IOC Report
SecuriteInfo.com.FileRepPup.14974.19067.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.FileRepPup.14974.19067.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Program Files (x86)\Wise\Wise Care 365\WiseCare365.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Wise\Wise Care 365\WiseDefrag.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Wise\Wise Care 365\WiseEraser.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Wise\Wise Care 365\WiseTray.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Wise\Wise Care 365\WiseTurbo.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Wise\Wise Care 365\is-06S8G.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Wise\Wise Care 365\is-0KH1K.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Wise\Wise Care 365\is-0OCO8.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Wise\Wise Care 365\is-2137K.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Wise\Wise Care 365\is-5N4PF.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Wise\Wise Care 365\is-686UE.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Wise\Wise Care 365\is-HBE50.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Wise\Wise Care 365\is-KVUKP.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Wise\Wise Care 365\is-LTPNS.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Wise\Wise Care 365\is-ML9G6.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Wise\Wise Care 365\is-NN1JK.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Wise\Wise Care 365\is-Q90PB.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Wise\Wise Care 365\is-RHK8R.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Wise\Wise Care 365\is-TBFAC.tmp
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Wise\Wise Care 365\is-VM9DB.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Wise\Wise Care 365\libeay32.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Wise\Wise Care 365\sqlite3.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Wise\Wise Care 365\ssleay32.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Wise\Wise Care 365\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-0JG3C.tmp\SecuriteInfo.com.FileRepPup.14974.19067.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Wise\Wise Care 365\AutoUpdate.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Wise\Wise Care 365\BootLauncher.exe (copy)
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Wise\Wise Care 365\BootPack.wpk (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Program Files (x86)\Wise\Wise Care 365\BootTime.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Wise\Wise Care 365\DManager.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Wise\Wise Care 365\DefragOptions.ini (copy)
Microsoft HTML Help Project
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Abkhazian.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Arabic.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Azerbaijani(Latin).ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Belarusian.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Bulgarian.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Catalan.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Chinese(Simplified).ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Chinese(Traditional).ini (copy)
data
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Croatian.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Czech.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Danish.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Dutch(Belgium).ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Dutch(Nederlands).ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\English.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Finnish.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\French.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Georgian.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\German.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Greek.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Hebrew.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Hungarian.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Indonesian.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Italian.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Japanese.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Korean.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Kurdish.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Lithuanian.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Nepali.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Norwegian(Bokmal).ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Norwegian(Nynorsk).ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF, CR line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Persian.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Polish.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Portuguese(Brazil).ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Portuguese(Portugal).ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Romanian.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Russian.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Serbian(Cyrillic).ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Slovak.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Slovenian.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Spanish(Spain).ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Swedish(Sweden).ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Thai.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Turkish.ini (copy)
data
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Ukrainian.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\Vietnamese.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-0K4D0.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-0KV3G.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-0U498.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-1HG9F.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-1HMQQ.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-2R9T4.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-4UGBN.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-4V222.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-5CI8V.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-5GKRD.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-6O8KK.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-75Q8A.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-7DHRJ.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-7RBI1.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-8GKPK.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-9QT7S.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-9RLN5.tmp
data
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-A7D99.tmp
Unicode text, UTF-16, little-endian text, with CRLF, CR line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-ARED8.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-B2U0C.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-B4B37.tmp
data
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-CE734.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-CJ9MH.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-DOEI9.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-F73V7.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-GDUNS.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-HANV8.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-HJAD5.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-IIOAA.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-IMHBK.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-JIIE0.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-JUK4P.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-LH3KH.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-LVL12.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-NQ1BG.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-O8BB2.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-OB6TO.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-OBGII.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-P55SE.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-QV9NK.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-SURPH.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-TGO78.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-UINQF.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-UU410.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Languages\is-V59MG.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\License.txt (copy)
ASCII text, with very long lines (870), with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Rate.info (copy)
ASCII text
dropped
C:\Program Files (x86)\Wise\Wise Care 365\Themes_v6.txt (copy)
JSON data
dropped
C:\Program Files (x86)\Wise\Wise Care 365\WJSLib.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Wise\Wise Care 365\WiseBootBooster.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Wise\Wise Care 365\fileshredder.ico (copy)
MS Windows icon resource - 2 icons, 32x32, 32 bits/pixel, 16x16, 32 bits/pixel
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\a1.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\a2.png (copy)
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\a6.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\a7.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\a9.png (copy)
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\b5.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\c4.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\c7.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\d1.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\d2.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\d3.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\d4.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\d7.png (copy)
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\e7.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\e8.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\e9.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\f0.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\f1.png (copy)
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\f2.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\f3.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\f4.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\f5.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\f6.png (copy)
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\f7.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\g1.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\g2.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\g3.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\g4.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\g5.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\g6.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\g7.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\g8.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\h1.png (copy)
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\h2.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\h3.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\h4.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\h5.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\h6.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\h7.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\h8.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\i1.png (copy)
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\i2.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\i3.png (copy)
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\i4.png (copy)
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\i5.png (copy)
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\i6.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\i7.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\i8.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-03O8G.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-0DU8L.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-0F6JM.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-0KBSG.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-1M6JI.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-25TOS.tmp
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-2AMFT.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-2O33D.tmp
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-2SGTE.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-3GM49.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-5R91K.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-754V0.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-8LG4P.tmp
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-BDSBP.tmp
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-CF6AK.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-CKOMM.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-DMRAE.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-DTIVV.tmp
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-E2PK7.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-E8CHT.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-EEEQ0.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-EGK32.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-G37CL.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-G55TL.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-G6IF2.tmp
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-G875B.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-GBMNH.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-GGMJG.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-H1132.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-HPQ2M.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-IS72O.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-IU54T.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-IU6CJ.tmp
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-JL61E.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-JL65U.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-K12IT.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-KAO93.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-M20V6.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-MUHFI.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-N2UG0.tmp
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-NGB8A.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-NOI36.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-OEQDK.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-OQK6L.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-OQRJU.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-PIGJ4.tmp
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-POMU3.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-QH3DP.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-QUNH2.tmp
PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-RL1JV.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-RSJ9M.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-T5CES.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-T7K4B.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-THC3H.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-TPEB1.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\is-V5MFV.tmp
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\j.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\j0.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\j1.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\j3.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\j4.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\j6.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\j7.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\headers\j8.png (copy)
PNG image data, 40 x 40, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Wise\Wise Care 365\is-0ETB5.tmp
ASCII text, with very long lines (870), with CRLF line terminators
dropped
C:\Program Files (x86)\Wise\Wise Care 365\is-1C06C.tmp
JSON data
dropped
C:\Program Files (x86)\Wise\Wise Care 365\is-D7TKL.tmp
MS Windows icon resource - 7 icons, -128x-128, 32 bits/pixel, 96x96, 32 bits/pixel
dropped
C:\Program Files (x86)\Wise\Wise Care 365\is-JV7IH.tmp
MS Windows icon resource - 2 icons, 32x32, 32 bits/pixel, 16x16, 32 bits/pixel
dropped
C:\Program Files (x86)\Wise\Wise Care 365\is-TOP6G.tmp
ASCII text
dropped
C:\Program Files (x86)\Wise\Wise Care 365\is-UR7HO.tmp
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Program Files (x86)\Wise\Wise Care 365\is-V74T2.tmp
Microsoft HTML Help Project
dropped
C:\Program Files (x86)\Wise\Wise Care 365\skin.ico (copy)
MS Windows icon resource - 7 icons, -128x-128, 32 bits/pixel, 96x96, 32 bits/pixel
dropped
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\AutoShutdown.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\DateRecovery.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\DuplicateFinder.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\FastSearch.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\FolderHider.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\ForceDeleter.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\GameBooster.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\MemoryOptimizer.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\ProgramUninstaller.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\Reminder.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\is-0JVAF.tmp
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\is-0U1VF.tmp
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\is-B6N3P.tmp
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\is-C4PA2.tmp
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\is-FTFR1.tmp
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\is-GF8OH.tmp
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\is-IUBVJ.tmp
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\is-QOVQA.tmp
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\is-RPCRV.tmp
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Wise\Wise Care 365\tools\img\is-VCGTP.tmp
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Wise\Wise Care 365\tools\is-LFJ0P.tmp
Generic INItialization configuration [Wise Folder Hider]
dropped
C:\Program Files (x86)\Wise\Wise Care 365\tools\toolsv6.ini (copy)
Generic INItialization configuration [Wise Folder Hider]
dropped
C:\Program Files (x86)\Wise\Wise Care 365\unins000.dat
InnoSetup Log Wise Care 365, version 0x418, 60239 bytes, 123716\37\user\376, C:\Program Files (x86)\Wise\Wise Care 365\
dropped
C:\Program Files (x86)\Wise\Wise Care 365\unins000.msg
InnoSetup messages, version 6.0.0, 243 messages (UTF-16), Cancel installation
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xfd71ae79, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Wise Care 365\Uninstall Wise Care 365.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Apr 25 12:30:14 2024, mtime=Thu Apr 25 12:30:14 2024, atime=Thu Apr 25 12:30:00 2024, length=2680240, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Wise Care 365\Wise Care 365.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Apr 25 12:30:18 2024, mtime=Thu Apr 25 12:30:19 2024, atime=Wed Mar 20 14:49:40 2024, length=18762136, window=hide
dropped
C:\Users\Public\Desktop\Wise Care 365.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Apr 25 12:30:18 2024, mtime=Thu Apr 25 12:30:20 2024, atime=Wed Mar 20 14:49:40 2024, length=18762136, window=hide
dropped
C:\Users\user\AppData\Local\Temp\bojvgash.ini
JSON data
dropped
C:\Users\user\AppData\Local\Temp\is-1Q5HG.tmp\Icon_128.bmp
PC bitmap, Windows 3.x format, 128 x 128 x 24, image size 49152, resolution 3779 x 3779 px/m, cbSize 49206, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\is-1Q5HG.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-1Q5HG.tmp\introduce.url
MS Windows 95 Internet shortcut text (URL=<https://www.wisecleaner.com/thanks-for-choosing-WiseCare365.html>), ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-1Q5HG.tmp\license.txt
ASCII text, with very long lines (870), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Wise Care 365\UpdateInfo\012055670.png
PNG image data, 1500 x 240, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Wise Care 365\config.ini
Generic INItialization configuration [BootBooster]
dropped
C:\Users\user\AppData\Roaming\Wise Care 365\toolsv6.ini
Generic INItialization configuration [Wise Folder Hider]
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
Chrome Cache Entry: 233
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 234
ASCII text, with very long lines (9040)
downloaded
Chrome Cache Entry: 235
ASCII text, with very long lines (20303)
dropped
Chrome Cache Entry: 236
PNG image data, 60 x 60, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 237
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 238
ASCII text, with very long lines (11215), with no line terminators
downloaded
Chrome Cache Entry: 239
PNG image data, 16 x 12, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 240
PNG image data, 140 x 100, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 241
ASCII text, with very long lines (39210), with no line terminators
downloaded
Chrome Cache Entry: 242
ASCII text, with very long lines (2124)
downloaded
Chrome Cache Entry: 243
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 244
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 245
JSON data
dropped
Chrome Cache Entry: 246
PNG image data, 60 x 60, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 247
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 248
GIF image data, version 89a, 1 x 1
dropped
Chrome Cache Entry: 249
ASCII text, with very long lines (2054)
downloaded
Chrome Cache Entry: 250
ASCII text
downloaded
Chrome Cache Entry: 251
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 252
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 253
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 254
PNG image data, 50 x 100, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 255
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 256
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 257
MS Windows icon resource - 4 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
downloaded
Chrome Cache Entry: 258
PNG image data, 27 x 104, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 259
PNG image data, 60 x 60, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 260
ASCII text, with very long lines (1763)
downloaded
Chrome Cache Entry: 261
ASCII text, with very long lines (2247)
downloaded
Chrome Cache Entry: 262
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 263
ASCII text, with very long lines (3164)
downloaded
Chrome Cache Entry: 264
ASCII text, with very long lines (12982), with no line terminators
downloaded
Chrome Cache Entry: 265
PNG image data, 1 x 5, 4-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 266
PNG image data, 1 x 5, 4-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 267
ASCII text, with very long lines (1915)
downloaded
Chrome Cache Entry: 268
ASCII text, with very long lines (12331)
downloaded
Chrome Cache Entry: 269
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 270
GIF image data, version 89a, 1 x 1
dropped
Chrome Cache Entry: 271
PNG image data, 370 x 100, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 272
ASCII text, with very long lines (2124)
downloaded
Chrome Cache Entry: 273
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 274
ASCII text, with very long lines (2050)
downloaded
Chrome Cache Entry: 275
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 276
Web Open Font Format (Version 2), TrueType, length 6416, version 1.0
downloaded
Chrome Cache Entry: 277
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 278
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 279
ASCII text, with very long lines (3702)
downloaded
Chrome Cache Entry: 280
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 281
Unicode text, UTF-8 text, with very long lines (38752)
downloaded
Chrome Cache Entry: 282
PNG image data, 39 x 33, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 283
ASCII text, with very long lines (1293)
downloaded
Chrome Cache Entry: 284
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 285
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 286
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 287
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 288
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 289
PNG image data, 16 x 12, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 290
ASCII text, with very long lines (3295)
downloaded
Chrome Cache Entry: 291
PNG image data, 100 x 110, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 292
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 293
ASCII text, with very long lines (3982), with no line terminators
downloaded
Chrome Cache Entry: 294
PNG image data, 140 x 140, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 295
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 296
ASCII text, with very long lines (541)
downloaded
Chrome Cache Entry: 297
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 298
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 299
ASCII text, with very long lines (7711)
downloaded
Chrome Cache Entry: 300
PNG image data, 60 x 60, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 301
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 302
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 303
ASCII text, with very long lines (1715), with no line terminators
downloaded
Chrome Cache Entry: 304
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 305
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 306
PNG image data, 241 x 137, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 307
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 308
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 309
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 310
PNG image data, 39 x 220, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 311
PNG image data, 39 x 33, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 312
Web Open Font Format (Version 2), TrueType, length 11032, version 1.0
downloaded
Chrome Cache Entry: 313
GIF image data, version 89a, 1 x 1
downloaded
Chrome Cache Entry: 314
PNG image data, 160 x 192, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 315
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 316
GIF image data, version 89a, 1 x 1
downloaded
Chrome Cache Entry: 317
PNG image data, 60 x 60, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 318
PNG image data, 140 x 140, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 319
ASCII text, with very long lines (389)
downloaded
Chrome Cache Entry: 320
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 321
GIF image data, version 89a, 1 x 1
downloaded
Chrome Cache Entry: 322
ASCII text
downloaded
Chrome Cache Entry: 323
PNG image data, 140 x 100, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 324
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 325
ASCII text, with very long lines (2343)
downloaded
Chrome Cache Entry: 326
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 327
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 328
ASCII text, with very long lines (20303)
downloaded
Chrome Cache Entry: 329
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 330
PNG image data, 140 x 100, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 331
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 332
PNG image data, 50 x 100, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 333
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 334
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 335
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 336
PNG image data, 100 x 110, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 337
JSON data
downloaded
Chrome Cache Entry: 338
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 339
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 340
ASCII text, with very long lines (2818)
downloaded
Chrome Cache Entry: 341
MS Windows icon resource - 4 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
Chrome Cache Entry: 342
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 343
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 344
ASCII text, with very long lines (1648)
downloaded
Chrome Cache Entry: 345
PNG image data, 5 x 1, 4-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 346
ASCII text, with very long lines (2124)
downloaded
Chrome Cache Entry: 347
ASCII text, with very long lines (3744), with no line terminators
downloaded
Chrome Cache Entry: 348
PNG image data, 60 x 60, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 349
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 350
ASCII text, with very long lines (10455), with no line terminators
downloaded
Chrome Cache Entry: 351
PNG image data, 50 x 360, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 352
ASCII text, with very long lines (7884), with no line terminators
downloaded
Chrome Cache Entry: 353
HTML document, Unicode text, UTF-8 text, with very long lines (1003), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 354
ASCII text
downloaded
Chrome Cache Entry: 355
PNG image data, 158 x 110, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 356
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 357
PNG image data, 5 x 1, 4-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 358
HTML document, ASCII text, with very long lines (24918)
downloaded
Chrome Cache Entry: 359
GIF image data, version 89a, 1 x 1
dropped
Chrome Cache Entry: 360
PNG image data, 100 x 110, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 361
HTML document, ASCII text, with very long lines (56043)
downloaded
Chrome Cache Entry: 362
PNG image data, 160 x 58, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 363
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 364
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 365
ASCII text
downloaded
Chrome Cache Entry: 366
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 367
PNG image data, 140 x 100, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 368
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 369
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 370
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 371
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 372
SVG Scalable Vector Graphics image
downloaded
There are 417 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.14974.19067.exe
"C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.14974.19067.exe"
malicious
C:\Users\user\AppData\Local\Temp\is-0JG3C.tmp\SecuriteInfo.com.FileRepPup.14974.19067.tmp
"C:\Users\user\AppData\Local\Temp\is-0JG3C.tmp\SecuriteInfo.com.FileRepPup.14974.19067.tmp" /SL5="$1045C,19204712,857088,C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.14974.19067.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /delete /tn \WiseCleaner\W365SkipUAC /f
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.wisecleaner.com/thanks-for-choosing-WiseCare365.html
C:\Program Files (x86)\Wise\Wise Care 365\WiseCare365.exe
"C:\Program Files (x86)\Wise\Wise Care 365\WiseCare365.exe"
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2556 --field-trial-handle=1076,i,16708299124163291726,5417237086903671621,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files (x86)\Wise\Wise Care 365\BootTime.exe
"C:\Program Files (x86)\Wise\Wise Care 365\BootTime.exe"
C:\Program Files (x86)\Wise\Wise Care 365\WiseTray.exe
"C:\Program Files (x86)\Wise\Wise Care 365\WiseTray.exe"

URLs

Name
IP
Malicious
http://info.wisecleaner.com/info_group/images/2024/04/12/012055670.png
104.26.2.143
http://downloads.wisecleaner.com/update/care365_v6/AutoUpdate_6.0.3.593.zip
unknown
https://wisecleaner.net/software_statistics/wiserate.txtU
unknown
https://www.wisecleaner.com/static/img/icon/icon_arrow_1f2238_12.svg
172.67.68.11
https://www.wisecleaner.com/static/img/product/thanks-for-choosing/thanks_box_wdf.png
172.67.68.11
http://www.wisecleaner.net/software_statistics/v6.php?p=insertstart
unknown
https://downloads.wisecleaner.com/soft/WJSSetup.exe
unknown
https://platform.twitter.com/widgets/widget_iframe.2f70fb173b9000da126c79afe2098f02.html?origin=https%3A%2F%2Fwww.wisecleaner.com
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.lb.en.JisoxTPHVRs.O/m=gapi_iframes_style_bubble/exm=auth,ytsubscribe/rt=j/sv=1/d=1/ed=1/am=AAAC/rs=AHpOoo9VOmUKkb8FAwL65OiDUU4etqWcRg/cb=gapi.loaded_2?le=scs
142.250.105.101
https://info.wisecleaner.com/messages/index.php?to=checknews&pid=3L
unknown
http://ocsps.ssl.com0?
unknown
http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0
unknown
https://www.wisecleaner.com/disc/?day=%d&pix=%.2f
unknown
https://www.wisecleaner.com/static/img/product/update/icon.png
172.67.68.11
https://syndication.twitter.com/i/jot/embeds?l=%7B%22widget_origin%22%3A%22https%3A%2F%2Fwww.wisecleaner.com%2Fthanks-for-choosing-WiseCare365.html%22%2C%22widget_frame%22%3Afalse%2C%22language%22%3A%22en%22%2C%22message%22%3A%22m%3Awithcount%3A%22%2C%22_category_%22%3A%22tfw_client_event%22%2C%22triggered_on%22%3A1714051841572%2C%22dnt%22%3Afalse%2C%22client_version%22%3A%222615f7e52b7e0%3A1702314776716%22%2C%22format_version%22%3A1%2C%22event_namespace%22%3A%7B%22client%22%3A%22tfw%22%2C%22page%22%3A%22button%22%2C%22section%22%3A%22follow%22%2C%22action%22%3A%22impression%22%7D%7D&session_id=23573a4b92be966386dd3bcaa06c1e011847d690
104.244.42.72
https://www.wisecleaner.com/a
unknown
https://www.youtube.com/subscribe_embed?action_card=1&channelid=UCXLbiumrDzPSJikI9BIZjrw&usegapi=1&usegapi=1&jsh=m%3B%2F_%2Fscs%2Fabc-static%2F_%2Fjs%2Fk%3Dgapi.lb.en.JisoxTPHVRs.O%2Fam%3DAAAC%2Fd%3D1%2Frs%3DAHpOoo9VOmUKkb8FAwL65OiDUU4etqWcRg%2Fm%3D__features__
64.233.176.93
https://downloads.wisecleaner.com/soft/WFDSetup.exe
unknown
https://www.wisecleaner.com/static/font/roboto/v29/KFOmCnqEu92Fr1Mu5mxKKTU1Kvnz.woff2
172.67.68.11
http://sslcom.crl.certum.pl/ctnca.crl0s
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.lb.en.JisoxTPHVRs.O/m=auth/exm=ytsubscribe/rt=j/sv=1/d=1/ed=1/am=AAAC/rs=AHpOoo9VOmUKkb8FAwL65OiDUU4etqWcRg/cb=gapi.loaded_1?le=scs
142.250.105.101
http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl0
unknown
http://www.indyproject.org/
unknown
http://www.wisecleaner.com/toolbox/imagesv6/ForceDeleter.svg
unknown
http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0_
unknown
http://downloads.wisecleaner.com/update/care365_v6/Languages/Norwegian(Bokmal).lanb
unknown
about:blank
https://www.wisecleaner.com/how-to-uninstall-wisecleaner-product.html
unknown
https://www.wisecleaner.com/toolbox/imagesv6/FolderHider.svg
unknown
https://pdf.wisecleaner.com/static/svg/logo/pdf_logo.svg
172.67.68.11
https://downloads.wisecleaner.com/soft/WDFSetup.exe
unknown
http://downloads.wisecleaner.com/update/care365_v6/Languages/Dutch(Belgium).lan
unknown
https://wisecleaner.wordpress.com/2017/05/08/solution-for-compatibility-issue-between-wisecleaner-an
unknown
https://www.wisecleaner.com:443/toolbox/toolsv6.ini
unknown
https://www.wisecleaner.com/static/page/product/update/update.css
172.67.68.11
https://g.live.com/odclientsettings/Prod.C:
unknown
https://www.wisecleaner.com/renew-license.html
unknown
https://www.wisecleaner.com/static/img/product/thanks-for-choosing/clean.png
172.67.68.11
http://downloads.wisecleaner.com/update/care365_v6/Languages/Ukrainian.lan
unknown
http://downloads.wisecleaner.com/soft/WASSetup.exe
unknown
https://www.wisecleaner.com/eula.html
unknown
https://www.youtube.com/subscribe_embed?usegapi=1&channel=wisecleanervideo&layout=default&count=default&origin=https%3A%2F%2Fwww.wisecleaner.com&gsrc=3p&ic=1&jsh=m%3B%2F_%2Fscs%2Fabc-static%2F_%2Fjs%2Fk%3Dgapi.lb.en.JisoxTPHVRs.O%2Fam%3DAAAC%2Fd%3D1%2Frs%3DAHpOoo9VOmUKkb8FAwL65OiDUU4etqWcRg%2Fm%3D__features__#_methods=onPlusOne%2C_ready%2C_close%2C_open%2C_resizeMe%2C_renderstart%2Concircled%2Cdrefresh%2Cerefresh%2Conload&id=I0_1714051839396&_gfid=I0_1714051839396&parent=https%3A%2F%2Fwww.wisecleaner.com&pfname=&rpctoken=22571271
http://downloads.wisecleaner.com/update/care365_v6/libeay32_6.0.3.593.zipH
unknown
http://service.weibo.com/share/share.php?url=https%3A%2F%2Fwww.wisecleaner.com.cn
unknown
https://www.google.com/cse/static/element/8435450f13508ca1/default+en.css
142.250.105.147
http://downloads.wisecleaner.com/update/care365_v6/Languages/Bulgarian.lan.4153
unknown
https://downloads.wisecleaner.com/soft/WRMSetup.exe
unknown
https://www.wisecleaner.com/static/img/product/products_icon/was-60.png
172.67.68.11
https://forum.wisecleaner.com/index.php?/topic/18165-how-to-fix-the-issue-of-you-are-possibly-a-vict
unknown
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
unknown
https://info.wisecleaner.com/messages/index.php?to=checknews&pid=3y
unknown
https://www.youtube.com/s/subscriptions/subscribe_embed/img/subscribe_button_branded_lozenge.png
64.233.176.93
http://www.wisecleaner.net/wiseclean
unknown
https://downloads.wisecleaner.com/soft/WDRSetup.exe
unknown
https://downloads.wisecleaner.com/soft/WFHSetup_5.0.2.232.exel
unknown
http://www.innosetup.com/
unknown
http://www.wisecleaner.com/toolbox/imagesv6/DuplicateFinder.svg
unknown
https://www.wisecleaner.com/images/awards/si-award-epick5.png
172.67.68.11
https://www.wisecleaner.com/toolbox/imagesv6/Reminder.svg
unknown
https://www.wisecleaner.com/static/img/product/products_icon/wdc-60.png
172.67.68.11
http://downloads.wisecleaner.com/update/care365_v6/BootTime_6.0.3.593.zipsvg
unknown
https://www.wisecleaner.com/toolbox/imagesv6/ForceDeleter.svgl
unknown
https://www.wisecleaner.com/toolbox/imagesv6/GameBooster.svgll
unknown
https://www.wisecleaner.com/static/img/common/icon_french.svg
172.67.68.11
https://www.wisecleaner.com/static/js/common/sprint.min.js
172.67.68.11
http://downloads.wisecleaner.com/update/care365_v6/Languages/Greek.lan
unknown
https://www.wisecleaner.com/news/w365info.htmU
unknown
http://downloads.wisecleaner.com/update/care365_v6/Languages/German.lan
unknown
https://www.wisecleaner.com
unknown
https://platform.twitter.com/widgets/follow_button.2f70fb173b9000da126c79afe2098f02.en.html#dnt=false&id=twitter-widget-0&lang=en&screen_name=WiseCleaner&show_count=false&show_screen_name=false&size=m&time=1714051841571
https://apis.google.com/js/rpc:shindig_random.js?onload=init
173.194.219.113
http://www.wisecleaner.net/wisecleaner_feedback/index.php?to=fetch-unread-message
unknown
http://downloads.wisecleaner.com/update/care365_v6/Languages/Portuguese(Portugal).lan
unknown
http://crl.ver)
unknown
https://www.wisecleaner.com/static/img/common/icon_germany.svg
172.67.68.11
https://www.wisecleaner.com/eula.htmlSV
unknown
http://www.wisecleaner.net/wisecleaner_feedback/index.php?to=upload-fileU
unknown
https://www.wisecleaner.com/software_update/getinfo_v6.php?p_id=31&s_build=636
104.26.2.143
https://downloads.wisecleaner.com/soft/WMOSetup.exe
unknown
http://www.haysoft.org%1-k
unknown
https://www.wisecleaner.com/static/img/common/icon_follow_youtube.svg
172.67.68.11
http://www.wisecleaner.com/toolbox/imagesv6/MemoryOptimizer.svg
unknown
http://downloads.wisecleaner.com/update/care365_v6/Languages/Italian.lan931334
unknown
http://downloads.wisecleaner.com/update/care365_v6/Languages/Russian.lanA
unknown
https://www.wisecleaner.com/static/img/product/thanks-for-choosing/bbb.png
172.67.68.11
https://www.wisecleaner.com/toolbox/imagesv6/DuplicateFinder.svg
unknown
https://www.wisecleaner.com/toolbox/imagesv6/GameBooster.svg
unknown
http://downloads.wisecleaner.com/update/care365_v6/DManager_6.1.4.601.zip
unknown
https://info.wisecleaner.com/messages/index.php?to=checknews&pid=%dU
unknown
http://sslcom.ocsp-certum.com08
unknown
https://www.wisecleaner.com/8https://www.wisecleaner.com/8https://www.wisecleaner.com/
unknown
https://www.wisecleaner.net/software_statistics/index.php?p=comment_status
unknown
https://www.wisecleaner.com/static/js/utils/utils.js?v=1.14
172.67.68.11
https://www.facebook.com/plugins/like.php?href=http%3A%2F%2Fwww.facebook.com%2Fwisecleanersoft&send=false&layout=button_count&width=110&show_faces=false&font&colorscheme=light&action=like&height=21
http://www.wisecleaner.com/&via=wisecleaner
unknown
https://www.wisecleaner.com/toolbox/imagesv6/DataRecovery.svgl
unknown
https://www.wisecleaner.com/static/img/product/thanks-for-choosing/sign.png
172.67.68.11
https://www.wisecleaner.com/static/img/common/icon_follow_facebook.svg
172.67.68.11
https://www.youtube.com/s/subscriptions/subscribe_embed/js/www-subscribe-embed-card_v0.js
64.233.176.93
https://www.wisecleaner.com/toolbox/imagesv6/DataRecovery.svg
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
star-mini.c10r.facebook.com
31.13.65.36
twitter.com
104.244.42.193
plus.l.google.com
142.250.105.101
cs491.wac.edgecastcdn.net
192.229.163.25
platform.twitter.map.fastly.net
151.101.12.157
syndication.twitter.com
104.244.42.136
stats.g.doubleclick.net
108.177.122.154
scontent.xx.fbcdn.net
31.13.88.13
youtube-ui.l.google.com
64.233.176.93
mailserver.wisecleaner.net
23.224.25.138
www.wisecleaner.com
172.67.68.11
www3.l.google.com
64.233.176.101
cse.google.com
142.250.9.101
www.google.com
64.233.177.104
info.wisecleaner.com
104.26.2.143
pdf.wisecleaner.com
172.67.68.11
www.facebook.com
unknown
www.adsensecustomsearchads.com
unknown
static.xx.fbcdn.net
unknown
www.wisecleaner.net
unknown
platform.twitter.com
unknown
www.youtube.com
unknown
apis.google.com
unknown
There are 13 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
31.13.65.36
star-mini.c10r.facebook.com
Ireland
142.250.9.91
unknown
United States
23.224.25.138
mailserver.wisecleaner.net
United States
64.233.176.93
youtube-ui.l.google.com
United States
142.250.105.157
unknown
United States
173.194.219.113
unknown
United States
192.168.2.4
unknown
unknown
104.244.42.72
unknown
United States
172.67.68.11
www.wisecleaner.com
United States
108.177.122.154
stats.g.doubleclick.net
United States
104.26.2.143
info.wisecleaner.com
United States
31.13.88.13
scontent.xx.fbcdn.net
Ireland
104.26.3.143
unknown
United States
104.244.42.136
syndication.twitter.com
United States
142.250.105.101
plus.l.google.com
United States
104.244.42.8
unknown
United States
192.229.163.25
cs491.wac.edgecastcdn.net
United States
142.250.105.147
unknown
United States
64.233.177.104
www.google.com
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown
151.101.12.157
platform.twitter.map.fastly.net
United States
There are 12 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\WiseCleaner\WiseCare365
path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\WiseCleaner\WiseCare365
Product Name
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WiseBootAssistant
Description
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\WiseCleaner\WiseCare365
ispro
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
Inno Setup: Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
MajorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
MinorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wise Care 365_is1
EstimatedSize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{FBF23B40-E3F0-101B-8488-00AA003E56F8} {000214E4-0000-0000-C000-000000000046} 0xFFFF
HKEY_LOCAL_MACHINE\SOFTWARE\WiseCleaner\WiseCare365
ConfigPath
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\shell\WShredFile
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\shell\WShredFile
ICON
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\shell\WShredFile\Command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shell\WShredFile
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shell\WShredFile
ICON
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shell\WShredFile\Command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WiseCleaner\WiseCare365
BoosterRun
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\WiseCleaner\WiseCare365
path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WiseTray_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WiseTray_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WiseTray_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WiseTray_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WiseTray_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WiseTray_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WiseTray_RASAPI32
FileDirectory
There are 41 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7F385000
direct allocation
page read and write
DA8000
unkown
page read and write
1A0D80EB000
heap
page read and write
DB7000
trusted library allocation
page read and write
7FA3A000
direct allocation
page read and write
7F4AB000
direct allocation
page read and write
19A000
stack
page read and write
7F642000
direct allocation
page read and write
54E0000
direct allocation
page read and write
7F418000
direct allocation
page read and write
D90000
trusted library allocation
page read and write
1940000
heap
page read and write
199E000
heap
page read and write
918000
heap
page read and write
84E000
stack
page read and write
2C14000
heap
page read and write
3611000
heap
page read and write
55D0000
trusted library allocation
page read and write
19A000
stack
page read and write
2C2A000
heap
page read and write
7FBB3000
direct allocation
page read and write
7FE31000
direct allocation
page read and write
A75C000
heap
page read and write
2BFB000
heap
page read and write
7F570000
direct allocation
page read and write
3611000
heap
page read and write
C29000
heap
page read and write
7F469000
direct allocation
page read and write
5400000
direct allocation
page read and write
650000
unkown
page read and write
9B1C57E000
stack
page read and write
DB7000
trusted library allocation
page read and write
1A0D39B0000
trusted library allocation
page read and write
2C18000
heap
page read and write
6C1A0000
unkown
page readonly
F28000
direct allocation
page read and write
1280000
heap
page read and write
A773000
heap
page read and write
7F665000
direct allocation
page read and write
4AF0000
trusted library allocation
page read and write
AABE000
stack
page read and write
9B1C377000
stack
page read and write
A88000
unkown
page readonly
D90000
trusted library allocation
page read and write
8F1000
heap
page read and write
F68000
heap
page read and write
4A1000
unkown
page readonly
401000
unkown
page execute read
55D0000
trusted library allocation
page read and write
E34000
unkown
page read and write
53A6000
direct allocation
page read and write
A8A000
unkown
page readonly
2C14000
heap
page read and write
D90000
trusted library allocation
page read and write
7F82B000
direct allocation
page read and write
55D0000
trusted library allocation
page read and write
1A0D824D000
trusted library allocation
page read and write
1A0D2A5B000
heap
page read and write
7F980000
direct allocation
page read and write
7F758000
direct allocation
page read and write
548F000
direct allocation
page read and write
2BE1000
heap
page read and write
DB0000
trusted library allocation
page read and write
2830000
heap
page read and write
121F000
direct allocation
page read and write
7FBD1000
direct allocation
page read and write
7FB9E000
direct allocation
page read and write
3564000
direct allocation
page read and write
1A0D7FB0000
trusted library allocation
page read and write
91E000
heap
page read and write
1946000
heap
page read and write
AE5F000
stack
page read and write
1A0D7E60000
trusted library allocation
page read and write
47F9000
direct allocation
page read and write
7F5C0000
direct allocation
page read and write
55D0000
trusted library allocation
page read and write
11EB000
direct allocation
page read and write
2BFB000
heap
page read and write
45CE000
direct allocation
page read and write
192A000
heap
page read and write
3347000
direct allocation
page read and write
D90000
trusted library allocation
page read and write
7FB9C000
direct allocation
page read and write
7FDEE000
direct allocation
page read and write
7F7DC000
direct allocation
page read and write
4BA5000
trusted library allocation
page read and write
5199000
direct allocation
page read and write
1A0D8280000
remote allocation
page read and write
6DE000
stack
page read and write
F60000
heap
page read and write
55D0000
trusted library allocation
page read and write
7F768000
direct allocation
page read and write
231A000
direct allocation
page read and write
DB2000
trusted library allocation
page read and write
4B80000
trusted library allocation
page read and write
7F7BC000
direct allocation
page read and write
7F489000
direct allocation
page read and write
4AF0000
trusted library allocation
page read and write
995F000
stack
page read and write
923000
heap
page read and write
35E2000
direct allocation
page read and write
2C14000
heap
page read and write
2BFB000
heap
page read and write
35F0000
direct allocation
page execute and read and write
D96000
unkown
page read and write
7FDD0000
direct allocation
page read and write
22AC000
direct allocation
page read and write
1A0D826F000
trusted library allocation
page read and write
3611000
heap
page read and write
7FE08000
direct allocation
page read and write
7F5D1000
direct allocation
page read and write
1A0D2B29000
heap
page read and write
7FBE1000
direct allocation
page read and write
7F3A4000
direct allocation
page read and write
3611000
heap
page read and write
4B80000
trusted library allocation
page read and write
870000
heap
page read and write
7F5D0000
direct allocation
page read and write
5231000
direct allocation
page read and write
7F7EC000
direct allocation
page read and write
1A0D8230000
trusted library allocation
page read and write
4B9A000
trusted library allocation
page read and write
52B6000
direct allocation
page read and write
8E6000
heap
page read and write
4B15000
trusted library allocation
page read and write
2BE1000
heap
page read and write
115C000
direct allocation
page read and write
D74000
unkown
page execute read
1A0D3AB0000
trusted library section
page readonly
DB7000
trusted library allocation
page read and write
A6F1000
heap
page read and write
7F6D6000
direct allocation
page read and write
A715000
heap
page read and write
2C18000
heap
page read and write
7FE40000
direct allocation
page read and write
2BFB000
heap
page read and write
5354000
direct allocation
page read and write
7FBB0000
direct allocation
page read and write
7F6E7000
direct allocation
page read and write
4B98000
trusted library allocation
page read and write
A91D000
stack
page read and write
DB0000
trusted library allocation
page read and write
19B0000
heap
page read and write
2BFB000
heap
page read and write
7FB42000
direct allocation
page read and write
7FE10000
direct allocation
page read and write
7FDEA000
direct allocation
page read and write
D90000
trusted library allocation
page read and write
7FDD0000
direct allocation
page read and write
2C31000
heap
page read and write
36F0000
unkown
page read and write
F54000
heap
page read and write
7F748000
direct allocation
page read and write
4E80000
heap
page read and write
7FE19000
direct allocation
page read and write
7F739000
direct allocation
page read and write
7F9F1000
direct allocation
page read and write
A751000
heap
page read and write
1A0D7EF0000
trusted library allocation
page read and write
8C9000
heap
page read and write
4AF0000
trusted library allocation
page read and write
7F46A000
direct allocation
page read and write
DB2000
trusted library allocation
page read and write
94B000
heap
page read and write
525A000
direct allocation
page read and write
18B8000
heap
page read and write
1A0D810D000
heap
page read and write
7F5A0000
direct allocation
page read and write
DB7000
trusted library allocation
page read and write
A766000
heap
page read and write
929000
heap
page read and write
8AF000
heap
page read and write
2C14000
heap
page read and write
3611000
heap
page read and write
4AF0000
trusted library allocation
page read and write
1A0D8215000
trusted library allocation
page read and write
6FC000
unkown
page execute read
7F3E5000
direct allocation
page read and write
2C14000
heap
page read and write
2BF2000
heap
page read and write
51E4000
direct allocation
page read and write
6C170000
unkown
page readonly
2BFB000
heap
page read and write
2C31000
heap
page read and write
6270000
trusted library allocation
page read and write
C20000
heap
page read and write
22E6000
direct allocation
page read and write
1999000
heap
page read and write
4B8A000
trusted library allocation
page read and write
1A0D7EF0000
trusted library allocation
page read and write
118C000
direct allocation
page read and write
A6E0000
heap
page read and write
7F799000
direct allocation
page read and write
2C18000
heap
page read and write
D32000
unkown
page execute read
7FE0B000
direct allocation
page read and write
7FE40000
direct allocation
page read and write
545B000
direct allocation
page read and write
7F3B5000
direct allocation
page read and write
2BEA000
heap
page read and write
2C1C000
heap
page read and write
7FCDD000
direct allocation
page read and write
7F789000
direct allocation
page read and write
59A000
heap
page read and write
1A0D3E31000
trusted library allocation
page read and write
DB7000
trusted library allocation
page read and write
7F52B000
direct allocation
page read and write
D54000
heap
page read and write
C00000
heap
page read and write
7F54C000
direct allocation
page read and write
1A0D3AD0000
trusted library section
page readonly
7F707000
direct allocation
page read and write
F63000
heap
page read and write
7F622000
direct allocation
page read and write
7FCDD000
direct allocation
page read and write
7FB83000
direct allocation
page read and write
1177000
direct allocation
page read and write
55D0000
trusted library allocation
page read and write
8C3000
heap
page read and write
7F76B000
direct allocation
page read and write
7FE0D000
direct allocation
page read and write
DB2000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
1A0D8103000
heap
page read and write
F4B000
heap
page read and write
1A0D80CA000
heap
page read and write
3533000
direct allocation
page read and write
7F438000
direct allocation
page read and write
A96E000
stack
page read and write
2BA0000
heap
page read and write
9B000
stack
page read and write
7F354000
direct allocation
page read and write
2BFB000
heap
page read and write
7FDD0000
direct allocation
page read and write
2C2A000
heap
page read and write
4B0F000
trusted library allocation
page read and write
1A0D2900000
heap
page read and write
D80000
heap
page read and write
4B80000
trusted library allocation
page read and write
5418000
direct allocation
page read and write
2C31000
heap
page read and write
9B1C87E000
unkown
page readonly
1680000
heap
page read and write
7FD30000
direct allocation
page read and write
2C1A000
heap
page read and write
1910000
heap
page read and write
7419000
direct allocation
page read and write
7FB6E000
direct allocation
page read and write
16D0000
heap
page read and write
4E9000
unkown
page execute read
CB0000
direct allocation
page execute and read and write
3506000
direct allocation
page read and write
1A0D3215000
heap
page read and write
7FE3D000
direct allocation
page read and write
A46000
unkown
page read and write
DB7000
trusted library allocation
page read and write
7FD30000
direct allocation
page read and write
8ED000
heap
page read and write
A727000
heap
page read and write
9B1BDFB000
stack
page read and write
AA6E000
stack
page read and write
EDE000
direct allocation
page read and write
7FD30000
direct allocation
page read and write
AE60000
heap
page read and write
A73F000
heap
page read and write
1A0D331A000
heap
page read and write
2BFB000
heap
page read and write
2C18000
heap
page read and write
E2D000
unkown
page read and write
6C171000
unkown
page execute read
7FE05000
direct allocation
page read and write
7F600000
direct allocation
page read and write
2C2C000
heap
page read and write
9B1D97B000
stack
page read and write
7FDFB000
direct allocation
page read and write
2195000
direct allocation
page read and write
6B0000
heap
page read and write
D90000
trusted library allocation
page read and write
1A0D8307000
trusted library allocation
page read and write
11F2000
direct allocation
page read and write
4AF0000
trusted library allocation
page read and write
F6B000
heap
page read and write
1972000
heap
page read and write
7FBEB000
direct allocation
page read and write
55D0000
trusted library allocation
page read and write
7FBCF000
direct allocation
page read and write
7F759000
direct allocation
page read and write
7FC10000
direct allocation
page read and write
7FE1E000
direct allocation
page read and write
2C02000
heap
page read and write
D90000
trusted library allocation
page read and write
1A0D80FB000
heap
page read and write
7F78C000
direct allocation
page read and write
7F6D3000
direct allocation
page read and write
659000
unkown
page read and write
1A0D82E8000
trusted library allocation
page read and write
4813000
direct allocation
page read and write
7FC60000
direct allocation
page read and write
1167000
direct allocation
page read and write
7F7BA000
direct allocation
page read and write
9B1D0FE000
stack
page read and write
51FD000
direct allocation
page read and write
7F5F1000
direct allocation
page read and write
4E80000
trusted library allocation
page read and write
483000
unkown
page read and write
6C255000
unkown
page readonly
13C1000
unkown
page readonly
A743000
heap
page read and write
9D00000
trusted library allocation
page read and write
D54000
heap
page read and write
489000
unkown
page write copy
1A0D7EF1000
trusted library allocation
page read and write
1194000
direct allocation
page read and write
D4E000
stack
page read and write
6C1A1000
unkown
page execute read
7416000
direct allocation
page read and write
A783000
heap
page read and write
7F674000
direct allocation
page read and write
908000
heap
page read and write
4B93000
trusted library allocation
page read and write
F0B000
direct allocation
page read and write
D90000
trusted library allocation
page read and write
373E000
heap
page read and write
7FE05000
direct allocation
page read and write
7FDA8000
direct allocation
page read and write
1A0D7EE0000
trusted library allocation
page read and write
2BFB000
heap
page read and write
7F880000
direct allocation
page read and write
DCC000
stack
page read and write
7FBA3000
direct allocation
page read and write
401000
unkown
page execute read
2C31000
heap
page read and write
A6D0000
remote allocation
page read and write
226A000
direct allocation
page read and write
2BFB000
heap
page read and write
F6C000
heap
page read and write
1B77000
heap
page read and write
2DE0000
heap
page read and write
DA1000
unkown
page read and write
D90000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
6E0000
heap
page read and write
7FC04000
direct allocation
page read and write
2BFB000
heap
page read and write
33EE000
direct allocation
page read and write
1286000
heap
page read and write
DB7000
trusted library allocation
page read and write
DB0000
trusted library allocation
page read and write
2BFB000
heap
page read and write
2BFB000
heap
page read and write
7FB4A000
direct allocation
page read and write
2296000
direct allocation
page read and write
D85000
unkown
page write copy
7FE31000
direct allocation
page read and write
7FDE0000
direct allocation
page read and write
7F4CB000
direct allocation
page read and write
45A000
unkown
page execute read
7FA12000
direct allocation
page read and write
7FE3E000
direct allocation
page read and write
7F4FB000
direct allocation
page read and write
7FE2B000
direct allocation
page read and write
7FB70000
direct allocation
page read and write
7FBDF000
direct allocation
page read and write
4B93000
trusted library allocation
page read and write
530000
heap
page read and write
7F59F000
direct allocation
page read and write
DB2000
trusted library allocation
page read and write
2C2F000
heap
page read and write
7F910000
direct allocation
page read and write
5B7000
heap
page read and write
E38000
unkown
page readonly
7F604000
direct allocation
page read and write
DB2000
trusted library allocation
page read and write
8DE000
heap
page read and write
2BE1000
heap
page read and write
22FC000
direct allocation
page read and write
4B70000
trusted library allocation
page read and write
94C000
heap
page read and write
354C000
direct allocation
page read and write
1A0D82A0000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
2BFB000
heap
page read and write
7F590000
direct allocation
page read and write
2C29000
heap
page read and write
3438000
direct allocation
page read and write
7F3E8000
direct allocation
page read and write
53E2000
direct allocation
page read and write
1A0D80C0000
heap
page read and write
51EB000
direct allocation
page read and write
2BF2000
heap
page read and write
18C000
stack
page read and write
2C00000
trusted library allocation
page read and write
9B1D87E000
unkown
page readonly
7F429000
direct allocation
page read and write
3412000
direct allocation
page read and write
334F000
direct allocation
page read and write
DB7000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
A715000
heap
page read and write
2BFB000
heap
page read and write
3611000
heap
page read and write
2C1C000
heap
page read and write
7F4CA000
direct allocation
page read and write
2BE1000
heap
page read and write
7F7CA000
direct allocation
page read and write
7F48A000
direct allocation
page read and write
7FB80000
direct allocation
page read and write
2BFB000
heap
page read and write
4B70000
trusted library allocation
page read and write
1A0D2AB1000
heap
page read and write
7F52F000
direct allocation
page read and write
1346000
unkown
page readonly
18B0000
heap
page read and write
55D0000
trusted library allocation
page read and write
7F7CC000
direct allocation
page read and write
6A0000
heap
page read and write
F61000
direct allocation
page read and write
16D4000
heap
page read and write
55D0000
trusted library allocation
page read and write
2BFB000
heap
page read and write
D90000
trusted library allocation
page read and write
9B1D2FE000
stack
page read and write
52DC000
direct allocation
page read and write
54D0000
direct allocation
page read and write
1A0D7F10000
trusted library allocation
page read and write
7FDD8000
direct allocation
page read and write
55D0000
trusted library allocation
page read and write
7FBC0000
direct allocation
page read and write
523D000
direct allocation
page read and write
DB7000
trusted library allocation
page read and write
2BFB000
heap
page read and write
2BE1000
heap
page read and write
7F7AA000
direct allocation
page read and write
7F55F000
direct allocation
page read and write
7F55F000
direct allocation
page read and write
236A000
direct allocation
page read and write
46CF000
stack
page read and write
1970000
heap
page read and write
4610000
direct allocation
page read and write
F19000
direct allocation
page read and write
4B80000
trusted library allocation
page read and write
A4D000
unkown
page read and write
1A0D7F10000
trusted library allocation
page read and write
538000
heap
page read and write
7FDF7000
direct allocation
page read and write
7F614000
direct allocation
page read and write
DB7000
trusted library allocation
page read and write
2BFB000
heap
page read and write
14AA000
unkown
page readonly
1A0D3313000
heap
page read and write
7FDE4000
direct allocation
page read and write
196F000
heap
page read and write
A72D000
heap
page read and write
7F708000
direct allocation
page read and write
9EE0000
trusted library allocation
page read and write
4B8A000
trusted library allocation
page read and write
191B000
heap
page read and write
4BA3000
trusted library allocation
page read and write
7F51C000
direct allocation
page read and write
7F676000
direct allocation
page read and write
1A0D8291000
trusted library allocation
page read and write
1A0D804F000
heap
page read and write
D0E000
stack
page read and write
2BE1000
heap
page read and write
11CE000
direct allocation
page read and write
1A0D8220000
trusted library allocation
page read and write
9B1C67E000
unkown
page readonly
3400000
direct allocation
page read and write
7FBC0000
direct allocation
page read and write
1A0D3302000
heap
page read and write
7F79A000
direct allocation
page read and write
7F77A000
direct allocation
page read and write
197C000
heap
page read and write
73E000
stack
page read and write
1A0D80E2000
heap
page read and write
1208000
direct allocation
page read and write
380F000
stack
page read and write
1A0D80F5000
heap
page read and write
2BFB000
heap
page read and write
7F75B000
direct allocation
page read and write
7FDB8000
direct allocation
page read and write
2C18000
heap
page read and write
9B1CEFE000
stack
page read and write
90F000
heap
page read and write
4B15000
trusted library allocation
page read and write
A4F000
unkown
page read and write
DB2000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
34D5000
direct allocation
page read and write
2BFB000
heap
page read and write
985E000
stack
page read and write
25E0000
heap
page read and write
A750000
heap
page read and write
2C14000
heap
page read and write
B62000
unkown
page execute read
2C14000
heap
page read and write
A763000
heap
page read and write
55D0000
trusted library allocation
page read and write
1A0D7E50000
trusted library allocation
page read and write
36AE000
stack
page read and write
2BFB000
heap
page read and write
2C1A000
heap
page read and write
931000
heap
page read and write
7FD30000
direct allocation
page read and write
7DF000
stack
page read and write
1A0D2A7A000
heap
page read and write
7FDD4000
direct allocation
page read and write
7FB48000
direct allocation
page read and write
1A0D7EF2000
trusted library allocation
page read and write
7F686000
direct allocation
page read and write
4B80000
trusted library allocation
page read and write
7F45A000
direct allocation
page read and write
1A0D8280000
remote allocation
page read and write
197F000
heap
page read and write
2C2A000
heap
page read and write
3398000
direct allocation
page read and write
408000
unkown
page execute read
7F3A5000
direct allocation
page read and write
48E0000
heap
page read and write
1368000
unkown
page readonly
7F654000
direct allocation
page read and write
7F77C000
direct allocation
page read and write
2C18000
heap
page read and write
7FA42000
direct allocation
page read and write
D90000
trusted library allocation
page read and write
7FE21000
direct allocation
page read and write
2BFB000
heap
page read and write
3611000
heap
page read and write
2363000
direct allocation
page read and write
1A0D3401000
trusted library allocation
page read and write
8CF000
heap
page read and write
7F375000
direct allocation
page read and write
1A0D8272000
trusted library allocation
page read and write
F36000
direct allocation
page read and write
2BE1000
heap
page read and write
8D8000
heap
page read and write
4B80000
trusted library allocation
page read and write
16D4000
heap
page read and write
A59E000
stack
page read and write
F6B000
heap
page read and write
7FE37000
direct allocation
page read and write
A36000
unkown
page read and write
257F000
stack
page read and write
7F3C5000
direct allocation
page read and write
1A0D2A00000
heap
page read and write
55D0000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
408000
unkown
page execute read
A39000
unkown
page read and write
7FDF0000
direct allocation
page read and write
D90000
trusted library allocation
page read and write
1A0D8042000
heap
page read and write
7F6F7000
direct allocation
page read and write
A6F1000
heap
page read and write
7FBC0000
direct allocation
page read and write
7FB7A000
direct allocation
page read and write
EF8000
heap
page read and write
DB0000
trusted library allocation
page read and write
3410000
direct allocation
page read and write
1A0D2A7D000
heap
page read and write
7FE2D000
direct allocation
page read and write
1A0D8264000
trusted library allocation
page read and write
2BE1000
heap
page read and write
400000
unkown
page readonly
2C1A000
heap
page read and write
510E000
stack
page read and write
4A9000
unkown
page read and write
9E0000
heap
page read and write
DB2000
trusted library allocation
page read and write
45CE000
stack
page read and write
DB2000
trusted library allocation
page read and write
7FD70000
direct allocation
page read and write
DAD000
trusted library allocation
page read and write
2BFB000
heap
page read and write
7F738000
direct allocation
page read and write
D90000
trusted library allocation
page read and write
7F5F5000
direct allocation
page read and write
4AF0000
trusted library allocation
page read and write
2338000
direct allocation
page read and write
7F728000
direct allocation
page read and write
590000
heap
page read and write
7F323000
direct allocation
page read and write
7F7BC000
direct allocation
page read and write
7FB52000
direct allocation
page read and write
2C16000
heap
page read and write
16D4000
heap
page read and write
48F000
unkown
page readonly
8D8000
heap
page read and write
2240000
direct allocation
page read and write
7FE17000
direct allocation
page read and write
1A0D2AA1000
heap
page read and write
7F5B0000
direct allocation
page read and write
4B8000
unkown
page readonly
22C8000
direct allocation
page read and write
7F7CA000
direct allocation
page read and write
487000
unkown
page read and write
7F580000
direct allocation
page read and write
7FE4A000
direct allocation
page read and write
F20000
direct allocation
page read and write
7F3A7000
direct allocation
page read and write
7F50C000
direct allocation
page read and write
1A0D2A91000
heap
page read and write
D90000
trusted library allocation
page read and write
19A4000
heap
page read and write
2C18000
heap
page read and write
1A0D7EC0000
trusted library allocation
page read and write
354F000
direct allocation
page read and write
2C16000
heap
page read and write
D90000
trusted library allocation
page read and write
1938000
heap
page read and write
2C31000
heap
page read and write
1A0D2A26000
heap
page read and write
7FBA4000
direct allocation
page read and write
7FA58000
direct allocation
page read and write
8EA000
heap
page read and write
7F6A5000
direct allocation
page read and write
2BE1000
heap
page read and write
9B1DA7E000
unkown
page readonly
A87000
unkown
page read and write
7FB6A000
direct allocation
page read and write
9B1D17E000
unkown
page readonly
1969000
heap
page read and write
230B000
direct allocation
page read and write
495E000
stack
page read and write
7F8C8000
direct allocation
page read and write
7F313000
direct allocation
page read and write
2288000
direct allocation
page read and write
55D0000
trusted library allocation
page read and write
2BB0000
direct allocation
page execute and read and write
4ECE000
stack
page read and write
4AF0000
trusted library allocation
page read and write
7F7EB000
direct allocation
page read and write
7F409000
direct allocation
page read and write
1A0D8102000
heap
page read and write
1A0D2B02000
heap
page read and write
DB7000
trusted library allocation
page read and write
7F78A000
direct allocation
page read and write
1A0D82C2000
trusted library allocation
page read and write
2BFB000
heap
page read and write
1A0D2A8D000
heap
page read and write
DB7000
trusted library allocation
page read and write
335D000
direct allocation
page read and write
3404000
direct allocation
page read and write
2BE1000
heap
page read and write
4AF0000
trusted library allocation
page read and write
7FE29000
direct allocation
page read and write
A758000
heap
page read and write
54A5000
direct allocation
page read and write
7F612000
direct allocation
page read and write
2BE1000
heap
page read and write
3410000
heap
page read and write
5360000
direct allocation
page read and write
A36000
unkown
page write copy
133E000
unkown
page readonly
7F664000
direct allocation
page read and write
1A0D2AA3000
heap
page read and write
55D0000
trusted library allocation
page read and write
6C199000
unkown
page readonly
7FBEF000
direct allocation
page read and write
64E000
unkown
page write copy
3558000
direct allocation
page read and write
7F5B0000
direct allocation
page read and write
878000
heap
page read and write
DB7000
trusted library allocation
page read and write
7F50B000
direct allocation
page read and write
52E1000
direct allocation
page read and write
1B90000
heap
page read and write
7FA32000
direct allocation
page read and write
DB2000
trusted library allocation
page read and write
65C000
unkown
page write copy
7F356000
direct allocation
page read and write
661000
unkown
page readonly
3611000
heap
page read and write
2BE1000
heap
page read and write
7F718000
direct allocation
page read and write
9B1D57E000
unkown
page readonly
7F5C0000
direct allocation
page read and write
2190000
direct allocation
page read and write
7F624000
direct allocation
page read and write
4B93000
trusted library allocation
page read and write
F53000
direct allocation
page read and write
45B1000
direct allocation
page read and write
7FA3E000
direct allocation
page read and write
4B80000
trusted library allocation
page read and write
5431000
direct allocation
page read and write
A82000
unkown
page write copy
2C16000
heap
page read and write
7F398000
direct allocation
page read and write
2BFB000
heap
page read and write
7FDD0000
direct allocation
page read and write
2C18000
heap
page read and write
2378000
direct allocation
page read and write
7F654000
direct allocation
page read and write
341A000
direct allocation
page read and write
D90000
trusted library allocation
page read and write
7F47A000
direct allocation
page read and write
7F428000
direct allocation
page read and write
45C0000
direct allocation
page read and write
1A0D7F24000
trusted library allocation
page read and write
4FCE000
stack
page read and write
7FDF0000
direct allocation
page read and write
2C26000
heap
page read and write
352B000
direct allocation
page read and write
A6E000
stack
page read and write
2BFB000
heap
page read and write
A7A9000
heap
page read and write
7F5F0000
direct allocation
page read and write
3611000
heap
page read and write
7F696000
direct allocation
page read and write
3611000
heap
page read and write
1A0D2A40000
heap
page read and write
4791000
direct allocation
page read and write
6E7000
heap
page read and write
7FA01000
direct allocation
page read and write
7F7FA000
direct allocation
page read and write
1A0D82FC000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
DB2000
trusted library allocation
page read and write
7FE1F000
direct allocation
page read and write
D90000
trusted library allocation
page read and write
7F78B000
direct allocation
page read and write
543D000
direct allocation
page read and write
4B70000
trusted library allocation
page read and write
2C14000
heap
page read and write
5212000
direct allocation
page read and write
D90000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
400000
unkown
page readonly
1A0D2A2B000
heap
page read and write
52A4000
direct allocation
page read and write
16D4000
heap
page read and write
7FBD9000
direct allocation
page read and write
4E70000
trusted library allocation
page read and write
DB7000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
DB1000
trusted library allocation
page read and write
7FB90000
direct allocation
page read and write
7FBCB000
direct allocation
page read and write
277D000
direct allocation
page read and write
9B1C77B000
stack
page read and write
28F0000
heap
page read and write
2C1C000
heap
page read and write
549E000
direct allocation
page read and write
D90000
trusted library allocation
page read and write
393E000
stack
page read and write
7F3F8000
direct allocation
page read and write
7FDD0000
direct allocation
page read and write
526A000
direct allocation
page read and write
4B15000
trusted library allocation
page read and write
7F4EB000
direct allocation
page read and write
A783000
heap
page read and write
7F6C6000
direct allocation
page read and write
EF0000
heap
page read and write
11A2000
direct allocation
page read and write
1150000
direct allocation
page read and write
11C0000
direct allocation
page read and write
4B80000
trusted library allocation
page read and write
7FE18000
direct allocation
page read and write
55D0000
trusted library allocation
page read and write
7F3D8000
direct allocation
page read and write
3400000
direct allocation
page read and write
7FA22000
direct allocation
page read and write
1A0D7F20000
trusted library allocation
page read and write
9B1D07E000
unkown
page readonly
2E53000
heap
page read and write
7F6A7000
direct allocation
page read and write
4A5D000
stack
page read and write
2328000
direct allocation
page read and write
4B80000
trusted library allocation
page read and write
2C1A000
heap
page read and write
7F646000
direct allocation
page read and write
7F58F000
direct allocation
page read and write
33BC000
direct allocation
page read and write
1431000
unkown
page readonly
1A0D82E5000
trusted library allocation
page read and write
16D4000
heap
page read and write
7F449000
direct allocation
page read and write
D90000
trusted library allocation
page read and write
22A4000
direct allocation
page read and write
DB2000
trusted library allocation
page read and write
3701000
heap
page read and write
7F7A9000
direct allocation
page read and write
7F632000
direct allocation
page read and write
6C272000
unkown
page read and write
7F334000
direct allocation
page read and write
C10000
direct allocation
page execute and read and write
F44000
direct allocation
page read and write
55D0000
trusted library allocation
page read and write
7F6F8000
direct allocation
page read and write
ABFE000
stack
page read and write
A75D000
heap
page read and write
1A0D8210000
trusted library allocation
page read and write
52B4000
direct allocation
page read and write
190F000
heap
page read and write
2E3E000
stack
page read and write
5210000
direct allocation
page read and write
D54000
heap
page read and write
198B000
heap
page read and write
7F611000
direct allocation
page read and write
9B1D67E000
unkown
page readonly
9B1CE7E000
unkown
page readonly
2BFB000
heap
page read and write
7F419000
direct allocation
page read and write
2C2E000
heap
page read and write
2BFB000
heap
page read and write
33F6000
direct allocation
page read and write
47AC000
direct allocation
page read and write
D90000
trusted library allocation
page read and write
7F7AC000
direct allocation
page read and write
2C18000
heap
page read and write
356D000
direct allocation
page read and write
7FB60000
direct allocation
page read and write
2C1C000
heap
page read and write
4B80000
trusted library allocation
page read and write
D90000
unclassified section
page read and write
5283000
direct allocation
page read and write
2BFB000
heap
page read and write
194E000
heap
page read and write
55D0000
trusted library allocation
page read and write
2BFB000
heap
page read and write
7FB62000
direct allocation
page read and write
5463000
direct allocation
page read and write
A49000
unkown
page read and write
7F7A0000
direct allocation
page read and write
400000
unkown
page readonly
7F57F000
direct allocation
page read and write
1A0D8218000
trusted library allocation
page read and write
4BA5000
trusted library allocation
page read and write
480000
unkown
page write copy
F69000
heap
page read and write
7FBDB000
direct allocation
page read and write
7FA00000
direct allocation
page read and write
5285000
direct allocation
page read and write
7FDE0000
direct allocation
page read and write
DB2000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
38A0000
heap
page read and write
7F6B7000
direct allocation
page read and write
A76F000
heap
page read and write
7FBD6000
direct allocation
page read and write
3509000
direct allocation
page read and write
2248000
direct allocation
page read and write
2C2F000
heap
page read and write
7FC06000
direct allocation
page read and write
4B95000
trusted library allocation
page read and write
3A7E000
stack
page read and write
7FDF2000
direct allocation
page read and write
7F55C000
direct allocation
page read and write
7FDFA000
direct allocation
page read and write
5248000
direct allocation
page read and write
926000
heap
page read and write
A700000
heap
page read and write
2C31000
heap
page read and write
7F635000
direct allocation
page read and write
2C14000
heap
page read and write
6C273000
unkown
page write copy
22D7000
direct allocation
page read and write
7FC00000
direct allocation
page read and write
8CC000
heap
page read and write
4B93000
trusted library allocation
page read and write
9B1CB79000
stack
page read and write
D90000
trusted library allocation
page read and write
3590000
direct allocation
page read and write
45E4000
direct allocation
page read and write
4B80000
trusted library allocation
page read and write
400000
unkown
page readonly
DB2000
trusted library allocation
page read and write
1201000
direct allocation
page read and write
3620000
heap
page read and write
7F50D000
direct allocation
page read and write
D85000
unkown
page read and write
4BA3000
trusted library allocation
page read and write
7F7FC000
direct allocation
page read and write
2BFB000
heap
page read and write
7FE11000
direct allocation
page read and write
1A0D3AA0000
trusted library section
page readonly
2BFB000
heap
page read and write
55D0000
trusted library allocation
page read and write
2C1C000
heap
page read and write
7FB7E000
direct allocation
page read and write
7FB72000
direct allocation
page read and write
1A0D331B000
heap
page read and write
45EB000
direct allocation
page read and write
7FDD0000
direct allocation
page read and write
54AC000
direct allocation
page read and write
E20000
heap
page read and write
449000
unkown
page execute read
7FB01000
direct allocation
page read and write
7F4DD000
direct allocation
page read and write
7F80C000
direct allocation
page read and write
944000
heap
page read and write
1A0D82F4000
trusted library allocation
page read and write
1974000
heap
page read and write
7F364000
direct allocation
page read and write
D90000
trusted library allocation
page read and write
1226000
direct allocation
page read and write
7F920000
direct allocation
page read and write
35E0000
heap
page read and write
7F79B000
direct allocation
page read and write
7F682000
direct allocation
page read and write
DB7000
trusted library allocation
page read and write
8C2000
heap
page read and write
9B1CA7E000
unkown
page readonly
1974000
heap
page read and write
1A0D82BA000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
16AF000
stack
page read and write
52E5000
direct allocation
page read and write
940000
heap
page read and write
2C2E000
heap
page read and write
7F51D000
direct allocation
page read and write
F5A000
direct allocation
page read and write
1A0D31A0000
trusted library section
page read and write
22E3000
direct allocation
page read and write
2C14000
heap
page read and write
7FBF4000
direct allocation
page read and write
7FE2E000
direct allocation
page read and write
401000
unkown
page execute read
7FBF1000
direct allocation
page read and write
480000
unkown
page read and write
55D0000
trusted library allocation
page read and write
5410000
direct allocation
page read and write
55D0000
trusted library allocation
page read and write
7F51B000
direct allocation
page read and write
7F80A000
direct allocation
page read and write
400000
unkown
page readonly
7FE00000
direct allocation
page read and write
2BE1000
heap
page read and write
9B1D4FE000
stack
page read and write
8BE000
heap
page read and write
4B80000
trusted library allocation
page read and write
7F4BB000
direct allocation
page read and write
6C27A000
unkown
page readonly
1258000
direct allocation
page read and write
2BFB000
heap
page read and write
2C2E000
heap
page read and write
117E000
direct allocation
page read and write
7FA18000
direct allocation
page read and write
A6F000
unkown
page execute read
9B1CFFE000
stack
page read and write
7F3C8000
direct allocation
page read and write
7F6E7000
direct allocation
page read and write
2C14000
heap
page read and write
199E000
heap
page read and write
1A0D80F3000
heap
page read and write
1A0D80BE000
heap
page read and write
7FBC0000
direct allocation
page read and write
7F6A3000
direct allocation
page read and write
2510000
direct allocation
page read and write
35BC000
stack
page read and write
3340000
direct allocation
page read and write
7FA1D000
direct allocation
page read and write
DB7000
trusted library allocation
page read and write
2BE1000
heap
page read and write
4B70000
trusted library allocation
page read and write
7F6B3000
direct allocation
page read and write
DB7000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
5391000
direct allocation
page read and write
45D5000
direct allocation
page read and write
83F000
stack
page read and write
73A0000
trusted library allocation
page read and write
7FE15000
direct allocation
page read and write
2BFB000
heap
page read and write
45C7000
direct allocation
page read and write
6E6000
heap
page read and write
355B000
direct allocation
page read and write
1A0D8256000
trusted library allocation
page read and write
38A3000
heap
page read and write
55D0000
trusted library allocation
page read and write
7FE04000
direct allocation
page read and write
7F56F000
direct allocation
page read and write
2BFB000
heap
page read and write
A6FF000
heap
page read and write
7F2A8000
direct allocation
page read and write
53A4000
direct allocation
page read and write
DA7000
trusted library allocation
page read and write
1917000
heap
page read and write
7F7BA000
direct allocation
page read and write
D90000
trusted library allocation
page read and write
A715000
heap
page read and write
A81E000
stack
page read and write
7F4EB000
direct allocation
page read and write
7FDD0000
direct allocation
page read and write
2BFB000
heap
page read and write
7F4DB000
direct allocation
page read and write
7FDE1000
direct allocation
page read and write
3611000
heap
page read and write
1937000
heap
page read and write
1A0D831A000
trusted library allocation
page read and write
7F49A000
direct allocation
page read and write
1A0D8200000
trusted library allocation
page read and write
7FBC3000
direct allocation
page read and write
5293000
direct allocation
page read and write
7F303000
direct allocation
page read and write
4B80000
trusted library allocation
page read and write
A6EC000
heap
page read and write
1A0D7EE0000
trusted library allocation
page read and write
53DE000
direct allocation
page read and write
1978000
heap
page read and write
7F673000
direct allocation
page read and write
EA0000
heap
page read and write
7F7AC000
direct allocation
page read and write
7F7DA000
direct allocation
page read and write
5258000
direct allocation
page read and write
A781000
heap
page read and write
A705000
heap
page read and write
D90000
trusted library allocation
page read and write
2C21000
heap
page read and write
541F000
direct allocation
page read and write
2BE1000
heap
page read and write
4B95000
trusted library allocation
page read and write
7F2C2000
direct allocation
page read and write
1434000
unkown
page readonly
1978000
heap
page read and write
9B1D5FE000
stack
page read and write
7FA30000
direct allocation
page read and write
2371000
direct allocation
page read and write
1A0D3300000
heap
page read and write
2BFB000
heap
page read and write
1A0D7EF4000
trusted library allocation
page read and write
7FE30000
direct allocation
page read and write
19C000
stack
page read and write
7F7DD000
direct allocation
page read and write
D90000
trusted library allocation
page read and write
4E8000
unkown
page execute read
3A3D000
stack
page read and write
11C7000
direct allocation
page read and write
8BD000
heap
page read and write
7FDF6000
direct allocation
page read and write
4B70000
trusted library allocation
page read and write
2C18000
heap
page read and write
7FB6C000
direct allocation
page read and write
A74C000
heap
page read and write
55D0000
trusted library allocation
page read and write
2BFB000
heap
page read and write
7FE2F000
direct allocation
page read and write
1A0D2AFF000
heap
page read and write
DB0000
trusted library allocation
page read and write
646000
unkown
page execute read
7F5E0000
direct allocation
page read and write
D54000
heap
page read and write
7F4FC000
direct allocation
page read and write
E36000
unkown
page readonly
7FE40000
direct allocation
page read and write
9B1CF7E000
unkown
page readonly
90D000
heap
page read and write
7F3E7000
direct allocation
page read and write
7FE00000
direct allocation
page read and write
4B70000
trusted library allocation
page read and write
4910000
trusted library allocation
page read and write
16D4000
heap
page read and write
7F449000
direct allocation
page read and write
7F81D000
direct allocation
page read and write
2C1A000
heap
page read and write
7FE00000
direct allocation
page read and write
4B70000
trusted library allocation
page read and write
1A0D80FD000
heap
page read and write
D54000
heap
page read and write
500E000
stack
page read and write
373E000
heap
page read and write
A7AA000
heap
page read and write
8D3000
heap
page read and write
7FB93000
direct allocation
page read and write
7FDCE000
direct allocation
page read and write
7FDFF000
direct allocation
page read and write
D90000
trusted library allocation
page read and write
5393000
direct allocation
page read and write
4B70000
trusted library allocation
page read and write
7FB5E000
direct allocation
page read and write
4BA5000
trusted library allocation
page read and write
3410000
direct allocation
page read and write
7FB50000
direct allocation
page read and write
7FE1C000
direct allocation
page read and write
7FA00000
direct allocation
page read and write
D90000
trusted library allocation
page read and write
9B1DCFF000
stack
page read and write
D90000
trusted library allocation
page read and write
7F2E3000
direct allocation
page read and write
7F440000
direct allocation
page read and write
7FB30000
direct allocation
page read and write
D54000
heap
page read and write
1934000
heap
page read and write
D90000
trusted library allocation
page read and write
1146000
direct allocation
page read and write
2BFB000
heap
page read and write
1A0D8054000
heap
page read and write
2BFB000
heap
page read and write
191B000
heap
page read and write
C25000
heap
page read and write
4608000
direct allocation
page read and write
9B1CD7B000
stack
page read and write
8ED000
heap
page read and write
D54000
heap
page read and write
7F459000
direct allocation
page read and write
5352000
direct allocation
page read and write
1A0D3200000
heap
page read and write
7F2B2000
direct allocation
page read and write
90000
stack
page read and write
7FDF0000
direct allocation
page read and write
2C14000
heap
page read and write
9F7000
unkown
page execute read
7FB22000
direct allocation
page read and write
2BFB000
heap
page read and write
1999000
heap
page read and write
1A0D82A3000
trusted library allocation
page read and write
F3D000
direct allocation
page read and write
4B70000
trusted library allocation
page read and write
2BFB000
heap
page read and write
2BE1000
heap
page read and write
D90000
trusted library allocation
page read and write
7F9E1000
direct allocation
page read and write
4BA5000
trusted library allocation
page read and write
7FDF0000
direct allocation
page read and write
19A8000
heap
page read and write
1218000
direct allocation
page read and write
7F550000
direct allocation
page read and write
4E0000
heap
page read and write
3611000
heap
page read and write
1A0D82F1000
trusted library allocation
page read and write
2BFB000
heap
page read and write
A72C000
heap
page read and write
926000
heap
page read and write
6BF0000
heap
page read and write
A41000
unkown
page read and write
196C000
heap
page read and write
1A0D808F000
heap
page read and write
1974000
heap
page read and write
9B1C17D000
stack
page read and write
4B80000
trusted library allocation
page read and write
8DE000
heap
page read and write
45F9000
direct allocation
page read and write
2E50000
heap
page read and write
1243000
direct allocation
page read and write
A703000
heap
page read and write
BD4000
unkown
page execute read
2C2A000
heap
page read and write
7F4BA000
direct allocation
page read and write
DB7000
trusted library allocation
page read and write
7FB8E000
direct allocation
page read and write
6EBD000
stack
page read and write
A6D0000
remote allocation
page read and write
ACFD000
stack
page read and write
7FBB7000
direct allocation
page read and write
2BE0000
heap
page read and write
7F4ED000
direct allocation
page read and write
A71C000
heap
page read and write
4B98000
trusted library allocation
page read and write
1A0D8118000
heap
page read and write
518F000
direct allocation
page read and write
946000
heap
page read and write
461F000
direct allocation
page read and write
7F683000
direct allocation
page read and write
7F990000
direct allocation
page read and write
55D0000
trusted library allocation
page read and write
19A1000
heap
page read and write
3800000
heap
page read and write
55D0000
trusted library allocation
page read and write
70BF000
stack
page read and write
2BFC000
heap
page read and write
4B80000
trusted library allocation
page read and write
7FD20000
direct allocation
page read and write
5481000
direct allocation
page read and write
3611000
heap
page read and write
7FDD0000
direct allocation
page read and write
7F4AA000
direct allocation
page read and write
228F000
direct allocation
page read and write
13B1000
unkown
page readonly
7FBE4000
direct allocation
page read and write
7F53F000
direct allocation
page read and write
7FDD0000
direct allocation
page read and write
33D9000
direct allocation
page read and write
7F727000
direct allocation
page read and write
7F395000
direct allocation
page read and write
1A0D3AE0000
trusted library section
page readonly
7F749000
direct allocation
page read and write
22ED000
direct allocation
page read and write
65C000
unkown
page read and write
7F3F8000
direct allocation
page read and write
DB7000
trusted library allocation
page read and write
D7C000
unkown
page execute read
DB2000
trusted library allocation
page read and write
2BFB000
heap
page read and write
192D000
heap
page read and write
2C14000
heap
page read and write
2BFB000
heap
page read and write
7F83B000
direct allocation
page read and write
2BFB000
heap
page read and write
3583000
heap
page read and write
D90000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
539F000
stack
page read and write
55D0000
trusted library allocation
page read and write
11A9000
direct allocation
page read and write
7FD50000
direct allocation
page read and write
54C2000
direct allocation
page read and write
1B70000
heap
page read and write
1A0D8208000
trusted library allocation
page read and write
54B3000
direct allocation
page read and write
7FB11000
direct allocation
page read and write
7F672000
direct allocation
page read and write
1A0D802C000
heap
page read and write
7F53C000
direct allocation
page read and write
2278000
direct allocation
page read and write
D90000
trusted library allocation
page read and write
11D6000
direct allocation
page read and write
4B70000
trusted library allocation
page read and write
A727000
heap
page read and write
4BA3000
trusted library allocation
page read and write
45AA000
direct allocation
page read and write
510000
heap
page read and write
2C14000
heap
page read and write
7F601000
direct allocation
page read and write
4779000
direct allocation
page read and write
7F3B8000
direct allocation
page read and write
7FE4E000
direct allocation
page read and write
2312000
direct allocation
page read and write
1A0D820E000
trusted library allocation
page read and write
7F693000
direct allocation
page read and write
55D0000
trusted library allocation
page read and write
7F6E8000
direct allocation
page read and write
114A000
direct allocation
page read and write
D90000
trusted library allocation
page read and write
7F439000
direct allocation
page read and write
55D0000
trusted library allocation
page read and write
16D4000
heap
page read and write
3801000
heap
page read and write
932000
heap
page read and write
2271000
direct allocation
page read and write
7F7DA000
direct allocation
page read and write
903000
heap
page read and write
7FBB0000
direct allocation
page read and write
7FE0F000
direct allocation
page read and write
2BFB000
heap
page read and write
2B6C000
stack
page read and write
4B4000
unkown
page write copy
6C197000
unkown
page readonly
55D0000
trusted library allocation
page read and write
353B000
direct allocation
page read and write
142B000
unkown
page readonly
2C02000
heap
page read and write
3610000
heap
page read and write
64E000
unkown
page read and write
7F79C000
direct allocation
page read and write
1A0D331A000
heap
page read and write
7FDA8000
direct allocation
page read and write
2BFB000
heap
page read and write
7F54F000
direct allocation
page read and write
7FA3C000
direct allocation
page read and write
7F662000
direct allocation
page read and write
22C1000
direct allocation
page read and write
7FB7C000
direct allocation
page read and write
7F695000
direct allocation
page read and write
1A0D2C00000
heap
page read and write
7F769000
direct allocation
page read and write
7F6C3000
direct allocation
page read and write
458B000
direct allocation
page read and write
9B1C27E000
unkown
page readonly
7F634000
direct allocation
page read and write
1A0D2A74000
heap
page read and write
45DD000
direct allocation
page read and write
1978000
heap
page read and write
4B93000
trusted library allocation
page read and write
2BFB000
heap
page read and write
1120000
direct allocation
page read and write
4A9000
unkown
page write copy
2BFB000
heap
page read and write
7FDB0000
direct allocation
page read and write
7F663000
direct allocation
page read and write
6FBF000
stack
page read and write
1992000
heap
page read and write
1A0D2B13000
heap
page read and write
F2F000
direct allocation
page read and write
54A000
heap
page read and write
7F6C7000
direct allocation
page read and write
1A0D828E000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
7F3D5000
direct allocation
page read and write
A6FF000
heap
page read and write
1936000
heap
page read and write
2B4B000
heap
page read and write
DB2000
trusted library allocation
page read and write
63F0000
direct allocation
page read and write
4E80000
trusted library allocation
page read and write
2BFB000
heap
page read and write
D60000
trusted library allocation
page read and write
527F000
direct allocation
page read and write
5422000
direct allocation
page read and write
A709000
heap
page read and write
3611000
heap
page read and write
191F000
heap
page read and write
2C14000
heap
page read and write
4618000
direct allocation
page read and write
4A6000
unkown
page readonly
7F7EA000
direct allocation
page read and write
1992000
heap
page read and write
2C14000
heap
page read and write
13BB000
unkown
page readonly
D90000
trusted library allocation
page read and write
7F2F3000
direct allocation
page read and write
16D4000
heap
page read and write
1A0D3740000
trusted library allocation
page read and write
A778000
heap
page read and write
55D0000
trusted library allocation
page read and write
7F6D7000
direct allocation
page read and write
7F631000
direct allocation
page read and write
7FBA1000
direct allocation
page read and write
2354000
direct allocation
page read and write
F68000
direct allocation
page read and write
197D000
heap
page read and write
4B80000
trusted library allocation
page read and write
8EA000
heap
page read and write
9B000
stack
page read and write
5268000
direct allocation
page read and write
2C31000
heap
page read and write
54C9000
direct allocation
page read and write
4B70000
trusted library allocation
page read and write
4B95000
trusted library allocation
page read and write
2BFB000
heap
page read and write
4AF0000
trusted library allocation
page read and write
45A3000
direct allocation
page read and write
8B3000
heap
page read and write
8E0000
heap
page read and write
663000
unkown
page readonly
55D0000
trusted library allocation
page read and write
22BA000
direct allocation
page read and write
4B80000
trusted library allocation
page read and write
52C0000
direct allocation
page read and write
3524000
direct allocation
page read and write
A73D000
heap
page read and write
DB7000
trusted library allocation
page read and write
6C277000
unkown
page read and write
55D0000
trusted library allocation
page read and write
1F0000
heap
page read and write
458E000
stack
page read and write
362C000
stack
page read and write
2C35000
heap
page read and write
1A0D801F000
heap
page read and write
7FD30000
direct allocation
page read and write
3366000
direct allocation
page read and write
4E60000
heap
page read and write
A69F000
stack
page read and write
1992000
heap
page read and write
3611000
heap
page read and write
3611000
heap
page read and write
A75A000
heap
page read and write
2C2A000
heap
page read and write
546D000
direct allocation
page read and write
1A0D7FC0000
trusted library allocation
page read and write
400000
unkown
page readonly
7FBFD000
direct allocation
page read and write
2BFB000
heap
page read and write
7FE20000
direct allocation
page read and write
4B98000
trusted library allocation
page read and write
9B1DFFE000
stack
page read and write
7FDE3000
direct allocation
page read and write
F50000
heap
page read and write
4AB000
unkown
page read and write
EE6000
direct allocation
page read and write
2DDF000
stack
page read and write
55D0000
trusted library allocation
page read and write
7FA2E000
direct allocation
page read and write
6C18C000
unkown
page readonly
ABBE000
stack
page read and write
1A0D2A96000
heap
page read and write
1134000
direct allocation
page read and write
354A000
direct allocation
page read and write
F5E000
heap
page read and write
2C1A000
heap
page read and write
1A0D3AC0000
trusted library section
page readonly
4B2000
unkown
page read and write
7FB82000
direct allocation
page read and write
A711000
heap
page read and write
9B1D37E000
unkown
page readonly
55D0000
trusted library allocation
page read and write
2C2A000
heap
page read and write
DA8000
trusted library allocation
page read and write
2BE1000
heap
page read and write
A734000
heap
page read and write
9B1D47E000
unkown
page readonly
2BE1000
heap
page read and write
3611000
heap
page read and write
3611000
heap
page read and write
59E000
heap
page read and write
7F74B000
direct allocation
page read and write
55D0000
trusted library allocation
page read and write
7F51F000
direct allocation
page read and write
4B95000
trusted library allocation
page read and write
1A0D7FB0000
trusted library allocation
page read and write
92F000
heap
page read and write
54BB000
direct allocation
page read and write
A709000
heap
page read and write
DAA000
unkown
page read and write
2C2A000
heap
page read and write
A743000
heap
page read and write
5350000
direct allocation
page read and write
4F0000
heap
page read and write
1A0D82FF000
trusted library allocation
page read and write
1A0D810A000
heap
page read and write
7F5E1000
direct allocation
page read and write
2BFB000
heap
page read and write
192A000
heap
page read and write
33D2000
direct allocation
page read and write
9B1CC7E000
unkown
page readonly
D88000
unkown
page read and write
74D6000
direct allocation
page read and write
A6D0000
remote allocation
page read and write
7F49A000
direct allocation
page read and write
119D000
direct allocation
page read and write
DB2000
trusted library allocation
page read and write
11B0000
direct allocation
page read and write
3700000
heap
page read and write
9B1D77E000
stack
page read and write
1A0D80E7000
heap
page read and write
2C31000
heap
page read and write
95000
stack
page read and write
7F54F000
direct allocation
page read and write
7FA40000
direct allocation
page read and write
4795000
direct allocation
page read and write
8B8000
heap
page read and write
A703000
heap
page read and write
1A0D3202000
heap
page read and write
8C6000
heap
page read and write
55D0000
trusted library allocation
page read and write
7FBA0000
direct allocation
page read and write
2C31000
heap
page read and write
55D0000
trusted library allocation
page read and write
15AF000
stack
page read and write
22B3000
direct allocation
page read and write
2C14000
heap
page read and write
7F621000
direct allocation
page read and write
7FE39000
direct allocation
page read and write
1A0D8000000
heap
page read and write
1A0D8280000
remote allocation
page read and write
1A0D3090000
trusted library allocation
page read and write
1951000
heap
page read and write
DB2000
trusted library allocation
page read and write
9B1E07E000
unkown
page readonly
E2E000
unkown
page write copy
D90000
trusted library allocation
page read and write
51A1000
direct allocation
page read and write
2BFB000
heap
page read and write
2C28000
heap
page read and write
7FE40000
direct allocation
page read and write
5197000
direct allocation
page read and write
192E000
heap
page read and write
9B1D3FE000
stack
page read and write
235C000
direct allocation
page read and write
2BFB000
heap
page read and write
7FA08000
direct allocation
page read and write
7FBF0000
direct allocation
page read and write
DB2000
trusted library allocation
page read and write
5472000
direct allocation
page read and write
A754000
heap
page read and write
7FE3F000
direct allocation
page read and write
2510000
direct allocation
page read and write
2BFB000
heap
page read and write
25E3000
heap
page read and write
1A0D2920000
heap
page read and write
DB7000
trusted library allocation
page read and write
AD5E000
stack
page read and write
D90000
trusted library allocation
page read and write
7FE19000
direct allocation
page read and write
4B80000
trusted library allocation
page read and write
62E000
unkown
page execute read
8DE000
heap
page read and write
55D0000
trusted library allocation
page read and write
4BA3000
trusted library allocation
page read and write
3554000
direct allocation
page read and write
5180000
direct allocation
page read and write
73FF000
direct allocation
page read and write
D54000
heap
page read and write
401000
unkown
page execute read
7FB4E000
direct allocation
page read and write
2C31000
heap
page read and write
9B1C47E000
unkown
page readonly
19D000
stack
page read and write
2C2A000
heap
page read and write
A72E000
heap
page read and write
4BA5000
trusted library allocation
page read and write
8C9000
heap
page read and write
7F408000
direct allocation
page read and write
11FA000
direct allocation
page read and write
2BFB000
heap
page read and write
4B80000
trusted library allocation
page read and write
2C14000
heap
page read and write
2C23000
heap
page read and write
366E000
stack
page read and write
7F717000
direct allocation
page read and write
D90000
trusted library allocation
page read and write
2BE1000
heap
page read and write
7F2D3000
direct allocation
page read and write
8E8000
heap
page read and write
7FE07000
direct allocation
page read and write
1A0D3A90000
trusted library section
page readonly
2BE1000
heap
page read and write
52E3000
direct allocation
page read and write
7FA50000
direct allocation
page read and write
522A000
direct allocation
page read and write
682C000
direct allocation
page read and write
2C31000
heap
page read and write
1A0D330C000
heap
page read and write
2BFB000
heap
page read and write
7F848000
direct allocation
page read and write
1A0D7ED0000
trusted library allocation
page read and write
4B80000
trusted library allocation
page read and write
D54000
heap
page read and write
55D0000
trusted library allocation
page read and write
8AF000
heap
page read and write
7FCB0000
direct allocation
page read and write
1A0D9000000
heap
page read and write
D90000
trusted library allocation
page read and write
22F4000
direct allocation
page read and write
2BFB000
heap
page read and write
229D000
direct allocation
page read and write
7FE01000
direct allocation
page read and write
199D000
heap
page read and write
D90000
trusted library allocation
page read and write
2C14000
heap
page read and write
2C16000
heap
page read and write
7FE1B000
direct allocation
page read and write
7FB5A000
direct allocation
page read and write
3611000
heap
page read and write
8D3000
heap
page read and write
9B1C97B000
stack
page read and write
4B6000
unkown
page readonly
45F2000
direct allocation
page read and write
7FE000
stack
page read and write
7F344000
direct allocation
page read and write
7F479000
direct allocation
page read and write
1B96000
heap
page read and write
458000
unkown
page execute read
7FE0C000
direct allocation
page read and write
7FDA8000
direct allocation
page read and write
DB3000
trusted library allocation
page read and write
7FBC1000
direct allocation
page read and write
4B70000
trusted library allocation
page read and write
1A0D8061000
heap
page read and write
16D4000
heap
page read and write
55D0000
trusted library allocation
page read and write
1A0D826C000
trusted library allocation
page read and write
D90000
unkown
page read and write
D54000
heap
page read and write
7FBD3000
direct allocation
page read and write
55D0000
trusted library allocation
page read and write
7F4CD000
direct allocation
page read and write
7FE00000
direct allocation
page read and write
4B70000
trusted library allocation
page read and write
3371000
direct allocation
page read and write
16D4000
heap
page read and write
22D0000
direct allocation
page read and write
1956000
heap
page read and write
2BFB000
heap
page read and write
7FDA8000
direct allocation
page read and write
D50000
heap
page read and write
7FDF4000
direct allocation
page read and write
4B70000
trusted library allocation
page read and write
4600000
direct allocation
page read and write
19AB000
heap
page read and write
7F50F000
direct allocation
page read and write
2C31000
heap
page read and write
2C1A000
heap
page read and write
2C1A000
heap
page read and write
7FB32000
direct allocation
page read and write
DA4000
unkown
page read and write
1A0D3E50000
trusted library allocation
page read and write
99000
stack
page read and write
5377000
direct allocation
page read and write
2BFB000
heap
page read and write
7F652000
direct allocation
page read and write
16D4000
heap
page read and write
401000
unkown
page execute read
7FE3F000
direct allocation
page read and write
3611000
heap
page read and write
D90000
trusted library allocation
page read and write
2BFB000
heap
page read and write
3611000
heap
page read and write
4B80000
trusted library allocation
page read and write
2BE1000
heap
page read and write
2BE3000
heap
page read and write
A77C000
heap
page read and write
7FAC0000
direct allocation
page read and write
D90000
trusted library allocation
page read and write
690000
heap
page read and write
1A0D2A13000
heap
page read and write
7FB5C000
direct allocation
page read and write
4B80000
trusted library allocation
page read and write
5497000
direct allocation
page read and write
C70000
heap
page read and write
7F644000
direct allocation
page read and write
2BFB000
heap
page read and write
920000
heap
page read and write
2C31000
heap
page read and write
7F642000
direct allocation
page read and write
7F4DA000
direct allocation
page read and write
400000
unkown
page readonly
4AF0000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
7FE22000
direct allocation
page read and write
45B9000
direct allocation
page read and write
2BFB000
heap
page read and write
11DD000
direct allocation
page read and write
15DC000
unkown
page readonly
7FA1A000
direct allocation
page read and write
7FBBB000
direct allocation
page read and write
6C195000
unkown
page read and write
4BA5000
trusted library allocation
page read and write
195D000
heap
page read and write
7FB92000
direct allocation
page read and write
580000
heap
page read and write
7FDE5000
direct allocation
page read and write
2BFB000
heap
page read and write
14AF000
stack
page read and write
7F779000
direct allocation
page read and write
116F000
direct allocation
page read and write
There are 1606 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://www.facebook.com/plugins/like.php?href=http%3A%2F%2Fwww.facebook.com%2Fwisecleanersoft&send=false&layout=button_count&width=110&show_faces=false&font&colorscheme=light&action=like&height=21
https://www.wisecleaner.com/thanks-for-choosing-WiseCare365.html
https://www.wisecleaner.com/thanks-for-choosing-WiseCare365.html
https://www.wisecleaner.com/thanks-for-choosing-WiseCare365.html
https://platform.twitter.com/widgets/widget_iframe.2f70fb173b9000da126c79afe2098f02.html?origin=https%3A%2F%2Fwww.wisecleaner.com
about:blank
https://www.youtube.com/subscribe_embed?usegapi=1&channel=wisecleanervideo&layout=default&count=default&origin=https%3A%2F%2Fwww.wisecleaner.com&gsrc=3p&ic=1&jsh=m%3B%2F_%2Fscs%2Fabc-static%2F_%2Fjs%2Fk%3Dgapi.lb.en.JisoxTPHVRs.O%2Fam%3DAAAC%2Fd%3D1%2Frs%3DAHpOoo9VOmUKkb8FAwL65OiDUU4etqWcRg%2Fm%3D__features__#_methods=onPlusOne%2C_ready%2C_close%2C_open%2C_resizeMe%2C_renderstart%2Concircled%2Cdrefresh%2Cerefresh%2Conload&id=I0_1714051839396&_gfid=I0_1714051839396&parent=https%3A%2F%2Fwww.wisecleaner.com&pfname=&rpctoken=22571271
https://platform.twitter.com/widgets/follow_button.2f70fb173b9000da126c79afe2098f02.en.html#dnt=false&id=twitter-widget-0&lang=en&screen_name=WiseCleaner&show_count=false&show_screen_name=false&size=m&time=1714051841571
https://accounts.google.com/o/oauth2/postmessageRelay?parent=https%3A%2F%2Fwww.wisecleaner.com&jsh=m%3B%2F_%2Fscs%2Fabc-static%2F_%2Fjs%2Fk%3Dgapi.lb.en.JisoxTPHVRs.O%2Fam%3DAAAC%2Fd%3D1%2Frs%3DAHpOoo9VOmUKkb8FAwL65OiDUU4etqWcRg%2Fm%3D__features__#rpctoken=1872338475&forcesecure=1
https://www.youtube.com/subscribe_embed?action_card=1&channelid=UCXLbiumrDzPSJikI9BIZjrw&usegapi=1&usegapi=1&jsh=m%3B%2F_%2Fscs%2Fabc-static%2F_%2Fjs%2Fk%3Dgapi.lb.en.JisoxTPHVRs.O%2Fam%3DAAAC%2Fd%3D1%2Frs%3DAHpOoo9VOmUKkb8FAwL65OiDUU4etqWcRg%2Fm%3D__features__#id=I0_1714051842536&_gfid=I0_1714051842536&parent=https%3A%2F%2Fwww.wisecleaner.com&pfname=&rpctoken=24310883