Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
lw2HMxuVuf.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Program Files\CCleaner\CCUpdate.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\CCleaner64.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\CCleanerBugReport.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\CCleanerPerformanceOptimizerService.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\wa_3rd_party_host_32.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\wa_3rd_party_host_64.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\OPSBBCA.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\CCleaner\CCleaner.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\CCleanerCrashDump.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\CCleanerDU.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\CCleanerPerformanceOptimizer.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\CCleanerReactivator.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\CCleanerReactivator.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Data\DUState.dat
|
JSON data
|
dropped
|
||
C:\Program Files\CCleaner\Data\StateHistory\DUState 2024-11-24 11-16-32-817.dat (copy)
|
JSON data
|
dropped
|
||
C:\Program Files\CCleaner\Data\StateHistory\DUState 2024-11-24 11-17-08-263.dat (copy)
|
JSON data
|
dropped
|
||
C:\Program Files\CCleaner\Data\StateHistory\InitialDUState V24_2.dat (copy)
|
JSON data
|
dropped
|
||
C:\Program Files\CCleaner\Data\burger_client\8866F8A9-70C9-43A2-BFBE-EE00AA2DC417\203abf8c-03ea-4cb7-b490-fe04ea1c26bb
|
data
|
dropped
|
||
C:\Program Files\CCleaner\Data\burger_client\8866F8A9-70C9-43A2-BFBE-EE00AA2DC417\44ED97C8-2D40-4A50-913D-673F6858B9AF
|
data
|
dropped
|
||
C:\Program Files\CCleaner\Data\usercfg.ini
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\CCleaner\LOG\BugReport.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
modified
|
||
C:\Program Files\CCleaner\LOG\BugReport.status
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\CCleaner\LOG\DriverUpdEng.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\CCleaner\LOG\DriverUpdEngTask.log
|
Unicode text, UTF-8 text, with no line terminators
|
dropped
|
||
C:\Program Files\CCleaner\LOG\DriverUpdaterLib.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\CCleaner\LOG\DumpProcess.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
modified
|
||
C:\Program Files\CCleaner\LOG\burger_client\8866F8A9-70C9-43A2-BFBE-EE00AA2DC417\2bab7519-4020-4dae-a822-3e7f39e8fa82
|
data
|
dropped
|
||
C:\Program Files\CCleaner\LOG\burger_client\8866F8A9-70C9-43A2-BFBE-EE00AA2DC417\44ED97C8-2D40-4A50-913D-673F6858B9AF
|
data
|
dropped
|
||
C:\Program Files\CCleaner\LOG\event_manager.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
modified
|
||
C:\Program Files\CCleaner\LOG\pd.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\CCleaner\LOG\su_adapter.log
|
Unicode text, UTF-8 (with BOM) text, with very long lines (820), with CRLF line terminators
|
dropped
|
||
C:\Program Files\CCleaner\LOG\su_controller.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\CCleaner\LOG\su_telemetry.log
|
Unicode text, UTF-8 text, with no line terminators
|
dropped
|
||
C:\Program Files\CCleaner\LOG\unp31145570364458760i-unhandled.mdmp
|
Mini DuMP crash report, 19 streams, Sun Nov 24 11:14:54 2024, 0x241964 type
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1025.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1026.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1027.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1028.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1029.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1030.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1031.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1032.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1034.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1035.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1036.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1037.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1038.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1040.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1041.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1042.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1043.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1044.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1045.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1046.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1048.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1049.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1050.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1051.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1052.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1053.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1054.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1055.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1056.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1057.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1058.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1059.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1060.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1061.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1062.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1063.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1065.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1066.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1067.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1068.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1071.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1079.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1081.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1086.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1087.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1090.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1092.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1093.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1102.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1104.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1109.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1110.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-1155.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-2052.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-2070.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-2074.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-3098.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-5146.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Lang\lang-9999.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Setup\02cb0e58-d7f9-4650-aaa3-c382df995438.ini
|
Generic INItialization configuration [Signature]
|
dropped
|
||
C:\Program Files\CCleaner\Setup\92a778af-76d6-4186-8535-ae66d08f623f.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\Setup\9c909bc2-cad9-48a5-8b4a-a855a60d0635.xml
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Program Files\CCleaner\Setup\config.def
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\CCleaner\gcapi_17324469042992.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\gcapi_1732446922760.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\gcapi_17324469293276.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\gcapi_dll.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\lc.dat (copy)
|
data
|
dropped
|
||
C:\Program Files\CCleaner\libwaapi.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\libwaheap.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\libwalocal.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\libwaresource.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\libwautils.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\libwavmodapi.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\CCleaner\uninst.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0xaa2fa9d7, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\CCleaner\CCleaner Homepage.url
|
MS Windows 95 Internet shortcut text (URL=<http://www.ccleaner.com/ccleaner>), ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\CCleaner\CCleaner.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Wed Nov 6 14:39:14 2024, mtime=Sun Nov 24 10:14:48 2024, atime=Wed Nov 6 14:39:14 2024, length=45359408, window=hide
|
dropped
|
||
C:\ProgramData\Piriform\CCleaner\CCleanerProgramDeactivator.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 35, database pages 20, cookie 0x12, schema 4,
UTF-8, version-valid-for 35
|
dropped
|
||
C:\ProgramData\Piriform\CCleaner\CCleanerProgramDeactivatorCache.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 22, cookie 0xd, schema 4, UTF-8,
version-valid-for 6
|
dropped
|
||
C:\ProgramData\Piriform\CCleaner\burger_client\8866F8A9-70C9-43A2-BFBE-EE00AA2DC417\44ED97C8-2D40-4A50-913D-673F6858B9AF
|
data
|
dropped
|
||
C:\ProgramData\Piriform\CCleaner\burger_client\8866F8A9-70C9-43A2-BFBE-EE00AA2DC417\78c2e8b9-496a-4af2-a60d-3146ee3f9e1c
|
data
|
dropped
|
||
C:\Users\Public\Desktop\CCleaner.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Wed Nov 6 14:39:14 2024, mtime=Sun Nov 24 10:14:43 2024, atime=Wed Nov 6 14:39:14 2024, length=45359408, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\wa_3rd_party_host_64.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\wa_3rd_party_host_32.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000002.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000005.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000007.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000009.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\MANIFEST-000002
|
MPEG-4 LOAS
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\MANIFEST-000005
|
MPEG-4 LOAS
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\MANIFEST-000007
|
MPEG-4 LOAS
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\MANIFEST-000009
|
MPEG-4 LOAS
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\10[1].json
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\Roboto-Light-v1[1].ttf
|
TrueType Font data, 17 tables, 1st "GPOS", 15 names, Microsoft, language 0x409, Copyright 2011 Google Inc. All Rights Reserved.Roboto
LightRegularVersion 2.001151; 2014Roboto-L
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\icon-redundant-files-v1[1].png
|
PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\Roboto-Bold-v1[1].ttf
|
TrueType Font data, 18 tables, 1st "GDEF", 13 names, Microsoft, language 0x409, Copyright 2011 Google Inc. All Rights Reserved.RobotoBoldRoboto
BoldVersion 2.001150; 2014Roboto
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\Roboto-Regular-v1[1].ttf
|
TrueType Font data, 18 tables, 1st "GDEF", 13 names, Microsoft, language 0x409, Copyright 2011 Google Inc. All Rights Reserved.RobotoRegularVersion
2.001101; 2014Roboto-Regular
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\V0UV4482.txt
|
Generic INItialization configuration [Common]
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\autumn_toaster_button_bg-v1[1].png
|
PNG image data, 422 x 105, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\icon-free-up-v1[1].png
|
PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\img-banner-garbage-v1[1].png
|
PNG image data, 82 x 52, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\Roboto-Bold-v1[1].ttf
|
TrueType Font data, 18 tables, 1st "GDEF", 13 names, Microsoft, language 0x409, Copyright 2011 Google Inc. All Rights Reserved.RobotoBoldRoboto
BoldVersion 2.001150; 2014Roboto
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\icon-take-control-v1[1].png
|
PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\img-toaster-garbage-v1[1].png
|
PNG image data, 360 x 144, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\10[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\R7IW179X.txt
|
Generic INItialization configuration [Common]
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\RX3GZ0SR.txt
|
Generic INItialization configuration [Common]
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Roboto-Bold-v1[1].ttf
|
TrueType Font data, 18 tables, 1st "GDEF", 13 names, Microsoft, language 0x409, Copyright 2011 Google Inc. All Rights Reserved.RobotoBoldRoboto
BoldVersion 2.001150; 2014Roboto
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Roboto-Light-v1[1].ttf
|
TrueType Font data, 17 tables, 1st "GPOS", 15 names, Microsoft, language 0x409, Copyright 2011 Google Inc. All Rights Reserved.Roboto
LightRegularVersion 2.001151; 2014Roboto-L
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Roboto-Regular-v1[1].ttf
|
TrueType Font data, 18 tables, 1st "GDEF", 13 names, Microsoft, language 0x409, Copyright 2011 Google Inc. All Rights Reserved.RobotoRegularVersion
2.001101; 2014Roboto-Regular
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Roboto-Regular-v1[2].ttf
|
TrueType Font data, 18 tables, 1st "GDEF", 13 names, Microsoft, language 0x409, Copyright 2011 Google Inc. All Rights Reserved.RobotoRegularVersion
2.001101; 2014Roboto-Regular
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\ZTA0I6KA.txt
|
Generic INItialization configuration [Common]
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\info[1].json
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\info[2].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\info[3].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.chk
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat
|
Extensible storage engine DataBase, version 0x620, checksum 0xe90d2be5, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.jfm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6358C710-B89F-46B9-93F2-F6CAC44F5286
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\CheckUpdate.log
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\D566D7D7-DCD6-471C-8109-BE0AD33199E3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\F07D8C6A-04B6-4025-869C-70A788D7B5C0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\OPSD146.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_24vkofhx.vjg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_btr0o3gs.1qx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bvinwzbu.ati.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cfn2fhoy.a3h.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dsrhdxjx.deb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gkfrcbtq.ffe.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_los2spzx.je4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_newecgpf.mab.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oaxwrmsj.2yy.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uqskywbl.jp4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w32iczjm.tbz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ydhbtu23.hsf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\asw66ac836ee4d4c90c.tmp
|
GIF image data, version 89a, 1 x 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aswa246ed9ee05d79f1.tmp
|
GIF image data, version 89a, 1 x 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aswddb84324c9d9bb2d.tmp
|
GIF image data, version 89a, 1 x 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsr3318.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ButtonEvent.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\INetC.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\UserInfo.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\a\asdk.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\g\gcapi_dll.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\modern-header.bmp
|
PC bitmap, Windows 3.x format, 150 x 57 x 24, image size 25764, resolution 3780 x 3780 px/m, cbSize 25818, bits offset 54
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\modern-wizard.bmp
|
PC bitmap, Windows 3.x format, 164 x 314 x 24, image size 154488, resolution 3780 x 3780 px/m, cbSize 154542, bits offset
54
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\nsDialogs.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\nsProcess.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\p\ServiceUninstaller.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\p\pfBL.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\pfUI.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\CC_Logo_40x96.png
|
PNG image data, 40 x 37, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\CC_logo_72x66.png
|
PNG image data, 72 x 66, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\Montserrat-Regular.otf
|
OpenType font data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\PF_computer.png
|
PNG image data, 679 x 176, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1025.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1026.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1027.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1028.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1029.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1030.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1031.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1032.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1034.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1035.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1036.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1037.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1038.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1040.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1041.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1042.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1043.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1044.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1045.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1046.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1048.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1049.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1050.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1051.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1052.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1053.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1054.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1055.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1056.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1057.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1058.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1059.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1060.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1061.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1062.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1063.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1065.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1066.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1067.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1068.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1071.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1079.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1081.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1086.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1087.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1090.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1092.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1093.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1102.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1104.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1109.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1110.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1155.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-2052.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-2070.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-2074.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-3098.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-5146.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-9999.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Q14I0EU6GPWYBDIEE0GM.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\YCSY57EUV1ZYRP474QZ8.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccc0fa1b9f86f7b3.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccc0fa1b9f86f7b3.customDestinations-ms~RF6a968f.TMP
(copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 10:15:01 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 10:15:01 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 10:15:01 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 10:15:01 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 10:15:00 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\webappsstore.sqlite-shm
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
C:\Windows\Tasks\CCleanerCrashReporting.job
|
data
|
dropped
|
||
C:\Windows\Temp\D566D7D7-DCD6-471C-8109-BE0AD33199E3
|
data
|
dropped
|
||
C:\Windows\Temp\F07D8C6A-04B6-4025-869C-70A788D7B5C0
|
data
|
dropped
|
||
C:\Windows\Temp\waapi-1732446978\dee05ccdd54c4d9596188efc
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\waapi-1732446978\lc.dat
|
data
|
dropped
|
||
C:\Windows\Temp\waapi-1732447020\9bedc75df002c2da24d49a5b
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\waapi-1732447020\lc.dat
|
data
|
dropped
|
||
Chrome Cache Entry: 398
|
C source, ASCII text, with very long lines (64709), with CRLF, LF line terminators
|
dropped
|
||
Chrome Cache Entry: 399
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 400
|
ASCII text, with very long lines (22445)
|
downloaded
|
||
Chrome Cache Entry: 401
|
Web Open Font Format (Version 2), TrueType, length 18588, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 402
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 403
|
ASCII text, with very long lines (16769)
|
downloaded
|
||
Chrome Cache Entry: 404
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 405
|
ASCII text, with very long lines (8065)
|
dropped
|
||
Chrome Cache Entry: 406
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 407
|
C source, ASCII text, with very long lines (64709), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 408
|
Unicode text, UTF-8 text, with very long lines (32054)
|
dropped
|
||
Chrome Cache Entry: 409
|
ASCII text, with very long lines (22445)
|
dropped
|
||
Chrome Cache Entry: 410
|
C source, ASCII text, with very long lines (65097)
|
dropped
|
||
Chrome Cache Entry: 411
|
ASCII text, with very long lines (19863), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 412
|
ASCII text, with very long lines (21734), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 413
|
HTML document, ASCII text, with very long lines (815)
|
downloaded
|
||
Chrome Cache Entry: 414
|
ASCII text, with very long lines (16769)
|
dropped
|
||
Chrome Cache Entry: 415
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 416
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 417
|
ASCII text, with no line terminators
|
dropped
|
||
Chrome Cache Entry: 418
|
ASCII text, with no line terminators
|
dropped
|
||
Chrome Cache Entry: 419
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 420
|
ASCII text, with very long lines (11812)
|
downloaded
|
||
Chrome Cache Entry: 421
|
ASCII text, with very long lines (37729)
|
dropped
|
||
Chrome Cache Entry: 422
|
ASCII text, with very long lines (32764)
|
downloaded
|
||
Chrome Cache Entry: 423
|
ASCII text, with very long lines (5552)
|
dropped
|
||
Chrome Cache Entry: 424
|
ASCII text, with very long lines (58876), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 425
|
Web Open Font Format (Version 2), TrueType, length 18536, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 426
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 427
|
ASCII text, with very long lines (8065)
|
downloaded
|
||
Chrome Cache Entry: 428
|
ASCII text, with very long lines (16769)
|
dropped
|
||
Chrome Cache Entry: 429
|
ASCII text, with very long lines (29146)
|
downloaded
|
||
Chrome Cache Entry: 430
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 431
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 432
|
ASCII text, with very long lines (31295), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 433
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 434
|
ASCII text, with very long lines (33615)
|
downloaded
|
||
Chrome Cache Entry: 435
|
HTML document, Unicode text, UTF-8 text, with very long lines (12724), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 436
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 437
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 438
|
ASCII text, with no line terminators
|
dropped
|
||
Chrome Cache Entry: 439
|
PNG image data, 76 x 62, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 440
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 441
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 442
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 132x132, components
3
|
dropped
|
||
Chrome Cache Entry: 443
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 444
|
ASCII text, with very long lines (16769)
|
downloaded
|
||
Chrome Cache Entry: 445
|
Web Open Font Format (Version 2), TrueType, length 18596, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 446
|
Unicode text, UTF-8 text, with very long lines (51384), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 447
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 448
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 449
|
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1560x590, components
3
|
downloaded
|
||
Chrome Cache Entry: 450
|
ASCII text, with very long lines (37729)
|
downloaded
|
||
Chrome Cache Entry: 451
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 452
|
ASCII text, with very long lines (57795)
|
dropped
|
||
Chrome Cache Entry: 453
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 454
|
PNG image data, 396 x 185, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 455
|
ASCII text, with very long lines (19863), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 456
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 457
|
HTML document, ASCII text, with no line terminators
|
dropped
|
||
Chrome Cache Entry: 458
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 459
|
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1560x590, components
3
|
dropped
|
||
Chrome Cache Entry: 460
|
ASCII text, with very long lines (33615)
|
dropped
|
||
Chrome Cache Entry: 461
|
GIF image data, version 89a, 1 x 1
|
dropped
|
||
Chrome Cache Entry: 462
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 463
|
ASCII text, with very long lines (57795)
|
downloaded
|
||
Chrome Cache Entry: 464
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 465
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 466
|
ASCII text, with very long lines (64779)
|
dropped
|
||
Chrome Cache Entry: 467
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 468
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 469
|
Unicode text, UTF-8 text, with very long lines (32054)
|
downloaded
|
||
Chrome Cache Entry: 470
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 471
|
ASCII text, with very long lines (31295), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 472
|
ASCII text, with very long lines (32764)
|
dropped
|
||
Chrome Cache Entry: 473
|
ASCII text, with very long lines (29146)
|
dropped
|
||
Chrome Cache Entry: 474
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 475
|
ASCII text, with very long lines (1223)
|
downloaded
|
||
Chrome Cache Entry: 476
|
ASCII text, with very long lines (65450)
|
downloaded
|
||
Chrome Cache Entry: 477
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 478
|
ASCII text, with very long lines (9217)
|
downloaded
|
||
Chrome Cache Entry: 479
|
PNG image data, 396 x 185, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 480
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 481
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 482
|
ASCII text, with very long lines (65455)
|
dropped
|
||
Chrome Cache Entry: 483
|
Unicode text, UTF-8 text, with very long lines (51384), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 484
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 485
|
ASCII text, with very long lines (55521)
|
dropped
|
||
Chrome Cache Entry: 486
|
Unicode text, UTF-8 text, with very long lines (41169)
|
dropped
|
||
Chrome Cache Entry: 487
|
ASCII text, with very long lines (21734), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 488
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 489
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 132x132, components
3
|
downloaded
|
||
Chrome Cache Entry: 490
|
ASCII text, with very long lines (5552)
|
downloaded
|
||
Chrome Cache Entry: 491
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 492
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 493
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 494
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 495
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 496
|
HTML document, ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 497
|
GIF image data, version 89a, 1 x 1
|
downloaded
|
||
Chrome Cache Entry: 498
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 499
|
C source, ASCII text, with very long lines (65097)
|
downloaded
|
||
Chrome Cache Entry: 500
|
ASCII text, with very long lines (11812)
|
dropped
|
||
Chrome Cache Entry: 501
|
Unicode text, UTF-8 text, with very long lines (41169)
|
downloaded
|
||
Chrome Cache Entry: 502
|
ASCII text, with very long lines (64779)
|
downloaded
|
||
Chrome Cache Entry: 503
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 504
|
ASCII text, with very long lines (9217)
|
dropped
|
||
Chrome Cache Entry: 505
|
ASCII text, with no line terminators
|
dropped
|
||
Chrome Cache Entry: 506
|
HTML document, ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 507
|
ASCII text, with very long lines (65455)
|
downloaded
|
||
Chrome Cache Entry: 508
|
ASCII text, with very long lines (55521)
|
downloaded
|
||
Chrome Cache Entry: 509
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 511
|
ASCII text, with very long lines (58876), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 512
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 513
|
PNG image data, 76 x 62, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 514
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 515
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 516
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 388 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\lw2HMxuVuf.exe
|
"C:\Users\user\Desktop\lw2HMxuVuf.exe"
|
||
C:\Program Files\CCleaner\CCleaner64.exe
|
"C:\Program Files\CCleaner\CCleaner64.exe" /createSkipUAC
|
||
C:\Program Files\CCleaner\CCUpdate.exe
|
"C:\Program Files\CCleaner\CCUpdate.exe" /reg
|
||
C:\Program Files\CCleaner\CCUpdate.exe
|
"C:\Program Files\CCleaner\CCUpdate.exe"
|
||
C:\Program Files\CCleaner\CCleanerBugReport.exe
|
"C:\Program Files\CCleaner\CCleanerBugReport.exe" --product 90 --send dumps|report --path "C:\Program Files\CCleaner\LOG"
--programpath "C:\Program Files\CCleaner" --guid "aa2c86aa-7fc5-4c8e-a69d-19a7dbc0b72a" --version "6.30.11385" --silent
|
||
C:\Program Files\CCleaner\CCleaner64.exe
|
"C:\Program Files\CCleaner\CCleaner.exe" 0
|
||
C:\Program Files\CCleaner\CCleaner64.exe
|
"C:\Program Files\CCleaner\CCleaner64.exe"
|
||
C:\Program Files\CCleaner\CCUpdate.exe
|
CCUpdate.exe /emupdater /applydll "C:\Program Files\CCleaner\Setup\92a778af-76d6-4186-8535-ae66d08f623f.dll"
|
||
C:\Program Files\CCleaner\CCleaner64.exe
|
"C:\Program Files\CCleaner\CCleaner64.exe" /monitor
|
||
C:\Program Files\CCleaner\wa_3rd_party_host_32.exe
|
--pid=3276
|
||
C:\Program Files\CCleaner\CCleanerPerformanceOptimizerService.exe
|
"C:\Program Files\CCleaner\CCleanerPerformanceOptimizerService.exe"
|
||
C:\Program Files\CCleaner\wa_3rd_party_host_32.exe
|
--pid=2992
|
||
C:\Program Files\CCleaner\wa_3rd_party_host_64.exe
|
--pid=3276
|
||
C:\Program Files\CCleaner\CCleaner64.exe
|
"C:\Program Files\CCleaner\CCleaner64.exe" /MONITOR
|
||
C:\Program Files\CCleaner\CCleaner64.exe
|
"C:\Program Files\CCleaner\CCleaner.exe" /MONITOR /uac
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /S /C ""C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ExecutionPolicy
Bypass "(Get-ItemProperty 'C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe').VersionInfo.FileDescription" > "C:\Users\user\AppData\Local\Temp\OPSBBCA.tmp"
2> "C:\Users\user\AppData\Local\Temp\OPSBBCB.tmp""
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ExecutionPolicy Bypass "(Get-ItemProperty 'C:\Program
Files (x86)\Microsoft\Edge\Application\msedge.exe').VersionInfo.FileDescription"
|
||
C:\Program Files\CCleaner\wa_3rd_party_host_64.exe
|
--pid=2992
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /S /C ""C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ExecutionPolicy
Bypass "(Get-ItemProperty 'C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe').VersionInfo.FileDescription" > "C:\Users\user\AppData\Local\Temp\OPSD146.tmp"
2> "C:\Users\user\AppData\Local\Temp\OPSD147.tmp""
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ExecutionPolicy Bypass "(Get-ItemProperty 'C:\Program
Files (x86)\Microsoft\Edge\Application\msedge.exe').VersionInfo.FileDescription"
|
||
C:\Program Files\CCleaner\CCleaner64.exe
|
"C:\Program Files\CCleaner\CCleaner64.exe" /MONITOR
|
||
C:\Program Files\CCleaner\CCleaner64.exe
|
"C:\Program Files\CCleaner\CCleaner.exe" /MONITOR /uac
|
||
C:\Program Files\CCleaner\CCleanerCrashDump.exe
|
"C:\Program Files\CCleaner\CCleanerCrashDump.exe" --pid 1272 --exception_ptr 0000007E054FD2C0 --thread_id 5744 --dump_level
21 --dump_file "C:\Program Files\CCleaner\LOG\unp31145570364458760i-unhandled.mdmp" --comment "" --min_interval 60
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\CCleaner\CCleaner.exe
|
"C:\Program Files\CCleaner\CCleaner.exe" 0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://www.ccleaner.com/go/app_releasenotes?p=1&v=&l=1033&b=1&a=0
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=2004,i,4752939339511443600,2295827606538063107,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Windows\System32\wbem\unsecapp.exe
|
C:\Windows\system32\wbem\unsecapp.exe -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\CCleaner\CCleaner.exe
|
"C:\Program Files\CCleaner\CCleaner.exe" /MONITOR /uac
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\CCleaner\CCleaner.exe
|
"C:\Program Files\CCleaner\CCleaner.exe" /MONITOR /uac
|
||
C:\Program Files\CCleaner\CCleanerCrashDump.exe
|
"C:\Program Files\CCleaner\CCleanerCrashDump.exe" --pid 7236 --exception_ptr 0000005CCC9FD640 --thread_id 8100 --dump_level
21 --dump_file "C:\Program Files\CCleaner\LOG\unp31145570997760611i-unhandled.mdmp" --comment "" --min_interval 60
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 30 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.ccleaner.com/go/app_po_surveyContinueDemoViewSleepingProgramsPopup/PerformanceOptimizer/
|
unknown
|
||
https://connect.facebook.net/signals/config/2679475345708101?v=2.9.176&r=stable&domain=www.ccleaner.com&hme=872f04a0547459b3285cb03b0d7a47bfde40628f4b386809918a621e2688602f&ex_m=70%2C121%2C107%2C111%2C61%2C4%2C100%2C69%2C16%2C97%2C89%2C51%2C54%2C172%2C175%2C187%2C183%2C184%2C186%2C29%2C101%2C53%2C77%2C185%2C167%2C170%2C180%2C181%2C188%2C131%2C41%2C189%2C190%2C34%2C143%2C15%2C50%2C195%2C194%2C133%2C18%2C40%2C1%2C43%2C65%2C66%2C67%2C71%2C93%2C17%2C14%2C96%2C92%2C91%2C108%2C52%2C110%2C39%2C109%2C30%2C94%2C26%2C168%2C171%2C140%2C86%2C56%2C84%2C33%2C73%2C0%2C95%2C32%2C28%2C82%2C83%2C88%2C47%2C46%2C87%2C37%2C11%2C12%2C13%2C6%2C7%2C25%2C22%2C23%2C57%2C62%2C64%2C75%2C102%2C27%2C76%2C9%2C8%2C80%2C48%2C21%2C104%2C103%2C105%2C98%2C10%2C20%2C3%2C38%2C74%2C19%2C5%2C90%2C81%2C44%2C35%2C85%2C2%2C36%2C63%2C42%2C106%2C45%2C79%2C68%2C112%2C60%2C59%2C31%2C99%2C58%2C55%2C49%2C78%2C72%2C24%2C113
|
157.240.196.15
|
||
https://www.ccleaner.com/business/ccleaner-business-edition
|
unknown
|
||
https://ccleaner.com/go/app_cc_license_agreement
|
unknown
|
||
https://ipm-provider.ff.avast.com/?action=1&p_elm=229&p_lng=en&p_lid=en-us&p_ads=1&p_devrsrch=1&p_thrdprt=1&p_thrdtr=1&p_midex=1F2CCAD3812656C4930608337C4FB4A5DA9202DE17AF565647702A83E3FCF3B0&p_hid=aa2c86aa-7fc5-4c8e-a69d-19a7dbc0b72a&p_ubs=50&p_trs=0&p_alp=0&p_jar=0&p_cclic=&p_chcc=0&p_bld=mmm_ccl_012_999_a8k_m&p_dols=0&p_sols=0&p_pts=0&p_ftc=0&p_btc=0&p_pro=90&p_vep=6&p_ves=30&p_vbd=11385&p_osv=10.0&p_wsc2v_av=9011&p_gksw=0&p_chr=0&p_sbi=0&p_scbu=0&p_tos=0&p_bau=0&p_dvt=3&p_bsls=0&p_gis=0&p_fds=172544&p_cco=0&p_ccgx=0&p_cce=1&p_cced=0&p_ccnsv=0&p_ccnu=0&p_ccna=0&p_ccnl=0&p_lit=0&p_avt=cc-pro-trial&p_wvv=117.0.2045.47&p_age=0&p_tcy=0&p_pct=0&p_jct=0&p_lex=-1&p_ccgd=0&p_ccod=0&p_ccdb=0&p_pctn=0&p_iau=0&p_qcm=0&p_hcm=1&p_sum=1&p_ost=0&p_scr=1&p_fid=20241124
|
34.111.24.1
|
||
https://brain.jumpshot.com/avast/ss/reportjumpshot_silentscanresults://https://brain.jumpshot.com/av
|
unknown
|
||
https://analytics.avcdn.net/om
|
unknown
|
||
https://www.avast.com/lp-ppc-nbu-fav-cc
|
unknown
|
||
https://sp.analytics.yahoo.com/sp.pl?a=10000&d=Sun%2C%2024%20Nov%202024%2011%3A15%3A25%20GMT&n=5&b=CCleaner%20v6.30.11385&.yp=10180940&f=https%3A%2F%2Fwww.ccleaner.com%2Fknowledge%2Fccleaner-v6-30-11385%3Fcv%3Dv6-30-11385&enc=UTF-8&yv=1.16.5&tagmgr=gtm%2Cadobe
|
54.246.144.89
|
||
https://aefd.nelreports.net/api/report?cat=bingaotak
|
unknown
|
||
https://deff.nelreports.net/api/report?cat=msn
|
unknown
|
||
https://sciter.com/docs/content/script/Array.htm
|
unknown
|
||
https://analytics.avcdn.net/(
|
unknown
|
||
https://www.ccleaner.com/docs/ccleaner/ccleaner-settings/choosing-which-cookies-to-keep
|
unknown
|
||
https://s-trackoff.avcdn.net/trackoff/8ad1526a87b9617cf6dd677cdf9f87a0e3fd1555b6a8828d87ec2bef2850fa
|
unknown
|
||
https://install.avcdn.net/avg/iavs9x/avg_internet_security_setup.exeASWSig2A123D026AE3BEAC0AC7D4DC35
|
unknown
|
||
https://analytics.twitter.com/i/adsct?bci=3&dv=America%2FNew_York%26en-US%2Cen%26Google%20Inc.%26Win32%26255%261280%261024%264%2624%261280%26984%260%26na&eci=2&event_id=f0466fac-a653-4a79-868b-04f8676bc357&events=%5B%5B%22pageview%22%2C%7B%7D%5D%5D&integration=advertiser&p_id=Twitter&p_user_id=0&pl_id=1bd174fb-a78f-4078-9437-448582031ffa&tw_document_href=https%3A%2F%2Fwww.ccleaner.com%2Fknowledge%2Fccleaner-v6-30-11385%3Fcv%3Dv6-30-11385&tw_iframe_status=0&tw_order_quantity=0&tw_sale_amount=0&txn_id=o4ls7&type=javascript&version=2.3.31
|
104.244.42.195
|
||
http://p%03d.sb.avast.com/V1/MD/avast_streambackraw_%03d://CommChannelAddr_StreambackGetBody
|
unknown
|
||
https://cdn.cookielaw.org/scripttemplates/6.36.0/assets/v2/otPcCenter.json
|
104.18.87.42
|
||
http://ccleaner.tools.avcdn.net/tools/ccleaner/update/20180205.dll
|
unknown
|
||
https://analytics.avcdn.net/S
|
unknown
|
||
http://p%03d.sb.avast.com/V1/MD/Do
|
unknown
|
||
https://honzik.avcdn.net/setup/avast-vpn/release/avast_vpn_online_setup.exeASWSig2A06FCDABA5742BE662
|
unknown
|
||
https://ipm-provider.ff.avast.com/?action=1&p_elm=0&p_lng=en&p_lid=en-us&p_ads=1&p_devrsrch=1&p_thrdprt=1&p_thrdtr=1&p_midex=1F2CCAD3812656C4930608337C4FB4A5DA9202DE17AF565647702A83E3FCF3B0&p_hid=aa2c86aa-7fc5-4c8e-a69d-19a7dbc0b72a&p_ubs=50&p_trs=0&p_alp=0&p_jar=0&p_cclic=&p_chcc=0&p_bld=mmm_ccl_012_999_a8k_m&p_dols=0&p_sols=0&p_pts=0&p_ftc=0&p_btc=0&p_pro=90&p_vep=6&p_ves=30&p_vbd=11385&p_osv=10.0&p_wsc2v_av=9011&p_gksw=0&p_chr=0&p_sbi=0&p_scbu=0&p_tos=0&p_bau=0&p_dvt=3&p_bsls=0&p_gis=0&p_fds=172544&p_cco=0&p_ccgx=0&p_cce=1&p_cced=0&p_ccnsv=0&p_ccnu=0&p_ccna=0&p_ccnl=0&p_lit=0&p_avt=cc-pro-trial&p_wvv=117.0.2045.47&p_age=0&p_tcy=0&p_pct=0&p_jct=0&p_lex=-1&p_ccgd=0&p_ccod=0&p_ccdb=0&p_pctn=0&p_iau=0&p_qcm=0&p_hcm=1&p_sum=1&p_ost=0&p_scr=1&p_fid=20241124
|
34.111.24.1
|
||
http://ncc.avast.com/ncc.txter
|
unknown
|
||
https://winqual.sb.avast.com
|
unknown
|
||
https://piriform.zendesk.com/hc/en-us/articles/218109957-How-do-I-manage-browser-plugins-
|
unknown
|
||
http://honzik.avcdn.net/setup/avast-tu/release/avast_cleanup_online_setup.exeASWSig2A4C1A1197A19B18F
|
unknown
|
||
http://files.avast.com/beta9x/avast_free_antivirus_setup_online.exeASWSig2A5549FF2866EA44F68D28FB2B1
|
unknown
|
||
https://winqual.sb.avast.com/V1/MD
|
35.190.209.22
|
||
https://oms.ccleaner.com/b/ss/symanteccom/1/JS-2.22.0-LDQM/s18539589585813?AQB=1&ndh=1&pf=1&t=24%2F10%2F2024%206%3A15%3A21%200%20300&sdid=4523341CF3BE0AEE-41D4D261AA724F9B&mid=86915098161613896303235469939112226982&aamlh=6&ce=UTF-8&pageName=ccleaner%3Aus%3Aknowledge%3Accleaner-v6-30-11385&g=https%3A%2F%2Fwww.ccleaner.com%2Fknowledge%2Fccleaner-v6-30-11385%3Fcv%3Dv6-30-11385&cc=USD&server=norton&events=event69&aamb=6G1ynYcLPuiQxYZrsz_pkqfLG9yMXBpb2zX5dvJdYQJzPXImdj0y&c2=us&c3=en&c8=D%3Dv163&c14=D%3Dv16&v18=ccleaner%3Aus%3Aknowledge%3Accleaner-v6-30-11385&v21=D%3Dc21&v27=D%3Dc2&v28=D%3Dc3&c35=D%3DpageName&c41=ccleaner&v41=D%3Dc41&c46=html&c47=page&v47=s_code_norton%202024-10-07&c48=CCleaner%20v6.30.11385&v48=D%3Dc49&c49=knowledge&v49=D%3Dc48&v57=86915098161613896303235469939112226982&c59=ccleaner%3Aknowledge%3Accleaner-v6-30-11385&v59=D%3Dc59&v72=ccleaner&c75=D%3Dv57&v96=https%3A%2F%2Fwww.ccleaner.com%2Fknowledge%2Fccleaner-v6-30-11385&v164=ccleaner%3A999_a&s=1280x1024&c=24&j=1.6&v=N&k=Y&bw=1034&bh=870&mcorgid=67C716D751E567F70A490D4C%40AdobeOrg&AQE=1
|
63.140.62.27
|
||
https://license.piriform.com/0
|
unknown
|
||
https://s-trackoff.avcdn.net/avg/trackoff/7854df286ff1c4e1f4d81d466f4a1b0243b39837ac99c5b98817907f76
|
unknown
|
||
https://install.avcdn.net/beta9x/avast_pro_antivirus_setup_online.exeASWSig2A579D90FED0C6441EE7B258F
|
unknown
|
||
https://shepherd.ff.avast.com/?p_vep=6&p_ves=30&p_vbd=11385&p_lit=0&p_midex=1F2CCAD3812656C493060833
|
unknown
|
||
https://c5.adalyser.com/adalyser.js?cid=ccleaner
|
52.209.8.105
|
||
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
|
unknown
|
||
http://www.ccleaner.com/go/app_releasenotes?p=1&v=&l=1033&b=1&a=0
|
unknown
|
||
https://license.piriform.com//
|
unknown
|
||
http://emupdate.avcdn.net/
|
unknown
|
||
http://p%03d.sb.avast.com/V1/PD/Do
|
unknown
|
||
https://license.piriform.com/product/v1/installcheck?p=1&v=6.30.11385&vx=&l=1033&b=1&o=10W6&g=0&i=1&
|
unknown
|
||
https://winqual.sb.avast.com/.MD
|
unknown
|
||
https://www.facebook.com/tr/?id=2679475345708101&ev=PageView&dl=https%3A%2F%2Fwww.ccleaner.com%2Fknowledge%2Fccleaner-v6-30-11385%3Fcv%3Dv6-30-11385&rl=&if=false&ts=1732446936663&sw=1280&sh=1024&v=2.9.176&r=stable&ec=0&o=4126&fbp=fb.1.1732446936660.65224446665965545&cs_est=true&ler=empty&cdl=API_unavailable&it=1732446935268&coo=false&dpo=&tm=1&rqm=GET
|
157.240.196.35
|
||
https://sciter.com/forums/topic/plus-custom-output-formatter-wont-work-if-they-are-written-in-htm/#p
|
unknown
|
||
https://www.ccleaner.com/go/app_cc_help_preloading
|
unknown
|
||
https://ccleaner.com/go/app_cc_privacy_data_factsheet
|
unknown
|
||
https://ipm-provider.ff.avast.com/?p_elm=76&action=1&p_age=0&p_bau=0&p_bsls=0&p_chcc=2&p_chr=0&p_dvt
|
unknown
|
||
https://openid.avg.commy-devices.avast.comalpha-rollout-service.ff.avast.comhttps://openid.avast.com
|
unknown
|
||
http://emupdate.avcdn.net/files/emupdate/pong.txts
|
unknown
|
||
https://honzik.avcdn.net/setup/avast-bs/beta/avast_battery_saver_online_setup.exeASWSig2A3A3BE3789E6
|
unknown
|
||
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLCopyright
|
unknown
|
||
https://tr.outbrain.com/cachedClickId?marketerId=001ac0827d67b7b38319c9517e7fa2f4cc
|
172.179.182.7
|
||
http://ccleaner.tools.avcdn.net/tools/ccleaner/update
|
unknown
|
||
https://brain.jumpshot.com/avast/ss/jumpshot_silentscanresults2://https://brain.jumpshot.com/avast/s
|
unknown
|
||
https://honzik.avcdn.net/setup/avast-bg/release/avast_breach_guard_online_setup.exeASWSig2A2457920CE
|
unknown
|
||
http://www.ccleaner.com/ccleaner
|
unknown
|
||
http://www.ccleaner.com/inapp/notificationsContent-Type:
|
unknown
|
||
https://viruslab-samples.sb.avast.com
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
|
unknown
|
||
http://emupdate.avcdn.net/files/emupdate/pong.txt32.dll
|
unknown
|
||
http://www.zkysky.com.ar/This
|
unknown
|
||
https://analytics.avcdn.net/dll
|
unknown
|
||
https://driver-updater.ff.avast.com/api/v1/scanDrivers/
|
34.149.202.126
|
||
https://service.piriform.com/installcheck.aspx5.70.7909PrefsPrivacyShareData1stParty
|
unknown
|
||
https://aefd.nelreports.net/api/report?cat=bingrms
|
unknown
|
||
https://dpm.demdex.net/ibs:dpid=411&dpuuid=Z0MKzAAAAHGmGQO-
|
54.229.91.192
|
||
https://static.hotjar.com/c/hotjar-857043.js?sv=6
|
18.66.102.106
|
||
https://cdn.cookielaw.org/scripttemplates/6.36.0/assets/otCommonStyles.css
|
104.18.87.42
|
||
https://shepherd.ff.avast.com/?p_lng=en&p_lid=en-us&p_ads=1&p_devrsrch=1&p_thrdprt=1&p_thrdtr=1&p_midex=1F2CCAD3812656C4930608337C4FB4A5DA9202DE17AF565647702A83E3FCF3B0&p_hid=aa2c86aa-7fc5-4c8e-a69d-19a7dbc0b72a&p_ubs=50&p_trs=0&p_alp=0&p_jar=0&p_cclic=&p_chcc=0&p_bld=mmm_ccl_012_999_a8k_m&p_dols=0&p_sols=0&p_pts=0&p_ftc=0&p_btc=0&p_pro=90&p_vep=6&p_ves=30&p_vbd=11385&p_osv=10.0&p_wsc2v_av=9011&p_gksw=0&p_chr=0&p_sbi=0&p_scbu=0&p_tos=0&p_bau=0&p_dvt=3&p_bsls=0&p_gis=0&p_fds=172544&p_cco=0&p_ccgx=0&p_cce=1&p_cced=0&p_ccnsv=0&p_ccnu=0&p_ccna=0&p_ccnl=0&p_lit=0&p_avt=cc-pro-trial&p_wvv=117.0.2045.47&p_age=0&p_tcy=0&p_pct=0&p_jct=0
|
34.160.176.28
|
||
https://honzik.avcdn.net/setup/avast-bs/release/avast_battery_saver_online_setup.exeASWSig2A072492C0
|
unknown
|
||
https://cdn.cookielaw.org/scripttemplates/otSDKStub.js
|
104.18.87.42
|
||
https://ip-info.ff.avast.com/v2/info
|
34.111.175.102
|
||
http://www.ccleaner.com/go/app_privacy?p=1&l=
|
unknown
|
||
https://shepherd.ff.avast.com/Mozilla/4.0
|
unknown
|
||
http://keys.backup.norton.com
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://www.ccleaner.com/go/app_du_systemrestoreinfo
|
unknown
|
||
http://www.gimp.org/xmp/
|
unknown
|
||
https://s.yimg.com/wi/ytc.js
|
87.248.114.12
|
||
https://analytics.avcdn.net:443/receive3
|
unknown
|
||
http://www.avast.com0/
|
unknown
|
||
https://service.piriform.com/a
|
unknown
|
||
https://analytics.avcdn.net/receive3
|
34.117.223.223
|
||
https://www.ccleaner.com/go/app_du_survey
|
unknown
|
||
https://c5.adalyser.com/tracking/track/v3/p?stm=1732446933112&e=lce1&url=https%3A%2F%2Fwww.ccleaner.com%2Fknowledge%2Fccleaner-v6-30-11385%3Fcv%3Dv6-30-11385&cid=ccleaner&p=%7B%22et%22%3A1732446933109%2C%22nr%22%3A%22New%22%2C%22cg%22%3A%22Direct%22%2C%22dt%22%3A%22desktop%22%2C%22so%22%3A%22direct%22%2C%22me%22%3A%22none%22%2C%22ca%22%3A%22direct%22%2C%22co%22%3A%22(not%20set)%22%2C%22ke%22%3A%22(not%20set)%22%2C%22vid%22%3A%221%22%2C%22sid%22%3A%221b678712-0cc8-486d-89d0-05e165f88b18%22%2C%22duid%22%3A%226a43d717-b772-42a5-badd-e897920af092%22%2C%22cw%22%3A1732446933109%7D&userAgent=Mozilla%2F5.0%20(Windows%20NT%2010.0%3B%20Win64%3B%20x64)%20AppleWebKit%2F537.36%20(KHTML%2C%20like%20Gecko)%20Chrome%2F117.0.0.0%20Safari%2F537.36&domain=www.ccleaner.com
|
52.209.8.105
|
||
https://secure.ccleaner.com/502/uurl-90zu4qtn5p?x-source=833
|
unknown
|
||
https://www.facebook.com/privacy_sandbox/pixel/register/trigger/?id=2679475345708101&ev=PageView&dl=https%3A%2F%2Fwww.ccleaner.com%2Fknowledge%2Fccleaner-v6-30-11385%3Fcv%3Dv6-30-11385&rl=&if=false&ts=1732446936663&sw=1280&sh=1024&v=2.9.176&r=stable&ec=0&o=4126&fbp=fb.1.1732446936660.65224446665965545&cs_est=true&ler=empty&cdl=API_unavailable&it=1732446935268&coo=false&dpo=&tm=1&rqm=FGET
|
157.240.196.35
|
||
http://ccleaner.tools.avcdn.net/tools/ccleaner/update/updates.xml
|
unknown
|
||
http://domrep.ff.avast.com/http://api.webrep.avast.com/avast_webrepapi://http://ui.ff.avast.com/avas
|
unknown
|
||
https://shepherd.ff.avast.com/
|
unknown
|
||
https://ipm-provider.ff.avast.com/?p_elm=76&action=1&p_age=0&p_bau=0&p_bsls=0&p_chcc=2&p_chr=0&p_dvt=3&p_fds=172544&p_gis=0&p_hid=aa2c86aa-7fc5-4c8e-a69d-19a7dbc0b72a&p_lid=en-CH&p_lng=en&p_midex=1F2CCAD3812656C4930608337C4FB4A5DA9202DE17AF565647702A83E3FCF3B0&p_osv=10.0&p_pro=90&p_sbi=0&p_scbu=0&p_tos=0&p_vbd=11385&p_vep=6&p_ves=30&p_wid=1675281926
|
34.111.24.1
|
||
https://ip-info.ff.avast.com/v1/info
|
34.111.175.102
|
||
http://%s:%d;https=https://%s:%dHTTP/1.0%u.%u.%u.%u01234567890123456789abcdef0123456789ABCDEFCONOUT$
|
unknown
|
||
https://service.piriform.com/installcheck.aspx?p=1&v=6.30.11385&vx=&l=1033&b=1&o=10W6&g=0&i=1&a=0&e=
|
unknown
|
||
http://www.ccleaner.com/go/app_license?p=1&l=
|
unknown
|
||
http://www.ccleaner.com/go/app_license?p=1&l=1033&a=0
|
unknown
|
||
https://install.avcdn.net/iavs9x/avast_free_antivirus_setup_online.exeASWSig2A2EC0971AB07DE15C30023C
|
unknown
|
||
http://ccleaner.tools.avcdn.net/
|
unknown
|
||
https://honzik.avcdn.net/setup/avg-bg/release/avg_breach_guard_online_setup.exeASWSig2A14AA13983E189
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-info-gcp.ff.avast.com
|
34.111.175.102
|
||
dev.visualwebsiteoptimizer.com
|
34.96.102.137
|
||
platform.twitter.map.fastly.net
|
146.75.120.157
|
||
spdc-global.pbp.gysm.yahoodns.net
|
54.246.144.89
|
||
stats.g.doubleclick.net
|
66.102.1.155
|
||
adobetarget.data.adobedc.net
|
66.235.152.221
|
||
scontent.xx.fbcdn.net
|
157.240.196.15
|
||
idsync.rlcdn.com
|
35.244.154.8
|
||
t.co
|
172.66.0.227
|
||
script.hotjar.com
|
13.33.187.74
|
||
peso-1422535133.eu-west-1.elb.amazonaws.com
|
52.209.8.105
|
||
www.google.com
|
142.250.181.68
|
||
dcs-public-edge-irl1-150041215.eu-west-1.elb.amazonaws.com
|
54.229.91.192
|
||
2w99epxhne.data.adobedc.net
|
63.140.62.27
|
||
mstatic.ccleaner.com
|
20.50.2.53
|
||
static-cdn.hotjar.com
|
18.66.102.106
|
||
star-mini.c10r.facebook.com
|
157.240.196.35
|
||
ipm-gcp-prod.ff.avast.com
|
34.111.24.1
|
||
s.twitter.com
|
104.244.42.195
|
||
wndc1.outbrain.org
|
172.179.182.7
|
||
analytics-prod-gcp.ff.avast.com
|
34.117.223.223
|
||
ax-0001.ax-msedge.net
|
150.171.27.10
|
||
streamback-cl1.ns1.ff.avast.com
|
35.190.209.22
|
||
analytics-alv.google.com
|
216.239.36.181
|
||
shepherd-gcp.ff.avast.com
|
34.160.176.28
|
||
dcjdc5qmbbux7.cloudfront.net
|
108.158.75.13
|
||
td.doubleclick.net
|
172.217.19.2
|
||
driver-updater-gcp.ff.avast.com
|
34.149.202.126
|
||
cdn.cookielaw.org
|
104.18.87.42
|
||
geolocation.onetrust.com
|
172.64.155.119
|
||
edge.gycpi.b.yahoodns.net
|
87.248.114.12
|
||
static.ads-twitter.com
|
unknown
|
||
amplify.outbrain.com
|
unknown
|
||
license.piriform.com
|
unknown
|
||
emupdate.avcdn.net
|
unknown
|
||
siteintercept.qualtrics.com
|
unknown
|
||
cm.everesttech.net
|
unknown
|
||
ipm-provider.ff.avast.com
|
unknown
|
||
driver-updater.ff.avast.com
|
unknown
|
||
oms.ccleaner.com
|
unknown
|
||
wave.outbrain.com
|
unknown
|
||
static.hotjar.com
|
unknown
|
||
trial-eum-clientnsv4-s.akamaihd.net
|
unknown
|
||
c5.adalyser.com
|
unknown
|
||
8-46-123-75_s-2-20-68-230_ts-1732446949-clienttons-s.akamaihd.net
|
unknown
|
||
assets.adobedtm.com
|
unknown
|
||
trial-eum-clienttons-s.akamaihd.net
|
unknown
|
||
winqual.sb.avast.com
|
unknown
|
||
connect.facebook.net
|
unknown
|
||
px.ads.linkedin.com
|
unknown
|
||
ipmcdn.avast.com
|
unknown
|
||
symantec.demdex.net
|
unknown
|
||
684d0d45.akstat.io
|
unknown
|
||
s.yimg.com
|
unknown
|
||
service.piriform.com
|
unknown
|
||
download.avira.com
|
unknown
|
||
www.mczbf.com
|
unknown
|
||
sp.analytics.yahoo.com
|
unknown
|
||
s.go-mpulse.net
|
unknown
|
||
symantec.tt.omtrdc.net
|
unknown
|
||
shepherd.ff.avast.com
|
unknown
|
||
cdn-production.ccleaner.com
|
unknown
|
||
www.nortonlifelock.com
|
unknown
|
||
analytics.avcdn.net
|
unknown
|
||
dpm.demdex.net
|
unknown
|
||
s1.pir.fm
|
unknown
|
||
analytics.ff.avast.com
|
unknown
|
||
www.facebook.com
|
unknown
|
||
www.linkedin.com
|
unknown
|
||
baxhwsyxgzi4uz2dblsq-p08v2f-49ff2084c-clientnsv4-s.akamaihd.net
|
unknown
|
||
ncc.avast.com
|
unknown
|
||
zn4i1jhjmxub1nc6y-gendigital.siteintercept.qualtrics.com
|
unknown
|
||
cdn-uat.ccleaner.com
|
unknown
|
||
analytics.twitter.com
|
unknown
|
||
snap.licdn.com
|
unknown
|
||
ccleaner.tools.avcdn.net
|
unknown
|
||
www.ccleaner.com
|
unknown
|
||
analytics.google.com
|
unknown
|
||
ip-info.ff.avast.com
|
unknown
|
||
c.go-mpulse.net
|
unknown
|
||
tr.outbrain.com
|
unknown
|
There are 71 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
34.111.24.1
|
ipm-gcp-prod.ff.avast.com
|
United States
|
||
35.244.154.8
|
idsync.rlcdn.com
|
United States
|
||
192.168.2.5
|
unknown
|
unknown
|
||
66.102.1.155
|
stats.g.doubleclick.net
|
United States
|
||
104.18.32.137
|
unknown
|
United States
|
||
66.235.152.221
|
adobetarget.data.adobedc.net
|
United States
|
||
52.209.8.105
|
peso-1422535133.eu-west-1.elb.amazonaws.com
|
United States
|
||
162.159.140.229
|
unknown
|
United States
|
||
104.18.87.42
|
cdn.cookielaw.org
|
United States
|
||
34.149.202.126
|
driver-updater-gcp.ff.avast.com
|
United States
|
||
63.140.62.17
|
unknown
|
United States
|
||
172.64.155.119
|
geolocation.onetrust.com
|
United States
|
||
34.253.40.242
|
unknown
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
52.50.80.142
|
unknown
|
United States
|
||
63.34.142.90
|
unknown
|
United States
|
||
146.75.120.157
|
platform.twitter.map.fastly.net
|
Sweden
|
||
54.246.144.89
|
spdc-global.pbp.gysm.yahoodns.net
|
United States
|
||
157.240.196.35
|
star-mini.c10r.facebook.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
20.50.2.53
|
mstatic.ccleaner.com
|
United States
|
||
18.66.102.106
|
static-cdn.hotjar.com
|
United States
|
||
63.140.62.27
|
2w99epxhne.data.adobedc.net
|
United States
|
||
172.179.182.7
|
wndc1.outbrain.org
|
United States
|
||
142.250.181.68
|
www.google.com
|
United States
|
||
34.96.102.137
|
dev.visualwebsiteoptimizer.com
|
United States
|
||
34.111.175.102
|
ip-info-gcp.ff.avast.com
|
United States
|
||
216.239.36.181
|
analytics-alv.google.com
|
United States
|
||
35.190.209.22
|
streamback-cl1.ns1.ff.avast.com
|
United States
|
||
54.229.91.192
|
dcs-public-edge-irl1-150041215.eu-west-1.elb.amazonaws.com
|
United States
|
||
172.217.19.2
|
td.doubleclick.net
|
United States
|
||
108.158.75.13
|
dcjdc5qmbbux7.cloudfront.net
|
United States
|
||
104.244.42.3
|
unknown
|
United States
|
||
104.244.42.195
|
s.twitter.com
|
United States
|
||
34.160.176.28
|
shepherd-gcp.ff.avast.com
|
United States
|
||
150.171.27.10
|
ax-0001.ax-msedge.net
|
United States
|
||
34.117.223.223
|
analytics-prod-gcp.ff.avast.com
|
United States
|
||
87.248.114.12
|
edge.gycpi.b.yahoodns.net
|
United Kingdom
|
||
13.33.187.74
|
script.hotjar.com
|
United States
|
||
157.240.196.15
|
scontent.xx.fbcdn.net
|
United States
|
||
172.66.0.227
|
t.co
|
United States
|
There are 31 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
SystemRestorePointCreationFrequency
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)TTL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)TTL-Spread
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)AU2
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)AUTNV
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)AlphaIntegration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)AlphaMigration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)CCAM
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)CCNU
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)CCT
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DUSkipOnboarding
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DriverScanInterval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DriverUpdater
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DriverUpdaterVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DumpReporting
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)GDDEBUG
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HCAddResults
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HCDirectCart
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HCResolveBtn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HCSkipAdvanced
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HealthCheck
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HealthCheckIpm
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HealthCheckNF
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HealthCheckVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HideRegistry
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)NotificationCentre
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)OPSWATSoftwareUpdater
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)OPSWATSoftwareUpdaterHC
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PC
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PCCU
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PCCUD
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PENP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)POSkipOnboarding
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PTOOF
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PerformanceOptimizerVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PrivacyPolicyDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)ProFeatureCounters
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)QuickCleanIpm
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)REU
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)SPERDI
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)SRDI
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)SUExclusions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)ShowOffers3rdParty
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)SoftwareUpdater
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)SoftwareUpdaterIpm
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)Survey-Uninstall
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)TrialOnboarding
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)UpgradeButtonAppearance
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WUF
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WV2C
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WV2I
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WV2ID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WV2T
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WV2U
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WelcomeScreen
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)CCPOC
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DTNP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DUNP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)LastUpdate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)TTL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)TTL-Spread
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)AU2
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)AUTNV
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)AlphaIntegration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)AlphaMigration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)CCAM
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)CCNU
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)CCT
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DUSkipOnboarding
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DriverScanInterval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DriverUpdater
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DriverUpdaterVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DumpReporting
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)GDDEBUG
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HCAddResults
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HCDirectCart
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HCResolveBtn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HCSkipAdvanced
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HealthCheck
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HealthCheckIpm
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HealthCheckNF
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HealthCheckVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HideRegistry
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)NotificationCentre
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)OPSWATSoftwareUpdater
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)OPSWATSoftwareUpdaterHC
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PC
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PCCU
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PCCUD
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PENP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)POSkipOnboarding
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PTOOF
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PerformanceOptimizerVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PrivacyPolicyDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)ProFeatureCounters
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)QuickCleanIpm
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)REU
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)SPERDI
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)SRDI
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)SUExclusions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)ShowOffers3rdParty
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)SoftwareUpdater
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)SoftwareUpdaterIpm
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)Survey-Uninstall
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)TrialOnboarding
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)UpgradeButtonAppearance
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WUF
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WV2C
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WV2I
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WV2ID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WV2T
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WV2U
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WelcomeScreen
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)CCPOC
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DTNP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DUNP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)LastUpdate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shell\Run CCleaner\command
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shell\Open CCleaner...\command
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
GD
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\cclaunch
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\cclaunch
|
URL Protocol
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\cclaunch\shell
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\cclaunch\shell\open
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\cclaunch\shell\open\command
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\ccleaner.exe
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\ccleaner.exe
|
Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
DataFolder
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
ProgramFolder
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CCleaner
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CCleaner
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CCleaner
|
Publisher
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
FirstInstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CCleaner
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CCleaner
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CCleaner
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CCleaner
|
FTUEX
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CCleaner
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CCleaner
|
DisplayIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
AcqSrc
|
||
HKEY_USERS.DEFAULT\Software\Piriform\CCleaner
|
AutoICS
|
||
HKEY_USERS.DEFAULT\Software\Piriform\CCleaner
|
Brandover
|
||
HKEY_USERS.DEFAULT\Software\Piriform\CCleaner
|
AcqSrc
|
||
HKEY_USERSS-1-5-19\SOFTWARE\Piriform\CCleaner
|
Brandover
|
||
HKEY_USERSS-1-5-19\SOFTWARE\Piriform\CCleaner
|
AcqSrc
|
||
HKEY_USERSS-1-5-20\SOFTWARE\Piriform\CCleaner
|
AutoICS
|
||
HKEY_USERSS-1-5-20\SOFTWARE\Piriform\CCleaner
|
AcqSrc
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
AutoICS
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
AcqSrc
|
||
HKEY_CURRENT_USER_Classes\Software\Piriform\CCleaner
|
AutoICS
|
||
HKEY_CURRENT_USER_Classes\Software\Piriform\CCleaner
|
Brandover
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
Language
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
|
GlobalAssocChangedCounter
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\partmgr
|
EnableCounterForIoctl
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
SkipUAC
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
Patches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
LastAppliedPatchId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner\properties
|
UseRegistry
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
DAST
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
T8062
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
HomeScreen
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
DefaultDetailedView
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
CheckTrialOffer
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
UpdateBackground
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
AlphaLSLUT
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
DUGuid
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\1D0EC6DE-4A80-4CC3-A335-E6E41C951198
|
144807F0-DE37-4C62-9C05-EB4CC64A7A2F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F
|
56C7A9DA-4B11-406A-8B1A-EFF157C294D6
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\1D0EC6DE-4A80-4CC3-A335-E6E41C951198
|
5FD38555-4B16-40AE-9A09-E2C969CB74AF
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F
|
7CCD586D-2ABC-42FF-A23B-3731F4F183D9
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\1D0EC6DE-4A80-4CC3-A335-E6E41C951198
|
8C5CFDF4-AB05-4EB0-8EF6-7B4620DC2CF3
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F
|
5E1D6A55-0134-486E-A166-38C2E4919BB1
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
FTU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
LatestICS
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
CookiesToSave
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
RunICS
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
LTR
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
UpdateKey
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
ServiceUseReporting
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
ServiceUseDebugLogging
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
LastDriverScan
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
NumOfOutdatedDrivers
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
OutdatedDriversCache
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
UpToDateDriversCache
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
StateSig
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)TTL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)TTL-Spread
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)AU2
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)AUTNV
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)AlphaIntegration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)AlphaMigration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)CCAM
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)CCNU
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)CCT
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DUSkipOnboarding
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DriverScanInterval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DriverUpdater
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DriverUpdaterVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DumpReporting
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)GDDEBUG
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HCAddResults
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HCDirectCart
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HCResolveBtn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HCSkipAdvanced
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HealthCheck
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HealthCheckIpm
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HealthCheckNF
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HealthCheckVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HideRegistry
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)NotificationCentre
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)OPSWATSoftwareUpdater
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)OPSWATSoftwareUpdaterHC
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PC
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PCCU
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PCCUD
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PENP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)POSkipOnboarding
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PTOOF
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PerformanceOptimizerVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PrivacyPolicyDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)ProFeatureCounters
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)QuickCleanIpm
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)REU
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)SPERDI
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)SRDI
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)SUExclusions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)ShowOffers3rdParty
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)SoftwareUpdater
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)SoftwareUpdaterIpm
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)Survey-Uninstall
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)TrialOnboarding
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)UpgradeButtonAppearance
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WUF
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WV2C
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WV2I
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WV2ID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WV2T
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WV2U
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WelcomeScreen
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)CCPOC
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DTNP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DUNP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
LastCleaningScan
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
AmountToClean
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
NumOfItemsToClean
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
AlphaLSLUT
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
LastCheckCountry
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
LastPOScan
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)LastUpdate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)TTL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)TTL-Spread
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)AU2
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)AUTNV
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)AlphaIntegration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)AlphaMigration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)CCAM
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)CCNU
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)CCT
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DUSkipOnboarding
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DriverScanInterval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DriverUpdater
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DriverUpdaterVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DumpReporting
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)GDDEBUG
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HCAddResults
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HCDirectCart
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HCResolveBtn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HCSkipAdvanced
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HealthCheck
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HealthCheckIpm
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HealthCheckNF
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HealthCheckVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)HideRegistry
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)NotificationCentre
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)OPSWATSoftwareUpdater
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)OPSWATSoftwareUpdaterHC
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PC
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PCCU
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PCCUD
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PENP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)POSkipOnboarding
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PTOOF
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PerformanceOptimizerVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)PrivacyPolicyDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)ProFeatureCounters
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)QuickCleanIpm
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)REU
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)SPERDI
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)SRDI
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)SUExclusions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)ShowOffers3rdParty
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)SoftwareUpdater
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)SoftwareUpdaterIpm
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)Survey-Uninstall
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)TrialOnboarding
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)UpgradeButtonAppearance
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WUF
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WV2C
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WV2I
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WV2ID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WV2T
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WV2U
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)WelcomeScreen
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)CCPOC
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DTNP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)DUNP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
LastPOScan
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
NumOfAwakeSoftware
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
ActiveProgramsToSleepCache
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
FTU
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
AlphaLSLUT
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
AlphaLSLUT
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
CookiesToSave
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
LastDriverScan
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
StateSig
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
LastCheckCountry
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
|
(Cfg)LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
LastCleaningScan
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
AmountToClean
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
NumOfItemsToClean
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
CCleaner Smart Cleaning
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
SystemMonitoring
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
CountryCode
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
LastCheckCountry
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
AlphaLSLUT
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
AlphaLSLUT
|
||
HKEY_USERSS-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
|
OneDriveSetup
|
||
HKEY_USERSS-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
|
OneDriveSetup
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
|
MicrosoftEdgeAutoLaunch_AA501BBC086EBD358E626B900A322692
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
|
CCleaner Smart Cleaning
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
AlphaLSLUT
|
||
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
|
AlphaLSLUT
|
There are 495 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1479DB6B000
|
heap
|
page read and write
|
||
1479CAF6000
|
heap
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
14794623000
|
heap
|
page read and write
|
||
6A165000
|
unkown
|
page write copy
|
||
549B000
|
heap
|
page read and write
|
||
1479C9F0000
|
trusted library allocation
|
page read and write
|
||
5F3F000
|
heap
|
page read and write
|
||
6C4C000
|
heap
|
page read and write
|
||
7FF7D8069000
|
unkown
|
page read and write
|
||
7FF7D7C78000
|
unkown
|
page write copy
|
||
283DFEA9000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
283E0160000
|
trusted library allocation
|
page read and write
|
||
22E6AD40000
|
trusted library allocation
|
page read and write
|
||
1479D430000
|
trusted library allocation
|
page read and write
|
||
9DA000
|
heap
|
page read and write
|
||
1479440E000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
283DF988000
|
heap
|
page read and write
|
||
9DE000
|
heap
|
page read and write
|
||
7FF7D8528000
|
unkown
|
page readonly
|
||
45A000
|
unkown
|
page read and write
|
||
6E77000
|
trusted library allocation
|
page read and write
|
||
5F21000
|
heap
|
page read and write
|
||
7FF66A23A000
|
unkown
|
page readonly
|
||
22E67CB0000
|
trusted library allocation
|
page read and write
|
||
1D24E8B0000
|
heap
|
page read and write
|
||
7680000
|
trusted library allocation
|
page read and write
|
||
7745000
|
trusted library allocation
|
page read and write
|
||
7730000
|
trusted library allocation
|
page read and write
|
||
7FF7D7CB6000
|
unkown
|
page write copy
|
||
6E78000
|
trusted library allocation
|
page read and write
|
||
14794A50000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
283DC520000
|
trusted library allocation
|
page read and write
|
||
283E0A21000
|
trusted library allocation
|
page read and write
|
||
3DEF000
|
heap
|
page read and write
|
||
7FF7D7CC7000
|
unkown
|
page write copy
|
||
324C6FB000
|
stack
|
page read and write
|
||
D21000
|
unkown
|
page execute read
|
||
283E0A4F000
|
trusted library allocation
|
page read and write
|
||
283E0A39000
|
trusted library allocation
|
page read and write
|
||
5EF5000
|
heap
|
page read and write
|
||
7FF66A217000
|
unkown
|
page read and write
|
||
283DFED8000
|
heap
|
page read and write
|
||
197BD8CA000
|
heap
|
page read and write
|
||
7FF7D7CB6000
|
unkown
|
page write copy
|
||
1478B58B000
|
heap
|
page read and write
|
||
7FF7D7C93000
|
unkown
|
page write copy
|
||
1270000
|
heap
|
page read and write
|
||
22E67CB0000
|
trusted library allocation
|
page read and write
|
||
773E000
|
trusted library allocation
|
page read and write
|
||
1D98000
|
unkown
|
page read and write
|
||
6C7A000
|
heap
|
page read and write
|
||
283E8AC0000
|
trusted library allocation
|
page read and write
|
||
7FF7D7CBA000
|
unkown
|
page write copy
|
||
7FF7D82E1000
|
unkown
|
page readonly
|
||
1479482F000
|
heap
|
page read and write
|
||
283DC024000
|
heap
|
page read and write
|
||
3DB5000
|
heap
|
page read and write
|
||
6C00000
|
heap
|
page read and write
|
||
508C000
|
heap
|
page read and write
|
||
197BD8CA000
|
heap
|
page read and write
|
||
3ED7000
|
heap
|
page read and write
|
||
283E0160000
|
trusted library allocation
|
page read and write
|
||
283DFAD3000
|
heap
|
page read and write
|
||
5F2D000
|
heap
|
page read and write
|
||
1479D3CD000
|
trusted library allocation
|
page read and write
|
||
6BF6000
|
heap
|
page read and write
|
||
283E8BA0000
|
trusted library allocation
|
page read and write
|
||
1479531F000
|
trusted library allocation
|
page read and write
|
||
7FF661996000
|
unkown
|
page write copy
|
||
22E65820000
|
trusted library allocation
|
page read and write
|
||
6E77000
|
trusted library allocation
|
page read and write
|
||
6C0C000
|
heap
|
page read and write
|
||
7FF7D827C000
|
unkown
|
page readonly
|
||
1479D450000
|
trusted library allocation
|
page read and write
|
||
3ECF000
|
heap
|
page read and write
|
||
7FF7D7CB4000
|
unkown
|
page write copy
|
||
7E052FE000
|
stack
|
page read and write
|
||
7740000
|
trusted library allocation
|
page read and write
|
||
1A43424D000
|
heap
|
page read and write
|
||
7FF7D82E1000
|
unkown
|
page readonly
|
||
7FF7D827F000
|
unkown
|
page readonly
|
||
197BE450000
|
heap
|
page read and write
|
||
3DDD000
|
heap
|
page read and write
|
||
283D90B0000
|
trusted library allocation
|
page read and write
|
||
3F01000
|
heap
|
page read and write
|
||
1479D3C0000
|
trusted library allocation
|
page read and write
|
||
1479D3AB000
|
trusted library allocation
|
page read and write
|
||
5DE1000
|
heap
|
page read and write
|
||
1478E382000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
7E057FE000
|
stack
|
page read and write
|
||
283DC4D0000
|
trusted library allocation
|
page read and write
|
||
1479D500000
|
trusted library allocation
|
page read and write
|
||
3DF8000
|
heap
|
page read and write
|
||
3DB2000
|
heap
|
page read and write
|
||
3DB2000
|
heap
|
page read and write
|
||
6D3B000
|
heap
|
page read and write
|
||
79A0000
|
trusted library allocation
|
page read and write
|
||
D0B000
|
heap
|
page read and write
|
||
99F000
|
heap
|
page read and write
|
||
1D24E872000
|
heap
|
page read and write
|
||
6E97000
|
trusted library allocation
|
page read and write
|
||
283E0A3F000
|
trusted library allocation
|
page read and write
|
||
283DC531000
|
trusted library allocation
|
page read and write
|
||
1479215C000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
1479533F000
|
trusted library allocation
|
page read and write
|
||
5F07000
|
heap
|
page read and write
|
||
7FF7D7C78000
|
unkown
|
page write copy
|
||
40A000
|
unkown
|
page read and write
|
||
14795310000
|
trusted library allocation
|
page read and write
|
||
5F43000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
1479C843000
|
trusted library allocation
|
page read and write
|
||
5F46000
|
heap
|
page read and write
|
||
283E8BD0000
|
trusted library allocation
|
page read and write
|
||
1478DA80000
|
trusted library allocation
|
page read and write
|
||
197BD8CA000
|
heap
|
page read and write
|
||
1478CF7B000
|
heap
|
page read and write
|
||
6017000
|
heap
|
page read and write
|
||
6E88000
|
trusted library allocation
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
1478DA80000
|
trusted library allocation
|
page read and write
|
||
14794431000
|
heap
|
page read and write
|
||
1C034C20000
|
trusted library allocation
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
1478CEEE000
|
heap
|
page read and write
|
||
5FF8000
|
heap
|
page read and write
|
||
20C7000
|
unkown
|
page readonly
|
||
197BD840000
|
heap
|
page read and write
|
||
9B0000
|
unkown
|
page readonly
|
||
76F0000
|
trusted library allocation
|
page read and write
|
||
1479D4C0000
|
trusted library allocation
|
page read and write
|
||
1BE2000
|
unkown
|
page write copy
|
||
283E8A20000
|
trusted library allocation
|
page read and write
|
||
6C85000
|
heap
|
page read and write
|
||
1478D4E0000
|
trusted library allocation
|
page read and write
|
||
47E9000
|
heap
|
page read and write
|
||
283DC4E0000
|
trusted library allocation
|
page read and write
|
||
3E37000
|
heap
|
page read and write
|
||
197BBFA4000
|
heap
|
page read and write
|
||
A6F000
|
unkown
|
page read and write
|
||
1479D410000
|
trusted library allocation
|
page read and write
|
||
7FF7D7CB6000
|
unkown
|
page write copy
|
||
3DFE000
|
heap
|
page read and write
|
||
3E27000
|
heap
|
page read and write
|
||
6E78000
|
trusted library allocation
|
page read and write
|
||
3EDE000
|
heap
|
page read and write
|
||
3EBB000
|
heap
|
page read and write
|
||
283DF996000
|
heap
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
1D24E89C000
|
heap
|
page read and write
|
||
6B485000
|
unkown
|
page readonly
|
||
7FF7D8175000
|
unkown
|
page readonly
|
||
2DF4000
|
heap
|
page read and write
|
||
1478D4E0000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
1A4323FB000
|
heap
|
page read and write
|
||
22E67338000
|
heap
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
3DF7000
|
heap
|
page read and write
|
||
5671000
|
heap
|
page read and write
|
||
3E1E000
|
heap
|
page read and write
|
||
7FF66199D000
|
unkown
|
page write copy
|
||
3DA9000
|
heap
|
page read and write
|
||
7FF661A00000
|
unkown
|
page read and write
|
||
FBF000
|
stack
|
page read and write
|
||
283D6C42000
|
heap
|
page read and write
|
||
12CB000
|
heap
|
page read and write
|
||
6BE2000
|
heap
|
page read and write
|
||
7750000
|
trusted library allocation
|
page read and write
|
||
283E0A3F000
|
trusted library allocation
|
page read and write
|
||
1C17000
|
unkown
|
page write copy
|
||
14794435000
|
heap
|
page read and write
|
||
1478D4E0000
|
trusted library allocation
|
page read and write
|
||
12BB000
|
heap
|
page read and write
|
||
41E000
|
unkown
|
page read and write
|
||
283D90B0000
|
trusted library allocation
|
page read and write
|
||
A4048FE000
|
unkown
|
page readonly
|
||
7FF7D7D2F000
|
unkown
|
page write copy
|
||
12E1000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
3DB1000
|
heap
|
page read and write
|
||
6BF2000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
14795317000
|
trusted library allocation
|
page read and write
|
||
77D8000
|
trusted library allocation
|
page read and write
|
||
7FF7D8175000
|
unkown
|
page readonly
|
||
7FF7D7211000
|
unkown
|
page execute read
|
||
14794888000
|
heap
|
page read and write
|
||
7E04BFE000
|
stack
|
page read and write
|
||
283E8BD0000
|
trusted library allocation
|
page read and write
|
||
7FF7D7CB4000
|
unkown
|
page write copy
|
||
2DF4000
|
heap
|
page read and write
|
||
5FF8000
|
heap
|
page read and write
|
||
283DBFFF000
|
heap
|
page read and write
|
||
1D24E893000
|
heap
|
page read and write
|
||
7FF7D8528000
|
unkown
|
page readonly
|
||
7790000
|
trusted library allocation
|
page read and write
|
||
283D93F0000
|
remote allocation
|
page read and write
|
||
A4052FE000
|
unkown
|
page readonly
|
||
5671000
|
heap
|
page read and write
|
||
3265000
|
heap
|
page read and write
|
||
22E6AD40000
|
trusted library allocation
|
page read and write
|
||
6C89000
|
heap
|
page read and write
|
||
147943AB000
|
heap
|
page read and write
|
||
197BC060000
|
heap
|
page read and write
|
||
1479C840000
|
trusted library allocation
|
page read and write
|
||
1479D3B0000
|
trusted library allocation
|
page read and write
|
||
79A000
|
unkown
|
page readonly
|
||
6BF2000
|
heap
|
page read and write
|
||
197BDFD3000
|
heap
|
page read and write
|
||
197BC080000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
1479CD38000
|
heap
|
page read and write
|
||
6005000
|
heap
|
page read and write
|
||
6C0C000
|
heap
|
page read and write
|
||
3E98000
|
heap
|
page read and write
|
||
12CB000
|
heap
|
page read and write
|
||
283DFC39000
|
heap
|
page read and write
|
||
1A434264000
|
heap
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
1FBD000
|
unkown
|
page readonly
|
||
6B239000
|
unkown
|
page write copy
|
||
1D24E857000
|
heap
|
page read and write
|
||
3D39000
|
heap
|
page read and write
|
||
197BD895000
|
heap
|
page read and write
|
||
1479FEB7000
|
heap
|
page read and write
|
||
1C06000
|
unkown
|
page read and write
|
||
6002000
|
heap
|
page read and write
|
||
283DFDC8000
|
heap
|
page read and write
|
||
887000
|
heap
|
page read and write
|
||
1C39000
|
unkown
|
page read and write
|
||
283E8B00000
|
trusted library allocation
|
page read and write
|
||
63A0000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
unkown
|
page readonly
|
||
7FF7D8282000
|
unkown
|
page readonly
|
||
283D85CA000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
7FF7D7D1F000
|
unkown
|
page write copy
|
||
22E6724D000
|
heap
|
page read and write
|
||
A4051FC000
|
stack
|
page read and write
|
||
6CA3000
|
heap
|
page read and write
|
||
283E8C10000
|
trusted library allocation
|
page read and write
|
||
6D10000
|
trusted library allocation
|
page read and write
|
||
3E09000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
283DF98F000
|
heap
|
page read and write
|
||
7FF7D8534000
|
unkown
|
page readonly
|
||
6E78000
|
trusted library allocation
|
page read and write
|
||
6C4A000
|
heap
|
page read and write
|
||
7FF7D7CBA000
|
unkown
|
page write copy
|
||
283DFFA2000
|
heap
|
page read and write
|
||
7960000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
147943EB000
|
heap
|
page read and write
|
||
3ED7000
|
heap
|
page read and write
|
||
6BEC000
|
heap
|
page read and write
|
||
14792085000
|
heap
|
page read and write
|
||
283E8B60000
|
trusted library allocation
|
page read and write
|
||
63A0000
|
trusted library allocation
|
page read and write
|
||
D77000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
6002000
|
heap
|
page read and write
|
||
6C59000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
283DFCB0000
|
heap
|
page read and write
|
||
3E09000
|
heap
|
page read and write
|
||
14795338000
|
trusted library allocation
|
page read and write
|
||
283D9275000
|
heap
|
page read and write
|
||
7740000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
1479D3B0000
|
trusted library allocation
|
page read and write
|
||
283DFC55000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
14790980000
|
trusted library allocation
|
page read and write
|
||
283E0A3F000
|
trusted library allocation
|
page read and write
|
||
5F45000
|
heap
|
page read and write
|
||
A405AFE000
|
unkown
|
page readonly
|
||
283D6D73000
|
heap
|
page read and write
|
||
14794886000
|
heap
|
page read and write
|
||
1478E385000
|
heap
|
page read and write
|
||
14794A50000
|
trusted library allocation
|
page read and write
|
||
283D6D73000
|
heap
|
page read and write
|
||
41AF000
|
stack
|
page read and write
|
||
283E0160000
|
trusted library allocation
|
page read and write
|
||
14794865000
|
heap
|
page read and write
|
||
7E056FF000
|
stack
|
page read and write
|
||
283DC520000
|
trusted library allocation
|
page read and write
|
||
7730000
|
trusted library allocation
|
page read and write
|
||
20C4000
|
unkown
|
page readonly
|
||
197BE538000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
14794A50000
|
trusted library allocation
|
page read and write
|
||
6FC000
|
stack
|
page read and write
|
||
7FF7D827C000
|
unkown
|
page readonly
|
||
283DF999000
|
heap
|
page read and write
|
||
234D000
|
unkown
|
page readonly
|
||
6D88000
|
trusted library allocation
|
page read and write
|
||
7FF7D6811000
|
unkown
|
page execute read
|
||
6C66000
|
heap
|
page read and write
|
||
283E0160000
|
trusted library allocation
|
page read and write
|
||
197BE479000
|
heap
|
page read and write
|
||
6BC8000
|
heap
|
page read and write
|
||
14790B00000
|
trusted library allocation
|
page read and write
|
||
79A0000
|
trusted library allocation
|
page read and write
|
||
22E65820000
|
trusted library allocation
|
page read and write
|
||
77C0000
|
trusted library allocation
|
page read and write
|
||
197BBFAA000
|
heap
|
page read and write
|
||
1479FE70000
|
heap
|
page read and write
|
||
1479474F000
|
heap
|
page read and write
|
||
5F4D000
|
heap
|
page read and write
|
||
7FF669EF1000
|
unkown
|
page execute read
|
||
14794431000
|
heap
|
page read and write
|
||
6C299000
|
unkown
|
page readonly
|
||
197BDA23000
|
heap
|
page read and write
|
||
283D6D73000
|
heap
|
page read and write
|
||
197BD89C000
|
heap
|
page read and write
|
||
7FF66A1B4000
|
unkown
|
page write copy
|
||
79A0000
|
trusted library allocation
|
page read and write
|
||
7E058FE000
|
stack
|
page read and write
|
||
1479440E000
|
heap
|
page read and write
|
||
14794FA0000
|
trusted library allocation
|
page read and write
|
||
2129000
|
unkown
|
page readonly
|
||
1C2D000
|
unkown
|
page write copy
|
||
A34000
|
unkown
|
page readonly
|
||
1479FEF8000
|
heap
|
page read and write
|
||
7FF661491000
|
unkown
|
page execute read
|
||
1D24E7F9000
|
heap
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
7FF7D82E1000
|
unkown
|
page readonly
|
||
2DF4000
|
heap
|
page read and write
|
||
3DDD000
|
heap
|
page read and write
|
||
283D8651000
|
heap
|
page read and write
|
||
22E67265000
|
heap
|
page read and write
|
||
283DFFAA000
|
heap
|
page read and write
|
||
6A88000
|
trusted library allocation
|
page read and write
|
||
1D24E837000
|
heap
|
page read and write
|
||
1478CEDE000
|
heap
|
page read and write
|
||
5FF8000
|
heap
|
page read and write
|
||
283E0A4F000
|
trusted library allocation
|
page read and write
|
||
6A164000
|
unkown
|
page read and write
|
||
7FF7D827F000
|
unkown
|
page readonly
|
||
489000
|
unkown
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
4040000
|
remote allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
2A8D000
|
stack
|
page read and write
|
||
1479FF1C000
|
heap
|
page read and write
|
||
7FF7D5E10000
|
unkown
|
page readonly
|
||
6BC0000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
283DFE89000
|
heap
|
page read and write
|
||
283E0A20000
|
trusted library allocation
|
page read and write
|
||
59EE000
|
stack
|
page read and write
|
||
1479C840000
|
trusted library allocation
|
page read and write
|
||
677D000
|
stack
|
page read and write
|
||
5050000
|
heap
|
page read and write
|
||
1D24E8B0000
|
heap
|
page read and write
|
||
7FF7D7C78000
|
unkown
|
page write copy
|
||
3ECA000
|
heap
|
page read and write
|
||
283E8B18000
|
trusted library allocation
|
page read and write
|
||
1D24E89C000
|
heap
|
page read and write
|
||
14794431000
|
heap
|
page read and write
|
||
7730000
|
trusted library allocation
|
page read and write
|
||
5F4D000
|
heap
|
page read and write
|
||
D75000
|
heap
|
page read and write
|
||
1D24E8CB000
|
heap
|
page read and write
|
||
D21000
|
unkown
|
page execute read
|
||
2DF4000
|
heap
|
page read and write
|
||
1479D480000
|
trusted library allocation
|
page read and write
|
||
283E0A4F000
|
trusted library allocation
|
page read and write
|
||
197BD8AD000
|
heap
|
page read and write
|
||
5F21000
|
heap
|
page read and write
|
||
22E67325000
|
heap
|
page read and write
|
||
14794435000
|
heap
|
page read and write
|
||
14794784000
|
heap
|
page read and write
|
||
283E0160000
|
trusted library allocation
|
page read and write
|
||
14794A48000
|
heap
|
page read and write
|
||
1478DA80000
|
trusted library allocation
|
page read and write
|
||
1478CF05000
|
heap
|
page read and write
|
||
1C02FF1A000
|
heap
|
page read and write
|
||
14794433000
|
heap
|
page read and write
|
||
7FF7D7C8C000
|
unkown
|
page write copy
|
||
6F08000
|
trusted library allocation
|
page read and write
|
||
1479208A000
|
heap
|
page read and write
|
||
810000
|
unkown
|
page readonly
|
||
3EE1000
|
heap
|
page read and write
|
||
D7C000
|
heap
|
page read and write
|
||
12DF000
|
heap
|
page read and write
|
||
1A434265000
|
heap
|
page read and write
|
||
5084000
|
heap
|
page read and write
|
||
14794A48000
|
heap
|
page read and write
|
||
1D24E893000
|
heap
|
page read and write
|
||
22E684A7000
|
heap
|
page read and write
|
||
5F4D000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
6BC7000
|
heap
|
page read and write
|
||
14794F90000
|
trusted library allocation
|
page read and write
|
||
6C59000
|
heap
|
page read and write
|
||
283DFC54000
|
heap
|
page read and write
|
||
9B1000
|
unkown
|
page execute read
|
||
77D0000
|
trusted library allocation
|
page read and write
|
||
147943CB000
|
heap
|
page read and write
|
||
541F000
|
stack
|
page read and write
|
||
283DC520000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
1A4341FE000
|
heap
|
page read and write
|
||
12E9000
|
heap
|
page read and write
|
||
1479FEC8000
|
heap
|
page read and write
|
||
1479460D000
|
heap
|
page read and write
|
||
6011000
|
heap
|
page read and write
|
||
1479216E000
|
heap
|
page read and write
|
||
283DF974000
|
heap
|
page read and write
|
||
A73000
|
unkown
|
page readonly
|
||
283E0A48000
|
trusted library allocation
|
page read and write
|
||
31C000
|
stack
|
page read and write
|
||
283E0A3F000
|
trusted library allocation
|
page read and write
|
||
531F000
|
stack
|
page read and write
|
||
1478CEED000
|
heap
|
page read and write
|
||
22E67CB0000
|
trusted library allocation
|
page read and write
|
||
7FF7D7CC7000
|
unkown
|
page write copy
|
||
A404FFB000
|
stack
|
page read and write
|
||
3DB2000
|
heap
|
page read and write
|
||
1478CF05000
|
heap
|
page read and write
|
||
14794620000
|
heap
|
page read and write
|
||
7FF66A21E000
|
unkown
|
page read and write
|
||
1479FEE9000
|
heap
|
page read and write
|
||
773A000
|
trusted library allocation
|
page read and write
|
||
283E0A21000
|
trusted library allocation
|
page read and write
|
||
6BD1000
|
heap
|
page read and write
|
||
76E0000
|
trusted library allocation
|
page read and write
|
||
5F26000
|
heap
|
page read and write
|
||
7E04CFF000
|
stack
|
page read and write
|
||
A73000
|
unkown
|
page readonly
|
||
4D9000
|
unkown
|
page read and write
|
||
283E0A3F000
|
trusted library allocation
|
page read and write
|
||
6BE7000
|
heap
|
page read and write
|
||
1479FE70000
|
heap
|
page read and write
|
||
197BD940000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
63A0000
|
trusted library allocation
|
page read and write
|
||
9DA000
|
heap
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
1479D460000
|
trusted library allocation
|
page read and write
|
||
1479C5A0000
|
trusted library allocation
|
page read and write
|
||
1D24E89C000
|
heap
|
page read and write
|
||
14794A50000
|
trusted library allocation
|
page read and write
|
||
283E0A47000
|
trusted library allocation
|
page read and write
|
||
197BC011000
|
heap
|
page read and write
|
||
1479FE75000
|
heap
|
page read and write
|
||
76E0000
|
trusted library allocation
|
page read and write
|
||
283DFE9C000
|
heap
|
page read and write
|
||
54C8000
|
heap
|
page read and write
|
||
1479FF17000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
283E0A3F000
|
trusted library allocation
|
page read and write
|
||
283DFEFD000
|
heap
|
page read and write
|
||
9B5000
|
heap
|
page read and write
|
||
5FF8000
|
heap
|
page read and write
|
||
283DFD02000
|
heap
|
page read and write
|
||
1D24E877000
|
heap
|
page read and write
|
||
1478CF0A000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
1338000
|
heap
|
page read and write
|
||
1478CF05000
|
heap
|
page read and write
|
||
283E0A47000
|
trusted library allocation
|
page read and write
|
||
14794780000
|
heap
|
page read and write
|
||
2FD0000
|
trusted library allocation
|
page read and write
|
||
14794889000
|
heap
|
page read and write
|
||
133D000
|
heap
|
page read and write
|
||
14794884000
|
heap
|
page read and write
|
||
6E87000
|
trusted library allocation
|
page read and write
|
||
5F50000
|
heap
|
page read and write
|
||
5F25000
|
heap
|
page read and write
|
||
7E059FD000
|
stack
|
page read and write
|
||
197BD8C2000
|
heap
|
page read and write
|
||
77A0000
|
trusted library allocation
|
page read and write
|
||
1478D5D4000
|
heap
|
page read and write
|
||
1478CED6000
|
heap
|
page read and write
|
||
1479C840000
|
trusted library allocation
|
page read and write
|
||
66D000
|
unkown
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
283E8BB0000
|
trusted library allocation
|
page read and write
|
||
197BBFCF000
|
heap
|
page read and write
|
||
6C63B000
|
unkown
|
page readonly
|
||
3EB5000
|
heap
|
page read and write
|
||
773E000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
197BD988000
|
heap
|
page read and write
|
||
6C90000
|
heap
|
page read and write
|
||
1479D360000
|
trusted library allocation
|
page read and write
|
||
7FF66186A000
|
unkown
|
page readonly
|
||
7FF7D7CB4000
|
unkown
|
page write copy
|
||
3E09000
|
heap
|
page read and write
|
||
3E48000
|
heap
|
page read and write
|
||
14794623000
|
heap
|
page read and write
|
||
283E08E0000
|
trusted library allocation
|
page read and write
|
||
1D24E8C1000
|
heap
|
page read and write
|
||
4BE0000
|
heap
|
page read and write
|
||
7FF7D8534000
|
unkown
|
page readonly
|
||
29DD000
|
stack
|
page read and write
|
||
1479D3C1000
|
trusted library allocation
|
page read and write
|
||
147909D0000
|
trusted library allocation
|
page read and write
|
||
918000
|
heap
|
page read and write
|
||
A6F000
|
unkown
|
page write copy
|
||
197BE3E0000
|
trusted library allocation
|
page read and write
|
||
6AB71000
|
unkown
|
page execute read
|
||
6BF8000
|
heap
|
page read and write
|
||
283E0A21000
|
trusted library allocation
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
D75000
|
heap
|
page read and write
|
||
283DFC54000
|
heap
|
page read and write
|
||
D78000
|
heap
|
page read and write
|
||
6B823000
|
unkown
|
page readonly
|
||
6F07000
|
trusted library allocation
|
page read and write
|
||
3E1D000
|
heap
|
page read and write
|
||
1479D3C0000
|
trusted library allocation
|
page read and write
|
||
283DFCD9000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
283E8B00000
|
trusted library allocation
|
page read and write
|
||
22E672ED000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
7E055FB000
|
stack
|
page read and write
|
||
3DF9000
|
heap
|
page read and write
|
||
1478E1F5000
|
heap
|
page read and write
|
||
471000
|
unkown
|
page read and write
|
||
283E0A40000
|
trusted library allocation
|
page read and write
|
||
6EA7000
|
trusted library allocation
|
page read and write
|
||
6C47000
|
heap
|
page read and write
|
||
A6F000
|
unkown
|
page read and write
|
||
1479473C000
|
heap
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
77D8000
|
trusted library allocation
|
page read and write
|
||
BB5000
|
heap
|
page read and write
|
||
283DF99E000
|
heap
|
page read and write
|
||
3E54000
|
heap
|
page read and write
|
||
197BD8CA000
|
heap
|
page read and write
|
||
283E8C10000
|
trusted library allocation
|
page read and write
|
||
261E000
|
stack
|
page read and write
|
||
283DFD16000
|
heap
|
page read and write
|
||
283D926A000
|
heap
|
page read and write
|
||
77E0000
|
trusted library allocation
|
page read and write
|
||
1A4323EB000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
5F2D000
|
heap
|
page read and write
|
||
6C571000
|
unkown
|
page write copy
|
||
321000
|
unkown
|
page execute read
|
||
6C93000
|
heap
|
page read and write
|
||
3E3A000
|
heap
|
page read and write
|
||
6C552000
|
unkown
|
page read and write
|
||
6C16000
|
heap
|
page read and write
|
||
D31000
|
heap
|
page read and write
|
||
7E051FD000
|
stack
|
page read and write
|
||
5F3F000
|
heap
|
page read and write
|
||
D65000
|
heap
|
page read and write
|
||
14794F60000
|
trusted library allocation
|
page read and write
|
||
3E31000
|
heap
|
page read and write
|
||
147947CF000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
7FF7D756B000
|
unkown
|
page readonly
|
||
1479441D000
|
heap
|
page read and write
|
||
5FFB000
|
heap
|
page read and write
|
||
811000
|
unkown
|
page readonly
|
||
283D85CA000
|
heap
|
page read and write
|
||
6BF2000
|
heap
|
page read and write
|
||
6A0F0000
|
unkown
|
page readonly
|
||
3E5F000
|
heap
|
page read and write
|
||
7FF7D5E11000
|
unkown
|
page execute read
|
||
14794754000
|
heap
|
page read and write
|
||
6CA3000
|
heap
|
page read and write
|
||
6BFD000
|
heap
|
page read and write
|
||
9B1000
|
unkown
|
page execute read
|
||
283DFD17000
|
heap
|
page read and write
|
||
9BE000
|
heap
|
page read and write
|
||
5F0000
|
unkown
|
page readonly
|
||
197BE3E0000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
unkown
|
page readonly
|
||
D77000
|
heap
|
page read and write
|
||
1C034D80000
|
remote allocation
|
page read and write
|
||
1C034CB0000
|
trusted library allocation
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
283E0A21000
|
trusted library allocation
|
page read and write
|
||
14790AF0000
|
trusted library allocation
|
page read and write
|
||
283D9275000
|
heap
|
page read and write
|
||
1663000
|
unkown
|
page readonly
|
||
283E0A39000
|
trusted library allocation
|
page read and write
|
||
14794A50000
|
trusted library allocation
|
page read and write
|
||
77C0000
|
trusted library allocation
|
page read and write
|
||
14795347000
|
trusted library allocation
|
page read and write
|
||
1D24E8D8000
|
heap
|
page read and write
|
||
6C0B000
|
heap
|
page read and write
|
||
12E9000
|
heap
|
page read and write
|
||
7FF6619A7000
|
unkown
|
page write copy
|
||
1A432380000
|
heap
|
page read and write
|
||
197BE5D0000
|
trusted library allocation
|
page read and write
|
||
147946D4000
|
heap
|
page read and write
|
||
3DBA000
|
heap
|
page read and write
|
||
3DCD000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
6C59000
|
heap
|
page read and write
|
||
3E1A000
|
heap
|
page read and write
|
||
7F55000
|
trusted library allocation
|
page read and write
|
||
7FF661A06000
|
unkown
|
page readonly
|
||
3EA9000
|
heap
|
page read and write
|
||
14794844000
|
heap
|
page read and write
|
||
1479C5A0000
|
trusted library allocation
|
page read and write
|
||
283D85BF000
|
heap
|
page read and write
|
||
1FAB000
|
unkown
|
page read and write
|
||
283D6D40000
|
trusted library allocation
|
page read and write
|
||
3E09000
|
heap
|
page read and write
|
||
5F07000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
1478E3B2000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
283D6C49000
|
heap
|
page read and write
|
||
283DFDC8000
|
heap
|
page read and write
|
||
7FF7D7A18000
|
unkown
|
page readonly
|
||
283DC553000
|
trusted library allocation
|
page read and write
|
||
63A0000
|
trusted library allocation
|
page read and write
|
||
3DFD000
|
heap
|
page read and write
|
||
7FF7D7D48000
|
unkown
|
page write copy
|
||
3E2A000
|
heap
|
page read and write
|
||
1478CEEB000
|
heap
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
3E0C000
|
heap
|
page read and write
|
||
3DB2000
|
heap
|
page read and write
|
||
1D24E89C000
|
heap
|
page read and write
|
||
12DF000
|
heap
|
page read and write
|
||
1479FF17000
|
heap
|
page read and write
|
||
6C15000
|
heap
|
page read and write
|
||
14794A50000
|
trusted library allocation
|
page read and write
|
||
3D2E000
|
heap
|
page read and write
|
||
283D6C5A000
|
heap
|
page read and write
|
||
5F33000
|
heap
|
page read and write
|
||
197BE3E0000
|
trusted library allocation
|
page read and write
|
||
1479532E000
|
trusted library allocation
|
page read and write
|
||
1479D3B0000
|
trusted library allocation
|
page read and write
|
||
3DFE000
|
heap
|
page read and write
|
||
6E78000
|
trusted library allocation
|
page read and write
|
||
1478CEFA000
|
heap
|
page read and write
|
||
1D24E874000
|
heap
|
page read and write
|
||
3EA4000
|
heap
|
page read and write
|
||
7740000
|
trusted library allocation
|
page read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
22E67245000
|
heap
|
page read and write
|
||
283DF997000
|
heap
|
page read and write
|
||
3E9A000
|
heap
|
page read and write
|
||
14790B20000
|
trusted library allocation
|
page read and write
|
||
1A1C000
|
unkown
|
page readonly
|
||
283DC530000
|
trusted library allocation
|
page read and write
|
||
283E0A38000
|
trusted library allocation
|
page read and write
|
||
5F55000
|
heap
|
page read and write
|
||
197BE440000
|
remote allocation
|
page read and write
|
||
3E24000
|
heap
|
page read and write
|
||
6B7E5000
|
unkown
|
page readonly
|
||
820000
|
heap
|
page read and write
|
||
14794A50000
|
trusted library allocation
|
page read and write
|
||
456000
|
unkown
|
page read and write
|
||
6BFD000
|
heap
|
page read and write
|
||
147947CE000
|
heap
|
page read and write
|
||
14790B03000
|
trusted library allocation
|
page read and write
|
||
1D24E8EE000
|
heap
|
page read and write
|
||
147943E2000
|
heap
|
page read and write
|
||
6B235000
|
unkown
|
page read and write
|
||
22E684CE000
|
heap
|
page read and write
|
||
7758000
|
trusted library allocation
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
heap
|
page read and write
|
||
59AD000
|
stack
|
page read and write
|
||
283DFEFC000
|
heap
|
page read and write
|
||
1479FE91000
|
heap
|
page read and write
|
||
3D86000
|
heap
|
page read and write
|
||
5C1C000
|
stack
|
page read and write
|
||
1D24E8C5000
|
heap
|
page read and write
|
||
7A8000
|
unkown
|
page readonly
|
||
3DF5000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
6E9F000
|
trusted library allocation
|
page read and write
|
||
5F47000
|
heap
|
page read and write
|
||
22E6724C000
|
heap
|
page read and write
|
||
283DF988000
|
heap
|
page read and write
|
||
7E04EFC000
|
stack
|
page read and write
|
||
5FF8000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
283E0A3F000
|
trusted library allocation
|
page read and write
|
||
1478D4E0000
|
trusted library allocation
|
page read and write
|
||
14794575000
|
heap
|
page read and write
|
||
7FF7D7D2E000
|
unkown
|
page read and write
|
||
283DFCF9000
|
heap
|
page read and write
|
||
6C05000
|
heap
|
page read and write
|
||
3F01000
|
heap
|
page read and write
|
||
5F4A000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
14794A50000
|
trusted library allocation
|
page read and write
|
||
1479D3BA000
|
trusted library allocation
|
page read and write
|
||
7748000
|
trusted library allocation
|
page read and write
|
||
7730000
|
trusted library allocation
|
page read and write
|
||
7FF661994000
|
unkown
|
page read and write
|
||
22E67258000
|
heap
|
page read and write
|
||
1C22000
|
unkown
|
page write copy
|
||
1D24E8CB000
|
heap
|
page read and write
|
||
283DFE9F000
|
heap
|
page read and write
|
||
6C5A000
|
heap
|
page read and write
|
||
3DF8000
|
heap
|
page read and write
|
||
6CA3000
|
heap
|
page read and write
|
||
D31000
|
heap
|
page read and write
|
||
77A0000
|
trusted library allocation
|
page read and write
|
||
6C58000
|
heap
|
page read and write
|
||
283E0A3F000
|
trusted library allocation
|
page read and write
|
||
1C22000
|
unkown
|
page write copy
|
||
22E67275000
|
heap
|
page read and write
|
||
2640000
|
heap
|
page read and write
|
||
3D46000
|
heap
|
page read and write
|
||
283E0A4F000
|
trusted library allocation
|
page read and write
|
||
283E8B60000
|
trusted library allocation
|
page read and write
|
||
283E8A90000
|
trusted library allocation
|
page read and write
|
||
197BD975000
|
heap
|
page read and write
|
||
197BC080000
|
trusted library allocation
|
page read and write
|
||
14794833000
|
heap
|
page read and write
|
||
283E8B1C000
|
trusted library allocation
|
page read and write
|
||
6BEC000
|
heap
|
page read and write
|
||
1A434254000
|
heap
|
page read and write
|
||
22E6725F000
|
heap
|
page read and write
|
||
1478CED6000
|
heap
|
page read and write
|
||
283E13CF000
|
heap
|
page read and write
|
||
197BDFD3000
|
heap
|
page read and write
|
||
14794A50000
|
trusted library allocation
|
page read and write
|
||
283E0A39000
|
trusted library allocation
|
page read and write
|
||
6049000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
5F3F000
|
heap
|
page read and write
|
||
321000
|
unkown
|
page execute read
|
||
1479D380000
|
trusted library allocation
|
page read and write
|
||
6006000
|
heap
|
page read and write
|
||
5F4D000
|
heap
|
page read and write
|
||
A404356000
|
stack
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
6F1F000
|
trusted library allocation
|
page read and write
|
||
1A4341F0000
|
heap
|
page read and write
|
||
3DEF000
|
heap
|
page read and write
|
||
5F2A000
|
heap
|
page read and write
|
||
3DFC000
|
heap
|
page read and write
|
||
7FF7D8061000
|
unkown
|
page read and write
|
||
283DC012000
|
heap
|
page read and write
|
||
3E3D000
|
heap
|
page read and write
|
||
5EE1000
|
heap
|
page read and write
|
||
3EEC000
|
heap
|
page read and write
|
||
3E2C000
|
heap
|
page read and write
|
||
CED000
|
heap
|
page read and write
|
||
7FF7D7D42000
|
unkown
|
page write copy
|
||
1479486F000
|
heap
|
page read and write
|
||
7670000
|
trusted library allocation
|
page read and write
|
||
76F0000
|
trusted library allocation
|
page read and write
|
||
283DC520000
|
trusted library allocation
|
page read and write
|
||
3E09000
|
heap
|
page read and write
|
||
1479FF11000
|
heap
|
page read and write
|
||
2359000
|
unkown
|
page readonly
|
||
1BFB000
|
unkown
|
page read and write
|
||
7730000
|
trusted library allocation
|
page read and write
|
||
3E36000
|
heap
|
page read and write
|
||
1478D4E0000
|
trusted library allocation
|
page read and write
|
||
5F46000
|
heap
|
page read and write
|
||
6BDD000
|
heap
|
page read and write
|
||
5F50000
|
heap
|
page read and write
|
||
283DF998000
|
heap
|
page read and write
|
||
3DB2000
|
heap
|
page read and write
|
||
1BE5000
|
unkown
|
page write copy
|
||
1A1C000
|
unkown
|
page readonly
|
||
1479D540000
|
trusted library allocation
|
page read and write
|
||
3EA4000
|
heap
|
page read and write
|
||
283D6D74000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
1301000
|
heap
|
page read and write
|
||
6E78000
|
trusted library allocation
|
page read and write
|
||
22E67CB0000
|
trusted library allocation
|
page read and write
|
||
1D24E872000
|
heap
|
page read and write
|
||
1478CF0A000
|
heap
|
page read and write
|
||
283D6D74000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
7FF7D7CDE000
|
unkown
|
page write copy
|
||
5FFB000
|
heap
|
page read and write
|
||
7FF7D8282000
|
unkown
|
page readonly
|
||
738000
|
heap
|
page read and write
|
||
14790980000
|
trusted library allocation
|
page read and write
|
||
3EE2000
|
heap
|
page read and write
|
||
1155000
|
heap
|
page read and write
|
||
508B000
|
heap
|
page read and write
|
||
1BE4000
|
unkown
|
page read and write
|
||
7FF66A220000
|
unkown
|
page readonly
|
||
7FF7D827F000
|
unkown
|
page readonly
|
||
14794433000
|
heap
|
page read and write
|
||
1479FEB7000
|
heap
|
page read and write
|
||
14792165000
|
heap
|
page read and write
|
||
197BE3E0000
|
trusted library allocation
|
page read and write
|
||
1D24E7F0000
|
heap
|
page read and write
|
||
283DFE2E000
|
heap
|
page read and write
|
||
283DFCEF000
|
heap
|
page read and write
|
||
283D90B0000
|
trusted library allocation
|
page read and write
|
||
14794607000
|
heap
|
page read and write
|
||
3E1C000
|
heap
|
page read and write
|
||
198000
|
stack
|
page read and write
|
||
5F15000
|
heap
|
page read and write
|
||
7FF6619A9000
|
unkown
|
page read and write
|
||
197BE3F0000
|
heap
|
page readonly
|
||
6BFA000
|
heap
|
page read and write
|
||
1479FEB7000
|
heap
|
page read and write
|
||
14790980000
|
trusted library allocation
|
page read and write
|
||
14795318000
|
trusted library allocation
|
page read and write
|
||
9BE000
|
heap
|
page read and write
|
||
283DF998000
|
heap
|
page read and write
|
||
283DF98D000
|
heap
|
page read and write
|
||
8821000
|
heap
|
page read and write
|
||
1479478B000
|
heap
|
page read and write
|
||
7FF7D8088000
|
unkown
|
page readonly
|
||
3E05000
|
heap
|
page read and write
|
||
197BD8CA000
|
heap
|
page read and write
|
||
5671000
|
heap
|
page read and write
|
||
3E48000
|
heap
|
page read and write
|
||
7FF7D7A18000
|
unkown
|
page readonly
|
||
3DAA000
|
heap
|
page read and write
|
||
14794618000
|
heap
|
page read and write
|
||
7700000
|
trusted library allocation
|
page read and write
|
||
1BF8000
|
unkown
|
page write copy
|
||
22E6725D000
|
heap
|
page read and write
|
||
1479CA20000
|
trusted library allocation
|
page read and write
|
||
1D24E855000
|
heap
|
page read and write
|
||
3D99000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
283D85AE000
|
heap
|
page read and write
|
||
5F37000
|
heap
|
page read and write
|
||
7790000
|
trusted library allocation
|
page read and write
|
||
7748000
|
trusted library allocation
|
page read and write
|
||
283E1301000
|
heap
|
page read and write
|
||
14795313000
|
trusted library allocation
|
page read and write
|
||
D17000
|
heap
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
7FF7D6811000
|
unkown
|
page execute read
|
||
913000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
6F18000
|
trusted library allocation
|
page read and write
|
||
283E13D4000
|
heap
|
page read and write
|
||
22E65820000
|
trusted library allocation
|
page read and write
|
||
283DF988000
|
heap
|
page read and write
|
||
3EA4000
|
heap
|
page read and write
|
||
1C034C50000
|
trusted library allocation
|
page read and write
|
||
1479FE8F000
|
heap
|
page read and write
|
||
14792165000
|
heap
|
page read and write
|
||
283E8AFE000
|
trusted library allocation
|
page read and write
|
||
283DFEFD000
|
heap
|
page read and write
|
||
3E09000
|
heap
|
page read and write
|
||
6C66000
|
heap
|
page read and write
|
||
1D24E872000
|
heap
|
page read and write
|
||
6E88000
|
trusted library allocation
|
page read and write
|
||
197BE5D0000
|
trusted library allocation
|
page read and write
|
||
5F4D000
|
heap
|
page read and write
|
||
7940000
|
trusted library allocation
|
page read and write
|
||
1478B5A1000
|
heap
|
page read and write
|
||
5F21000
|
heap
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
7FF63C49B000
|
unkown
|
page write copy
|
||
2DF4000
|
heap
|
page read and write
|
||
1341000
|
heap
|
page read and write
|
||
5F33000
|
heap
|
page read and write
|
||
3D10000
|
heap
|
page read and write
|
||
283DFADA000
|
heap
|
page read and write
|
||
7FF661490000
|
unkown
|
page readonly
|
||
7E05CFC000
|
stack
|
page read and write
|
||
147943FD000
|
heap
|
page read and write
|
||
7FF7D7D35000
|
unkown
|
page read and write
|
||
283D6C3E000
|
heap
|
page read and write
|
||
279E000
|
stack
|
page read and write
|
||
283E8B18000
|
trusted library allocation
|
page read and write
|
||
6C63000
|
heap
|
page read and write
|
||
283D8595000
|
heap
|
page read and write
|
||
6011000
|
heap
|
page read and write
|
||
7950000
|
trusted library allocation
|
page read and write
|
||
1479D3AB000
|
trusted library allocation
|
page read and write
|
||
A4059FD000
|
stack
|
page read and write
|
||
6BEB000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
197BBF35000
|
heap
|
page read and write
|
||
1479D3C8000
|
trusted library allocation
|
page read and write
|
||
1A4341FB000
|
heap
|
page read and write
|
||
6C550000
|
unkown
|
page write copy
|
||
6049000
|
heap
|
page read and write
|
||
1C034BE0000
|
trusted library allocation
|
page read and write
|
||
283D85C2000
|
heap
|
page read and write
|
||
3040000
|
remote allocation
|
page read and write
|
||
283E8B10000
|
trusted library allocation
|
page read and write
|
||
1D24E891000
|
heap
|
page read and write
|
||
283E8BC0000
|
trusted library allocation
|
page read and write
|
||
6C08000
|
heap
|
page read and write
|
||
14794362000
|
heap
|
page read and write
|
||
412000
|
unkown
|
page read and write
|
||
2644000
|
heap
|
page read and write
|
||
15CF000
|
stack
|
page read and write
|
||
6E78000
|
trusted library allocation
|
page read and write
|
||
3E4C000
|
heap
|
page read and write
|
||
197BE5D0000
|
trusted library allocation
|
page read and write
|
||
197BE487000
|
heap
|
page read and write
|
||
283E0A40000
|
trusted library allocation
|
page read and write
|
||
7FF7D84FA000
|
unkown
|
page readonly
|
||
D9E000
|
stack
|
page read and write
|
||
4040000
|
remote allocation
|
page read and write
|
||
887000
|
heap
|
page read and write
|
||
7FF7D8088000
|
unkown
|
page readonly
|
||
197BE3E0000
|
trusted library allocation
|
page read and write
|
||
7E05BFE000
|
stack
|
page read and write
|
||
6C08000
|
heap
|
page read and write
|
||
6E77000
|
trusted library allocation
|
page read and write
|
||
1479D3B0000
|
trusted library allocation
|
page read and write
|
||
1D24E7E0000
|
remote allocation
|
page read and write
|
||
14794614000
|
heap
|
page read and write
|
||
77E0000
|
trusted library allocation
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
147947CF000
|
heap
|
page read and write
|
||
1479D380000
|
trusted library allocation
|
page read and write
|
||
283E0A3F000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
1479C9F0000
|
trusted library allocation
|
page read and write
|
||
283E13D4000
|
heap
|
page read and write
|
||
283E1301000
|
heap
|
page read and write
|
||
197BBFFC000
|
heap
|
page read and write
|
||
40E000
|
unkown
|
page read and write
|
||
6B242000
|
unkown
|
page read and write
|
||
197BD8C6000
|
heap
|
page read and write
|
||
7FF66198A000
|
unkown
|
page write copy
|
||
283E0A27000
|
trusted library allocation
|
page read and write
|
||
2B8D000
|
stack
|
page read and write
|
||
97A000
|
stack
|
page read and write
|
||
1479FF1C000
|
heap
|
page read and write
|
||
7FF7D7D47000
|
unkown
|
page read and write
|
||
283E0A3F000
|
trusted library allocation
|
page read and write
|
||
1D24E8B0000
|
heap
|
page read and write
|
||
7FF7D756B000
|
unkown
|
page readonly
|
||
2DF4000
|
heap
|
page read and write
|
||
283DFCF3000
|
heap
|
page read and write
|
||
643A000
|
heap
|
page read and write
|
||
166E000
|
stack
|
page read and write
|
||
4B90000
|
heap
|
page read and write
|
||
197BD988000
|
heap
|
page read and write
|
||
9B1000
|
unkown
|
page execute read
|
||
2DF4000
|
heap
|
page read and write
|
||
1479478B000
|
heap
|
page read and write
|
||
1478CF0A000
|
heap
|
page read and write
|
||
283D859C000
|
heap
|
page read and write
|
||
3EC5000
|
heap
|
page read and write
|
||
DB9000
|
heap
|
page read and write
|
||
5F2D000
|
heap
|
page read and write
|
||
6B720000
|
unkown
|
page readonly
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
1479D3B0000
|
trusted library allocation
|
page read and write
|
||
480D000
|
heap
|
page read and write
|
||
283E0160000
|
trusted library allocation
|
page read and write
|
||
1A4323C0000
|
heap
|
page read and write
|
||
197BE440000
|
remote allocation
|
page read and write
|
||
7740000
|
trusted library allocation
|
page read and write
|
||
14795347000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
7FF6619A5000
|
unkown
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
1C034C24000
|
trusted library allocation
|
page read and write
|
||
A73000
|
unkown
|
page readonly
|
||
1479D380000
|
trusted library allocation
|
page read and write
|
||
5EE8000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
283E8B18000
|
trusted library allocation
|
page read and write
|
||
14795319000
|
trusted library allocation
|
page read and write
|
||
283DC550000
|
trusted library allocation
|
page read and write
|
||
5F50000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
3E98000
|
heap
|
page read and write
|
||
283E0430000
|
trusted library allocation
|
page read and write
|
||
197BBF52000
|
heap
|
page read and write
|
||
6E77000
|
trusted library allocation
|
page read and write
|
||
3E34000
|
heap
|
page read and write
|
||
28DD000
|
stack
|
page read and write
|
||
1478B5CE000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
3DD3000
|
heap
|
page read and write
|
||
7FF66198A000
|
unkown
|
page read and write
|
||
197BE5D0000
|
trusted library allocation
|
page read and write
|
||
283DFC0F000
|
heap
|
page read and write
|
||
7270000
|
trusted library allocation
|
page read and write
|
||
283E0160000
|
trusted library allocation
|
page read and write
|
||
14795337000
|
trusted library allocation
|
page read and write
|
||
1D24E8B0000
|
heap
|
page read and write
|
||
1479CAFB000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
14795338000
|
trusted library allocation
|
page read and write
|
||
1479FEF0000
|
heap
|
page read and write
|
||
3EAF000
|
heap
|
page read and write
|
||
3E32000
|
heap
|
page read and write
|
||
1C034D30000
|
trusted library allocation
|
page read and write
|
||
6C62D000
|
unkown
|
page read and write
|
||
1479D3C1000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
3E63000
|
heap
|
page read and write
|
||
147943EB000
|
heap
|
page read and write
|
||
1478CFC6000
|
heap
|
page read and write
|
||
283E0160000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
283E13D1000
|
heap
|
page read and write
|
||
283E13CF000
|
heap
|
page read and write
|
||
197BE5D0000
|
trusted library allocation
|
page read and write
|
||
D15000
|
heap
|
page read and write
|
||
5C24000
|
heap
|
page read and write
|
||
1478E3B5000
|
heap
|
page read and write
|
||
197BC080000
|
trusted library allocation
|
page read and write
|
||
197BC090000
|
heap
|
page read and write
|
||
6E97000
|
trusted library allocation
|
page read and write
|
||
A4049FE000
|
stack
|
page read and write
|
||
283D6D73000
|
heap
|
page read and write
|
||
7270000
|
trusted library allocation
|
page read and write
|
||
3E3D000
|
heap
|
page read and write
|
||
6B813000
|
unkown
|
page write copy
|
||
7FF7D5E11000
|
unkown
|
page execute read
|
||
6E78000
|
trusted library allocation
|
page read and write
|
||
1479460D000
|
heap
|
page read and write
|
||
283DC550000
|
trusted library allocation
|
page read and write
|
||
1479532F000
|
trusted library allocation
|
page read and write
|
||
41FE000
|
stack
|
page read and write
|
||
1D24E893000
|
heap
|
page read and write
|
||
283DFDF8000
|
heap
|
page read and write
|
||
3DD8000
|
heap
|
page read and write
|
||
63A0000
|
trusted library allocation
|
page read and write
|
||
6C74000
|
heap
|
page read and write
|
||
3E09000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
283DFCEC000
|
heap
|
page read and write
|
||
197BE4E2000
|
heap
|
page read and write
|
||
14794888000
|
heap
|
page read and write
|
||
283D6C2E000
|
heap
|
page read and write
|
||
283D85AE000
|
heap
|
page read and write
|
||
3D37000
|
heap
|
page read and write
|
||
283DC520000
|
trusted library allocation
|
page read and write
|
||
14794A50000
|
trusted library allocation
|
page read and write
|
||
1479436B000
|
heap
|
page read and write
|
||
7FF7D7C91000
|
unkown
|
page read and write
|
||
6EA7000
|
trusted library allocation
|
page read and write
|
||
5F97000
|
heap
|
page read and write
|
||
6C66000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
3E09000
|
heap
|
page read and write
|
||
7FF7D6811000
|
unkown
|
page execute read
|
||
283E0160000
|
trusted library allocation
|
page read and write
|
||
14794784000
|
heap
|
page read and write
|
||
283D6D74000
|
heap
|
page read and write
|
||
14794633000
|
heap
|
page read and write
|
||
3DEF000
|
heap
|
page read and write
|
||
6C15000
|
heap
|
page read and write
|
||
1479D3C9000
|
trusted library allocation
|
page read and write
|
||
283E0A4F000
|
trusted library allocation
|
page read and write
|
||
6C74000
|
heap
|
page read and write
|
||
7FF66A23A000
|
unkown
|
page readonly
|
||
7FF7D8534000
|
unkown
|
page readonly
|
||
2F3D000
|
stack
|
page read and write
|
||
25C0000
|
heap
|
page read and write
|
||
147909D0000
|
trusted library allocation
|
page read and write
|
||
1BE2000
|
unkown
|
page write copy
|
||
12BB000
|
heap
|
page read and write
|
||
14794361000
|
heap
|
page read and write
|
||
12E9000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
475000
|
unkown
|
page read and write
|
||
7FF7D756B000
|
unkown
|
page readonly
|
||
1A434231000
|
heap
|
page read and write
|
||
197BC080000
|
trusted library allocation
|
page read and write
|
||
3D99000
|
heap
|
page read and write
|
||
14794616000
|
heap
|
page read and write
|
||
64D000
|
unkown
|
page read and write
|
||
283E08E0000
|
trusted library allocation
|
page read and write
|
||
3D2D000
|
heap
|
page read and write
|
||
14794784000
|
heap
|
page read and write
|
||
400F000
|
stack
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
197BE440000
|
remote allocation
|
page read and write
|
||
1D24E8D6000
|
heap
|
page read and write
|
||
3DEA000
|
heap
|
page read and write
|
||
549C000
|
heap
|
page read and write
|
||
6E98000
|
trusted library allocation
|
page read and write
|
||
283E0A3F000
|
trusted library allocation
|
page read and write
|
||
7FF661491000
|
unkown
|
page execute read
|
||
14794404000
|
heap
|
page read and write
|
||
7E04FFB000
|
stack
|
page read and write
|
||
6008000
|
heap
|
page read and write
|
||
6E97000
|
trusted library allocation
|
page read and write
|
||
6D3E000
|
heap
|
page read and write
|
||
14795318000
|
trusted library allocation
|
page read and write
|
||
14790B18000
|
trusted library allocation
|
page read and write
|
||
5F50000
|
heap
|
page read and write
|
||
7930000
|
trusted library allocation
|
page read and write
|
||
1479CAF3000
|
heap
|
page read and write
|
||
7FF661490000
|
unkown
|
page readonly
|
||
283E8B00000
|
trusted library allocation
|
page read and write
|
||
14794544000
|
heap
|
page read and write
|
||
14794A50000
|
trusted library allocation
|
page read and write
|
||
7FF7D8174000
|
unkown
|
page write copy
|
||
12E9000
|
heap
|
page read and write
|
||
14794394000
|
heap
|
page read and write
|
||
5F46000
|
heap
|
page read and write
|
||
9BB000
|
heap
|
page read and write
|
||
1479433A000
|
heap
|
page read and write
|
||
6C74000
|
heap
|
page read and write
|
||
D5F000
|
heap
|
page read and write
|
||
7FF7D827F000
|
unkown
|
page readonly
|
||
1479FEE9000
|
heap
|
page read and write
|
||
5F46000
|
heap
|
page read and write
|
||
283E0A3F000
|
trusted library allocation
|
page read and write
|
||
14795357000
|
trusted library allocation
|
page read and write
|
||
197BC080000
|
trusted library allocation
|
page read and write
|
||
3E2F000
|
heap
|
page read and write
|
||
1479C840000
|
trusted library allocation
|
page read and write
|
||
283E0430000
|
trusted library allocation
|
page read and write
|
||
7FF7D7CB6000
|
unkown
|
page write copy
|
||
408000
|
unkown
|
page readonly
|
||
12DF000
|
heap
|
page read and write
|
||
1D24E8B8000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
1479535F000
|
trusted library allocation
|
page read and write
|
||
7730000
|
trusted library allocation
|
page read and write
|
||
14794431000
|
heap
|
page read and write
|
||
1C034F0E000
|
heap
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
5F45000
|
heap
|
page read and write
|
||
7FF66199C000
|
unkown
|
page read and write
|
||
283E0A40000
|
trusted library allocation
|
page read and write
|
||
14794532000
|
heap
|
page read and write
|
||
283DFD12000
|
heap
|
page read and write
|
||
283D6C6C000
|
heap
|
page read and write
|
||
7E04DFD000
|
stack
|
page read and write
|
||
6E78000
|
trusted library allocation
|
page read and write
|
||
14794438000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
3CE000
|
stack
|
page read and write
|
||
1479D3B0000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
49D000
|
unkown
|
page read and write
|
||
7FF7D82E1000
|
unkown
|
page readonly
|
||
3E97000
|
heap
|
page read and write
|
||
197BC080000
|
trusted library allocation
|
page read and write
|
||
1479D530000
|
trusted library allocation
|
page read and write
|
||
12BD000
|
heap
|
page read and write
|
||
283E13C1000
|
heap
|
page read and write
|
||
3510000
|
trusted library allocation
|
page read and write
|
||
6011000
|
heap
|
page read and write
|
||
5F2D000
|
heap
|
page read and write
|
||
7830000
|
trusted library allocation
|
page read and write
|
||
1479D440000
|
trusted library allocation
|
page read and write
|
||
283DFF14000
|
heap
|
page read and write
|
||
1479CA00000
|
trusted library allocation
|
page read and write
|
||
887000
|
heap
|
page read and write
|
||
12E2000
|
heap
|
page read and write
|
||
6B56C000
|
unkown
|
page readonly
|
||
AB0000
|
heap
|
page read and write
|
||
5F25000
|
heap
|
page read and write
|
||
283D8E01000
|
heap
|
page read and write
|
||
283DC4D0000
|
trusted library allocation
|
page read and write
|
||
5EFC000
|
heap
|
page read and write
|
||
1479D510000
|
trusted library allocation
|
page read and write
|
||
7E053FE000
|
stack
|
page read and write
|
||
5F37000
|
heap
|
page read and write
|
||
22E6AD40000
|
trusted library allocation
|
page read and write
|
||
5F37000
|
heap
|
page read and write
|
||
283E8AFE000
|
trusted library allocation
|
page read and write
|
||
5F35000
|
heap
|
page read and write
|
||
9DC000
|
heap
|
page read and write
|
||
7FF7D7CD1000
|
unkown
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
96000
|
stack
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
22E68740000
|
remote allocation
|
page read and write
|
||
1478B5AB000
|
heap
|
page read and write
|
||
87C000
|
stack
|
page read and write
|
||
3E6E000
|
heap
|
page read and write
|
||
3E63000
|
heap
|
page read and write
|
||
1478E3BA000
|
heap
|
page read and write
|
||
22E67CB0000
|
trusted library allocation
|
page read and write
|
||
283DFDAD000
|
heap
|
page read and write
|
||
1478B585000
|
heap
|
page read and write
|
||
197BD8A1000
|
heap
|
page read and write
|
||
63A0000
|
trusted library allocation
|
page read and write
|
||
47D000
|
unkown
|
page read and write
|
||
6C79000
|
heap
|
page read and write
|
||
321000
|
unkown
|
page execute read
|
||
1D24E8B4000
|
heap
|
page read and write
|
||
1D24E8CB000
|
heap
|
page read and write
|
||
1C2B000
|
unkown
|
page read and write
|
||
283D85C3000
|
heap
|
page read and write
|
||
12C6000
|
heap
|
page read and write
|
||
7FF7D82E1000
|
unkown
|
page readonly
|
||
6CA3000
|
heap
|
page read and write
|
||
5FF9000
|
heap
|
page read and write
|
||
14794431000
|
heap
|
page read and write
|
||
3E08000
|
heap
|
page read and write
|
||
3D28000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
7FF7D7CDD000
|
unkown
|
page read and write
|
||
1A434264000
|
heap
|
page read and write
|
||
1479FE75000
|
heap
|
page read and write
|
||
7FF7D7CD6000
|
unkown
|
page read and write
|
||
63A0000
|
trusted library allocation
|
page read and write
|
||
283DC530000
|
trusted library allocation
|
page read and write
|
||
6BE3000
|
heap
|
page read and write
|
||
1479C840000
|
trusted library allocation
|
page read and write
|
||
D75000
|
heap
|
page read and write
|
||
1478E194000
|
heap
|
page read and write
|
||
283E8B01000
|
trusted library allocation
|
page read and write
|
||
D0B000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
197BBFE1000
|
heap
|
page read and write
|
||
283D6D73000
|
heap
|
page read and write
|
||
1BF2000
|
unkown
|
page read and write
|
||
197BD8CA000
|
heap
|
page read and write
|
||
7FF7D7D1D000
|
unkown
|
page read and write
|
||
3E1B000
|
heap
|
page read and write
|
||
283E8B09000
|
trusted library allocation
|
page read and write
|
||
6007000
|
heap
|
page read and write
|
||
7FF7D5E11000
|
unkown
|
page execute read
|
||
197BDFD3000
|
heap
|
page read and write
|
||
283DFEA1000
|
heap
|
page read and write
|
||
1478E1FC000
|
heap
|
page read and write
|
||
283DC550000
|
trusted library allocation
|
page read and write
|
||
7FF7D8088000
|
unkown
|
page readonly
|
||
9B0000
|
unkown
|
page readonly
|
||
14795317000
|
trusted library allocation
|
page read and write
|
||
5F07000
|
heap
|
page read and write
|
||
3EA0000
|
heap
|
page read and write
|
||
1479D460000
|
trusted library allocation
|
page read and write
|
||
1D24E7C0000
|
heap
|
page read and write
|
||
197BD8AC000
|
heap
|
page read and write
|
||
1479CA10000
|
trusted library allocation
|
page read and write
|
||
7FF7D7CD3000
|
unkown
|
page write copy
|
||
283D85CA000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
14794889000
|
heap
|
page read and write
|
||
1479216E000
|
heap
|
page read and write
|
||
6E87000
|
trusted library allocation
|
page read and write
|
||
22E684CE000
|
heap
|
page read and write
|
||
197BD9CA000
|
heap
|
page read and write
|
||
1479C5A0000
|
trusted library allocation
|
page read and write
|
||
14795347000
|
trusted library allocation
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
6E98000
|
trusted library allocation
|
page read and write
|
||
2129000
|
unkown
|
page readonly
|
||
3DDB000
|
heap
|
page read and write
|
||
6A70000
|
trusted library allocation
|
page read and write
|
||
5F1F000
|
heap
|
page read and write
|
||
12E9000
|
heap
|
page read and write
|
||
1479FE88000
|
heap
|
page read and write
|
||
7E04AF7000
|
stack
|
page read and write
|
||
283E0A3F000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
14794633000
|
heap
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
197BD8D7000
|
heap
|
page read and write
|
||
283DC4D0000
|
trusted library allocation
|
page read and write
|
||
7FF7D7CC7000
|
unkown
|
page write copy
|
||
A4058FE000
|
unkown
|
page readonly
|
||
A34000
|
unkown
|
page readonly
|
||
3E09000
|
heap
|
page read and write
|
||
4FB0000
|
heap
|
page read and write
|
||
6BFC000
|
heap
|
page read and write
|
||
54C3000
|
heap
|
page read and write
|
||
7700000
|
trusted library allocation
|
page read and write
|
||
10F6000
|
stack
|
page read and write
|
||
3E40000
|
heap
|
page read and write
|
||
283DFDE3000
|
heap
|
page read and write
|
||
7920000
|
trusted library allocation
|
page read and write
|
||
7E054FC000
|
stack
|
page read and write
|
||
283DC533000
|
trusted library allocation
|
page read and write
|
||
CAF000
|
stack
|
page read and write
|
||
D77000
|
heap
|
page read and write
|
||
D31000
|
heap
|
page read and write
|
||
14794761000
|
heap
|
page read and write
|
||
283DF98D000
|
heap
|
page read and write
|
||
7FF7D7D37000
|
unkown
|
page write copy
|
||
1479D490000
|
trusted library allocation
|
page read and write
|
||
6C04000
|
heap
|
page read and write
|
||
7FF7D7A18000
|
unkown
|
page readonly
|
||
505A000
|
heap
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
147909D0000
|
trusted library allocation
|
page read and write
|
||
283E8B00000
|
trusted library allocation
|
page read and write
|
||
7FF63C3B0000
|
unkown
|
page readonly
|
||
6E77000
|
trusted library allocation
|
page read and write
|
||
197BE3E0000
|
trusted library allocation
|
page read and write
|
||
6BD0000
|
heap
|
page read and write
|
||
283E0870000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
147943F2000
|
heap
|
page read and write
|
||
A404AFE000
|
unkown
|
page readonly
|
||
7FF7D5E10000
|
unkown
|
page readonly
|
||
77C0000
|
trusted library allocation
|
page read and write
|
||
283DF9BA000
|
heap
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
7F50000
|
trusted library allocation
|
page read and write
|
||
9DE000
|
heap
|
page read and write
|
||
283D9260000
|
heap
|
page read and write
|
||
1479D520000
|
trusted library allocation
|
page read and write
|
||
283E0A4F000
|
trusted library allocation
|
page read and write
|
||
1D250447000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
1C17000
|
unkown
|
page write copy
|
||
1479531A000
|
trusted library allocation
|
page read and write
|
||
7FF66198D000
|
unkown
|
page write copy
|
||
586E000
|
stack
|
page read and write
|
||
22E6AD40000
|
trusted library allocation
|
page read and write
|
||
5F1000
|
unkown
|
page execute read
|
||
BAF000
|
stack
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
197BDFD4000
|
heap
|
page read and write
|
||
1A4341FB000
|
heap
|
page read and write
|
||
283E1398000
|
heap
|
page read and write
|
||
283D6C08000
|
heap
|
page read and write
|
||
6C8C000
|
heap
|
page read and write
|
||
887000
|
heap
|
page read and write
|
||
3E9E000
|
heap
|
page read and write
|
||
1FBD000
|
unkown
|
page write copy
|
||
283DC520000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
6BDE000
|
heap
|
page read and write
|
||
283D85C2000
|
heap
|
page read and write
|
||
77D0000
|
trusted library allocation
|
page read and write
|
||
14794774000
|
heap
|
page read and write
|
||
6C0C000
|
heap
|
page read and write
|
||
283D93F0000
|
remote allocation
|
page read and write
|
||
283E0A21000
|
trusted library allocation
|
page read and write
|
||
6C6F000
|
heap
|
page read and write
|
||
1478CEF2000
|
heap
|
page read and write
|
||
3E09000
|
heap
|
page read and write
|
||
6E78000
|
trusted library allocation
|
page read and write
|
||
283E8AF0000
|
trusted library allocation
|
page read and write
|
||
14794606000
|
heap
|
page read and write
|
||
283E8A90000
|
trusted library allocation
|
page read and write
|
||
1479D3BE000
|
trusted library allocation
|
page read and write
|
||
12E9000
|
heap
|
page read and write
|
||
283D6D40000
|
trusted library allocation
|
page read and write
|
||
6001000
|
heap
|
page read and write
|
||
5F96000
|
heap
|
page read and write
|
||
1479D3C8000
|
trusted library allocation
|
page read and write
|
||
4EFC000
|
stack
|
page read and write
|
||
6A0F1000
|
unkown
|
page execute read
|
||
7FF7D8282000
|
unkown
|
page readonly
|
||
14794541000
|
heap
|
page read and write
|
||
79A0000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
14794751000
|
heap
|
page read and write
|
||
283E0A2F000
|
trusted library allocation
|
page read and write
|
||
9B1000
|
unkown
|
page execute read
|
||
283D9232000
|
heap
|
page read and write
|
||
1A4323E4000
|
heap
|
page read and write
|
||
283D6C29000
|
heap
|
page read and write
|
||
283DBFFF000
|
heap
|
page read and write
|
||
1478D4E0000
|
trusted library allocation
|
page read and write
|
||
283E8B0D000
|
trusted library allocation
|
page read and write
|
||
197BBF95000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
283D85AC000
|
heap
|
page read and write
|
||
1FBE000
|
unkown
|
page readonly
|
||
6530000
|
trusted library allocation
|
page read and write
|
||
6C52000
|
heap
|
page read and write
|
||
6002000
|
heap
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
197BD8C3000
|
heap
|
page read and write
|
||
54C8000
|
heap
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
1479460C000
|
heap
|
page read and write
|
||
1478DA80000
|
trusted library allocation
|
page read and write
|
||
6E77000
|
trusted library allocation
|
page read and write
|
||
6BE0000
|
heap
|
page read and write
|
||
283DC540000
|
trusted library allocation
|
page read and write
|
||
22E6725C000
|
heap
|
page read and write
|
||
1479457B000
|
heap
|
page read and write
|
||
12BB000
|
heap
|
page read and write
|
||
1479D470000
|
trusted library allocation
|
page read and write
|
||
6C71000
|
heap
|
page read and write
|
||
6E98000
|
trusted library allocation
|
page read and write
|
||
1301000
|
heap
|
page read and write
|
||
645000
|
unkown
|
page read and write
|
||
12CB000
|
heap
|
page read and write
|
||
1479452D000
|
heap
|
page read and write
|
||
5FF8000
|
heap
|
page read and write
|
||
3D9E000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
1C14000
|
unkown
|
page write copy
|
||
231F000
|
unkown
|
page readonly
|
||
7741000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
283E8B0D000
|
trusted library allocation
|
page read and write
|
||
6F0F000
|
trusted library allocation
|
page read and write
|
||
1BF7000
|
unkown
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
3E06000
|
heap
|
page read and write
|
||
2359000
|
unkown
|
page readonly
|
||
6C59000
|
heap
|
page read and write
|
||
1D24E84D000
|
heap
|
page read and write
|
||
887000
|
heap
|
page read and write
|
||
283DFC3B000
|
heap
|
page read and write
|
||
6E97000
|
trusted library allocation
|
page read and write
|
||
6005000
|
heap
|
page read and write
|
||
12E1000
|
heap
|
page read and write
|
||
1D24E84B000
|
heap
|
page read and write
|
||
6E9F000
|
trusted library allocation
|
page read and write
|
||
283E8BE0000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
7FF7D6811000
|
unkown
|
page execute read
|
||
283E8B00000
|
trusted library allocation
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
1336000
|
heap
|
page read and write
|
||
22E6A97A000
|
heap
|
page read and write
|
||
283D85C3000
|
heap
|
page read and write
|
||
3EE7000
|
heap
|
page read and write
|
||
283DFE9F000
|
heap
|
page read and write
|
||
14794402000
|
heap
|
page read and write
|
||
6C74000
|
heap
|
page read and write
|
||
14795320000
|
trusted library allocation
|
page read and write
|
||
1D24E7C5000
|
heap
|
page read and write
|
||
283D90B0000
|
trusted library allocation
|
page read and write
|
||
1C034C10000
|
trusted library allocation
|
page read and write
|
||
283D85C6000
|
heap
|
page read and write
|
||
6E97000
|
trusted library allocation
|
page read and write
|
||
3EE4000
|
heap
|
page read and write
|
||
6E7F000
|
trusted library allocation
|
page read and write
|
||
4B2C000
|
stack
|
page read and write
|
||
1479215C000
|
heap
|
page read and write
|
||
283E8BE0000
|
trusted library allocation
|
page read and write
|
||
14792094000
|
heap
|
page read and write
|
||
6A166000
|
unkown
|
page read and write
|
||
1C07000
|
unkown
|
page write copy
|
||
283DFCC7000
|
heap
|
page read and write
|
||
1478CEF5000
|
heap
|
page read and write
|
||
1D24E8C0000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
7FF7D5E10000
|
unkown
|
page readonly
|
||
1D24E760000
|
heap
|
page read and write
|
||
6E80000
|
trusted library allocation
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
6017000
|
heap
|
page read and write
|
||
133A000
|
heap
|
page read and write
|
||
7FF7D7D41000
|
unkown
|
page read and write
|
||
147943AC000
|
heap
|
page read and write
|
||
7730000
|
trusted library allocation
|
page read and write
|
||
2B99000
|
heap
|
page read and write
|
||
22E6725D000
|
heap
|
page read and write
|
||
6BD9000
|
heap
|
page read and write
|
||
147943EB000
|
heap
|
page read and write
|
||
77B0000
|
trusted library allocation
|
page read and write
|
||
14794784000
|
heap
|
page read and write
|
||
3E44000
|
heap
|
page read and write
|
||
1478DCB0000
|
remote allocation
|
page read and write
|
||
1D250436000
|
heap
|
page read and write
|
||
8821000
|
heap
|
page read and write
|
||
7FF7D7D01000
|
unkown
|
page read and write
|
||
283E0A40000
|
trusted library allocation
|
page read and write
|
||
1479D550000
|
trusted library allocation
|
page read and write
|
||
9B5000
|
heap
|
page read and write
|
||
1A432409000
|
heap
|
page read and write
|
||
5055000
|
heap
|
page read and write
|
||
43E000
|
unkown
|
page read and write
|
||
289D000
|
stack
|
page read and write
|
||
7FF7D827C000
|
unkown
|
page readonly
|
||
3DED000
|
heap
|
page read and write
|
||
1A4341FB000
|
heap
|
page read and write
|
||
197BD8BA000
|
heap
|
page read and write
|
||
1479D3C5000
|
trusted library allocation
|
page read and write
|
||
14790B30000
|
trusted library allocation
|
page read and write
|
||
7680000
|
trusted library allocation
|
page read and write
|
||
1A434221000
|
heap
|
page read and write
|
||
197BE121000
|
heap
|
page read and write
|
||
3DD8000
|
heap
|
page read and write
|
||
283DF98F000
|
heap
|
page read and write
|
||
6BC1000
|
heap
|
page read and write
|
||
22E67CB0000
|
trusted library allocation
|
page read and write
|
||
1D24E8C5000
|
heap
|
page read and write
|
||
7FF7D8088000
|
unkown
|
page readonly
|
||
197BBFF3000
|
heap
|
page read and write
|
||
1479FF17000
|
heap
|
page read and write
|
||
1D24E826000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
14795328000
|
trusted library allocation
|
page read and write
|
||
1479CD38000
|
heap
|
page read and write
|
||
D31000
|
heap
|
page read and write
|
||
773E000
|
trusted library allocation
|
page read and write
|
||
1D24E89C000
|
heap
|
page read and write
|
||
14795318000
|
trusted library allocation
|
page read and write
|
||
1298000
|
heap
|
page read and write
|
||
1479FE86000
|
heap
|
page read and write
|
||
3E09000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
5FF8000
|
heap
|
page read and write
|
||
14794A50000
|
trusted library allocation
|
page read and write
|
||
6D3B000
|
heap
|
page read and write
|
||
1A4341F9000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
6C66000
|
heap
|
page read and write
|
||
7FF7D8082000
|
unkown
|
page read and write
|
||
283D6C90000
|
heap
|
page read and write
|
||
3E3E000
|
heap
|
page read and write
|
||
1D24E8D8000
|
heap
|
page read and write
|
||
7FF7D827F000
|
unkown
|
page readonly
|
||
14790980000
|
trusted library allocation
|
page read and write
|
||
7FF7D7211000
|
unkown
|
page execute read
|
||
3EAC000
|
heap
|
page read and write
|
||
1D24E81D000
|
heap
|
page read and write
|
||
1690000
|
heap
|
page read and write
|
||
283E8BF0000
|
trusted library allocation
|
page read and write
|
||
3D46000
|
heap
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
1478CF06000
|
heap
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
6EEF000
|
trusted library allocation
|
page read and write
|
||
3E5B000
|
heap
|
page read and write
|
||
7FF7D7CD8000
|
unkown
|
page read and write
|
||
283E8B00000
|
trusted library allocation
|
page read and write
|
||
14795318000
|
trusted library allocation
|
page read and write
|
||
197BD8C3000
|
heap
|
page read and write
|
||
6BC7000
|
heap
|
page read and write
|
||
1479478B000
|
heap
|
page read and write
|
||
283DF96B000
|
heap
|
page read and write
|
||
6B569000
|
unkown
|
page readonly
|
||
283D6D40000
|
trusted library allocation
|
page read and write
|
||
1479FEB8000
|
heap
|
page read and write
|
||
283DFC4D000
|
heap
|
page read and write
|
||
1479FE91000
|
heap
|
page read and write
|
||
5FF8000
|
heap
|
page read and write
|
||
22E6726F000
|
heap
|
page read and write
|
||
7FF7D7211000
|
unkown
|
page execute read
|
||
6EE7000
|
trusted library allocation
|
page read and write
|
||
7920000
|
trusted library allocation
|
page read and write
|
||
3DDC000
|
heap
|
page read and write
|
||
197BBF72000
|
heap
|
page read and write
|
||
6BF3000
|
heap
|
page read and write
|
||
7730000
|
trusted library allocation
|
page read and write
|
||
7FF7D8282000
|
unkown
|
page readonly
|
||
1A4325C0000
|
heap
|
page read and write
|
||
197BE3E0000
|
trusted library allocation
|
page read and write
|
||
773A000
|
trusted library allocation
|
page read and write
|
||
6002000
|
heap
|
page read and write
|
||
3DED000
|
heap
|
page read and write
|
||
6BE0000
|
heap
|
page read and write
|
||
14790B10000
|
trusted library allocation
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
772B000
|
trusted library allocation
|
page read and write
|
||
283D6D40000
|
trusted library allocation
|
page read and write
|
||
12CB000
|
heap
|
page read and write
|
||
7FF7D8528000
|
unkown
|
page readonly
|
||
14794438000
|
heap
|
page read and write
|
||
283DF96A000
|
heap
|
page read and write
|
||
508E000
|
heap
|
page read and write
|
||
14794A50000
|
trusted library allocation
|
page read and write
|
||
7FF7D7CB4000
|
unkown
|
page write copy
|
||
283E0160000
|
trusted library allocation
|
page read and write
|
||
283E8BA0000
|
trusted library allocation
|
page read and write
|
||
6442000
|
heap
|
page read and write
|
||
283D6D40000
|
trusted library allocation
|
page read and write
|
||
3DB1000
|
heap
|
page read and write
|
||
5F2D000
|
heap
|
page read and write
|
||
2FD0000
|
trusted library allocation
|
page read and write
|
||
3D86000
|
heap
|
page read and write
|
||
1C034D80000
|
remote allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
6E78000
|
trusted library allocation
|
page read and write
|
||
5671000
|
heap
|
page read and write
|
||
197BD8BF000
|
heap
|
page read and write
|
||
5DD0000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
283DFEC9000
|
heap
|
page read and write
|
||
1D24E7E0000
|
remote allocation
|
page read and write
|
||
6BFF000
|
heap
|
page read and write
|
||
283E0A40000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
3E10000
|
heap
|
page read and write
|
||
12DF000
|
heap
|
page read and write
|
||
1D24E877000
|
heap
|
page read and write
|
||
DDC000
|
stack
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
1D24E8B7000
|
heap
|
page read and write
|
||
7FF7D84FA000
|
unkown
|
page readonly
|
||
14794A50000
|
trusted library allocation
|
page read and write
|
||
7FF669EF1000
|
unkown
|
page execute read
|
||
7E05DFD000
|
stack
|
page read and write
|
||
283E0A3F000
|
trusted library allocation
|
page read and write
|
||
3E3C000
|
heap
|
page read and write
|
||
147909D0000
|
trusted library allocation
|
page read and write
|
||
283E8AFA000
|
trusted library allocation
|
page read and write
|
||
1D24E877000
|
heap
|
page read and write
|
||
197BDFD4000
|
heap
|
page read and write
|
||
4040000
|
remote allocation
|
page read and write
|
||
283DC530000
|
trusted library allocation
|
page read and write
|
||
320000
|
unkown
|
page readonly
|
||
1D24E7A0000
|
heap
|
page readonly
|
||
6CA3000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
197BC080000
|
trusted library allocation
|
page read and write
|
||
283E8C20000
|
trusted library allocation
|
page read and write
|
||
9B1000
|
unkown
|
page execute read
|
||
283DF8EC000
|
heap
|
page read and write
|
||
1BFC000
|
unkown
|
page write copy
|
||
D15000
|
heap
|
page read and write
|
||
416000
|
unkown
|
page read and write
|
||
1479D520000
|
trusted library allocation
|
page read and write
|
||
14790B01000
|
trusted library allocation
|
page read and write
|
||
1C034D40000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
3E3B000
|
heap
|
page read and write
|
||
1479475A000
|
heap
|
page read and write
|
||
7E050FC000
|
stack
|
page read and write
|
||
63A0000
|
trusted library allocation
|
page read and write
|
||
3EB4000
|
heap
|
page read and write
|
||
197BE468000
|
heap
|
page read and write
|
||
1A4341F1000
|
heap
|
page read and write
|
||
283D6C53000
|
heap
|
page read and write
|
||
283DFF00000
|
heap
|
page read and write
|
||
283E0430000
|
trusted library allocation
|
page read and write
|
||
14795313000
|
trusted library allocation
|
page read and write
|
||
1A4341FE000
|
heap
|
page read and write
|
||
3E5D000
|
heap
|
page read and write
|
||
25B0000
|
heap
|
page read and write
|
||
7FF7D7CC7000
|
unkown
|
page write copy
|
||
6BE7000
|
heap
|
page read and write
|
||
283DF99E000
|
heap
|
page read and write
|
||
283DF95E000
|
heap
|
page read and write
|
||
5671000
|
heap
|
page read and write
|
||
1A434266000
|
heap
|
page read and write
|
||
3E60000
|
heap
|
page read and write
|
||
3E40000
|
heap
|
page read and write
|
||
14794865000
|
heap
|
page read and write
|
||
283E0670000
|
trusted library allocation
|
page read and write
|
||
14795340000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
12DF000
|
heap
|
page read and write
|
||
197BD8AE000
|
heap
|
page read and write
|
||
283D85CA000
|
heap
|
page read and write
|
||
1479FEDE000
|
heap
|
page read and write
|
||
1478DA80000
|
trusted library allocation
|
page read and write
|
||
1479D3BE000
|
trusted library allocation
|
page read and write
|
||
14794438000
|
heap
|
page read and write
|
||
14794620000
|
heap
|
page read and write
|
||
283E8BB0000
|
trusted library allocation
|
page read and write
|
||
1478CEEE000
|
heap
|
page read and write
|
||
D31000
|
heap
|
page read and write
|
||
14794780000
|
heap
|
page read and write
|
||
3DD7000
|
heap
|
page read and write
|
||
A73000
|
unkown
|
page readonly
|
||
3DE9000
|
heap
|
page read and write
|
||
3E06000
|
heap
|
page read and write
|
||
283DBF3B000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
6003000
|
heap
|
page read and write
|
||
3DED000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
283DFED3000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
283E13B2000
|
heap
|
page read and write
|
||
6C7E000
|
heap
|
page read and write
|
||
283D93F0000
|
remote allocation
|
page read and write
|
||
3DB2000
|
heap
|
page read and write
|
||
283E0A3F000
|
trusted library allocation
|
page read and write
|
||
1A43240A000
|
heap
|
page read and write
|
||
283DC548000
|
trusted library allocation
|
page read and write
|
||
6C570000
|
unkown
|
page read and write
|
||
197BC015000
|
heap
|
page read and write
|
||
A34000
|
unkown
|
page readonly
|
||
3DD3000
|
heap
|
page read and write
|
||
283D85CA000
|
heap
|
page read and write
|
||
283E0160000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
1478CEE0000
|
heap
|
page read and write
|
||
283DFD95000
|
heap
|
page read and write
|
||
14794431000
|
heap
|
page read and write
|
||
D65000
|
heap
|
page read and write
|
||
79B0000
|
trusted library allocation
|
page read and write
|
||
283E0160000
|
trusted library allocation
|
page read and write
|
||
283E8B80000
|
trusted library allocation
|
page read and write
|
||
22E67CB0000
|
trusted library allocation
|
page read and write
|
||
14794606000
|
heap
|
page read and write
|
||
14794606000
|
heap
|
page read and write
|
||
283E8B80000
|
trusted library allocation
|
page read and write
|
||
5F4D000
|
heap
|
page read and write
|
||
3D99000
|
heap
|
page read and write
|
||
197BD8CA000
|
heap
|
page read and write
|
||
6002000
|
heap
|
page read and write
|
||
197BC00D000
|
heap
|
page read and write
|
||
283DBF3B000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
5FFD000
|
heap
|
page read and write
|
||
133A000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
887000
|
heap
|
page read and write
|
||
283D6C3A000
|
heap
|
page read and write
|
||
3E25000
|
heap
|
page read and write
|
||
283D6D40000
|
trusted library allocation
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
9B0000
|
unkown
|
page readonly
|
||
6B812000
|
unkown
|
page read and write
|
||
6017000
|
heap
|
page read and write
|
||
3ED7000
|
heap
|
page read and write
|
||
283D922D000
|
heap
|
page read and write
|
||
9BE000
|
heap
|
page read and write
|
||
1478D4E0000
|
trusted library allocation
|
page read and write
|
||
6B47C000
|
unkown
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
283D6D73000
|
heap
|
page read and write
|
||
1479532B000
|
trusted library allocation
|
page read and write
|
||
5F46000
|
heap
|
page read and write
|
||
5F1F000
|
heap
|
page read and write
|
||
1478CF0A000
|
heap
|
page read and write
|
||
4BDD000
|
stack
|
page read and write
|
||
3DD8000
|
heap
|
page read and write
|
||
197BE520000
|
heap
|
page read and write
|
||
5D2E000
|
stack
|
page read and write
|
||
6EC7000
|
trusted library allocation
|
page read and write
|
||
283E0A38000
|
trusted library allocation
|
page read and write
|
||
22E67301000
|
heap
|
page read and write
|
||
14794780000
|
heap
|
page read and write
|
||
5F26000
|
heap
|
page read and write
|
||
14794620000
|
heap
|
page read and write
|
||
649000
|
unkown
|
page read and write
|
||
22E65820000
|
trusted library allocation
|
page read and write
|
||
1D24E84F000
|
heap
|
page read and write
|
||
6B5CD000
|
unkown
|
page readonly
|
||
1D24E8E7000
|
heap
|
page read and write
|
||
1D24E84B000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
CB0000
|
remote allocation
|
page read and write
|
||
3E16000
|
heap
|
page read and write
|
||
14799310000
|
trusted library allocation
|
page read and write
|
||
1478E1BE000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
5AEF000
|
stack
|
page read and write
|
||
7FF7D7211000
|
unkown
|
page execute read
|
||
3DEF000
|
heap
|
page read and write
|
||
5F3C000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
77D0000
|
trusted library allocation
|
page read and write
|
||
7FF7D8534000
|
unkown
|
page readonly
|
||
2DF4000
|
heap
|
page read and write
|
||
283E8B05000
|
trusted library allocation
|
page read and write
|
||
3040000
|
remote allocation
|
page read and write
|
||
283DC540000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
7800000
|
trusted library allocation
|
page read and write
|
||
197BBF3B000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
D15000
|
heap
|
page read and write
|
||
802000
|
unkown
|
page write copy
|
||
63A0000
|
trusted library allocation
|
page read and write
|
||
1479FEF5000
|
heap
|
page read and write
|
||
5082000
|
heap
|
page read and write
|
||
6D70000
|
trusted library allocation
|
page read and write
|
||
7FF66A0F9000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
3D4C000
|
heap
|
page read and write
|
||
283D90B0000
|
trusted library allocation
|
page read and write
|
||
7FF63C3B1000
|
unkown
|
page execute read
|
||
7740000
|
trusted library allocation
|
page read and write
|
||
1D24E877000
|
heap
|
page read and write
|
||
1301000
|
heap
|
page read and write
|
||
6B815000
|
unkown
|
page write copy
|
||
283D6D73000
|
heap
|
page read and write
|
||
7FF7D7CB4000
|
unkown
|
page write copy
|
||
22E6725D000
|
heap
|
page read and write
|
||
1C3C000
|
unkown
|
page write copy
|
||
6C10000
|
heap
|
page read and write
|
||
3D92000
|
heap
|
page read and write
|
||
6BDD000
|
heap
|
page read and write
|
||
14CE000
|
stack
|
page read and write
|
||
3DDD000
|
heap
|
page read and write
|
||
7FF7D8088000
|
unkown
|
page readonly
|
||
14795338000
|
trusted library allocation
|
page read and write
|
||
197BD8CA000
|
heap
|
page read and write
|
||
22E67245000
|
heap
|
page read and write
|
||
283DF908000
|
heap
|
page read and write
|
||
283D85CA000
|
heap
|
page read and write
|
||
3D84000
|
heap
|
page read and write
|
||
3D37000
|
heap
|
page read and write
|
||
7E054F6000
|
stack
|
page read and write
|
||
6BC3000
|
heap
|
page read and write
|
||
283D863C000
|
heap
|
page read and write
|
||
283E0160000
|
trusted library allocation
|
page read and write
|
||
7FF7D8282000
|
unkown
|
page readonly
|
||
CFC000
|
heap
|
page read and write
|
||
1D24E8B0000
|
heap
|
page read and write
|
||
A4057FE000
|
stack
|
page read and write
|
||
283E0A21000
|
trusted library allocation
|
page read and write
|
||
6B567000
|
unkown
|
page readonly
|
||
6BD8000
|
heap
|
page read and write
|
||
6D39000
|
heap
|
page read and write
|
||
1478CEF6000
|
heap
|
page read and write
|
||
197BE4E6000
|
heap
|
page read and write
|
||
6E80000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
283DF98D000
|
heap
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
887000
|
heap
|
page read and write
|
||
283E4A20000
|
trusted library allocation
|
page read and write
|
||
197BDFD0000
|
heap
|
page read and write
|
||
5470000
|
heap
|
page read and write
|
||
1479D4F0000
|
trusted library allocation
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
7740000
|
trusted library allocation
|
page read and write
|
||
77E0000
|
trusted library allocation
|
page read and write
|
||
1478DA80000
|
trusted library allocation
|
page read and write
|
||
7FF7D7D26000
|
unkown
|
page write copy
|
||
22E68740000
|
remote allocation
|
page read and write
|
||
6E89000
|
trusted library allocation
|
page read and write
|
||
147909D0000
|
trusted library allocation
|
page read and write
|
||
283DF996000
|
heap
|
page read and write
|
||
7FF7D7211000
|
unkown
|
page execute read
|
||
633F000
|
stack
|
page read and write
|
||
22E67257000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
283D85CA000
|
heap
|
page read and write
|
||
7FF7D7D02000
|
unkown
|
page write copy
|
||
7FF63C4A5000
|
unkown
|
page readonly
|
||
197BC02A000
|
heap
|
page read and write
|
||
283E8BF0000
|
trusted library allocation
|
page read and write
|
||
197BE47F000
|
heap
|
page read and write
|
||
283E0A20000
|
trusted library allocation
|
page read and write
|
||
7970000
|
trusted library allocation
|
page read and write
|
||
283D90B0000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
283D6D40000
|
trusted library allocation
|
page read and write
|
||
1478DCB0000
|
remote allocation
|
page read and write
|
||
7FF7D5E10000
|
unkown
|
page readonly
|
||
4F60000
|
heap
|
page read and write
|
||
3DED000
|
heap
|
page read and write
|
||
D31000
|
heap
|
page read and write
|
||
6C93000
|
heap
|
page read and write
|
||
7FF7D7A18000
|
unkown
|
page readonly
|
||
6BD3000
|
heap
|
page read and write
|
||
7FF7D5E10000
|
unkown
|
page readonly
|
||
99B000
|
heap
|
page read and write
|
||
14790B00000
|
trusted library allocation
|
page read and write
|
||
6A14B000
|
unkown
|
page readonly
|
||
3D3A000
|
heap
|
page read and write
|
||
3EBB000
|
heap
|
page read and write
|
||
7740000
|
trusted library allocation
|
page read and write
|
||
9BE000
|
heap
|
page read and write
|
||
1478CF0A000
|
heap
|
page read and write
|
||
7FF63C452000
|
unkown
|
page readonly
|
||
5F4D000
|
heap
|
page read and write
|
||
7FF7D7D21000
|
unkown
|
page read and write
|
||
14790B10000
|
trusted library allocation
|
page read and write
|
||
197BD8CA000
|
heap
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
2FD0000
|
trusted library allocation
|
page read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
324CAFF000
|
stack
|
page read and write
|
||
283E0160000
|
trusted library allocation
|
page read and write
|
||
1A434266000
|
heap
|
page read and write
|
||
1C14000
|
unkown
|
page write copy
|
||
3ED7000
|
heap
|
page read and write
|
||
6D3A000
|
heap
|
page read and write
|
||
A6F000
|
unkown
|
page write copy
|
||
283D85CA000
|
heap
|
page read and write
|
||
1D24E877000
|
heap
|
page read and write
|
||
D78000
|
heap
|
page read and write
|
||
7730000
|
trusted library allocation
|
page read and write
|
||
1D25041B000
|
heap
|
page read and write
|
||
1479D4E0000
|
trusted library allocation
|
page read and write
|
||
1478D4E0000
|
trusted library allocation
|
page read and write
|
||
7741000
|
trusted library allocation
|
page read and write
|
||
283E0A21000
|
trusted library allocation
|
page read and write
|
||
6CA3000
|
heap
|
page read and write
|
||
6C55000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
126E000
|
stack
|
page read and write
|
||
5F3F000
|
heap
|
page read and write
|
||
5F1F000
|
heap
|
page read and write
|
||
7FF66198F000
|
unkown
|
page write copy
|
||
283E0A21000
|
trusted library allocation
|
page read and write
|
||
7E05AFD000
|
stack
|
page read and write
|
||
1479533F000
|
trusted library allocation
|
page read and write
|
||
54C2000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
283E0A3F000
|
trusted library allocation
|
page read and write
|
||
283E0A28000
|
trusted library allocation
|
page read and write
|
||
1479480F000
|
heap
|
page read and write
|
||
22E6724F000
|
heap
|
page read and write
|
||
283D859E000
|
heap
|
page read and write
|
||
6ED8000
|
trusted library allocation
|
page read and write
|
||
5EED000
|
heap
|
page read and write
|
||
197BD93C000
|
heap
|
page read and write
|
||
1A4323E7000
|
heap
|
page read and write
|
||
1478DA80000
|
trusted library allocation
|
page read and write
|
||
1479FEEE000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
1478CF0A000
|
heap
|
page read and write
|
||
197BBFBD000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
283DF909000
|
heap
|
page read and write
|
||
283E0A4F000
|
trusted library allocation
|
page read and write
|
||
14794751000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
197BDFD4000
|
heap
|
page read and write
|
||
1478CEEE000
|
heap
|
page read and write
|
||
6EE7000
|
trusted library allocation
|
page read and write
|
||
6EDF000
|
trusted library allocation
|
page read and write
|
||
1479FE88000
|
heap
|
page read and write
|
||
2FD0000
|
trusted library allocation
|
page read and write
|
||
3E28000
|
heap
|
page read and write
|
||
1301000
|
heap
|
page read and write
|
||
6BC5000
|
heap
|
page read and write
|
||
283E0A3F000
|
trusted library allocation
|
page read and write
|
||
508D000
|
heap
|
page read and write
|
||
7700000
|
trusted library allocation
|
page read and write
|
||
7FF7D5E11000
|
unkown
|
page execute read
|
||
22E67269000
|
heap
|
page read and write
|
||
22E659F4000
|
heap
|
page read and write
|
||
3E18000
|
heap
|
page read and write
|
||
1D24E893000
|
heap
|
page read and write
|
||
147943CF000
|
heap
|
page read and write
|
||
6CA3000
|
heap
|
page read and write
|
||
4808000
|
heap
|
page read and write
|
||
7840000
|
trusted library allocation
|
page read and write
|
||
3DD7000
|
heap
|
page read and write
|
||
283E0A21000
|
trusted library allocation
|
page read and write
|
||
A34000
|
unkown
|
page readonly
|
||
1C034BE1000
|
trusted library allocation
|
page read and write
|
||
7FF6619AA000
|
unkown
|
page write copy
|
||
3040000
|
remote allocation
|
page read and write
|
||
14794430000
|
heap
|
page read and write
|
||
22E67B31000
|
heap
|
page read and write
|
||
1479D3CD000
|
trusted library allocation
|
page read and write
|
||
7FF7D7A18000
|
unkown
|
page readonly
|
||
283DC540000
|
trusted library allocation
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
6E78000
|
trusted library allocation
|
page read and write
|
||
6C52000
|
heap
|
page read and write
|
||
1D24E82B000
|
heap
|
page read and write
|
||
3E6A000
|
heap
|
page read and write
|
||
14794573000
|
heap
|
page read and write
|
||
6BF9000
|
heap
|
page read and write
|
||
22E6AD40000
|
trusted library allocation
|
page read and write
|
||
54CA000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
1478E4B4000
|
heap
|
page read and write
|
||
14790980000
|
trusted library allocation
|
page read and write
|
||
6AB70000
|
unkown
|
page readonly
|
||
1479FEF0000
|
heap
|
page read and write
|
||
5F3F000
|
heap
|
page read and write
|
||
147909D0000
|
trusted library allocation
|
page read and write
|
||
283E8AF0000
|
trusted library allocation
|
page read and write
|
||
7FF7D8528000
|
unkown
|
page readonly
|
||
283D85D7000
|
heap
|
page read and write
|
||
3DD8000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
1BF4000
|
unkown
|
page write copy
|
||
2DF4000
|
heap
|
page read and write
|
||
7FF7D7CC7000
|
unkown
|
page write copy
|
||
3EF9000
|
heap
|
page read and write
|
||
283DF99E000
|
heap
|
page read and write
|
||
1D24E8C5000
|
heap
|
page read and write
|
||
1D250441000
|
heap
|
page read and write
|
||
5F45000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
1478E4B2000
|
heap
|
page read and write
|
||
283E8B09000
|
trusted library allocation
|
page read and write
|
||
283DFED8000
|
heap
|
page read and write
|
||
6BC3000
|
heap
|
page read and write
|
||
1478E18E000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
6BCC000
|
heap
|
page read and write
|
||
14795312000
|
trusted library allocation
|
page read and write
|
||
1D24E660000
|
heap
|
page read and write
|
||
1479D3C5000
|
trusted library allocation
|
page read and write
|
||
283E0A27000
|
trusted library allocation
|
page read and write
|
||
3DB2000
|
heap
|
page read and write
|
||
197BE4BD000
|
heap
|
page read and write
|
||
283DF98D000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
7FF7D6811000
|
unkown
|
page execute read
|
||
6BE9000
|
heap
|
page read and write
|
||
1478CEFF000
|
heap
|
page read and write
|
||
283E8AEB000
|
trusted library allocation
|
page read and write
|
||
14794417000
|
heap
|
page read and write
|
||
EBF000
|
stack
|
page read and write
|
||
86E000
|
stack
|
page read and write
|
||
14790AE0000
|
trusted library allocation
|
page read and write
|
||
1479FE51000
|
heap
|
page read and write
|
||
7FF7D827C000
|
unkown
|
page readonly
|
||
283E0A3F000
|
trusted library allocation
|
page read and write
|
||
1478CEEA000
|
heap
|
page read and write
|
||
3DED000
|
heap
|
page read and write
|
||
6008000
|
heap
|
page read and write
|
||
197BBFE8000
|
heap
|
page read and write
|
||
7FF7D84FA000
|
unkown
|
page readonly
|
||
3DDB000
|
heap
|
page read and write
|
||
283E0A27000
|
trusted library allocation
|
page read and write
|
||
283DFE9C000
|
heap
|
page read and write
|
||
1479FEA6000
|
heap
|
page read and write
|
||
6B81F000
|
unkown
|
page read and write
|
||
22E6726E000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
A73000
|
unkown
|
page readonly
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
283E8A80000
|
trusted library allocation
|
page read and write
|
||
7FF7D8175000
|
unkown
|
page readonly
|
||
15D0000
|
heap
|
page read and write
|
||
6011000
|
heap
|
page read and write
|
||
D31000
|
heap
|
page read and write
|
||
283D85AD000
|
heap
|
page read and write
|
||
47F0000
|
heap
|
page read and write
|
||
14795330000
|
trusted library allocation
|
page read and write
|
||
3DEF000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
47FA000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
A6F000
|
unkown
|
page write copy
|
||
283DC530000
|
trusted library allocation
|
page read and write
|
||
1478DCB0000
|
remote allocation
|
page read and write
|
||
3E53000
|
heap
|
page read and write
|
||
283E0A4F000
|
trusted library allocation
|
page read and write
|
||
283E4A20000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
3DB2000
|
heap
|
page read and write
|
||
5FC7000
|
heap
|
page read and write
|
||
1478E334000
|
heap
|
page read and write
|
||
508D000
|
heap
|
page read and write
|
||
3D99000
|
heap
|
page read and write
|
||
283D6D73000
|
heap
|
page read and write
|
||
283D6C70000
|
heap
|
page read and write
|
||
1478CFB3000
|
heap
|
page read and write
|
||
3E41000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
1A434222000
|
heap
|
page read and write
|
||
12CB000
|
heap
|
page read and write
|
||
283E8B18000
|
trusted library allocation
|
page read and write
|
||
6E97000
|
trusted library allocation
|
page read and write
|
||
6BED000
|
heap
|
page read and write
|
||
9DE000
|
heap
|
page read and write
|
||
197BE3E0000
|
trusted library allocation
|
page read and write
|
||
6CA3000
|
heap
|
page read and write
|
||
283DF988000
|
heap
|
page read and write
|
||
7FF7D7CB6000
|
unkown
|
page write copy
|
||
976000
|
stack
|
page read and write
|
||
6ED8000
|
trusted library allocation
|
page read and write
|
||
6C556000
|
unkown
|
page write copy
|
||
14794431000
|
heap
|
page read and write
|
||
1A4341F9000
|
heap
|
page read and write
|
||
6BD6000
|
heap
|
page read and write
|
||
1C05000
|
unkown
|
page write copy
|
||
283E0A21000
|
trusted library allocation
|
page read and write
|
||
5EE0000
|
heap
|
page read and write
|
||
14794620000
|
heap
|
page read and write
|
||
283D8675000
|
heap
|
page read and write
|
||
1D2503F0000
|
heap
|
page read and write
|
||
1478E181000
|
heap
|
page read and write
|
||
283E0160000
|
trusted library allocation
|
page read and write
|
||
14790AE0000
|
trusted library allocation
|
page read and write
|
||
1479457E000
|
heap
|
page read and write
|
||
283E0A21000
|
trusted library allocation
|
page read and write
|
||
283DC530000
|
trusted library allocation
|
page read and write
|
||
3DDB000
|
heap
|
page read and write
|
||
6C66000
|
heap
|
page read and write
|
||
6049000
|
heap
|
page read and write
|
||
3E08000
|
heap
|
page read and write
|
||
283D85CA000
|
heap
|
page read and write
|
||
283E0430000
|
trusted library allocation
|
page read and write
|
||
14794A50000
|
trusted library allocation
|
page read and write
|
||
197BDFD3000
|
heap
|
page read and write
|
||
773A000
|
trusted library allocation
|
page read and write
|
||
7FF7D7C98000
|
unkown
|
page write copy
|
||
283DC4D0000
|
trusted library allocation
|
page read and write
|
||
1479D3C0000
|
trusted library allocation
|
page read and write
|
||
1479C850000
|
trusted library allocation
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
7FF7D7C78000
|
unkown
|
page write copy
|
||
3DAF000
|
heap
|
page read and write
|
||
283DF908000
|
heap
|
page read and write
|
||
14794A48000
|
heap
|
page read and write
|
||
6BF0000
|
heap
|
page read and write
|
||
197BBF00000
|
heap
|
page read and write
|
||
1FA3000
|
unkown
|
page read and write
|
||
283DFC4D000
|
heap
|
page read and write
|
||
147943EB000
|
heap
|
page read and write
|
||
CB0000
|
remote allocation
|
page read and write
|
||
6C66000
|
heap
|
page read and write
|
||
1479FE51000
|
heap
|
page read and write
|
||
283DFCEA000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
197BD9C3000
|
heap
|
page read and write
|
||
14794A50000
|
trusted library allocation
|
page read and write
|
||
1F99000
|
unkown
|
page read and write
|
||
600A000
|
heap
|
page read and write
|
||
A4050FE000
|
unkown
|
page readonly
|
||
1479D3C0000
|
trusted library allocation
|
page read and write
|
||
6C5A000
|
heap
|
page read and write
|
||
5671000
|
heap
|
page read and write
|
||
7730000
|
trusted library allocation
|
page read and write
|
||
283E0A38000
|
trusted library allocation
|
page read and write
|
||
1478CEDD000
|
heap
|
page read and write
|
||
7740000
|
trusted library allocation
|
page read and write
|
||
5F29000
|
heap
|
page read and write
|
||
1D24E740000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
77F0000
|
trusted library allocation
|
page read and write
|
||
5F4D000
|
heap
|
page read and write
|
||
14795317000
|
trusted library allocation
|
page read and write
|
||
14795320000
|
trusted library allocation
|
page read and write
|
||
197BD9D6000
|
heap
|
page read and write
|
||
14790B00000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
283DFC3B000
|
heap
|
page read and write
|
||
3DBA000
|
heap
|
page read and write
|
||
1479D458000
|
trusted library allocation
|
page read and write
|
||
283DFE36000
|
heap
|
page read and write
|
||
14794625000
|
heap
|
page read and write
|
||
320000
|
unkown
|
page readonly
|
||
1D24E8D8000
|
heap
|
page read and write
|
||
283D8688000
|
heap
|
page read and write
|
||
283D6C78000
|
heap
|
page read and write
|
||
6D35000
|
heap
|
page read and write
|
||
7FF7D7C97000
|
unkown
|
page read and write
|
||
6B940000
|
unkown
|
page readonly
|
||
1479FF1C000
|
heap
|
page read and write
|
||
283DF971000
|
heap
|
page read and write
|
||
14795319000
|
trusted library allocation
|
page read and write
|
||
3E06000
|
heap
|
page read and write
|
||
1A4341FE000
|
heap
|
page read and write
|
||
9DE000
|
heap
|
page read and write
|
||
20C4000
|
unkown
|
page readonly
|
||
1C034C53000
|
trusted library allocation
|
page read and write
|
||
1479CA10000
|
trusted library allocation
|
page read and write
|
||
1479C840000
|
trusted library allocation
|
page read and write
|
||
7FF66198E000
|
unkown
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
283E0A39000
|
trusted library allocation
|
page read and write
|
||
1479533F000
|
trusted library allocation
|
page read and write
|
||
7741000
|
trusted library allocation
|
page read and write
|
||
772B000
|
trusted library allocation
|
page read and write
|
||
1479FEB7000
|
heap
|
page read and write
|
||
3EB8000
|
heap
|
page read and write
|
||
14795348000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
197BBF8B000
|
heap
|
page read and write
|
||
77C0000
|
trusted library allocation
|
page read and write
|
||
162D000
|
stack
|
page read and write
|
||
1D24E8D6000
|
heap
|
page read and write
|
||
283DC548000
|
trusted library allocation
|
page read and write
|
||
6C89000
|
heap
|
page read and write
|
||
3E23000
|
heap
|
page read and write
|
||
1479C5A0000
|
trusted library allocation
|
page read and write
|
||
22E67CB0000
|
trusted library allocation
|
page read and write
|
||
9B1000
|
unkown
|
page execute read
|
||
3DFA000
|
heap
|
page read and write
|
||
283DC548000
|
trusted library allocation
|
page read and write
|
||
63A0000
|
trusted library allocation
|
page read and write
|
||
7FF7D8174000
|
unkown
|
page write copy
|
||
3E09000
|
heap
|
page read and write
|
||
1D24E8D6000
|
heap
|
page read and write
|
||
197BD8C2000
|
heap
|
page read and write
|
||
283E0A37000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
5F3F000
|
heap
|
page read and write
|
||
6EA7000
|
trusted library allocation
|
page read and write
|
||
7FF661A06000
|
unkown
|
page readonly
|
||
7FF7D7CDC000
|
unkown
|
page write copy
|
||
231F000
|
unkown
|
page readonly
|
||
1479D3B0000
|
trusted library allocation
|
page read and write
|
||
3DCD000
|
heap
|
page read and write
|
||
283E8B50000
|
trusted library allocation
|
page read and write
|
||
283E139E000
|
heap
|
page read and write
|
||
7FF66186A000
|
unkown
|
page readonly
|
||
6A168000
|
unkown
|
page readonly
|
||
1479FEF8000
|
heap
|
page read and write
|
||
283E8BA0000
|
trusted library allocation
|
page read and write
|
||
1FA8000
|
unkown
|
page read and write
|
||
A73000
|
unkown
|
page readonly
|
||
283E8A20000
|
trusted library allocation
|
page read and write
|
||
A34000
|
unkown
|
page readonly
|
||
2DF4000
|
heap
|
page read and write
|
||
1479D430000
|
trusted library allocation
|
page read and write
|
||
3E3F000
|
heap
|
page read and write
|
||
14794623000
|
heap
|
page read and write
|
||
6BD2000
|
heap
|
page read and write
|
||
6C04000
|
heap
|
page read and write
|
||
7730000
|
trusted library allocation
|
page read and write
|
||
7FF669EF0000
|
unkown
|
page readonly
|
||
1478CF0A000
|
heap
|
page read and write
|
||
283E0A27000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
7FF7D8175000
|
unkown
|
page readonly
|
||
1D24E8B8000
|
heap
|
page read and write
|
||
22E65820000
|
trusted library allocation
|
page read and write
|
||
3D99000
|
heap
|
page read and write
|
||
8E8000
|
heap
|
page read and write
|
||
14794406000
|
heap
|
page read and write
|
||
283D90B0000
|
trusted library allocation
|
page read and write
|
||
5670000
|
heap
|
page read and write
|
||
3EAF000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
283DC024000
|
heap
|
page read and write
|
||
7FF63C4AD000
|
unkown
|
page readonly
|
||
887000
|
heap
|
page read and write
|
||
3DDB000
|
heap
|
page read and write
|
||
6BED000
|
heap
|
page read and write
|
||
283E8C10000
|
trusted library allocation
|
page read and write
|
||
3EF3000
|
heap
|
page read and write
|
||
5671000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
1A4323A0000
|
heap
|
page read and write
|
||
14794573000
|
heap
|
page read and write
|
||
147943A8000
|
heap
|
page read and write
|
||
5F3F000
|
heap
|
page read and write
|
||
3F01000
|
heap
|
page read and write
|
||
1478D911000
|
heap
|
page read and write
|
||
283DFFA2000
|
heap
|
page read and write
|
||
5F1F000
|
heap
|
page read and write
|
||
283E8AEB000
|
trusted library allocation
|
page read and write
|
||
1A4323F0000
|
heap
|
page read and write
|
||
1479460D000
|
heap
|
page read and write
|
||
3EA2000
|
heap
|
page read and write
|
||
283E8B00000
|
trusted library allocation
|
page read and write
|
||
45F000
|
unkown
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
147947CE000
|
heap
|
page read and write
|
||
197BDFD3000
|
heap
|
page read and write
|
||
6CA0000
|
trusted library allocation
|
page read and write
|
||
22E6725A000
|
heap
|
page read and write
|
||
6B721000
|
unkown
|
page execute read
|
||
1A434231000
|
heap
|
page read and write
|
||
197BBE00000
|
heap
|
page read and write
|
||
197BC003000
|
heap
|
page read and write
|
||
7FF7D8174000
|
unkown
|
page write copy
|
||
2DF4000
|
heap
|
page read and write
|
||
283E0A47000
|
trusted library allocation
|
page read and write
|
||
283E8B10000
|
trusted library allocation
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
3D49000
|
heap
|
page read and write
|
||
283E0A39000
|
trusted library allocation
|
page read and write
|
||
283DC4E0000
|
trusted library allocation
|
page read and write
|
||
1479D4E0000
|
trusted library allocation
|
page read and write
|
||
14795318000
|
trusted library allocation
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
1479D4E0000
|
trusted library allocation
|
page read and write
|
||
234D000
|
unkown
|
page readonly
|
||
283E08E0000
|
trusted library allocation
|
page read and write
|
||
197BD951000
|
heap
|
page read and write
|
||
22E684AB000
|
heap
|
page read and write
|
||
7E05EFE000
|
stack
|
page read and write
|
||
6C61000
|
heap
|
page read and write
|
||
772B000
|
trusted library allocation
|
page read and write
|
||
283D6D40000
|
trusted library allocation
|
page read and write
|
||
7F50000
|
trusted library allocation
|
page read and write
|
||
CFC000
|
heap
|
page read and write
|
||
1D24E8CB000
|
heap
|
page read and write
|
||
147947CE000
|
heap
|
page read and write
|
||
79A0000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
6E88000
|
trusted library allocation
|
page read and write
|
||
1479D3BA000
|
trusted library allocation
|
page read and write
|
||
1479D440000
|
trusted library allocation
|
page read and write
|
||
283DFEFC000
|
heap
|
page read and write
|
||
20CA000
|
unkown
|
page readonly
|
||
1C04000
|
unkown
|
page read and write
|
||
22E65820000
|
trusted library allocation
|
page read and write
|
||
283E8C20000
|
trusted library allocation
|
page read and write
|
||
283E8C20000
|
trusted library allocation
|
page read and write
|
||
1479C840000
|
trusted library allocation
|
page read and write
|
||
6140000
|
trusted library allocation
|
page read and write
|
||
197BBF30000
|
heap
|
page read and write
|
||
7990000
|
trusted library allocation
|
page read and write
|
||
1479FE6A000
|
heap
|
page read and write
|
||
14794577000
|
heap
|
page read and write
|
||
7FF7D8528000
|
unkown
|
page readonly
|
||
6BF0000
|
heap
|
page read and write
|
||
283DFC39000
|
heap
|
page read and write
|
||
283E8B50000
|
trusted library allocation
|
page read and write
|
||
197BD8BC000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
58AC000
|
stack
|
page read and write
|
||
6C626000
|
unkown
|
page read and write
|
||
7FF6619FA000
|
unkown
|
page read and write
|
||
728000
|
heap
|
page read and write
|
||
5F4D000
|
heap
|
page read and write
|
||
14794A50000
|
trusted library allocation
|
page read and write
|
||
5C25000
|
heap
|
page read and write
|
||
77B0000
|
trusted library allocation
|
page read and write
|
||
197BE120000
|
heap
|
page read and write
|
||
283D6D74000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
A4047FE000
|
stack
|
page read and write
|
||
7FF7D8534000
|
unkown
|
page readonly
|
||
6C52000
|
heap
|
page read and write
|
||
9B0000
|
unkown
|
page readonly
|
||
1C034D80000
|
remote allocation
|
page read and write
|
||
1D24E856000
|
heap
|
page read and write
|
||
5FFF000
|
heap
|
page read and write
|
||
3E3A000
|
heap
|
page read and write
|
||
7FF7D7C78000
|
unkown
|
page write copy
|
||
6C44000
|
heap
|
page read and write
|
||
6B814000
|
unkown
|
page read and write
|
||
7FF7D756B000
|
unkown
|
page readonly
|
||
283E0430000
|
trusted library allocation
|
page read and write
|
||
1479D370000
|
trusted library allocation
|
page read and write
|
||
147943AB000
|
heap
|
page read and write
|
||
197BDFD3000
|
heap
|
page read and write
|
||
1D250435000
|
heap
|
page read and write
|
||
22E65820000
|
trusted library allocation
|
page read and write
|
||
1478E189000
|
heap
|
page read and write
|
||
D17000
|
heap
|
page read and write
|
||
6BDF000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
283E8B00000
|
trusted library allocation
|
page read and write
|
||
1478CF0A000
|
heap
|
page read and write
|
||
3D49000
|
heap
|
page read and write
|
||
7FF7D8057000
|
unkown
|
page read and write
|
||
1478CF0A000
|
heap
|
page read and write
|
||
5FFF000
|
heap
|
page read and write
|
||
283DC531000
|
trusted library allocation
|
page read and write
|
||
6BD4000
|
heap
|
page read and write
|
||
14795358000
|
trusted library allocation
|
page read and write
|
||
283D85C3000
|
heap
|
page read and write
|
||
6C5A000
|
heap
|
page read and write
|
||
283E0160000
|
trusted library allocation
|
page read and write
|
||
3DEF000
|
heap
|
page read and write
|
||
283DC520000
|
trusted library allocation
|
page read and write
|
||
7FF7D5E11000
|
unkown
|
page execute read
|
||
2DF4000
|
heap
|
page read and write
|
||
7700000
|
trusted library allocation
|
page read and write
|
||
1D24E8D8000
|
heap
|
page read and write
|
||
6C93000
|
heap
|
page read and write
|
||
14790AF0000
|
trusted library allocation
|
page read and write
|
||
1D24E893000
|
heap
|
page read and write
|
||
3E3D000
|
heap
|
page read and write
|
||
14795350000
|
trusted library allocation
|
page read and write
|
||
6C74000
|
heap
|
page read and write
|
||
197BDFD3000
|
heap
|
page read and write
|
||
6BF0000
|
heap
|
page read and write
|
||
283D8595000
|
heap
|
page read and write
|
||
1A432650000
|
heap
|
page read and write
|
||
4F3E000
|
stack
|
page read and write
|
||
3E3A000
|
heap
|
page read and write
|
||
1479D3B0000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
1478E377000
|
heap
|
page read and write
|
||
20C7000
|
unkown
|
page readonly
|
||
9BE000
|
heap
|
page read and write
|
||
197BBEE0000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
7FF7D7CD7000
|
unkown
|
page write copy
|
||
3E06000
|
heap
|
page read and write
|
||
283E0160000
|
trusted library allocation
|
page read and write
|
||
14794889000
|
heap
|
page read and write
|
||
6002000
|
heap
|
page read and write
|
||
14790980000
|
trusted library allocation
|
page read and write
|
||
5F3F000
|
heap
|
page read and write
|
||
1A4323C8000
|
heap
|
page read and write
|
||
12C6000
|
heap
|
page read and write
|
||
7FF7D84FA000
|
unkown
|
page readonly
|
||
2DF4000
|
heap
|
page read and write
|
||
147947CE000
|
heap
|
page read and write
|
||
623E000
|
stack
|
page read and write
|
||
283DFCFC000
|
heap
|
page read and write
|
||
147951D0000
|
trusted library allocation
|
page read and write
|
||
7FF7D756B000
|
unkown
|
page readonly
|
||
7FF66A1B7000
|
unkown
|
page write copy
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
3DDB000
|
heap
|
page read and write
|
||
5671000
|
heap
|
page read and write
|
||
1479D460000
|
trusted library allocation
|
page read and write
|
||
9DE000
|
heap
|
page read and write
|
||
283D85BA000
|
heap
|
page read and write
|
||
283E0A30000
|
trusted library allocation
|
page read and write
|
||
22E6ADA0000
|
trusted library allocation
|
page read and write
|
||
3D4C000
|
heap
|
page read and write
|
||
197BBFC4000
|
heap
|
page read and write
|
||
1663000
|
unkown
|
page readonly
|
||
283E8AC0000
|
trusted library allocation
|
page read and write
|
||
D15000
|
heap
|
page read and write
|
||
197BE45C000
|
heap
|
page read and write
|
||
147949E6000
|
heap
|
page read and write
|
||
283E0160000
|
trusted library allocation
|
page read and write
|
||
283D85A5000
|
heap
|
page read and write
|
||
1479C840000
|
trusted library allocation
|
page read and write
|
||
7FF7D8063000
|
unkown
|
page read and write
|
||
508B000
|
heap
|
page read and write
|
||
1A432370000
|
heap
|
page read and write
|
||
147943A4000
|
heap
|
page read and write
|
||
3E5A000
|
heap
|
page read and write
|
||
197BC095000
|
heap
|
page read and write
|
||
6E97000
|
trusted library allocation
|
page read and write
|
||
7FF7D84FA000
|
unkown
|
page readonly
|
||
7FF7D827C000
|
unkown
|
page readonly
|
||
283E0A38000
|
trusted library allocation
|
page read and write
|
||
283DC550000
|
trusted library allocation
|
page read and write
|
||
6B047000
|
unkown
|
page readonly
|
||
6B478000
|
unkown
|
page read and write
|
||
14794888000
|
heap
|
page read and write
|
||
283D85B6000
|
heap
|
page read and write
|
||
22E68740000
|
remote allocation
|
page read and write
|
||
7FF66A220000
|
unkown
|
page readonly
|
||
1478B5A5000
|
heap
|
page read and write
|
||
147943E6000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
283E13D0000
|
heap
|
page read and write
|
||
283E8AC0000
|
trusted library allocation
|
page read and write
|
||
1479478B000
|
heap
|
page read and write
|
||
3D4C000
|
heap
|
page read and write
|
||
1A434210000
|
heap
|
page read and write
|
||
7FF7D8065000
|
unkown
|
page read and write
|
||
148F000
|
stack
|
page read and write
|
||
6C88000
|
heap
|
page read and write
|
||
5F4D000
|
heap
|
page read and write
|
||
197BD8A5000
|
heap
|
page read and write
|
||
D21000
|
unkown
|
page execute read
|
||
1478E3BA000
|
heap
|
page read and write
|
||
6C05000
|
heap
|
page read and write
|
||
283E0A21000
|
trusted library allocation
|
page read and write
|
||
283DF997000
|
heap
|
page read and write
|
||
1478CEE8000
|
heap
|
page read and write
|
||
197BD8C3000
|
heap
|
page read and write
|
||
5C20000
|
heap
|
page read and write
|
||
6049000
|
heap
|
page read and write
|
||
6D70000
|
trusted library allocation
|
page read and write
|
||
3E41000
|
heap
|
page read and write
|
||
5F07000
|
heap
|
page read and write
|
||
3DEF000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
283E0870000
|
trusted library allocation
|
page read and write
|
||
283E0A27000
|
trusted library allocation
|
page read and write
|
||
6BC7000
|
heap
|
page read and write
|
||
5F07000
|
heap
|
page read and write
|
||
1D24E87C000
|
heap
|
page read and write
|
||
1479FEB7000
|
heap
|
page read and write
|
||
1C034BE0000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
6017000
|
heap
|
page read and write
|
||
283E0A3F000
|
trusted library allocation
|
page read and write
|
||
1479FEF0000
|
heap
|
page read and write
|
||
6BC3000
|
heap
|
page read and write
|
||
73F000
|
heap
|
page read and write
|
||
14794614000
|
heap
|
page read and write
|
||
1A432409000
|
heap
|
page read and write
|
||
3DDB000
|
heap
|
page read and write
|
||
14795318000
|
trusted library allocation
|
page read and write
|
||
D3E000
|
stack
|
page read and write
|
||
1479476C000
|
heap
|
page read and write
|
||
14790AF0000
|
trusted library allocation
|
page read and write
|
||
283DC520000
|
trusted library allocation
|
page read and write
|
||
14795347000
|
trusted library allocation
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
9DB000
|
heap
|
page read and write
|
||
12DF000
|
heap
|
page read and write
|
||
283E8BA0000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
47ED000
|
heap
|
page read and write
|
||
1478DA80000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
1A434264000
|
heap
|
page read and write
|
||
14794780000
|
heap
|
page read and write
|
||
CFC000
|
heap
|
page read and write
|
||
14794A50000
|
trusted library allocation
|
page read and write
|
||
1A434211000
|
heap
|
page read and write
|
||
6C5F000
|
heap
|
page read and write
|
||
283DFED8000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
283E8A80000
|
trusted library allocation
|
page read and write
|
||
C7F000
|
stack
|
page read and write
|
||
283E8B01000
|
trusted library allocation
|
page read and write
|
||
14795311000
|
trusted library allocation
|
page read and write
|
||
6E98000
|
trusted library allocation
|
page read and write
|
||
283DC540000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
heap
|
page read and write
|
||
1D24E8D6000
|
heap
|
page read and write
|
||
283D85A1000
|
heap
|
page read and write
|
||
1479C9E0000
|
trusted library allocation
|
page read and write
|
||
1341000
|
heap
|
page read and write
|
||
22E65820000
|
trusted library allocation
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
5F2D000
|
heap
|
page read and write
|
||
1A4325A0000
|
trusted library allocation
|
page read and write
|
||
7FF66A0F9000
|
unkown
|
page readonly
|
||
1A434231000
|
heap
|
page read and write
|
||
14795318000
|
trusted library allocation
|
page read and write
|
||
1479D3C9000
|
trusted library allocation
|
page read and write
|
||
1478E1FC000
|
heap
|
page read and write
|
||
283D90B0000
|
trusted library allocation
|
page read and write
|
||
3EA4000
|
heap
|
page read and write
|
||
7FF7D7CBA000
|
unkown
|
page write copy
|
||
14794625000
|
heap
|
page read and write
|
||
1479FE8F000
|
heap
|
page read and write
|
||
197BD8AE000
|
heap
|
page read and write
|
||
77D8000
|
trusted library allocation
|
page read and write
|
||
14794A50000
|
trusted library allocation
|
page read and write
|
||
1C02FF1A000
|
heap
|
page read and write
|
||
7FF7D7C8B000
|
unkown
|
page read and write
|
||
283E0430000
|
trusted library allocation
|
page read and write
|
||
12CB000
|
heap
|
page read and write
|
||
283DF909000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
147943AF000
|
heap
|
page read and write
|
||
6B941000
|
unkown
|
page execute read
|
||
283D85BC000
|
heap
|
page read and write
|
||
6ED8000
|
trusted library allocation
|
page read and write
|
||
14794435000
|
heap
|
page read and write
|
||
283DF92E000
|
heap
|
page read and write
|
||
14794A50000
|
trusted library allocation
|
page read and write
|
||
3DD3000
|
heap
|
page read and write
|
||
283E0A38000
|
trusted library allocation
|
page read and write
|
||
283E8AC0000
|
trusted library allocation
|
page read and write
|
||
1479CA00000
|
trusted library allocation
|
page read and write
|
||
283E0A3F000
|
trusted library allocation
|
page read and write
|
||
667C000
|
stack
|
page read and write
|
||
1D24E8E8000
|
heap
|
page read and write
|
||
7FF7D7CBA000
|
unkown
|
page write copy
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
1D24E8C5000
|
heap
|
page read and write
|
||
283E0A3F000
|
trusted library allocation
|
page read and write
|
||
197BD89E000
|
heap
|
page read and write
|
||
283DFC0F000
|
heap
|
page read and write
|
||
6BFD000
|
heap
|
page read and write
|
||
6B234000
|
unkown
|
page write copy
|
||
3DED000
|
heap
|
page read and write
|
||
7FF669EF0000
|
unkown
|
page readonly
|
||
12E1000
|
heap
|
page read and write
|
||
283D6C34000
|
heap
|
page read and write
|
||
5FF8000
|
heap
|
page read and write
|
||
5F3F000
|
heap
|
page read and write
|
||
7670000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
324C8FE000
|
stack
|
page read and write
|
||
1D24E853000
|
heap
|
page read and write
|
||
811000
|
unkown
|
page readonly
|
||
147946CD000
|
heap
|
page read and write
|
||
3D99000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
12E9000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
14794FB0000
|
trusted library allocation
|
page read and write
|
||
77C0000
|
trusted library allocation
|
page read and write
|
||
14792195000
|
heap
|
page read and write
|
||
283E0A21000
|
trusted library allocation
|
page read and write
|
||
6B243000
|
unkown
|
page write copy
|
||
14794535000
|
heap
|
page read and write
|
||
6BEA000
|
heap
|
page read and write
|
||
7FF7D7CBA000
|
unkown
|
page write copy
|
||
8CE000
|
stack
|
page read and write
|
||
283E8B05000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
CB0000
|
remote allocation
|
page read and write
|
||
1478E43C000
|
heap
|
page read and write
|
||
283DC012000
|
heap
|
page read and write
|
||
6BD6000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
14794633000
|
heap
|
page read and write
|
||
283E0160000
|
trusted library allocation
|
page read and write
|
||
A6F000
|
unkown
|
page read and write
|
||
6E98000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
1D24E8EE000
|
heap
|
page read and write
|
||
92D000
|
heap
|
page read and write
|
||
D66000
|
heap
|
page read and write
|
||
197BDFD4000
|
heap
|
page read and write
|
||
14792195000
|
heap
|
page read and write
|
||
1D24E84E000
|
heap
|
page read and write
|
||
3E25000
|
heap
|
page read and write
|
||
197BE48C000
|
heap
|
page read and write
|
||
283DFCFC000
|
heap
|
page read and write
|
||
CC8000
|
heap
|
page read and write
|
||
283E8AFA000
|
trusted library allocation
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
3D4C000
|
heap
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
20CA000
|
unkown
|
page readonly
|
||
6C19000
|
heap
|
page read and write
|
||
1479D420000
|
trusted library allocation
|
page read and write
|
||
1479D1F0000
|
trusted library allocation
|
page read and write
|
||
1478E194000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
14794625000
|
heap
|
page read and write
|
||
6C4E000
|
heap
|
page read and write
|
||
283DFF03000
|
heap
|
page read and write
|
||
3E53000
|
heap
|
page read and write
|
||
1479C5A0000
|
trusted library allocation
|
page read and write
|
||
40AE000
|
stack
|
page read and write
|
||
283DFC55000
|
heap
|
page read and write
|
||
14794433000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
197BD895000
|
heap
|
page read and write
|
||
283E8AC1000
|
trusted library allocation
|
page read and write
|
||
147943AF000
|
heap
|
page read and write
|
||
507E000
|
heap
|
page read and write
|
||
6A00000
|
trusted library allocation
|
page read and write
|
||
6D3D000
|
heap
|
page read and write
|
||
6C66000
|
heap
|
page read and write
|
||
283E0160000
|
trusted library allocation
|
page read and write
|
||
283DC520000
|
trusted library allocation
|
page read and write
|
||
7700000
|
trusted library allocation
|
page read and write
|
||
7FF7D8174000
|
unkown
|
page write copy
|
||
197BDFD3000
|
heap
|
page read and write
|
||
6EB1000
|
trusted library allocation
|
page read and write
|
||
3DDC000
|
heap
|
page read and write
|
||
1D24E7E0000
|
remote allocation
|
page read and write
|
||
1D24E8DF000
|
heap
|
page read and write
|
||
6E77000
|
trusted library allocation
|
page read and write
|
||
6C7E000
|
heap
|
page read and write
|
||
5F07000
|
heap
|
page read and write
|
||
7FF66A1B4000
|
unkown
|
page read and write
|
||
6BC3000
|
heap
|
page read and write
|
||
A34000
|
unkown
|
page readonly
|
||
CEF000
|
heap
|
page read and write
|
||
197BD8B6000
|
heap
|
page read and write
|
||
147943AC000
|
heap
|
page read and write
|
||
197BC080000
|
trusted library allocation
|
page read and write
|
There are 2619 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://www.ccleaner.com/knowledge/ccleaner-v6-30-11385?cv=v6-30-11385
|
||
https://www.ccleaner.com/knowledge/ccleaner-v6-30-11385?cv=v6-30-11385
|
||
https://www.ccleaner.com/knowledge/ccleaner-v6-30-11385?cv=v6-30-11385
|
||
https://www.ccleaner.com/knowledge/ccleaner-v6-30-11385?cv=v6-30-11385
|
||
https://www.ccleaner.com/knowledge/ccleaner-v6-30-11385?cv=v6-30-11385
|
||
https://www.ccleaner.com/knowledge/ccleaner-v6-30-11385?cv=v6-30-11385
|
||
https://www.ccleaner.com/knowledge/ccleaner-v6-30-11385?cv=v6-30-11385
|
||
https://www.ccleaner.com/knowledge/ccleaner-v6-30-11385?cv=v6-30-11385
|