and write
|
||
6C5000
|
unkown
|
page read and write
|
||
6402000
|
heap
|
page read and write
|
||
3B03000
|
heap
|
page read and write
|
||
24D6000
|
direct allocation
|
page read and write
|
||
B25000
|
unkown
|
page read and write
|
||
3A51000
|
heap
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
71C0000
|
direct allocation
|
page read and write
|
||
D6A000
|
unkown
|
page readonly
|
||
A39000
|
heap
|
page read and write
|
||
6900000
|
heap
|
page read and write
|
||
65B2000
|
heap
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
2804000
|
direct allocation
|
page read and write
|
||
6487000
|
heap
|
page read and write
|
||
6605000
|
heap
|
page read and write
|
||
27FD000
|
direct allocation
|
page read and write
|
||
232D000
|
direct allocation
|
page read and write
|
||
6547000
|
heap
|
page read and write
|
||
283F000
|
direct allocation
|
page read and write
|
||
277D000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
F66000
|
heap
|
page read and write
|
||
A91000
|
heap
|
page read and write
|
||
5291000
|
heap
|
page read and write
|
||
7A1C000
|
heap
|
page read and write
|
||
3A82000
|
heap
|
page read and write
|
||
6469000
|
heap
|
page read and write
|
||
6445000
|
heap
|
page read and write
|
||
7A6E000
|
heap
|
page read and write
|
||
64A7000
|
heap
|
page read and write
|
||
26BC000
|
direct allocation
|
page read and write
|
||
670C000
|
heap
|
page read and write
|
||
6688000
|
heap
|
page read and write
|
||
6C0E6000
|
unkown
|
page read and write
|
||
281B000
|
direct allocation
|
page read and write
|
||
7A7000
|
unkown
|
page read and write
|
||
2674000
|
direct allocation
|
page read and write
|
||
B95000
|
heap
|
page read and write
|
||
F59000
|
heap
|
page read and write
|
||
6A44000
|
heap
|
page read and write
|
||
64C6000
|
heap
|
page read and write
|
||
6700000
|
heap
|
page read and write
|
||
3763000
|
direct allocation
|
page read and write
|
||
64C5000
|
heap
|
page read and write
|
||
3ABA000
|
heap
|
page read and write
|
||
650E000
|
heap
|
page read and write
|
||
E78000
|
heap
|
page read and write
|
||
3DDE000
|
stack
|
page read and write
|
||
ECF000
|
heap
|
page read and write
|
||
6900000
|
heap
|
page read and write
|
||
7A75000
|
heap
|
page read and write
|
||
3780000
|
direct allocation
|
page read and write
|
||
61E9F000
|
unkown
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
66CB000
|
heap
|
page read and write
|
||
6908000
|
heap
|
page read and write
|
||
3F1E000
|
stack
|
page read and write
|
||
34CF000
|
stack
|
page read and write
|
||
7FD40000
|
direct allocation
|
page read and write
|
||
A94000
|
heap
|
page read and write
|
||
37C1000
|
direct allocation
|
page read and write
|
||
27DE000
|
direct allocation
|
page read and write
|
||
3533000
|
direct allocation
|
page read and write
|
||
72A2000
|
direct allocation
|
page read and write
|
||
77F000
|
heap
|
page read and write
|
||
650E000
|
heap
|
page read and write
|
||
377E000
|
direct allocation
|
page read and write
|
||
B56000
|
unkown
|
page write copy
|
||
7A37000
|
heap
|
page read and write
|
||
65C2000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
3AA2000
|
heap
|
page read and write
|
||
3AA1000
|
heap
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
3B05000
|
heap
|
page read and write
|
||
6639000
|
heap
|
page read and write
|
||
2683000
|
direct allocation
|
page read and write
|
||
78D000
|
heap
|
page read and write
|
||
415F000
|
stack
|
page read and write
|
||
7ABF000
|
heap
|
page read and write
|
||
6916000
|
heap
|
page read and write
|
||
65B8000
|
heap
|
page read and write
|
||
3B37000
|
heap
|
page read and write
|
||
6935000
|
heap
|
page read and write
|
||
6646000
|
heap
|
page read and write
|
||
6486000
|
heap
|
page read and write
|
||
AE3000
|
heap
|
page read and write
|
||
26E0000
|
direct allocation
|
page read and write
|
||
64C5000
|
heap
|
page read and write
|
||
26B6000
|
direct allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
7A27000
|
heap
|
page read and write
|
||
7A56000
|
heap
|
page read and write
|
||
6942000
|
heap
|
page read and write
|
||
96000
|
stack
|
page read and write
|
||
36AE000
|
stack
|
page read and write
|
||
3743000
|
direct allocation
|
page read and write
|
||
6408000
|
heap
|
page read and write
|
||
353E000
|
stack
|
page read and write
|
||
3B3C000
|
heap
|
page read and write
|
||
2878000
|
direct allocation
|
page read and write
|
||
61E01000
|
unkown
|
page execute read
|
||
2243000
|
direct allocation
|
page read and write
|
||
5B94000
|
direct allocation
|
page read and write
|
||
6902000
|
heap
|
page read and write
|
||
65B0000
|
heap
|
page read and write
|
||
6A56000
|
heap
|
page read and write
|
||
6561000
|
heap
|
page read and write
|
||
371F000
|
direct allocation
|
page read and write
|
||
270F000
|
direct allocation
|
page read and write
|
||
350E000
|
direct allocation
|
page read and write
|
||
3BEC000
|
heap
|
page read and write
|
||
9C8000
|
heap
|
page read and write
|
||
375E000
|
direct allocation
|
page read and write
|
||
AD0000
|
direct allocation
|
page execute and read and write
|
||
65BE000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
7221000
|
heap
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
64C5000
|
heap
|
page read and write
|
||
62CC000
|
direct allocation
|
page read and write
|
||
6A44000
|
heap
|
page read and write
|
||
36CA000
|
direct allocation
|
page read and write
|
||
519C000
|
direct allocation
|
page read and write
|
||
663D000
|
heap
|
page read and write
|
||
63C1000
|
heap
|
page read and write
|
||
F5E000
|
heap
|
page read and write
|
||
5BAD000
|
direct allocation
|
page read and write
|
||
7A7C000
|
heap
|
page read and write
|
||
3ACD000
|
heap
|
page read and write
|
||
2D85000
|
direct allocation
|
page read and write
|
||
6543000
|
heap
|
page read and write
|
||
6985000
|
heap
|
page read and write
|
||
26F2000
|
direct allocation
|
page read and write
|
||
1F7000
|
heap
|
page read and write
|
||
3AF3000
|
heap
|
page read and write
|
||
3A81000
|
heap
|
page read and write
|
||
3796000
|
direct allocation
|
page read and write
|
||
E6F000
|
stack
|
page read and write
|
||
26BD000
|
direct allocation
|
page read and write
|
||
6599000
|
heap
|
page read and write
|
||
6C000000
|
unkown
|
page readonly
|
||
6689000
|
heap
|
page read and write
|
||
73F000
|
heap
|
page read and write
|
||
2343000
|
direct allocation
|
page read and write
|
||
666D000
|
heap
|
page read and write
|
||
6592000
|
heap
|
page read and write
|
||
6A02000
|
heap
|
page read and write
|
||
5C4A000
|
direct allocation
|
page read and write
|
||
24EC000
|
direct allocation
|
page read and write
|
||
6706000
|
heap
|
page read and write
|
||
3B41000
|
heap
|
page read and write
|
||
6D4000
|
unkown
|
page read and write
|
||
70BF000
|
stack
|
page read and write
|
||
2C93000
|
direct allocation
|
page read and write
|
||
779000
|
heap
|
page read and write
|
||
268E000
|
direct allocation
|
page read and write
|
||
6DC000
|
unkown
|
page readonly
|
||
3AA2000
|
heap
|
page read and write
|
||
272C000
|
direct allocation
|
page read and write
|
||
5210000
|
heap
|
page read and write
|
||
5290000
|
direct allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
A87000
|
heap
|
page read and write
|
||
66AF000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
6A56000
|
heap
|
page read and write
|
||
3A7C000
|
heap
|
page read and write
|
||
6E40000
|
direct allocation
|
page read and write
|
||
38DE000
|
stack
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
2757000
|
direct allocation
|
page read and write
|
||
7A59000
|
heap
|
page read and write
|
||
5B7B000
|
direct allocation
|
page read and write
|
||
7A40000
|
heap
|
page read and write
|
||
64C7000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
2708000
|
direct allocation
|
page read and write
|
||
6925000
|
heap
|
page read and write
|
||
EEB000
|
heap
|
page read and write
|
||
6402000
|
heap
|
page read and write
|
||
6686000
|
heap
|
page read and write
|
||
23DB000
|
direct allocation
|
page read and write
|
||
697F000
|
heap
|
page read and write
|
||
4B9000
|
unkown
|
page read and write
|
||
65C2000
|
heap
|
page read and write
|
||
788000
|
heap
|
page read and write
|
||
569E000
|
stack
|
page read and write
|
||
2268000
|
direct allocation
|
page read and write
|
||
647F000
|
heap
|
page read and write
|
||
71E9000
|
direct allocation
|
page read and write
|
||
71F000
|
stack
|
page read and write
|
||
654A000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
6572000
|
heap
|
page read and write
|
||
6417000
|
heap
|
page read and write
|
||
7A9A000
|
heap
|
page read and write
|
||
653A000
|
heap
|
page read and write
|
||
3490000
|
direct allocation
|
page read and write
|
||
26D8000
|
direct allocation
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
782000
|
heap
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
65B1000
|
heap
|
page read and write
|
||
7B1000
|
unkown
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
6901000
|
heap
|
page read and write
|
||
68D1000
|
heap
|
page read and write
|
||
26F9000
|
direct allocation
|
page read and write
|
||
75E000
|
stack
|
page read and write
|
||
6410000
|
heap
|
page read and write
|
||
6483000
|
heap
|
page read and write
|
||
6A47000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
643C000
|
heap
|
page read and write
|
||
6665000
|
heap
|
page read and write
|
||
3B27000
|
heap
|
page read and write
|
||
EE5000
|
heap
|
page read and write
|
||
223B000
|
direct allocation
|
page read and write
|
||
78D000
|
heap
|
page read and write
|
||
6445000
|
heap
|
page read and write
|
||
2640000
|
direct allocation
|
page read and write
|
||
64FE000
|
heap
|
page read and write
|
||
4C6000
|
unkown
|
page readonly
|
||
278B000
|
direct allocation
|
page read and write
|
||
3490000
|
heap
|
page read and write
|
||
2484000
|
direct allocation
|
page read and write
|
||
3AD8000
|
heap
|
page read and write
|
||
357C000
|
stack
|
page read and write
|
||
93000
|
stack
|
page read and write
|
||
64CC000
|
heap
|
page read and write
|
||
6582000
|
heap
|
page read and write
|
||
6555000
|
heap
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
2501000
|
direct allocation
|
page read and write
|
||
6CBE000
|
stack
|
page read and write
|
||
3690000
|
direct allocation
|
page read and write
|
||
6716000
|
heap
|
page read and write
|
||
7CBE000
|
stack
|
page read and write
|
||
6655000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
37BF000
|
direct allocation
|
page read and write
|
||
B37000
|
unkown
|
page write copy
|
||
6AA3000
|
heap
|
page read and write
|
||
3AC8000
|
heap
|
page read and write
|
||
3143000
|
heap
|
page read and write
|
||
728000
|
heap
|
page read and write
|
||
2351000
|
direct allocation
|
page read and write
|
||
3B5E000
|
stack
|
page read and write
|
||
6645000
|
heap
|
page read and write
|
||
7C9000
|
unkown
|
page read and write
|
||
65A2000
|
heap
|
page read and write
|
||
3AFA000
|
heap
|
page read and write
|
||
2B53000
|
heap
|
page read and write
|
||
665E000
|
heap
|
page read and write
|
||
2252000
|
direct allocation
|
page read and write
|
||
658C000
|
heap
|
page read and write
|
||
2830000
|
direct allocation
|
page read and write
|
||
7CE000
|
unkown
|
page read and write
|
||
ED1000
|
heap
|
page read and write
|
||
24E4000
|
direct allocation
|
page read and write
|
||
24C8000
|
direct allocation
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
6932000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
27ED000
|
direct allocation
|
page read and write
|
||
3B26000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
3B3C000
|
heap
|
page read and write
|
||
7A43000
|
heap
|
page read and write
|
||
2C80000
|
trusted library allocation
|
page read and write
|
||
656B000
|
heap
|
page read and write
|
||
7DFE000
|
stack
|
page read and write
|
||
EF5000
|
heap
|
page read and write
|
||
61EA6000
|
unkown
|
page readonly
|
||
3C50000
|
trusted library allocation
|
page read and write
|
||
2748000
|
direct allocation
|
page read and write
|
||
3A51000
|
heap
|
page read and write
|
||
691B000
|
heap
|
page read and write
|
||
3B2E000
|
heap
|
page read and write
|
||
361F000
|
stack
|
page read and write
|
||
98E000
|
stack
|
page read and write
|
||
65A3000
|
heap
|
page read and write
|
||
5BA9000
|
direct allocation
|
page read and write
|
||
74D000
|
heap
|
page read and write
|
||
3B41000
|
heap
|
page read and write
|
||
6445000
|
heap
|
page read and write
|
||
2846000
|
direct allocation
|
page read and write
|
||
378F000
|
direct allocation
|
page read and write
|
||
6551000
|
heap
|
page read and write
|
||
73B000
|
heap
|
page read and write
|
||
65A1000
|
heap
|
page read and write
|
||
3AD4000
|
heap
|
page read and write
|
||
A7C000
|
heap
|
page read and write
|
||
26D4000
|
direct allocation
|
page read and write
|
||
3A7B000
|
heap
|
page read and write
|
||
4C4000
|
unkown
|
page readonly
|
||
3B43000
|
heap
|
page read and write
|
||
655E000
|
heap
|
page read and write
|
||
78A000
|
heap
|
page read and write
|
||
A81000
|
heap
|
page read and write
|
||
3A79000
|
heap
|
page read and write
|
||
661F000
|
heap
|
page read and write
|
||
6690000
|
heap
|
page read and write
|
||
F4A000
|
heap
|
page read and write
|
||
2BBF000
|
direct allocation
|
page read and write
|
||
657B000
|
heap
|
page read and write
|
||
F56000
|
heap
|
page read and write
|
||
7A74000
|
heap
|
page read and write
|
||
6424000
|
heap
|
page read and write
|
||
7AC000
|
heap
|
page read and write
|
||
2733000
|
direct allocation
|
page read and write
|
||
6D7000
|
unkown
|
page write copy
|
||
F5B000
|
heap
|
page read and write
|
||
3A90000
|
heap
|
page read and write
|
||
2654000
|
direct allocation
|
page read and write
|
||
6486000
|
heap
|
page read and write
|
||
6403000
|
heap
|
page read and write
|
||
249B000
|
direct allocation
|
page read and write
|
||
2ACE000
|
stack
|
page read and write
|
||
6985000
|
heap
|
page read and write
|
||
374B000
|
direct allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
2334000
|
direct allocation
|
page read and write
|
||
66CA000
|
heap
|
page read and write
|
||
B4D000
|
unkown
|
page read and write
|
||
6C5000
|
unkown
|
page write copy
|
||
23D0000
|
direct allocation
|
page read and write
|
||
68DE000
|
heap
|
page read and write
|
||
2814000
|
direct allocation
|
page read and write
|
||
659D000
|
heap
|
page read and write
|
||
351E000
|
stack
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
6929000
|
heap
|
page read and write
|
||
66B8000
|
heap
|
page read and write
|
||
3B49000
|
heap
|
page read and write
|
||
3B05000
|
heap
|
page read and write
|
||
37BA000
|
direct allocation
|
page read and write
|
||
EE7000
|
heap
|
page read and write
|
||
ECC000
|
heap
|
page read and write
|
||
6604000
|
heap
|
page read and write
|
||
34D0000
|
heap
|
page read and write
|
||
3B5A000
|
heap
|
page read and write
|
||
2D45000
|
direct allocation
|
page read and write
|
||
650E000
|
heap
|
page read and write
|
||
A8D000
|
heap
|
page read and write
|
||
694A000
|
heap
|
page read and write
|
||
645B000
|
heap
|
page read and write
|
||
7A7A000
|
heap
|
page read and write
|
||
2226000
|
direct allocation
|
page read and write
|
||
61E8E000
|
unkown
|
page write copy
|
||
3A63000
|
heap
|
page read and write
|
||
405E000
|
stack
|
page read and write
|
||
3B50000
|
trusted library allocation
|
page read and write
|
||
66B6000
|
heap
|
page read and write
|
||
8E7000
|
heap
|
page read and write
|
||
6C0BA000
|
unkown
|
page readonly
|
||
1200000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
C29000
|
heap
|
page read and write
|
||
4C2000
|
unkown
|
page write copy
|
||
65A5000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
554E000
|
stack
|
page read and write
|
||
A7E000
|
heap
|
page read and write
|
||
6972000
|
heap
|
page read and write
|
||
4B7000
|
unkown
|
page read and write
|
||
6489000
|
heap
|
page read and write
|
||
B92000
|
heap
|
page read and write
|
||
33CE000
|
stack
|
page read and write
|
||
66C7000
|
heap
|
page read and write
|
||
65A9000
|
heap
|
page read and write
|
||
F5F000
|
heap
|
page read and write
|
||
3ACE000
|
heap
|
page read and write
|
||
5FE000
|
stack
|
page read and write
|
||
3709000
|
direct allocation
|
page read and write
|
||
671A000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
2699000
|
direct allocation
|
page read and write
|
||
6A86000
|
heap
|
page read and write
|
||
690E000
|
heap
|
page read and write
|
||
F4F000
|
heap
|
page read and write
|
||
61EA5000
|
unkown
|
page write copy
|
||
64A5000
|
heap
|
page read and write
|
||
274F000
|
direct allocation
|
page read and write
|
||
6402000
|
heap
|
page read and write
|
||
79F000
|
unkown
|
page execute read
|
||
1230000
|
direct allocation
|
page execute and read and write
|
||
64A5000
|
heap
|
page read and write
|
||
233C000
|
direct allocation
|
page read and write
|
||
2CF8000
|
direct allocation
|
page read and write
|
||
579F000
|
stack
|
page read and write
|
||
6688000
|
heap
|
page read and write
|
||
3742000
|
direct allocation
|
page read and write
|
||
664E000
|
heap
|
page read and write
|
||
5C67000
|
direct allocation
|
page read and write
|
||
69E3000
|
heap
|
page read and write
|
||
2863000
|
direct allocation
|
page read and write
|
||
2854000
|
direct allocation
|
page read and write
|
||
5B9E000
|
direct allocation
|
page read and write
|
||
3A82000
|
heap
|
page read and write
|
||
3B1F000
|
stack
|
page read and write
|
||
A9F000
|
heap
|
page read and write
|
||
D6E000
|
unkown
|
page readonly
|
||
3A58000
|
heap
|
page read and write
|
||
7DBE000
|
stack
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
3360000
|
remote allocation
|
page read and write
|
||
6DBF000
|
stack
|
page read and write
|
||
797000
|
heap
|
page read and write
|
||
61E8E000
|
unkown
|
page read and write
|
||
6402000
|
heap
|
page read and write
|
||
6625000
|
heap
|
page read and write
|
||
787000
|
heap
|
page read and write
|
||
26DB000
|
direct allocation
|
page read and write
|
||
7A24000
|
heap
|
page read and write
|
||
6543000
|
heap
|
page read and write
|
||
6969000
|
heap
|
page read and write
|
||
3521000
|
direct allocation
|
page read and write
|
||
64DA000
|
heap
|
page read and write
|
||
EEA000
|
heap
|
page read and write
|
||
7D1000
|
unkown
|
page read and write
|
||
660A000
|
heap
|
page read and write
|
||
3480000
|
direct allocation
|
page read and write
|
||
6677000
|
heap
|
page read and write
|
||
26CD000
|
direct allocation
|
page read and write
|
||
3B48000
|
heap
|
page read and write
|
||
6A8A000
|
heap
|
page read and write
|
||
2829000
|
direct allocation
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
6420000
|
heap
|
page read and write
|
||
6565000
|
heap
|
page read and write
|
||
318D000
|
stack
|
page read and write
|
||
51D1000
|
heap
|
page read and write
|
||
24FA000
|
direct allocation
|
page read and write
|
||
564F000
|
stack
|
page read and write
|
||
26C4000
|
direct allocation
|
page read and write
|
||
26AE000
|
direct allocation
|
page read and write
|
||
3AC8000
|
heap
|
page read and write
|
||
2B0E000
|
stack
|
page read and write
|
There are 1007 hidden memdumps, click here to show them.