Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.FileRepPup.14974.19067.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\Wise\Wise Care 365\WiseCare365.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\WiseDefrag.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\WiseEraser.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\WiseTray.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\WiseTurbo.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\is-06S8G.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\is-0KH1K.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\is-0OCO8.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\is-2137K.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\is-5N4PF.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\is-686UE.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\is-HBE50.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\is-KVUKP.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\is-LTPNS.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\is-ML9G6.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\is-NN1JK.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\is-Q90PB.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\is-RHK8R.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\is-TBFAC.tmp
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\is-VM9DB.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\libeay32.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\sqlite3.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\ssleay32.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\unins000.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-0JG3C.tmp\SecuriteInfo.com.FileRepPup.14974.19067.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\AutoUpdate.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\BootLauncher.exe (copy)
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\BootPack.wpk (copy)
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\BootTime.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\DManager.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\DefragOptions.ini (copy)
|
Microsoft HTML Help Project
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Abkhazian.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Arabic.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Azerbaijani(Latin).ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Belarusian.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Bulgarian.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Catalan.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Chinese(Simplified).ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Chinese(Traditional).ini (copy)
|
data
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Croatian.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Czech.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Danish.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Dutch(Belgium).ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Dutch(Nederlands).ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\English.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Finnish.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\French.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Georgian.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\German.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Greek.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Hebrew.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Hungarian.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Indonesian.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Italian.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Japanese.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Korean.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Kurdish.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Lithuanian.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Nepali.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Norwegian(Bokmal).ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Norwegian(Nynorsk).ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF, CR line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Persian.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Polish.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Portuguese(Brazil).ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Portuguese(Portugal).ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Romanian.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Russian.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Serbian(Cyrillic).ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Slovak.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Slovenian.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Spanish(Spain).ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Swedish(Sweden).ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Thai.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Turkish.ini (copy)
|
data
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Ukrainian.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Vietnamese.ini (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-0K4D0.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-0KV3G.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-0U498.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-1HG9F.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-1HMQQ.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-2R9T4.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-4UGBN.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-4V222.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-5CI8V.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-5GKRD.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-6O8KK.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-75Q8A.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-7DHRJ.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-7RBI1.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-8GKPK.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-9QT7S.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-9RLN5.tmp
|
data
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-A7D99.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF, CR line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-ARED8.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-B2U0C.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-B4B37.tmp
|
data
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-CE734.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-CJ9MH.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-DOEI9.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-F73V7.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-GDUNS.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-HANV8.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-HJAD5.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-IIOAA.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-IMHBK.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-JIIE0.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-JUK4P.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-LH3KH.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-LVL12.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-NQ1BG.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-O8BB2.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-OB6TO.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-OBGII.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-P55SE.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-QV9NK.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-SURPH.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-TGO78.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-UINQF.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-UU410.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-V59MG.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\License.txt (copy)
|
ASCII text, with very long lines (870), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Rate.info (copy)
|
ASCII text
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\Themes_v6.txt (copy)
|
JSON data
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\WJSLib.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\WiseBootBooster.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\fileshredder.ico (copy)
|
MS Windows icon resource - 2 icons, 32x32, 32 bits/pixel, 16x16, 32 bits/pixel
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\a1.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\a2.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\a6.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\a7.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\a9.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\b5.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\c4.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\c7.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\d1.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\d2.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\d3.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\d4.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\d7.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\e7.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\e8.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\e9.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\f0.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\f1.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\f2.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\f3.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\f4.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\f5.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\f6.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\f7.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\g1.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\g2.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\g3.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\g4.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\g5.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\g6.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\g7.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\g8.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\h1.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\h2.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\h3.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\h4.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\h5.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\h6.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\h7.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\h8.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\i1.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\i2.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\i3.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\i4.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\i5.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\i6.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\i7.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\i8.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-03O8G.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-0DU8L.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-0F6JM.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-0KBSG.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-1M6JI.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-25TOS.tmp
|
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-2AMFT.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-2O33D.tmp
|
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-2SGTE.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-3GM49.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-5R91K.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-754V0.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-8LG4P.tmp
|
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-BDSBP.tmp
|
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-CF6AK.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-CKOMM.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-DMRAE.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-DTIVV.tmp
|
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-E2PK7.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-E8CHT.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-EEEQ0.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-EGK32.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-G37CL.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-G55TL.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-G6IF2.tmp
|
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-G875B.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-GBMNH.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-GGMJG.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-H1132.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-HPQ2M.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-IS72O.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-IU54T.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-IU6CJ.tmp
|
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-JL61E.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-JL65U.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-K12IT.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-KAO93.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-M20V6.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-MUHFI.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-N2UG0.tmp
|
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-NGB8A.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-NOI36.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-OEQDK.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-OQK6L.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-OQRJU.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-PIGJ4.tmp
|
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-POMU3.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-QH3DP.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-QUNH2.tmp
|
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-RL1JV.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-RSJ9M.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-T5CES.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-T7K4B.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-THC3H.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-TPEB1.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-V5MFV.tmp
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\j.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\j0.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\j1.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\j3.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\j4.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\j6.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\j7.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\headers\j8.png (copy)
|
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\is-0ETB5.tmp
|
ASCII text, with very long lines (870), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\is-1C06C.tmp
|
JSON data
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\is-D7TKL.tmp
|
MS Windows icon resource - 7 icons, -128x-128, 32 bits/pixel, 96x96, 32 bits/pixel
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\is-JV7IH.tmp
|
MS Windows icon resource - 2 icons, 32x32, 32 bits/pixel, 16x16, 32 bits/pixel
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\is-TOP6G.tmp
|
ASCII text
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\is-UR7HO.tmp
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\is-V74T2.tmp
|
Microsoft HTML Help Project
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\skin.ico (copy)
|
MS Windows icon resource - 7 icons, -128x-128, 32 bits/pixel, 96x96, 32 bits/pixel
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\AutoShutdown.svg (copy)
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\DateRecovery.svg (copy)
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\DuplicateFinder.svg (copy)
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\FastSearch.svg (copy)
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\FolderHider.svg (copy)
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\ForceDeleter.svg (copy)
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\GameBooster.svg (copy)
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\MemoryOptimizer.svg (copy)
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\ProgramUninstaller.svg (copy)
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\Reminder.svg (copy)
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\is-0JVAF.tmp
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\is-0U1VF.tmp
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\is-B6N3P.tmp
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\is-C4PA2.tmp
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\is-FTFR1.tmp
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\is-GF8OH.tmp
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\is-IUBVJ.tmp
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\is-QOVQA.tmp
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\is-RPCRV.tmp
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\is-VCGTP.tmp
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\tools\is-LFJ0P.tmp
|
Generic INItialization configuration [Wise Folder Hider]
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\tools\toolsv6.ini (copy)
|
Generic INItialization configuration [Wise Folder Hider]
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\unins000.dat
|
InnoSetup Log Wise Care 365, version 0x418, 60239 bytes, 123716\37\user\376, C:\Program Files (x86)\Wise\Wise Care 365\
|
dropped
|
||
C:\Program Files (x86)\Wise\Wise Care 365\unins000.msg
|
InnoSetup messages, version 6.0.0, 243 messages (UTF-16), Cancel installation
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0xfd71ae79, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Wise Care 365\Uninstall Wise Care 365.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Thu Apr 25 12:30:14 2024, mtime=Thu Apr 25 12:30:14 2024, atime=Thu Apr 25 12:30:00 2024, length=2680240, window=hide
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Wise Care 365\Wise Care 365.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Thu Apr 25 12:30:18 2024, mtime=Thu Apr 25 12:30:19 2024, atime=Wed Mar 20 14:49:40 2024, length=18762136, window=hide
|
dropped
|
||
C:\Users\Public\Desktop\Wise Care 365.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Thu Apr 25 12:30:18 2024, mtime=Thu Apr 25 12:30:20 2024, atime=Wed Mar 20 14:49:40 2024, length=18762136, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bojvgash.ini
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-1Q5HG.tmp\Icon_128.bmp
|
PC bitmap, Windows 3.x format, 128 x 128 x 24, image size 49152, resolution 3779 x 3779 px/m, cbSize 49206, bits offset 54
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-1Q5HG.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-1Q5HG.tmp\introduce.url
|
MS Windows 95 Internet shortcut text (URL=<https://www.wisecleaner.com/thanks-for-choosing-WiseCare365.html>), ASCII text,
with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-1Q5HG.tmp\license.txt
|
ASCII text, with very long lines (870), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Wise Care 365\UpdateInfo\012055670.png
|
PNG image data, 1500 x 240, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Roaming\Wise Care 365\config.ini
|
Generic INItialization configuration [BootBooster]
|
dropped
|
||
C:\Users\user\AppData\Roaming\Wise Care 365\toolsv6.ini
|
Generic INItialization configuration [Wise Folder Hider]
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 233
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 234
|
ASCII text, with very long lines (9040)
|
downloaded
|
||
Chrome Cache Entry: 235
|
ASCII text, with very long lines (20303)
|
dropped
|
||
Chrome Cache Entry: 236
|
PNG image data, 60 x 60, 8-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 237
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 238
|
ASCII text, with very long lines (11215), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 239
|
PNG image data, 16 x 12, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 240
|
PNG image data, 140 x 100, 8-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 241
|
ASCII text, with very long lines (39210), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 242
|
ASCII text, with very long lines (2124)
|
downloaded
|
||
Chrome Cache Entry: 243
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 244
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 245
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 246
|
PNG image data, 60 x 60, 8-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 247
|
RIFF (little-endian) data, Web/P image
|
downloaded
|
||
Chrome Cache Entry: 248
|
GIF image data, version 89a, 1 x 1
|
dropped
|
||
Chrome Cache Entry: 249
|
ASCII text, with very long lines (2054)
|
downloaded
|
||
Chrome Cache Entry: 250
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 251
|
RIFF (little-endian) data, Web/P image
|
downloaded
|
||
Chrome Cache Entry: 252
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 253
|
RIFF (little-endian) data, Web/P image
|
downloaded
|
||
Chrome Cache Entry: 254
|
PNG image data, 50 x 100, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 255
|
RIFF (little-endian) data, Web/P image
|
downloaded
|
||
Chrome Cache Entry: 256
|
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 257
|
MS Windows icon resource - 4 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
|
downloaded
|
||
Chrome Cache Entry: 258
|
PNG image data, 27 x 104, 8-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 259
|
PNG image data, 60 x 60, 8-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 260
|
ASCII text, with very long lines (1763)
|
downloaded
|
||
Chrome Cache Entry: 261
|
ASCII text, with very long lines (2247)
|
downloaded
|
||
Chrome Cache Entry: 262
|
RIFF (little-endian) data, Web/P image
|
downloaded
|
||
Chrome Cache Entry: 263
|
ASCII text, with very long lines (3164)
|
downloaded
|
||
Chrome Cache Entry: 264
|
ASCII text, with very long lines (12982), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 265
|
PNG image data, 1 x 5, 4-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 266
|
PNG image data, 1 x 5, 4-bit colormap, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 267
|
ASCII text, with very long lines (1915)
|
downloaded
|
||
Chrome Cache Entry: 268
|
ASCII text, with very long lines (12331)
|
downloaded
|
||
Chrome Cache Entry: 269
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 270
|
GIF image data, version 89a, 1 x 1
|
dropped
|
||
Chrome Cache Entry: 271
|
PNG image data, 370 x 100, 8-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 272
|
ASCII text, with very long lines (2124)
|
downloaded
|
||
Chrome Cache Entry: 273
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 274
|
ASCII text, with very long lines (2050)
|
downloaded
|
||
Chrome Cache Entry: 275
|
RIFF (little-endian) data, Web/P image
|
downloaded
|
||
Chrome Cache Entry: 276
|
Web Open Font Format (Version 2), TrueType, length 6416, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 277
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 278
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 279
|
ASCII text, with very long lines (3702)
|
downloaded
|
||
Chrome Cache Entry: 280
|
RIFF (little-endian) data, Web/P image
|
downloaded
|
||
Chrome Cache Entry: 281
|
Unicode text, UTF-8 text, with very long lines (38752)
|
downloaded
|
||
Chrome Cache Entry: 282
|
PNG image data, 39 x 33, 8-bit colormap, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 283
|
ASCII text, with very long lines (1293)
|
downloaded
|
||
Chrome Cache Entry: 284
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 285
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 286
|
RIFF (little-endian) data, Web/P image
|
downloaded
|
||
Chrome Cache Entry: 287
|
RIFF (little-endian) data, Web/P image
|
downloaded
|
||
Chrome Cache Entry: 288
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 289
|
PNG image data, 16 x 12, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 290
|
ASCII text, with very long lines (3295)
|
downloaded
|
||
Chrome Cache Entry: 291
|
PNG image data, 100 x 110, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 292
|
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 293
|
ASCII text, with very long lines (3982), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 294
|
PNG image data, 140 x 140, 8-bit colormap, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 295
|
RIFF (little-endian) data, Web/P image
|
downloaded
|
||
Chrome Cache Entry: 296
|
ASCII text, with very long lines (541)
|
downloaded
|
||
Chrome Cache Entry: 297
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 298
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 299
|
ASCII text, with very long lines (7711)
|
downloaded
|
||
Chrome Cache Entry: 300
|
PNG image data, 60 x 60, 8-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 301
|
RIFF (little-endian) data, Web/P image
|
downloaded
|
||
Chrome Cache Entry: 302
|
RIFF (little-endian) data, Web/P image
|
downloaded
|
||
Chrome Cache Entry: 303
|
ASCII text, with very long lines (1715), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 304
|
RIFF (little-endian) data, Web/P image
|
downloaded
|
||
Chrome Cache Entry: 305
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 306
|
PNG image data, 241 x 137, 8-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 307
|
RIFF (little-endian) data, Web/P image
|
downloaded
|
||
Chrome Cache Entry: 308
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 309
|
RIFF (little-endian) data, Web/P image
|
downloaded
|
||
Chrome Cache Entry: 310
|
PNG image data, 39 x 220, 8-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 311
|
PNG image data, 39 x 33, 8-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 312
|
Web Open Font Format (Version 2), TrueType, length 11032, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 313
|
GIF image data, version 89a, 1 x 1
|
downloaded
|
||
Chrome Cache Entry: 314
|
PNG image data, 160 x 192, 8-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 315
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 316
|
GIF image data, version 89a, 1 x 1
|
downloaded
|
||
Chrome Cache Entry: 317
|
PNG image data, 60 x 60, 8-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 318
|
PNG image data, 140 x 140, 8-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 319
|
ASCII text, with very long lines (389)
|
downloaded
|
||
Chrome Cache Entry: 320
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 321
|
GIF image data, version 89a, 1 x 1
|
downloaded
|
||
Chrome Cache Entry: 322
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 323
|
PNG image data, 140 x 100, 8-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 324
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 325
|
ASCII text, with very long lines (2343)
|
downloaded
|
||
Chrome Cache Entry: 326
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 327
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 328
|
ASCII text, with very long lines (20303)
|
downloaded
|
||
Chrome Cache Entry: 329
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 330
|
PNG image data, 140 x 100, 8-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 331
|
RIFF (little-endian) data, Web/P image
|
downloaded
|
||
Chrome Cache Entry: 332
|
PNG image data, 50 x 100, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 333
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 334
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 335
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 336
|
PNG image data, 100 x 110, 8-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 337
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 338
|
RIFF (little-endian) data, Web/P image
|
downloaded
|
||
Chrome Cache Entry: 339
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 340
|
ASCII text, with very long lines (2818)
|
downloaded
|
||
Chrome Cache Entry: 341
|
MS Windows icon resource - 4 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
|
dropped
|
||
Chrome Cache Entry: 342
|
RIFF (little-endian) data, Web/P image
|
downloaded
|
||
Chrome Cache Entry: 343
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 344
|
ASCII text, with very long lines (1648)
|
downloaded
|
||
Chrome Cache Entry: 345
|
PNG image data, 5 x 1, 4-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 346
|
ASCII text, with very long lines (2124)
|
downloaded
|
||
Chrome Cache Entry: 347
|
ASCII text, with very long lines (3744), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 348
|
PNG image data, 60 x 60, 8-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 349
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 350
|
ASCII text, with very long lines (10455), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 351
|
PNG image data, 50 x 360, 8-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 352
|
ASCII text, with very long lines (7884), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 353
|
HTML document, Unicode text, UTF-8 text, with very long lines (1003), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 354
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 355
|
PNG image data, 158 x 110, 8-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 356
|
RIFF (little-endian) data, Web/P image
|
downloaded
|
||
Chrome Cache Entry: 357
|
PNG image data, 5 x 1, 4-bit colormap, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 358
|
HTML document, ASCII text, with very long lines (24918)
|
downloaded
|
||
Chrome Cache Entry: 359
|
GIF image data, version 89a, 1 x 1
|
dropped
|
||
Chrome Cache Entry: 360
|
PNG image data, 100 x 110, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 361
|
HTML document, ASCII text, with very long lines (56043)
|
downloaded
|
||
Chrome Cache Entry: 362
|
PNG image data, 160 x 58, 8-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 363
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 364
|
RIFF (little-endian) data, Web/P image
|
downloaded
|
||
Chrome Cache Entry: 365
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 366
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 367
|
PNG image data, 140 x 100, 8-bit colormap, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 368
|
RIFF (little-endian) data, Web/P image
|
downloaded
|
||
Chrome Cache Entry: 369
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 370
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 371
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 372
|
SVG Scalable Vector Graphics image
|
downloaded
|
There are 417 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.14974.19067.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.14974.19067.exe"
|
||
C:\Users\user\AppData\Local\Temp\is-0JG3C.tmp\SecuriteInfo.com.FileRepPup.14974.19067.tmp
|
"C:\Users\user\AppData\Local\Temp\is-0JG3C.tmp\SecuriteInfo.com.FileRepPup.14974.19067.tmp" /SL5="$1045C,19204712,857088,C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.14974.19067.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"schtasks.exe" /delete /tn \WiseCleaner\W365SkipUAC /f
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.wisecleaner.com/thanks-for-choosing-WiseCare365.html
|
||
C:\Program Files (x86)\Wise\Wise Care 365\WiseCare365.exe
|
"C:\Program Files (x86)\Wise\Wise Care 365\WiseCare365.exe"
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2556 --field-trial-handle=1076,i,16708299124163291726,5417237086903671621,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files (x86)\Wise\Wise Care 365\BootTime.exe
|
"C:\Program Files (x86)\Wise\Wise Care 365\BootTime.exe"
|
||
C:\Program Files (x86)\Wise\Wise Care 365\WiseTray.exe
|
"C:\Program Files (x86)\Wise\Wise Care 365\WiseTray.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://info.wisecleaner.com/info_group/images/2024/04/12/012055670.png
|
104.26.2.143
|
||
http://downloads.wisecleaner.com/update/care365_v6/AutoUpdate_6.0.3.593.zip
|
unknown
|
||
https://wisecleaner.net/software_statistics/wiserate.txtU
|
unknown
|
||
https://www.wisecleaner.com/static/img/icon/icon_arrow_1f2238_12.svg
|
172.67.68.11
|
||
https://www.wisecleaner.com/static/img/product/thanks-for-choosing/thanks_box_wdf.png
|
172.67.68.11
|
||
http://www.wisecleaner.net/software_statistics/v6.php?p=insertstart
|
unknown
|
||
https://downloads.wisecleaner.com/soft/WJSSetup.exe
|
unknown
|
||
https://platform.twitter.com/widgets/widget_iframe.2f70fb173b9000da126c79afe2098f02.html?origin=https%3A%2F%2Fwww.wisecleaner.com
|
|||
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.lb.en.JisoxTPHVRs.O/m=gapi_iframes_style_bubble/exm=auth,ytsubscribe/rt=j/sv=1/d=1/ed=1/am=AAAC/rs=AHpOoo9VOmUKkb8FAwL65OiDUU4etqWcRg/cb=gapi.loaded_2?le=scs
|
142.250.105.101
|
||
https://info.wisecleaner.com/messages/index.php?to=checknews&pid=3L
|
unknown
|
||
http://ocsps.ssl.com0?
|
unknown
|
||
http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0
|
unknown
|
||
https://www.wisecleaner.com/disc/?day=%d&pix=%.2f
|
unknown
|
||
https://www.wisecleaner.com/static/img/product/update/icon.png
|
172.67.68.11
|
||
https://syndication.twitter.com/i/jot/embeds?l=%7B%22widget_origin%22%3A%22https%3A%2F%2Fwww.wisecleaner.com%2Fthanks-for-choosing-WiseCare365.html%22%2C%22widget_frame%22%3Afalse%2C%22language%22%3A%22en%22%2C%22message%22%3A%22m%3Awithcount%3A%22%2C%22_category_%22%3A%22tfw_client_event%22%2C%22triggered_on%22%3A1714051841572%2C%22dnt%22%3Afalse%2C%22client_version%22%3A%222615f7e52b7e0%3A1702314776716%22%2C%22format_version%22%3A1%2C%22event_namespace%22%3A%7B%22client%22%3A%22tfw%22%2C%22page%22%3A%22button%22%2C%22section%22%3A%22follow%22%2C%22action%22%3A%22impression%22%7D%7D&session_id=23573a4b92be966386dd3bcaa06c1e011847d690
|
104.244.42.72
|
||
https://www.wisecleaner.com/a
|
unknown
|
||
https://www.youtube.com/subscribe_embed?action_card=1&channelid=UCXLbiumrDzPSJikI9BIZjrw&usegapi=1&usegapi=1&jsh=m%3B%2F_%2Fscs%2Fabc-static%2F_%2Fjs%2Fk%3Dgapi.lb.en.JisoxTPHVRs.O%2Fam%3DAAAC%2Fd%3D1%2Frs%3DAHpOoo9VOmUKkb8FAwL65OiDUU4etqWcRg%2Fm%3D__features__
|
64.233.176.93
|
||
https://downloads.wisecleaner.com/soft/WFDSetup.exe
|
unknown
|
||
https://www.wisecleaner.com/static/font/roboto/v29/KFOmCnqEu92Fr1Mu5mxKKTU1Kvnz.woff2
|
172.67.68.11
|
||
http://sslcom.crl.certum.pl/ctnca.crl0s
|
unknown
|
||
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.lb.en.JisoxTPHVRs.O/m=auth/exm=ytsubscribe/rt=j/sv=1/d=1/ed=1/am=AAAC/rs=AHpOoo9VOmUKkb8FAwL65OiDUU4etqWcRg/cb=gapi.loaded_1?le=scs
|
142.250.105.101
|
||
http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl0
|
unknown
|
||
http://www.indyproject.org/
|
unknown
|
||
http://www.wisecleaner.com/toolbox/imagesv6/ForceDeleter.svg
|
unknown
|
||
http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0_
|
unknown
|
||
http://downloads.wisecleaner.com/update/care365_v6/Languages/Norwegian(Bokmal).lanb
|
unknown
|
||
about:blank
|
|||
https://www.wisecleaner.com/how-to-uninstall-wisecleaner-product.html
|
unknown
|
||
https://www.wisecleaner.com/toolbox/imagesv6/FolderHider.svg
|
unknown
|
||
https://pdf.wisecleaner.com/static/svg/logo/pdf_logo.svg
|
172.67.68.11
|
||
https://downloads.wisecleaner.com/soft/WDFSetup.exe
|
unknown
|
||
http://downloads.wisecleaner.com/update/care365_v6/Languages/Dutch(Belgium).lan
|
unknown
|
||
https://wisecleaner.wordpress.com/2017/05/08/solution-for-compatibility-issue-between-wisecleaner-an
|
unknown
|
||
https://www.wisecleaner.com:443/toolbox/toolsv6.ini
|
unknown
|
||
https://www.wisecleaner.com/static/page/product/update/update.css
|
172.67.68.11
|
||
https://g.live.com/odclientsettings/Prod.C:
|
unknown
|
||
https://www.wisecleaner.com/renew-license.html
|
unknown
|
||
https://www.wisecleaner.com/static/img/product/thanks-for-choosing/clean.png
|
172.67.68.11
|
||
http://downloads.wisecleaner.com/update/care365_v6/Languages/Ukrainian.lan
|
unknown
|
||
http://downloads.wisecleaner.com/soft/WASSetup.exe
|
unknown
|
||
https://www.wisecleaner.com/eula.html
|
unknown
|
||
https://www.youtube.com/subscribe_embed?usegapi=1&channel=wisecleanervideo&layout=default&count=default&origin=https%3A%2F%2Fwww.wisecleaner.com&gsrc=3p&ic=1&jsh=m%3B%2F_%2Fscs%2Fabc-static%2F_%2Fjs%2Fk%3Dgapi.lb.en.JisoxTPHVRs.O%2Fam%3DAAAC%2Fd%3D1%2Frs%3DAHpOoo9VOmUKkb8FAwL65OiDUU4etqWcRg%2Fm%3D__features__#_methods=onPlusOne%2C_ready%2C_close%2C_open%2C_resizeMe%2C_renderstart%2Concircled%2Cdrefresh%2Cerefresh%2Conload&id=I0_1714051839396&_gfid=I0_1714051839396&parent=https%3A%2F%2Fwww.wisecleaner.com&pfname=&rpctoken=22571271
|
|||
http://downloads.wisecleaner.com/update/care365_v6/libeay32_6.0.3.593.zipH
|
unknown
|
||
http://service.weibo.com/share/share.php?url=https%3A%2F%2Fwww.wisecleaner.com.cn
|
unknown
|
||
https://www.google.com/cse/static/element/8435450f13508ca1/default+en.css
|
142.250.105.147
|
||
http://downloads.wisecleaner.com/update/care365_v6/Languages/Bulgarian.lan.4153
|
unknown
|
||
https://downloads.wisecleaner.com/soft/WRMSetup.exe
|
unknown
|
||
https://www.wisecleaner.com/static/img/product/products_icon/was-60.png
|
172.67.68.11
|
||
https://forum.wisecleaner.com/index.php?/topic/18165-how-to-fix-the-issue-of-you-are-possibly-a-vict
|
unknown
|
||
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
|
unknown
|
||
https://info.wisecleaner.com/messages/index.php?to=checknews&pid=3y
|
unknown
|
||
https://www.youtube.com/s/subscriptions/subscribe_embed/img/subscribe_button_branded_lozenge.png
|
64.233.176.93
|
||
http://www.wisecleaner.net/wiseclean
|
unknown
|
||
https://downloads.wisecleaner.com/soft/WDRSetup.exe
|
unknown
|
||
https://downloads.wisecleaner.com/soft/WFHSetup_5.0.2.232.exel
|
unknown
|
||
http://www.innosetup.com/
|
unknown
|
||
http://www.wisecleaner.com/toolbox/imagesv6/DuplicateFinder.svg
|
unknown
|
||
https://www.wisecleaner.com/images/awards/si-award-epick5.png
|
172.67.68.11
|
||
https://www.wisecleaner.com/toolbox/imagesv6/Reminder.svg
|
unknown
|
||
https://www.wisecleaner.com/static/img/product/products_icon/wdc-60.png
|
172.67.68.11
|
||
http://downloads.wisecleaner.com/update/care365_v6/BootTime_6.0.3.593.zipsvg
|
unknown
|
||
https://www.wisecleaner.com/toolbox/imagesv6/ForceDeleter.svgl
|
unknown
|
||
https://www.wisecleaner.com/toolbox/imagesv6/GameBooster.svgll
|
unknown
|
||
https://www.wisecleaner.com/static/img/common/icon_french.svg
|
172.67.68.11
|
||
https://www.wisecleaner.com/static/js/common/sprint.min.js
|
172.67.68.11
|
||
http://downloads.wisecleaner.com/update/care365_v6/Languages/Greek.lan
|
unknown
|
||
https://www.wisecleaner.com/news/w365info.htmU
|
unknown
|
||
http://downloads.wisecleaner.com/update/care365_v6/Languages/German.lan
|
unknown
|
||
https://www.wisecleaner.com
|
unknown
|
||
https://platform.twitter.com/widgets/follow_button.2f70fb173b9000da126c79afe2098f02.en.html#dnt=false&id=twitter-widget-0&lang=en&screen_name=WiseCleaner&show_count=false&show_screen_name=false&size=m&time=1714051841571
|
|||
https://apis.google.com/js/rpc:shindig_random.js?onload=init
|
173.194.219.113
|
||
http://www.wisecleaner.net/wisecleaner_feedback/index.php?to=fetch-unread-message
|
unknown
|
||
http://downloads.wisecleaner.com/update/care365_v6/Languages/Portuguese(Portugal).lan
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://www.wisecleaner.com/static/img/common/icon_germany.svg
|
172.67.68.11
|
||
https://www.wisecleaner.com/eula.htmlSV
|
unknown
|
||
http://www.wisecleaner.net/wisecleaner_feedback/index.php?to=upload-fileU
|
unknown
|
||
https://www.wisecleaner.com/software_update/getinfo_v6.php?p_id=31&s_build=636
|
104.26.2.143
|
||
https://downloads.wisecleaner.com/soft/WMOSetup.exe
|
unknown
|
||
http://www.haysoft.org%1-k
|
unknown
|
||
https://www.wisecleaner.com/static/img/common/icon_follow_youtube.svg
|
172.67.68.11
|
||
http://www.wisecleaner.com/toolbox/imagesv6/MemoryOptimizer.svg
|
unknown
|
||
http://downloads.wisecleaner.com/update/care365_v6/Languages/Italian.lan931334
|
unknown
|
||
http://downloads.wisecleaner.com/update/care365_v6/Languages/Russian.lanA
|
unknown
|
||
https://www.wisecleaner.com/static/img/product/thanks-for-choosing/bbb.png
|
172.67.68.11
|
||
https://www.wisecleaner.com/toolbox/imagesv6/DuplicateFinder.svg
|
unknown
|
||
https://www.wisecleaner.com/toolbox/imagesv6/GameBooster.svg
|
unknown
|
||
http://downloads.wisecleaner.com/update/care365_v6/DManager_6.1.4.601.zip
|
unknown
|
||
https://info.wisecleaner.com/messages/index.php?to=checknews&pid=%dU
|
unknown
|
||
http://sslcom.ocsp-certum.com08
|
unknown
|
||
https://www.wisecleaner.com/8https://www.wisecleaner.com/8https://www.wisecleaner.com/
|
unknown
|
||
https://www.wisecleaner.net/software_statistics/index.php?p=comment_status
|
unknown
|
||
https://www.wisecleaner.com/static/js/utils/utils.js?v=1.14
|
172.67.68.11
|
||
https://www.facebook.com/plugins/like.php?href=http%3A%2F%2Fwww.facebook.com%2Fwisecleanersoft&send=false&layout=button_count&width=110&show_faces=false&font&colorscheme=light&action=like&height=21
|
|||
http://www.wisecleaner.com/&via=wisecleaner
|
unknown
|
||
https://www.wisecleaner.com/toolbox/imagesv6/DataRecovery.svgl
|
unknown
|
||
https://www.wisecleaner.com/static/img/product/thanks-for-choosing/sign.png
|
172.67.68.11
|
||
https://www.wisecleaner.com/static/img/common/icon_follow_facebook.svg
|
172.67.68.11
|
||
https://www.youtube.com/s/subscriptions/subscribe_embed/js/www-subscribe-embed-card_v0.js
|
64.233.176.93
|
||
https://www.wisecleaner.com/toolbox/imagesv6/DataRecovery.svg
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
star-mini.c10r.facebook.com
|
31.13.65.36
|
||
twitter.com
|
104.244.42.193
|
||
plus.l.google.com
|
142.250.105.101
|
||
cs491.wac.edgecastcdn.net
|
192.229.163.25
|
||
platform.twitter.map.fastly.net
|
151.101.12.157
|
||
syndication.twitter.com
|
104.244.42.136
|
||
stats.g.doubleclick.net
|
108.177.122.154
|
||
scontent.xx.fbcdn.net
|
31.13.88.13
|
||
youtube-ui.l.google.com
|
64.233.176.93
|
||
mailserver.wisecleaner.net
|
23.224.25.138
|
||
www.wisecleaner.com
|
172.67.68.11
|
||
www3.l.google.com
|
64.233.176.101
|
||
cse.google.com
|
142.250.9.101
|
||
www.google.com
|
64.233.177.104
|
||
info.wisecleaner.com
|
104.26.2.143
|
||
pdf.wisecleaner.com
|
172.67.68.11
|
||
www.facebook.com
|
unknown
|
||
www.adsensecustomsearchads.com
|
unknown
|
||
static.xx.fbcdn.net
|
unknown
|
||
www.wisecleaner.net
|
unknown
|
||
platform.twitter.com
|
unknown
|
||
www.youtube.com
|
unknown
|
||
apis.google.com
|
unknown
|
There are 13 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
31.13.65.36
|
star-mini.c10r.facebook.com
|
Ireland
|
||
142.250.9.91
|
unknown
|
United States
|
||
23.224.25.138
|
mailserver.wisecleaner.net
|
United States
|
||
64.233.176.93
|
youtube-ui.l.google.com
|
United States
|
||
142.250.105.157
|
unknown
|
United States
|
||
173.194.219.113
|
unknown
|
United States
|
||
192.168.2.4
|
unknown
|
unknown
|
||
104.244.42.72
|
unknown
|
United States
|
||
172.67.68.11
|
www.wisecleaner.com
|
United States
|
||
108.177.122.154
|
stats.g.doubleclick.net
|
United States
|
||
104.26.2.143
|
info.wisecleaner.com
|
United States
|
||
31.13.88.13
|
scontent.xx.fbcdn.net
|
Ireland
|
||
104.26.3.143
|
unknown
|
United States
|
||
104.244.42.136
|
syndication.twitter.com
|
United States
|
||
142.250.105.101
|
plus.l.google.com
|
United States
|
||
104.244.42.8
|
unknown
|
United States
|
||
192.229.163.25
|
cs491.wac.edgecastcdn.net
|
United States
|
||
142.250.105.147
|
unknown
|
United States
|
||
64.233.177.104
|
www.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
127.0.0.1
|
unknown
|
unknown
|
||
151.101.12.157
|
platform.twitter.map.fastly.net
|
United States
|
There are 12 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\WiseCleaner\WiseCare365
|
path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\WiseCleaner\WiseCare365
|
Product Name
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WiseBootAssistant
|
Description
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\WiseCleaner\WiseCare365
|
ispro
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
|
Inno Setup: Setup Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
|
Inno Setup: App Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
|
Inno Setup: Icon Group
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
|
Inno Setup: User
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
|
Inno Setup: Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
|
DisplayIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
|
QuietUninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
|
MajorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
|
MinorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
|
EstimatedSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{FBF23B40-E3F0-101B-8488-00AA003E56F8} {000214E4-0000-0000-C000-000000000046} 0xFFFF
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WiseCleaner\WiseCare365
|
ConfigPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\shell\WShredFile
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\shell\WShredFile
|
ICON
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\shell\WShredFile\Command
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shell\WShredFile
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shell\WShredFile
|
ICON
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shell\WShredFile\Command
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WiseCleaner\WiseCare365
|
BoosterRun
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\WiseCleaner\WiseCare365
|
path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WiseTray_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WiseTray_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WiseTray_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WiseTray_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WiseTray_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WiseTray_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WiseTray_RASAPI32
|
FileDirectory
|
There are 41 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7F385000
|
direct allocation
|
page read and write
|
||
DA8000
|
unkown
|
page read and write
|
||
1A0D80EB000
|
heap
|
page read and write
|
||
DB7000
|
trusted library allocation
|
page read and write
|
||
7FA3A000
|
direct allocation
|
page read and write
|
||
7F4AB000
|
direct allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
7F642000
|
direct allocation
|
page read and write
|
||
54E0000
|
direct allocation
|
page read and write
|
||
7F418000
|
direct allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
1940000
|
heap
|
page read and write
|
||
199E000
|
heap
|
page read and write
|
||
918000
|
heap
|
page read and write
|
||
84E000
|
stack
|
page read and write
|
||
2C14000
|
heap
|
page read and write
|
||
3611000
|
heap
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
2C2A000
|
heap
|
page read and write
|
||
7FBB3000
|
direct allocation
|
page read and write
|
||
7FE31000
|
direct allocation
|
page read and write
|
||
A75C000
|
heap
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
7F570000
|
direct allocation
|
page read and write
|
||
3611000
|
heap
|
page read and write
|
||
C29000
|
heap
|
page read and write
|
||
7F469000
|
direct allocation
|
page read and write
|
||
5400000
|
direct allocation
|
page read and write
|
||
650000
|
unkown
|
page read and write
|
||
9B1C57E000
|
stack
|
page read and write
|
||
DB7000
|
trusted library allocation
|
page read and write
|
||
1A0D39B0000
|
trusted library allocation
|
page read and write
|
||
2C18000
|
heap
|
page read and write
|
||
6C1A0000
|
unkown
|
page readonly
|
||
F28000
|
direct allocation
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
A773000
|
heap
|
page read and write
|
||
7F665000
|
direct allocation
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
AABE000
|
stack
|
page read and write
|
||
9B1C377000
|
stack
|
page read and write
|
||
A88000
|
unkown
|
page readonly
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
F68000
|
heap
|
page read and write
|
||
4A1000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
E34000
|
unkown
|
page read and write
|
||
53A6000
|
direct allocation
|
page read and write
|
||
A8A000
|
unkown
|
page readonly
|
||
2C14000
|
heap
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
7F82B000
|
direct allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
1A0D824D000
|
trusted library allocation
|
page read and write
|
||
1A0D2A5B000
|
heap
|
page read and write
|
||
7F980000
|
direct allocation
|
page read and write
|
||
7F758000
|
direct allocation
|
page read and write
|
||
548F000
|
direct allocation
|
page read and write
|
||
2BE1000
|
heap
|
page read and write
|
||
DB0000
|
trusted library allocation
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
121F000
|
direct allocation
|
page read and write
|
||
7FBD1000
|
direct allocation
|
page read and write
|
||
7FB9E000
|
direct allocation
|
page read and write
|
||
3564000
|
direct allocation
|
page read and write
|
||
1A0D7FB0000
|
trusted library allocation
|
page read and write
|
||
91E000
|
heap
|
page read and write
|
||
1946000
|
heap
|
page read and write
|
||
AE5F000
|
stack
|
page read and write
|
||
1A0D7E60000
|
trusted library allocation
|
page read and write
|
||
47F9000
|
direct allocation
|
page read and write
|
||
7F5C0000
|
direct allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
11EB000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
45CE000
|
direct allocation
|
page read and write
|
||
192A000
|
heap
|
page read and write
|
||
3347000
|
direct allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
7FB9C000
|
direct allocation
|
page read and write
|
||
7FDEE000
|
direct allocation
|
page read and write
|
||
7F7DC000
|
direct allocation
|
page read and write
|
||
4BA5000
|
trusted library allocation
|
page read and write
|
||
5199000
|
direct allocation
|
page read and write
|
||
1A0D8280000
|
remote allocation
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
7F768000
|
direct allocation
|
page read and write
|
||
231A000
|
direct allocation
|
page read and write
|
||
DB2000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
7F7BC000
|
direct allocation
|
page read and write
|
||
7F489000
|
direct allocation
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
995F000
|
stack
|
page read and write
|
||
923000
|
heap
|
page read and write
|
||
35E2000
|
direct allocation
|
page read and write
|
||
2C14000
|
heap
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
35F0000
|
direct allocation
|
page execute and read and write
|
||
D96000
|
unkown
|
page read and write
|
||
7FDD0000
|
direct allocation
|
page read and write
|
||
22AC000
|
direct allocation
|
page read and write
|
||
1A0D826F000
|
trusted library allocation
|
page read and write
|
||
3611000
|
heap
|
page read and write
|
||
7FE08000
|
direct allocation
|
page read and write
|
||
7F5D1000
|
direct allocation
|
page read and write
|
||
1A0D2B29000
|
heap
|
page read and write
|
||
7FBE1000
|
direct allocation
|
page read and write
|
||
7F3A4000
|
direct allocation
|
page read and write
|
||
3611000
|
heap
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
7F5D0000
|
direct allocation
|
page read and write
|
||
5231000
|
direct allocation
|
page read and write
|
||
7F7EC000
|
direct allocation
|
page read and write
|
||
1A0D8230000
|
trusted library allocation
|
page read and write
|
||
4B9A000
|
trusted library allocation
|
page read and write
|
||
52B6000
|
direct allocation
|
page read and write
|
||
8E6000
|
heap
|
page read and write
|
||
4B15000
|
trusted library allocation
|
page read and write
|
||
2BE1000
|
heap
|
page read and write
|
||
115C000
|
direct allocation
|
page read and write
|
||
D74000
|
unkown
|
page execute read
|
||
1A0D3AB0000
|
trusted library section
|
page readonly
|
||
DB7000
|
trusted library allocation
|
page read and write
|
||
A6F1000
|
heap
|
page read and write
|
||
7F6D6000
|
direct allocation
|
page read and write
|
||
A715000
|
heap
|
page read and write
|
||
2C18000
|
heap
|
page read and write
|
||
7FE40000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
5354000
|
direct allocation
|
page read and write
|
||
7FBB0000
|
direct allocation
|
page read and write
|
||
7F6E7000
|
direct allocation
|
page read and write
|
||
4B98000
|
trusted library allocation
|
page read and write
|
||
A91D000
|
stack
|
page read and write
|
||
DB0000
|
trusted library allocation
|
page read and write
|
||
19B0000
|
heap
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
7FB42000
|
direct allocation
|
page read and write
|
||
7FE10000
|
direct allocation
|
page read and write
|
||
7FDEA000
|
direct allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
7FDD0000
|
direct allocation
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
36F0000
|
unkown
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
7F748000
|
direct allocation
|
page read and write
|
||
4E80000
|
heap
|
page read and write
|
||
7FE19000
|
direct allocation
|
page read and write
|
||
7F739000
|
direct allocation
|
page read and write
|
||
7F9F1000
|
direct allocation
|
page read and write
|
||
A751000
|
heap
|
page read and write
|
||
1A0D7EF0000
|
trusted library allocation
|
page read and write
|
||
8C9000
|
heap
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
7F46A000
|
direct allocation
|
page read and write
|
||
DB2000
|
trusted library allocation
|
page read and write
|
||
94B000
|
heap
|
page read and write
|
||
525A000
|
direct allocation
|
page read and write
|
||
18B8000
|
heap
|
page read and write
|
||
1A0D810D000
|
heap
|
page read and write
|
||
7F5A0000
|
direct allocation
|
page read and write
|
||
DB7000
|
trusted library allocation
|
page read and write
|
||
A766000
|
heap
|
page read and write
|
||
929000
|
heap
|
page read and write
|
||
8AF000
|
heap
|
page read and write
|
||
2C14000
|
heap
|
page read and write
|
||
3611000
|
heap
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
1A0D8215000
|
trusted library allocation
|
page read and write
|
||
6FC000
|
unkown
|
page execute read
|
||
7F3E5000
|
direct allocation
|
page read and write
|
||
2C14000
|
heap
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
51E4000
|
direct allocation
|
page read and write
|
||
6C170000
|
unkown
|
page readonly
|
||
2BFB000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
6270000
|
trusted library allocation
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
22E6000
|
direct allocation
|
page read and write
|
||
1999000
|
heap
|
page read and write
|
||
4B8A000
|
trusted library allocation
|
page read and write
|
||
1A0D7EF0000
|
trusted library allocation
|
page read and write
|
||
118C000
|
direct allocation
|
page read and write
|
||
A6E0000
|
heap
|
page read and write
|
||
7F799000
|
direct allocation
|
page read and write
|
||
2C18000
|
heap
|
page read and write
|
||
D32000
|
unkown
|
page execute read
|
||
7FE0B000
|
direct allocation
|
page read and write
|
||
7FE40000
|
direct allocation
|
page read and write
|
||
545B000
|
direct allocation
|
page read and write
|
||
7F3B5000
|
direct allocation
|
page read and write
|
||
2BEA000
|
heap
|
page read and write
|
||
2C1C000
|
heap
|
page read and write
|
||
7FCDD000
|
direct allocation
|
page read and write
|
||
7F789000
|
direct allocation
|
page read and write
|
||
59A000
|
heap
|
page read and write
|
||
1A0D3E31000
|
trusted library allocation
|
page read and write
|
||
DB7000
|
trusted library allocation
|
page read and write
|
||
7F52B000
|
direct allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
7F54C000
|
direct allocation
|
page read and write
|
||
1A0D3AD0000
|
trusted library section
|
page readonly
|
||
7F707000
|
direct allocation
|
page read and write
|
||
F63000
|
heap
|
page read and write
|
||
7F622000
|
direct allocation
|
page read and write
|
||
7FCDD000
|
direct allocation
|
page read and write
|
||
7FB83000
|
direct allocation
|
page read and write
|
||
1177000
|
direct allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
8C3000
|
heap
|
page read and write
|
||
7F76B000
|
direct allocation
|
page read and write
|
||
7FE0D000
|
direct allocation
|
page read and write
|
||
DB2000
|
trusted library allocation
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
1A0D8103000
|
heap
|
page read and write
|
||
F4B000
|
heap
|
page read and write
|
||
1A0D80CA000
|
heap
|
page read and write
|
||
3533000
|
direct allocation
|
page read and write
|
||
7F438000
|
direct allocation
|
page read and write
|
||
A96E000
|
stack
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
7F354000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
7FDD0000
|
direct allocation
|
page read and write
|
||
2C2A000
|
heap
|
page read and write
|
||
4B0F000
|
trusted library allocation
|
page read and write
|
||
1A0D2900000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
5418000
|
direct allocation
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
9B1C87E000
|
unkown
|
page readonly
|
||
1680000
|
heap
|
page read and write
|
||
7FD30000
|
direct allocation
|
page read and write
|
||
2C1A000
|
heap
|
page read and write
|
||
1910000
|
heap
|
page read and write
|
||
7419000
|
direct allocation
|
page read and write
|
||
7FB6E000
|
direct allocation
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
4E9000
|
unkown
|
page execute read
|
||
CB0000
|
direct allocation
|
page execute and read and write
|
||
3506000
|
direct allocation
|
page read and write
|
||
1A0D3215000
|
heap
|
page read and write
|
||
7FE3D000
|
direct allocation
|
page read and write
|
||
A46000
|
unkown
|
page read and write
|
||
DB7000
|
trusted library allocation
|
page read and write
|
||
7FD30000
|
direct allocation
|
page read and write
|
||
8ED000
|
heap
|
page read and write
|
||
A727000
|
heap
|
page read and write
|
||
9B1BDFB000
|
stack
|
page read and write
|
||
AA6E000
|
stack
|
page read and write
|
||
EDE000
|
direct allocation
|
page read and write
|
||
7FD30000
|
direct allocation
|
page read and write
|
||
AE60000
|
heap
|
page read and write
|
||
A73F000
|
heap
|
page read and write
|
||
1A0D331A000
|
heap
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
2C18000
|
heap
|
page read and write
|
||
E2D000
|
unkown
|
page read and write
|
||
6C171000
|
unkown
|
page execute read
|
||
7FE05000
|
direct allocation
|
page read and write
|
||
7F600000
|
direct allocation
|
page read and write
|
||
2C2C000
|
heap
|
page read and write
|
||
9B1D97B000
|
stack
|
page read and write
|
||
7FDFB000
|
direct allocation
|
page read and write
|
||
2195000
|
direct allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
1A0D8307000
|
trusted library allocation
|
page read and write
|
||
11F2000
|
direct allocation
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
F6B000
|
heap
|
page read and write
|
||
1972000
|
heap
|
page read and write
|
||
7FBEB000
|
direct allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
7FBCF000
|
direct allocation
|
page read and write
|
||
7F759000
|
direct allocation
|
page read and write
|
||
7FC10000
|
direct allocation
|
page read and write
|
||
7FE1E000
|
direct allocation
|
page read and write
|
||
2C02000
|
heap
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
1A0D80FB000
|
heap
|
page read and write
|
||
7F78C000
|
direct allocation
|
page read and write
|
||
7F6D3000
|
direct allocation
|
page read and write
|
||
659000
|
unkown
|
page read and write
|
||
1A0D82E8000
|
trusted library allocation
|
page read and write
|
||
4813000
|
direct allocation
|
page read and write
|
||
7FC60000
|
direct allocation
|
page read and write
|
||
1167000
|
direct allocation
|
page read and write
|
||
7F7BA000
|
direct allocation
|
page read and write
|
||
9B1D0FE000
|
stack
|
page read and write
|
||
51FD000
|
direct allocation
|
page read and write
|
||
7F5F1000
|
direct allocation
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
483000
|
unkown
|
page read and write
|
||
6C255000
|
unkown
|
page readonly
|
||
13C1000
|
unkown
|
page readonly
|
||
A743000
|
heap
|
page read and write
|
||
9D00000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
489000
|
unkown
|
page write copy
|
||
1A0D7EF1000
|
trusted library allocation
|
page read and write
|
||
1194000
|
direct allocation
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
6C1A1000
|
unkown
|
page execute read
|
||
7416000
|
direct allocation
|
page read and write
|
||
A783000
|
heap
|
page read and write
|
||
7F674000
|
direct allocation
|
page read and write
|
||
908000
|
heap
|
page read and write
|
||
4B93000
|
trusted library allocation
|
page read and write
|
||
F0B000
|
direct allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
373E000
|
heap
|
page read and write
|
||
7FE05000
|
direct allocation
|
page read and write
|
||
7FDA8000
|
direct allocation
|
page read and write
|
||
1A0D7EE0000
|
trusted library allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
7F880000
|
direct allocation
|
page read and write
|
||
DCC000
|
stack
|
page read and write
|
||
7FBA3000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2C31000
|
heap
|
page read and write
|
||
A6D0000
|
remote allocation
|
page read and write
|
||
226A000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
F6C000
|
heap
|
page read and write
|
||
1B77000
|
heap
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
DA1000
|
unkown
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
7FC04000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
33EE000
|
direct allocation
|
page read and write
|
||
1286000
|
heap
|
page read and write
|
||
DB7000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
trusted library allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
7FB4A000
|
direct allocation
|
page read and write
|
||
2296000
|
direct allocation
|
page read and write
|
||
D85000
|
unkown
|
page write copy
|
||
7FE31000
|
direct allocation
|
page read and write
|
||
7FDE0000
|
direct allocation
|
page read and write
|
||
7F4CB000
|
direct allocation
|
page read and write
|
||
45A000
|
unkown
|
page execute read
|
||
7FA12000
|
direct allocation
|
page read and write
|
||
7FE3E000
|
direct allocation
|
page read and write
|
||
7F4FB000
|
direct allocation
|
page read and write
|
||
7FE2B000
|
direct allocation
|
page read and write
|
||
7FB70000
|
direct allocation
|
page read and write
|
||
7FBDF000
|
direct allocation
|
page read and write
|
||
4B93000
|
trusted library allocation
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
7F59F000
|
direct allocation
|
page read and write
|
||
DB2000
|
trusted library allocation
|
page read and write
|
||
2C2F000
|
heap
|
page read and write
|
||
7F910000
|
direct allocation
|
page read and write
|
||
5B7000
|
heap
|
page read and write
|
||
E38000
|
unkown
|
page readonly
|
||
7F604000
|
direct allocation
|
page read and write
|
||
DB2000
|
trusted library allocation
|
page read and write
|
||
8DE000
|
heap
|
page read and write
|
||
2BE1000
|
heap
|
page read and write
|
||
22FC000
|
direct allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
94C000
|
heap
|
page read and write
|
||
354C000
|
direct allocation
|
page read and write
|
||
1A0D82A0000
|
trusted library allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
7F590000
|
direct allocation
|
page read and write
|
||
2C29000
|
heap
|
page read and write
|
||
3438000
|
direct allocation
|
page read and write
|
||
7F3E8000
|
direct allocation
|
page read and write
|
||
53E2000
|
direct allocation
|
page read and write
|
||
1A0D80C0000
|
heap
|
page read and write
|
||
51EB000
|
direct allocation
|
page read and write
|
||
2BF2000
|
heap
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
2C00000
|
trusted library allocation
|
page read and write
|
||
9B1D87E000
|
unkown
|
page readonly
|
||
7F429000
|
direct allocation
|
page read and write
|
||
3412000
|
direct allocation
|
page read and write
|
||
334F000
|
direct allocation
|
page read and write
|
||
DB7000
|
trusted library allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
A715000
|
heap
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
3611000
|
heap
|
page read and write
|
||
2C1C000
|
heap
|
page read and write
|
||
7F4CA000
|
direct allocation
|
page read and write
|
||
2BE1000
|
heap
|
page read and write
|
||
7F7CA000
|
direct allocation
|
page read and write
|
||
7F48A000
|
direct allocation
|
page read and write
|
||
7FB80000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
1A0D2AB1000
|
heap
|
page read and write
|
||
7F52F000
|
direct allocation
|
page read and write
|
||
1346000
|
unkown
|
page readonly
|
||
18B0000
|
heap
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
7F7CC000
|
direct allocation
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
F61000
|
direct allocation
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
9B1D2FE000
|
stack
|
page read and write
|
||
52DC000
|
direct allocation
|
page read and write
|
||
54D0000
|
direct allocation
|
page read and write
|
||
1A0D7F10000
|
trusted library allocation
|
page read and write
|
||
7FDD8000
|
direct allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
7FBC0000
|
direct allocation
|
page read and write
|
||
523D000
|
direct allocation
|
page read and write
|
||
DB7000
|
trusted library allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
2BE1000
|
heap
|
page read and write
|
||
7F7AA000
|
direct allocation
|
page read and write
|
||
7F55F000
|
direct allocation
|
page read and write
|
||
7F55F000
|
direct allocation
|
page read and write
|
||
236A000
|
direct allocation
|
page read and write
|
||
46CF000
|
stack
|
page read and write
|
||
1970000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page read and write
|
||
F19000
|
direct allocation
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
A4D000
|
unkown
|
page read and write
|
||
1A0D7F10000
|
trusted library allocation
|
page read and write
|
||
538000
|
heap
|
page read and write
|
||
7FDF7000
|
direct allocation
|
page read and write
|
||
7F614000
|
direct allocation
|
page read and write
|
||
DB7000
|
trusted library allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
14AA000
|
unkown
|
page readonly
|
||
1A0D3313000
|
heap
|
page read and write
|
||
7FDE4000
|
direct allocation
|
page read and write
|
||
196F000
|
heap
|
page read and write
|
||
A72D000
|
heap
|
page read and write
|
||
7F708000
|
direct allocation
|
page read and write
|
||
9EE0000
|
trusted library allocation
|
page read and write
|
||
4B8A000
|
trusted library allocation
|
page read and write
|
||
191B000
|
heap
|
page read and write
|
||
4BA3000
|
trusted library allocation
|
page read and write
|
||
7F51C000
|
direct allocation
|
page read and write
|
||
7F676000
|
direct allocation
|
page read and write
|
||
1A0D8291000
|
trusted library allocation
|
page read and write
|
||
1A0D804F000
|
heap
|
page read and write
|
||
D0E000
|
stack
|
page read and write
|
||
2BE1000
|
heap
|
page read and write
|
||
11CE000
|
direct allocation
|
page read and write
|
||
1A0D8220000
|
trusted library allocation
|
page read and write
|
||
9B1C67E000
|
unkown
|
page readonly
|
||
3400000
|
direct allocation
|
page read and write
|
||
7FBC0000
|
direct allocation
|
page read and write
|
||
1A0D3302000
|
heap
|
page read and write
|
||
7F79A000
|
direct allocation
|
page read and write
|
||
7F77A000
|
direct allocation
|
page read and write
|
||
197C000
|
heap
|
page read and write
|
||
73E000
|
stack
|
page read and write
|
||
1A0D80E2000
|
heap
|
page read and write
|
||
1208000
|
direct allocation
|
page read and write
|
||
380F000
|
stack
|
page read and write
|
||
1A0D80F5000
|
heap
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
7F75B000
|
direct allocation
|
page read and write
|
||
7FDB8000
|
direct allocation
|
page read and write
|
||
2C18000
|
heap
|
page read and write
|
||
9B1CEFE000
|
stack
|
page read and write
|
||
90F000
|
heap
|
page read and write
|
||
4B15000
|
trusted library allocation
|
page read and write
|
||
A4F000
|
unkown
|
page read and write
|
||
DB2000
|
trusted library allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
34D5000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
985E000
|
stack
|
page read and write
|
||
25E0000
|
heap
|
page read and write
|
||
A750000
|
heap
|
page read and write
|
||
2C14000
|
heap
|
page read and write
|
||
B62000
|
unkown
|
page execute read
|
||
2C14000
|
heap
|
page read and write
|
||
A763000
|
heap
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
1A0D7E50000
|
trusted library allocation
|
page read and write
|
||
36AE000
|
stack
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
2C1A000
|
heap
|
page read and write
|
||
931000
|
heap
|
page read and write
|
||
7FD30000
|
direct allocation
|
page read and write
|
||
7DF000
|
stack
|
page read and write
|
||
1A0D2A7A000
|
heap
|
page read and write
|
||
7FDD4000
|
direct allocation
|
page read and write
|
||
7FB48000
|
direct allocation
|
page read and write
|
||
1A0D7EF2000
|
trusted library allocation
|
page read and write
|
||
7F686000
|
direct allocation
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
7F45A000
|
direct allocation
|
page read and write
|
||
1A0D8280000
|
remote allocation
|
page read and write
|
||
197F000
|
heap
|
page read and write
|
||
2C2A000
|
heap
|
page read and write
|
||
3398000
|
direct allocation
|
page read and write
|
||
408000
|
unkown
|
page execute read
|
||
7F3A5000
|
direct allocation
|
page read and write
|
||
48E0000
|
heap
|
page read and write
|
||
1368000
|
unkown
|
page readonly
|
||
7F654000
|
direct allocation
|
page read and write
|
||
7F77C000
|
direct allocation
|
page read and write
|
||
2C18000
|
heap
|
page read and write
|
||
7FA42000
|
direct allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
7FE21000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
3611000
|
heap
|
page read and write
|
||
2363000
|
direct allocation
|
page read and write
|
||
1A0D3401000
|
trusted library allocation
|
page read and write
|
||
8CF000
|
heap
|
page read and write
|
||
7F375000
|
direct allocation
|
page read and write
|
||
1A0D8272000
|
trusted library allocation
|
page read and write
|
||
F36000
|
direct allocation
|
page read and write
|
||
2BE1000
|
heap
|
page read and write
|
||
8D8000
|
heap
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
A59E000
|
stack
|
page read and write
|
||
F6B000
|
heap
|
page read and write
|
||
7FE37000
|
direct allocation
|
page read and write
|
||
A36000
|
unkown
|
page read and write
|
||
257F000
|
stack
|
page read and write
|
||
7F3C5000
|
direct allocation
|
page read and write
|
||
1A0D2A00000
|
heap
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page execute read
|
||
A39000
|
unkown
|
page read and write
|
||
7FDF0000
|
direct allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
1A0D8042000
|
heap
|
page read and write
|
||
7F6F7000
|
direct allocation
|
page read and write
|
||
A6F1000
|
heap
|
page read and write
|
||
7FBC0000
|
direct allocation
|
page read and write
|
||
7FB7A000
|
direct allocation
|
page read and write
|
||
EF8000
|
heap
|
page read and write
|
||
DB0000
|
trusted library allocation
|
page read and write
|
||
3410000
|
direct allocation
|
page read and write
|
||
1A0D2A7D000
|
heap
|
page read and write
|
||
7FE2D000
|
direct allocation
|
page read and write
|
||
1A0D8264000
|
trusted library allocation
|
page read and write
|
||
2BE1000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2C1A000
|
heap
|
page read and write
|
||
510E000
|
stack
|
page read and write
|
||
4A9000
|
unkown
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
DB2000
|
trusted library allocation
|
page read and write
|
||
45CE000
|
stack
|
page read and write
|
||
DB2000
|
trusted library allocation
|
page read and write
|
||
7FD70000
|
direct allocation
|
page read and write
|
||
DAD000
|
trusted library allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
7F738000
|
direct allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
7F5F5000
|
direct allocation
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
2338000
|
direct allocation
|
page read and write
|
||
7F728000
|
direct allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
7F323000
|
direct allocation
|
page read and write
|
||
7F7BC000
|
direct allocation
|
page read and write
|
||
7FB52000
|
direct allocation
|
page read and write
|
||
2C16000
|
heap
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
48F000
|
unkown
|
page readonly
|
||
8D8000
|
heap
|
page read and write
|
||
2240000
|
direct allocation
|
page read and write
|
||
7FE17000
|
direct allocation
|
page read and write
|
||
1A0D2AA1000
|
heap
|
page read and write
|
||
7F5B0000
|
direct allocation
|
page read and write
|
||
4B8000
|
unkown
|
page readonly
|
||
22C8000
|
direct allocation
|
page read and write
|
||
7F7CA000
|
direct allocation
|
page read and write
|
||
487000
|
unkown
|
page read and write
|
||
7F580000
|
direct allocation
|
page read and write
|
||
7FE4A000
|
direct allocation
|
page read and write
|
||
F20000
|
direct allocation
|
page read and write
|
||
7F3A7000
|
direct allocation
|
page read and write
|
||
7F50C000
|
direct allocation
|
page read and write
|
||
1A0D2A91000
|
heap
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
19A4000
|
heap
|
page read and write
|
||
2C18000
|
heap
|
page read and write
|
||
1A0D7EC0000
|
trusted library allocation
|
page read and write
|
||
354F000
|
direct allocation
|
page read and write
|
||
2C16000
|
heap
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
1938000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
1A0D2A26000
|
heap
|
page read and write
|
||
7FBA4000
|
direct allocation
|
page read and write
|
||
7FA58000
|
direct allocation
|
page read and write
|
||
8EA000
|
heap
|
page read and write
|
||
7F6A5000
|
direct allocation
|
page read and write
|
||
2BE1000
|
heap
|
page read and write
|
||
9B1DA7E000
|
unkown
|
page readonly
|
||
A87000
|
unkown
|
page read and write
|
||
7FB6A000
|
direct allocation
|
page read and write
|
||
9B1D17E000
|
unkown
|
page readonly
|
||
1969000
|
heap
|
page read and write
|
||
230B000
|
direct allocation
|
page read and write
|
||
495E000
|
stack
|
page read and write
|
||
7F8C8000
|
direct allocation
|
page read and write
|
||
7F313000
|
direct allocation
|
page read and write
|
||
2288000
|
direct allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
2BB0000
|
direct allocation
|
page execute and read and write
|
||
4ECE000
|
stack
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
7F7EB000
|
direct allocation
|
page read and write
|
||
7F409000
|
direct allocation
|
page read and write
|
||
1A0D8102000
|
heap
|
page read and write
|
||
1A0D2B02000
|
heap
|
page read and write
|
||
DB7000
|
trusted library allocation
|
page read and write
|
||
7F78A000
|
direct allocation
|
page read and write
|
||
1A0D82C2000
|
trusted library allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
1A0D2A8D000
|
heap
|
page read and write
|
||
DB7000
|
trusted library allocation
|
page read and write
|
||
335D000
|
direct allocation
|
page read and write
|
||
3404000
|
direct allocation
|
page read and write
|
||
2BE1000
|
heap
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
7FE29000
|
direct allocation
|
page read and write
|
||
A758000
|
heap
|
page read and write
|
||
54A5000
|
direct allocation
|
page read and write
|
||
7F612000
|
direct allocation
|
page read and write
|
||
2BE1000
|
heap
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
5360000
|
direct allocation
|
page read and write
|
||
A36000
|
unkown
|
page write copy
|
||
133E000
|
unkown
|
page readonly
|
||
7F664000
|
direct allocation
|
page read and write
|
||
1A0D2AA3000
|
heap
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
6C199000
|
unkown
|
page readonly
|
||
7FBEF000
|
direct allocation
|
page read and write
|
||
64E000
|
unkown
|
page write copy
|
||
3558000
|
direct allocation
|
page read and write
|
||
7F5B0000
|
direct allocation
|
page read and write
|
||
878000
|
heap
|
page read and write
|
||
DB7000
|
trusted library allocation
|
page read and write
|
||
7F50B000
|
direct allocation
|
page read and write
|
||
52E1000
|
direct allocation
|
page read and write
|
||
1B90000
|
heap
|
page read and write
|
||
7FA32000
|
direct allocation
|
page read and write
|
||
DB2000
|
trusted library allocation
|
page read and write
|
||
65C000
|
unkown
|
page write copy
|
||
7F356000
|
direct allocation
|
page read and write
|
||
661000
|
unkown
|
page readonly
|
||
3611000
|
heap
|
page read and write
|
||
2BE1000
|
heap
|
page read and write
|
||
7F718000
|
direct allocation
|
page read and write
|
||
9B1D57E000
|
unkown
|
page readonly
|
||
7F5C0000
|
direct allocation
|
page read and write
|
||
2190000
|
direct allocation
|
page read and write
|
||
7F624000
|
direct allocation
|
page read and write
|
||
4B93000
|
trusted library allocation
|
page read and write
|
||
F53000
|
direct allocation
|
page read and write
|
||
45B1000
|
direct allocation
|
page read and write
|
||
7FA3E000
|
direct allocation
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
5431000
|
direct allocation
|
page read and write
|
||
A82000
|
unkown
|
page write copy
|
||
2C16000
|
heap
|
page read and write
|
||
7F398000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
7FDD0000
|
direct allocation
|
page read and write
|
||
2C18000
|
heap
|
page read and write
|
||
2378000
|
direct allocation
|
page read and write
|
||
7F654000
|
direct allocation
|
page read and write
|
||
341A000
|
direct allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
7F47A000
|
direct allocation
|
page read and write
|
||
7F428000
|
direct allocation
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
1A0D7F24000
|
trusted library allocation
|
page read and write
|
||
4FCE000
|
stack
|
page read and write
|
||
7FDF0000
|
direct allocation
|
page read and write
|
||
2C26000
|
heap
|
page read and write
|
||
352B000
|
direct allocation
|
page read and write
|
||
A6E000
|
stack
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
A7A9000
|
heap
|
page read and write
|
||
7F5F0000
|
direct allocation
|
page read and write
|
||
3611000
|
heap
|
page read and write
|
||
7F696000
|
direct allocation
|
page read and write
|
||
3611000
|
heap
|
page read and write
|
||
1A0D2A40000
|
heap
|
page read and write
|
||
4791000
|
direct allocation
|
page read and write
|
||
6E7000
|
heap
|
page read and write
|
||
7FA01000
|
direct allocation
|
page read and write
|
||
7F7FA000
|
direct allocation
|
page read and write
|
||
1A0D82FC000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
DB2000
|
trusted library allocation
|
page read and write
|
||
7FE1F000
|
direct allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
7F78B000
|
direct allocation
|
page read and write
|
||
543D000
|
direct allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
2C14000
|
heap
|
page read and write
|
||
5212000
|
direct allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1A0D2A2B000
|
heap
|
page read and write
|
||
52A4000
|
direct allocation
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
7FBD9000
|
direct allocation
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
DB7000
|
trusted library allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
DB1000
|
trusted library allocation
|
page read and write
|
||
7FB90000
|
direct allocation
|
page read and write
|
||
7FBCB000
|
direct allocation
|
page read and write
|
||
277D000
|
direct allocation
|
page read and write
|
||
9B1C77B000
|
stack
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
2C1C000
|
heap
|
page read and write
|
||
549E000
|
direct allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
393E000
|
stack
|
page read and write
|
||
7F3F8000
|
direct allocation
|
page read and write
|
||
7FDD0000
|
direct allocation
|
page read and write
|
||
526A000
|
direct allocation
|
page read and write
|
||
4B15000
|
trusted library allocation
|
page read and write
|
||
7F4EB000
|
direct allocation
|
page read and write
|
||
A783000
|
heap
|
page read and write
|
||
7F6C6000
|
direct allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
11A2000
|
direct allocation
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
11C0000
|
direct allocation
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
7FE18000
|
direct allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
7F3D8000
|
direct allocation
|
page read and write
|
||
3400000
|
direct allocation
|
page read and write
|
||
7FA22000
|
direct allocation
|
page read and write
|
||
1A0D7F20000
|
trusted library allocation
|
page read and write
|
||
9B1D07E000
|
unkown
|
page readonly
|
||
2E53000
|
heap
|
page read and write
|
||
7F6A7000
|
direct allocation
|
page read and write
|
||
4A5D000
|
stack
|
page read and write
|
||
2328000
|
direct allocation
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
2C1A000
|
heap
|
page read and write
|
||
7F646000
|
direct allocation
|
page read and write
|
||
7F58F000
|
direct allocation
|
page read and write
|
||
33BC000
|
direct allocation
|
page read and write
|
||
1431000
|
unkown
|
page readonly
|
||
1A0D82E5000
|
trusted library allocation
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
7F449000
|
direct allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
22A4000
|
direct allocation
|
page read and write
|
||
DB2000
|
trusted library allocation
|
page read and write
|
||
3701000
|
heap
|
page read and write
|
||
7F7A9000
|
direct allocation
|
page read and write
|
||
7F632000
|
direct allocation
|
page read and write
|
||
6C272000
|
unkown
|
page read and write
|
||
7F334000
|
direct allocation
|
page read and write
|
||
C10000
|
direct allocation
|
page execute and read and write
|
||
F44000
|
direct allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
7F6F8000
|
direct allocation
|
page read and write
|
||
ABFE000
|
stack
|
page read and write
|
||
A75D000
|
heap
|
page read and write
|
||
1A0D8210000
|
trusted library allocation
|
page read and write
|
||
52B4000
|
direct allocation
|
page read and write
|
||
190F000
|
heap
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
5210000
|
direct allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
198B000
|
heap
|
page read and write
|
||
7F611000
|
direct allocation
|
page read and write
|
||
9B1D67E000
|
unkown
|
page readonly
|
||
9B1CE7E000
|
unkown
|
page readonly
|
||
2BFB000
|
heap
|
page read and write
|
||
7F419000
|
direct allocation
|
page read and write
|
||
2C2E000
|
heap
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
33F6000
|
direct allocation
|
page read and write
|
||
47AC000
|
direct allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
7F7AC000
|
direct allocation
|
page read and write
|
||
2C18000
|
heap
|
page read and write
|
||
356D000
|
direct allocation
|
page read and write
|
||
7FB60000
|
direct allocation
|
page read and write
|
||
2C1C000
|
heap
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
D90000
|
unclassified section
|
page read and write
|
||
5283000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
194E000
|
heap
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
7FB62000
|
direct allocation
|
page read and write
|
||
5463000
|
direct allocation
|
page read and write
|
||
A49000
|
unkown
|
page read and write
|
||
7F7A0000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7F57F000
|
direct allocation
|
page read and write
|
||
1A0D8218000
|
trusted library allocation
|
page read and write
|
||
4BA5000
|
trusted library allocation
|
page read and write
|
||
480000
|
unkown
|
page write copy
|
||
F69000
|
heap
|
page read and write
|
||
7FBDB000
|
direct allocation
|
page read and write
|
||
7FA00000
|
direct allocation
|
page read and write
|
||
5285000
|
direct allocation
|
page read and write
|
||
7FDE0000
|
direct allocation
|
page read and write
|
||
DB2000
|
trusted library allocation
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
7F6B7000
|
direct allocation
|
page read and write
|
||
A76F000
|
heap
|
page read and write
|
||
7FBD6000
|
direct allocation
|
page read and write
|
||
3509000
|
direct allocation
|
page read and write
|
||
2248000
|
direct allocation
|
page read and write
|
||
2C2F000
|
heap
|
page read and write
|
||
7FC06000
|
direct allocation
|
page read and write
|
||
4B95000
|
trusted library allocation
|
page read and write
|
||
3A7E000
|
stack
|
page read and write
|
||
7FDF2000
|
direct allocation
|
page read and write
|
||
7F55C000
|
direct allocation
|
page read and write
|
||
7FDFA000
|
direct allocation
|
page read and write
|
||
5248000
|
direct allocation
|
page read and write
|
||
926000
|
heap
|
page read and write
|
||
A700000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
7F635000
|
direct allocation
|
page read and write
|
||
2C14000
|
heap
|
page read and write
|
||
6C273000
|
unkown
|
page write copy
|
||
22D7000
|
direct allocation
|
page read and write
|
||
7FC00000
|
direct allocation
|
page read and write
|
||
8CC000
|
heap
|
page read and write
|
||
4B93000
|
trusted library allocation
|
page read and write
|
||
9B1CB79000
|
stack
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
3590000
|
direct allocation
|
page read and write
|
||
45E4000
|
direct allocation
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
DB2000
|
trusted library allocation
|
page read and write
|
||
1201000
|
direct allocation
|
page read and write
|
||
3620000
|
heap
|
page read and write
|
||
7F50D000
|
direct allocation
|
page read and write
|
||
D85000
|
unkown
|
page read and write
|
||
4BA3000
|
trusted library allocation
|
page read and write
|
||
7F7FC000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
7FE11000
|
direct allocation
|
page read and write
|
||
1A0D3AA0000
|
trusted library section
|
page readonly
|
||
2BFB000
|
heap
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
2C1C000
|
heap
|
page read and write
|
||
7FB7E000
|
direct allocation
|
page read and write
|
||
7FB72000
|
direct allocation
|
page read and write
|
||
1A0D331B000
|
heap
|
page read and write
|
||
45EB000
|
direct allocation
|
page read and write
|
||
7FDD0000
|
direct allocation
|
page read and write
|
||
54AC000
|
direct allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
449000
|
unkown
|
page execute read
|
||
7FB01000
|
direct allocation
|
page read and write
|
||
7F4DD000
|
direct allocation
|
page read and write
|
||
7F80C000
|
direct allocation
|
page read and write
|
||
944000
|
heap
|
page read and write
|
||
1A0D82F4000
|
trusted library allocation
|
page read and write
|
||
1974000
|
heap
|
page read and write
|
||
7F364000
|
direct allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
1226000
|
direct allocation
|
page read and write
|
||
7F920000
|
direct allocation
|
page read and write
|
||
35E0000
|
heap
|
page read and write
|
||
7F79B000
|
direct allocation
|
page read and write
|
||
7F682000
|
direct allocation
|
page read and write
|
||
DB7000
|
trusted library allocation
|
page read and write
|
||
8C2000
|
heap
|
page read and write
|
||
9B1CA7E000
|
unkown
|
page readonly
|
||
1974000
|
heap
|
page read and write
|
||
1A0D82BA000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
16AF000
|
stack
|
page read and write
|
||
52E5000
|
direct allocation
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
2C2E000
|
heap
|
page read and write
|
||
7F51D000
|
direct allocation
|
page read and write
|
||
F5A000
|
direct allocation
|
page read and write
|
||
1A0D31A0000
|
trusted library section
|
page read and write
|
||
22E3000
|
direct allocation
|
page read and write
|
||
2C14000
|
heap
|
page read and write
|
||
7FBF4000
|
direct allocation
|
page read and write
|
||
7FE2E000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7FBF1000
|
direct allocation
|
page read and write
|
||
480000
|
unkown
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
5410000
|
direct allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
7F51B000
|
direct allocation
|
page read and write
|
||
7F80A000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7FE00000
|
direct allocation
|
page read and write
|
||
2BE1000
|
heap
|
page read and write
|
||
9B1D4FE000
|
stack
|
page read and write
|
||
8BE000
|
heap
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
7F4BB000
|
direct allocation
|
page read and write
|
||
6C27A000
|
unkown
|
page readonly
|
||
1258000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
2C2E000
|
heap
|
page read and write
|
||
117E000
|
direct allocation
|
page read and write
|
||
7FA18000
|
direct allocation
|
page read and write
|
||
A6F000
|
unkown
|
page execute read
|
||
9B1CFFE000
|
stack
|
page read and write
|
||
7F3C8000
|
direct allocation
|
page read and write
|
||
7F6E7000
|
direct allocation
|
page read and write
|
||
2C14000
|
heap
|
page read and write
|
||
199E000
|
heap
|
page read and write
|
||
1A0D80F3000
|
heap
|
page read and write
|
||
1A0D80BE000
|
heap
|
page read and write
|
||
7FBC0000
|
direct allocation
|
page read and write
|
||
7F6A3000
|
direct allocation
|
page read and write
|
||
2510000
|
direct allocation
|
page read and write
|
||
35BC000
|
stack
|
page read and write
|
||
3340000
|
direct allocation
|
page read and write
|
||
7FA1D000
|
direct allocation
|
page read and write
|
||
DB7000
|
trusted library allocation
|
page read and write
|
||
2BE1000
|
heap
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
7F6B3000
|
direct allocation
|
page read and write
|
||
DB7000
|
trusted library allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
5391000
|
direct allocation
|
page read and write
|
||
45D5000
|
direct allocation
|
page read and write
|
||
83F000
|
stack
|
page read and write
|
||
73A0000
|
trusted library allocation
|
page read and write
|
||
7FE15000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
45C7000
|
direct allocation
|
page read and write
|
||
6E6000
|
heap
|
page read and write
|
||
355B000
|
direct allocation
|
page read and write
|
||
1A0D8256000
|
trusted library allocation
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
7FE04000
|
direct allocation
|
page read and write
|
||
7F56F000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
A6FF000
|
heap
|
page read and write
|
||
7F2A8000
|
direct allocation
|
page read and write
|
||
53A4000
|
direct allocation
|
page read and write
|
||
DA7000
|
trusted library allocation
|
page read and write
|
||
1917000
|
heap
|
page read and write
|
||
7F7BA000
|
direct allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
A715000
|
heap
|
page read and write
|
||
A81E000
|
stack
|
page read and write
|
||
7F4EB000
|
direct allocation
|
page read and write
|
||
7FDD0000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
7F4DB000
|
direct allocation
|
page read and write
|
||
7FDE1000
|
direct allocation
|
page read and write
|
||
3611000
|
heap
|
page read and write
|
||
1937000
|
heap
|
page read and write
|
||
1A0D831A000
|
trusted library allocation
|
page read and write
|
||
7F49A000
|
direct allocation
|
page read and write
|
||
1A0D8200000
|
trusted library allocation
|
page read and write
|
||
7FBC3000
|
direct allocation
|
page read and write
|
||
5293000
|
direct allocation
|
page read and write
|
||
7F303000
|
direct allocation
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
A6EC000
|
heap
|
page read and write
|
||
1A0D7EE0000
|
trusted library allocation
|
page read and write
|
||
53DE000
|
direct allocation
|
page read and write
|
||
1978000
|
heap
|
page read and write
|
||
7F673000
|
direct allocation
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
7F7AC000
|
direct allocation
|
page read and write
|
||
7F7DA000
|
direct allocation
|
page read and write
|
||
5258000
|
direct allocation
|
page read and write
|
||
A781000
|
heap
|
page read and write
|
||
A705000
|
heap
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
2C21000
|
heap
|
page read and write
|
||
541F000
|
direct allocation
|
page read and write
|
||
2BE1000
|
heap
|
page read and write
|
||
4B95000
|
trusted library allocation
|
page read and write
|
||
7F2C2000
|
direct allocation
|
page read and write
|
||
1434000
|
unkown
|
page readonly
|
||
1978000
|
heap
|
page read and write
|
||
9B1D5FE000
|
stack
|
page read and write
|
||
7FA30000
|
direct allocation
|
page read and write
|
||
2371000
|
direct allocation
|
page read and write
|
||
1A0D3300000
|
heap
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
1A0D7EF4000
|
trusted library allocation
|
page read and write
|
||
7FE30000
|
direct allocation
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
7F7DD000
|
direct allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
4E8000
|
unkown
|
page execute read
|
||
3A3D000
|
stack
|
page read and write
|
||
11C7000
|
direct allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
7FDF6000
|
direct allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
2C18000
|
heap
|
page read and write
|
||
7FB6C000
|
direct allocation
|
page read and write
|
||
A74C000
|
heap
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
7FE2F000
|
direct allocation
|
page read and write
|
||
1A0D2AFF000
|
heap
|
page read and write
|
||
DB0000
|
trusted library allocation
|
page read and write
|
||
646000
|
unkown
|
page execute read
|
||
7F5E0000
|
direct allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
7F4FC000
|
direct allocation
|
page read and write
|
||
E36000
|
unkown
|
page readonly
|
||
7FE40000
|
direct allocation
|
page read and write
|
||
9B1CF7E000
|
unkown
|
page readonly
|
||
90D000
|
heap
|
page read and write
|
||
7F3E7000
|
direct allocation
|
page read and write
|
||
7FE00000
|
direct allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
4910000
|
trusted library allocation
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
7F449000
|
direct allocation
|
page read and write
|
||
7F81D000
|
direct allocation
|
page read and write
|
||
2C1A000
|
heap
|
page read and write
|
||
7FE00000
|
direct allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
1A0D80FD000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
500E000
|
stack
|
page read and write
|
||
373E000
|
heap
|
page read and write
|
||
A7AA000
|
heap
|
page read and write
|
||
8D3000
|
heap
|
page read and write
|
||
7FB93000
|
direct allocation
|
page read and write
|
||
7FDCE000
|
direct allocation
|
page read and write
|
||
7FDFF000
|
direct allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
5393000
|
direct allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
7FB5E000
|
direct allocation
|
page read and write
|
||
4BA5000
|
trusted library allocation
|
page read and write
|
||
3410000
|
direct allocation
|
page read and write
|
||
7FB50000
|
direct allocation
|
page read and write
|
||
7FE1C000
|
direct allocation
|
page read and write
|
||
7FA00000
|
direct allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
9B1DCFF000
|
stack
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
7F2E3000
|
direct allocation
|
page read and write
|
||
7F440000
|
direct allocation
|
page read and write
|
||
7FB30000
|
direct allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
1934000
|
heap
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
1146000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
1A0D8054000
|
heap
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
191B000
|
heap
|
page read and write
|
||
C25000
|
heap
|
page read and write
|
||
4608000
|
direct allocation
|
page read and write
|
||
9B1CD7B000
|
stack
|
page read and write
|
||
8ED000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
7F459000
|
direct allocation
|
page read and write
|
||
5352000
|
direct allocation
|
page read and write
|
||
1A0D3200000
|
heap
|
page read and write
|
||
7F2B2000
|
direct allocation
|
page read and write
|
||
90000
|
stack
|
page read and write
|
||
7FDF0000
|
direct allocation
|
page read and write
|
||
2C14000
|
heap
|
page read and write
|
||
9F7000
|
unkown
|
page execute read
|
||
7FB22000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
1999000
|
heap
|
page read and write
|
||
1A0D82A3000
|
trusted library allocation
|
page read and write
|
||
F3D000
|
direct allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
2BE1000
|
heap
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
7F9E1000
|
direct allocation
|
page read and write
|
||
4BA5000
|
trusted library allocation
|
page read and write
|
||
7FDF0000
|
direct allocation
|
page read and write
|
||
19A8000
|
heap
|
page read and write
|
||
1218000
|
direct allocation
|
page read and write
|
||
7F550000
|
direct allocation
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
3611000
|
heap
|
page read and write
|
||
1A0D82F1000
|
trusted library allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
A72C000
|
heap
|
page read and write
|
||
926000
|
heap
|
page read and write
|
||
6BF0000
|
heap
|
page read and write
|
||
A41000
|
unkown
|
page read and write
|
||
196C000
|
heap
|
page read and write
|
||
1A0D808F000
|
heap
|
page read and write
|
||
1974000
|
heap
|
page read and write
|
||
9B1C17D000
|
stack
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
8DE000
|
heap
|
page read and write
|
||
45F9000
|
direct allocation
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
1243000
|
direct allocation
|
page read and write
|
||
A703000
|
heap
|
page read and write
|
||
BD4000
|
unkown
|
page execute read
|
||
2C2A000
|
heap
|
page read and write
|
||
7F4BA000
|
direct allocation
|
page read and write
|
||
DB7000
|
trusted library allocation
|
page read and write
|
||
7FB8E000
|
direct allocation
|
page read and write
|
||
6EBD000
|
stack
|
page read and write
|
||
A6D0000
|
remote allocation
|
page read and write
|
||
ACFD000
|
stack
|
page read and write
|
||
7FBB7000
|
direct allocation
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
7F4ED000
|
direct allocation
|
page read and write
|
||
A71C000
|
heap
|
page read and write
|
||
4B98000
|
trusted library allocation
|
page read and write
|
||
1A0D8118000
|
heap
|
page read and write
|
||
518F000
|
direct allocation
|
page read and write
|
||
946000
|
heap
|
page read and write
|
||
461F000
|
direct allocation
|
page read and write
|
||
7F683000
|
direct allocation
|
page read and write
|
||
7F990000
|
direct allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
19A1000
|
heap
|
page read and write
|
||
3800000
|
heap
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
70BF000
|
stack
|
page read and write
|
||
2BFC000
|
heap
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
7FD20000
|
direct allocation
|
page read and write
|
||
5481000
|
direct allocation
|
page read and write
|
||
3611000
|
heap
|
page read and write
|
||
7FDD0000
|
direct allocation
|
page read and write
|
||
7F4AA000
|
direct allocation
|
page read and write
|
||
228F000
|
direct allocation
|
page read and write
|
||
13B1000
|
unkown
|
page readonly
|
||
7FBE4000
|
direct allocation
|
page read and write
|
||
7F53F000
|
direct allocation
|
page read and write
|
||
7FDD0000
|
direct allocation
|
page read and write
|
||
33D9000
|
direct allocation
|
page read and write
|
||
7F727000
|
direct allocation
|
page read and write
|
||
7F395000
|
direct allocation
|
page read and write
|
||
1A0D3AE0000
|
trusted library section
|
page readonly
|
||
7F749000
|
direct allocation
|
page read and write
|
||
22ED000
|
direct allocation
|
page read and write
|
||
65C000
|
unkown
|
page read and write
|
||
7F3F8000
|
direct allocation
|
page read and write
|
||
DB7000
|
trusted library allocation
|
page read and write
|
||
D7C000
|
unkown
|
page execute read
|
||
DB2000
|
trusted library allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
192D000
|
heap
|
page read and write
|
||
2C14000
|
heap
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
7F83B000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
3583000
|
heap
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
539F000
|
stack
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
11A9000
|
direct allocation
|
page read and write
|
||
7FD50000
|
direct allocation
|
page read and write
|
||
54C2000
|
direct allocation
|
page read and write
|
||
1B70000
|
heap
|
page read and write
|
||
1A0D8208000
|
trusted library allocation
|
page read and write
|
||
54B3000
|
direct allocation
|
page read and write
|
||
7FB11000
|
direct allocation
|
page read and write
|
||
7F672000
|
direct allocation
|
page read and write
|
||
1A0D802C000
|
heap
|
page read and write
|
||
7F53C000
|
direct allocation
|
page read and write
|
||
2278000
|
direct allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
11D6000
|
direct allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
A727000
|
heap
|
page read and write
|
||
4BA3000
|
trusted library allocation
|
page read and write
|
||
45AA000
|
direct allocation
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
2C14000
|
heap
|
page read and write
|
||
7F601000
|
direct allocation
|
page read and write
|
||
4779000
|
direct allocation
|
page read and write
|
||
7F3B8000
|
direct allocation
|
page read and write
|
||
7FE4E000
|
direct allocation
|
page read and write
|
||
2312000
|
direct allocation
|
page read and write
|
||
1A0D820E000
|
trusted library allocation
|
page read and write
|
||
7F693000
|
direct allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
7F6E8000
|
direct allocation
|
page read and write
|
||
114A000
|
direct allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
7F439000
|
direct allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
3801000
|
heap
|
page read and write
|
||
932000
|
heap
|
page read and write
|
||
2271000
|
direct allocation
|
page read and write
|
||
7F7DA000
|
direct allocation
|
page read and write
|
||
903000
|
heap
|
page read and write
|
||
7FBB0000
|
direct allocation
|
page read and write
|
||
7FE0F000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
2B6C000
|
stack
|
page read and write
|
||
4B4000
|
unkown
|
page write copy
|
||
6C197000
|
unkown
|
page readonly
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
353B000
|
direct allocation
|
page read and write
|
||
142B000
|
unkown
|
page readonly
|
||
2C02000
|
heap
|
page read and write
|
||
3610000
|
heap
|
page read and write
|
||
64E000
|
unkown
|
page read and write
|
||
7F79C000
|
direct allocation
|
page read and write
|
||
1A0D331A000
|
heap
|
page read and write
|
||
7FDA8000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
7F54F000
|
direct allocation
|
page read and write
|
||
7FA3C000
|
direct allocation
|
page read and write
|
||
7F662000
|
direct allocation
|
page read and write
|
||
22C1000
|
direct allocation
|
page read and write
|
||
7FB7C000
|
direct allocation
|
page read and write
|
||
7F695000
|
direct allocation
|
page read and write
|
||
1A0D2C00000
|
heap
|
page read and write
|
||
7F769000
|
direct allocation
|
page read and write
|
||
7F6C3000
|
direct allocation
|
page read and write
|
||
458B000
|
direct allocation
|
page read and write
|
||
9B1C27E000
|
unkown
|
page readonly
|
||
7F634000
|
direct allocation
|
page read and write
|
||
1A0D2A74000
|
heap
|
page read and write
|
||
45DD000
|
direct allocation
|
page read and write
|
||
1978000
|
heap
|
page read and write
|
||
4B93000
|
trusted library allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
1120000
|
direct allocation
|
page read and write
|
||
4A9000
|
unkown
|
page write copy
|
||
2BFB000
|
heap
|
page read and write
|
||
7FDB0000
|
direct allocation
|
page read and write
|
||
7F663000
|
direct allocation
|
page read and write
|
||
6FBF000
|
stack
|
page read and write
|
||
1992000
|
heap
|
page read and write
|
||
1A0D2B13000
|
heap
|
page read and write
|
||
F2F000
|
direct allocation
|
page read and write
|
||
54A000
|
heap
|
page read and write
|
||
7F6C7000
|
direct allocation
|
page read and write
|
||
1A0D828E000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
7F3D5000
|
direct allocation
|
page read and write
|
||
A6FF000
|
heap
|
page read and write
|
||
1936000
|
heap
|
page read and write
|
||
2B4B000
|
heap
|
page read and write
|
||
DB2000
|
trusted library allocation
|
page read and write
|
||
63F0000
|
direct allocation
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
D60000
|
trusted library allocation
|
page read and write
|
||
527F000
|
direct allocation
|
page read and write
|
||
5422000
|
direct allocation
|
page read and write
|
||
A709000
|
heap
|
page read and write
|
||
3611000
|
heap
|
page read and write
|
||
191F000
|
heap
|
page read and write
|
||
2C14000
|
heap
|
page read and write
|
||
4618000
|
direct allocation
|
page read and write
|
||
4A6000
|
unkown
|
page readonly
|
||
7F7EA000
|
direct allocation
|
page read and write
|
||
1992000
|
heap
|
page read and write
|
||
2C14000
|
heap
|
page read and write
|
||
13BB000
|
unkown
|
page readonly
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
7F2F3000
|
direct allocation
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
1A0D3740000
|
trusted library allocation
|
page read and write
|
||
A778000
|
heap
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
7F6D7000
|
direct allocation
|
page read and write
|
||
7F631000
|
direct allocation
|
page read and write
|
||
7FBA1000
|
direct allocation
|
page read and write
|
||
2354000
|
direct allocation
|
page read and write
|
||
F68000
|
direct allocation
|
page read and write
|
||
197D000
|
heap
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
8EA000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
5268000
|
direct allocation
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
54C9000
|
direct allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
4B95000
|
trusted library allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
45A3000
|
direct allocation
|
page read and write
|
||
8B3000
|
heap
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
663000
|
unkown
|
page readonly
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
22BA000
|
direct allocation
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
52C0000
|
direct allocation
|
page read and write
|
||
3524000
|
direct allocation
|
page read and write
|
||
A73D000
|
heap
|
page read and write
|
||
DB7000
|
trusted library allocation
|
page read and write
|
||
6C277000
|
unkown
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
458E000
|
stack
|
page read and write
|
||
362C000
|
stack
|
page read and write
|
||
2C35000
|
heap
|
page read and write
|
||
1A0D801F000
|
heap
|
page read and write
|
||
7FD30000
|
direct allocation
|
page read and write
|
||
3366000
|
direct allocation
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
A69F000
|
stack
|
page read and write
|
||
1992000
|
heap
|
page read and write
|
||
3611000
|
heap
|
page read and write
|
||
3611000
|
heap
|
page read and write
|
||
A75A000
|
heap
|
page read and write
|
||
2C2A000
|
heap
|
page read and write
|
||
546D000
|
direct allocation
|
page read and write
|
||
1A0D7FC0000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7FBFD000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
7FE20000
|
direct allocation
|
page read and write
|
||
4B98000
|
trusted library allocation
|
page read and write
|
||
9B1DFFE000
|
stack
|
page read and write
|
||
7FDE3000
|
direct allocation
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page read and write
|
||
EE6000
|
direct allocation
|
page read and write
|
||
2DDF000
|
stack
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
7FA2E000
|
direct allocation
|
page read and write
|
||
6C18C000
|
unkown
|
page readonly
|
||
ABBE000
|
stack
|
page read and write
|
||
1A0D2A96000
|
heap
|
page read and write
|
||
1134000
|
direct allocation
|
page read and write
|
||
354A000
|
direct allocation
|
page read and write
|
||
F5E000
|
heap
|
page read and write
|
||
2C1A000
|
heap
|
page read and write
|
||
1A0D3AC0000
|
trusted library section
|
page readonly
|
||
4B2000
|
unkown
|
page read and write
|
||
7FB82000
|
direct allocation
|
page read and write
|
||
A711000
|
heap
|
page read and write
|
||
9B1D37E000
|
unkown
|
page readonly
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
2C2A000
|
heap
|
page read and write
|
||
DA8000
|
trusted library allocation
|
page read and write
|
||
2BE1000
|
heap
|
page read and write
|
||
A734000
|
heap
|
page read and write
|
||
9B1D47E000
|
unkown
|
page readonly
|
||
2BE1000
|
heap
|
page read and write
|
||
3611000
|
heap
|
page read and write
|
||
3611000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
7F74B000
|
direct allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
7F51F000
|
direct allocation
|
page read and write
|
||
4B95000
|
trusted library allocation
|
page read and write
|
||
1A0D7FB0000
|
trusted library allocation
|
page read and write
|
||
92F000
|
heap
|
page read and write
|
||
54BB000
|
direct allocation
|
page read and write
|
||
A709000
|
heap
|
page read and write
|
||
DAA000
|
unkown
|
page read and write
|
||
2C2A000
|
heap
|
page read and write
|
||
A743000
|
heap
|
page read and write
|
||
5350000
|
direct allocation
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
1A0D82FF000
|
trusted library allocation
|
page read and write
|
||
1A0D810A000
|
heap
|
page read and write
|
||
7F5E1000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
192A000
|
heap
|
page read and write
|
||
33D2000
|
direct allocation
|
page read and write
|
||
9B1CC7E000
|
unkown
|
page readonly
|
||
D88000
|
unkown
|
page read and write
|
||
74D6000
|
direct allocation
|
page read and write
|
||
A6D0000
|
remote allocation
|
page read and write
|
||
7F49A000
|
direct allocation
|
page read and write
|
||
119D000
|
direct allocation
|
page read and write
|
||
DB2000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
direct allocation
|
page read and write
|
||
3700000
|
heap
|
page read and write
|
||
9B1D77E000
|
stack
|
page read and write
|
||
1A0D80E7000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
95000
|
stack
|
page read and write
|
||
7F54F000
|
direct allocation
|
page read and write
|
||
7FA40000
|
direct allocation
|
page read and write
|
||
4795000
|
direct allocation
|
page read and write
|
||
8B8000
|
heap
|
page read and write
|
||
A703000
|
heap
|
page read and write
|
||
1A0D3202000
|
heap
|
page read and write
|
||
8C6000
|
heap
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
7FBA0000
|
direct allocation
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
15AF000
|
stack
|
page read and write
|
||
22B3000
|
direct allocation
|
page read and write
|
||
2C14000
|
heap
|
page read and write
|
||
7F621000
|
direct allocation
|
page read and write
|
||
7FE39000
|
direct allocation
|
page read and write
|
||
1A0D8000000
|
heap
|
page read and write
|
||
1A0D8280000
|
remote allocation
|
page read and write
|
||
1A0D3090000
|
trusted library allocation
|
page read and write
|
||
1951000
|
heap
|
page read and write
|
||
DB2000
|
trusted library allocation
|
page read and write
|
||
9B1E07E000
|
unkown
|
page readonly
|
||
E2E000
|
unkown
|
page write copy
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
51A1000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
2C28000
|
heap
|
page read and write
|
||
7FE40000
|
direct allocation
|
page read and write
|
||
5197000
|
direct allocation
|
page read and write
|
||
192E000
|
heap
|
page read and write
|
||
9B1D3FE000
|
stack
|
page read and write
|
||
235C000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
7FA08000
|
direct allocation
|
page read and write
|
||
7FBF0000
|
direct allocation
|
page read and write
|
||
DB2000
|
trusted library allocation
|
page read and write
|
||
5472000
|
direct allocation
|
page read and write
|
||
A754000
|
heap
|
page read and write
|
||
7FE3F000
|
direct allocation
|
page read and write
|
||
2510000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
25E3000
|
heap
|
page read and write
|
||
1A0D2920000
|
heap
|
page read and write
|
||
DB7000
|
trusted library allocation
|
page read and write
|
||
AD5E000
|
stack
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
7FE19000
|
direct allocation
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
62E000
|
unkown
|
page execute read
|
||
8DE000
|
heap
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
4BA3000
|
trusted library allocation
|
page read and write
|
||
3554000
|
direct allocation
|
page read and write
|
||
5180000
|
direct allocation
|
page read and write
|
||
73FF000
|
direct allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7FB4E000
|
direct allocation
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
9B1C47E000
|
unkown
|
page readonly
|
||
19D000
|
stack
|
page read and write
|
||
2C2A000
|
heap
|
page read and write
|
||
A72E000
|
heap
|
page read and write
|
||
4BA5000
|
trusted library allocation
|
page read and write
|
||
8C9000
|
heap
|
page read and write
|
||
7F408000
|
direct allocation
|
page read and write
|
||
11FA000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
2C14000
|
heap
|
page read and write
|
||
2C23000
|
heap
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
7F717000
|
direct allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
2BE1000
|
heap
|
page read and write
|
||
7F2D3000
|
direct allocation
|
page read and write
|
||
8E8000
|
heap
|
page read and write
|
||
7FE07000
|
direct allocation
|
page read and write
|
||
1A0D3A90000
|
trusted library section
|
page readonly
|
||
2BE1000
|
heap
|
page read and write
|
||
52E3000
|
direct allocation
|
page read and write
|
||
7FA50000
|
direct allocation
|
page read and write
|
||
522A000
|
direct allocation
|
page read and write
|
||
682C000
|
direct allocation
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
1A0D330C000
|
heap
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
7F848000
|
direct allocation
|
page read and write
|
||
1A0D7ED0000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
8AF000
|
heap
|
page read and write
|
||
7FCB0000
|
direct allocation
|
page read and write
|
||
1A0D9000000
|
heap
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
22F4000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
229D000
|
direct allocation
|
page read and write
|
||
7FE01000
|
direct allocation
|
page read and write
|
||
199D000
|
heap
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
2C14000
|
heap
|
page read and write
|
||
2C16000
|
heap
|
page read and write
|
||
7FE1B000
|
direct allocation
|
page read and write
|
||
7FB5A000
|
direct allocation
|
page read and write
|
||
3611000
|
heap
|
page read and write
|
||
8D3000
|
heap
|
page read and write
|
||
9B1C97B000
|
stack
|
page read and write
|
||
4B6000
|
unkown
|
page readonly
|
||
45F2000
|
direct allocation
|
page read and write
|
||
7FE000
|
stack
|
page read and write
|
||
7F344000
|
direct allocation
|
page read and write
|
||
7F479000
|
direct allocation
|
page read and write
|
||
1B96000
|
heap
|
page read and write
|
||
458000
|
unkown
|
page execute read
|
||
7FE0C000
|
direct allocation
|
page read and write
|
||
7FDA8000
|
direct allocation
|
page read and write
|
||
DB3000
|
trusted library allocation
|
page read and write
|
||
7FBC1000
|
direct allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
1A0D8061000
|
heap
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
1A0D826C000
|
trusted library allocation
|
page read and write
|
||
D90000
|
unkown
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
7FBD3000
|
direct allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
7F4CD000
|
direct allocation
|
page read and write
|
||
7FE00000
|
direct allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
3371000
|
direct allocation
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
22D0000
|
direct allocation
|
page read and write
|
||
1956000
|
heap
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
7FDA8000
|
direct allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
7FDF4000
|
direct allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
4600000
|
direct allocation
|
page read and write
|
||
19AB000
|
heap
|
page read and write
|
||
7F50F000
|
direct allocation
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
2C1A000
|
heap
|
page read and write
|
||
2C1A000
|
heap
|
page read and write
|
||
7FB32000
|
direct allocation
|
page read and write
|
||
DA4000
|
unkown
|
page read and write
|
||
1A0D3E50000
|
trusted library allocation
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
5377000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
7F652000
|
direct allocation
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7FE3F000
|
direct allocation
|
page read and write
|
||
3611000
|
heap
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
3611000
|
heap
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
2BE1000
|
heap
|
page read and write
|
||
2BE3000
|
heap
|
page read and write
|
||
A77C000
|
heap
|
page read and write
|
||
7FAC0000
|
direct allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
1A0D2A13000
|
heap
|
page read and write
|
||
7FB5C000
|
direct allocation
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
5497000
|
direct allocation
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
7F644000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
7F642000
|
direct allocation
|
page read and write
|
||
7F4DA000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
7FE22000
|
direct allocation
|
page read and write
|
||
45B9000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
11DD000
|
direct allocation
|
page read and write
|
||
15DC000
|
unkown
|
page readonly
|
||
7FA1A000
|
direct allocation
|
page read and write
|
||
7FBBB000
|
direct allocation
|
page read and write
|
||
6C195000
|
unkown
|
page read and write
|
||
4BA5000
|
trusted library allocation
|
page read and write
|
||
195D000
|
heap
|
page read and write
|
||
7FB92000
|
direct allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
7FDE5000
|
direct allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
14AF000
|
stack
|
page read and write
|
||
7F779000
|
direct allocation
|
page read and write
|
||
116F000
|
direct allocation
|
page read and write
|
There are 1606 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://www.facebook.com/plugins/like.php?href=http%3A%2F%2Fwww.facebook.com%2Fwisecleanersoft&send=false&layout=button_count&width=110&show_faces=false&font&colorscheme=light&action=like&height=21
|
||
https://www.wisecleaner.com/thanks-for-choosing-WiseCare365.html
|
||
https://www.wisecleaner.com/thanks-for-choosing-WiseCare365.html
|
||
https://www.wisecleaner.com/thanks-for-choosing-WiseCare365.html
|
||
https://platform.twitter.com/widgets/widget_iframe.2f70fb173b9000da126c79afe2098f02.html?origin=https%3A%2F%2Fwww.wisecleaner.com
|
||
about:blank
|
||
https://www.youtube.com/subscribe_embed?usegapi=1&channel=wisecleanervideo&layout=default&count=default&origin=https%3A%2F%2Fwww.wisecleaner.com&gsrc=3p&ic=1&jsh=m%3B%2F_%2Fscs%2Fabc-static%2F_%2Fjs%2Fk%3Dgapi.lb.en.JisoxTPHVRs.O%2Fam%3DAAAC%2Fd%3D1%2Frs%3DAHpOoo9VOmUKkb8FAwL65OiDUU4etqWcRg%2Fm%3D__features__#_methods=onPlusOne%2C_ready%2C_close%2C_open%2C_resizeMe%2C_renderstart%2Concircled%2Cdrefresh%2Cerefresh%2Conload&id=I0_1714051839396&_gfid=I0_1714051839396&parent=https%3A%2F%2Fwww.wisecleaner.com&pfname=&rpctoken=22571271
|
||
https://platform.twitter.com/widgets/follow_button.2f70fb173b9000da126c79afe2098f02.en.html#dnt=false&id=twitter-widget-0&lang=en&screen_name=WiseCleaner&show_count=false&show_screen_name=false&size=m&time=1714051841571
|
||
https://accounts.google.com/o/oauth2/postmessageRelay?parent=https%3A%2F%2Fwww.wisecleaner.com&jsh=m%3B%2F_%2Fscs%2Fabc-static%2F_%2Fjs%2Fk%3Dgapi.lb.en.JisoxTPHVRs.O%2Fam%3DAAAC%2Fd%3D1%2Frs%3DAHpOoo9VOmUKkb8FAwL65OiDUU4etqWcRg%2Fm%3D__features__#rpctoken=1872338475&forcesecure=1
|
||
https://www.youtube.com/subscribe_embed?action_card=1&channelid=UCXLbiumrDzPSJikI9BIZjrw&usegapi=1&usegapi=1&jsh=m%3B%2F_%2Fscs%2Fabc-static%2F_%2Fjs%2Fk%3Dgapi.lb.en.JisoxTPHVRs.O%2Fam%3DAAAC%2Fd%3D1%2Frs%3DAHpOoo9VOmUKkb8FAwL65OiDUU4etqWcRg%2Fm%3D__features__#id=I0_1714051842536&_gfid=I0_1714051842536&parent=https%3A%2F%2Fwww.wisecleaner.com&pfname=&rpctoken=24310883
|