IOC Report
setup_CodecInstaller_full.exe

loading gif

Files

File Path
Type
Category
Malicious
setup_CodecInstaller_full.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Program Files (x86)\Crawler\CTipsDef.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Crawler\CToolbar.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Crawler\CUpdate.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Crawler\ctbcomm.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Crawler\ctbr.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Crawler\is-4A847.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Crawler\is-ADSTV.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Crawler\is-AVISQ.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Crawler\is-HEK6I.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Crawler\is-RD52J.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\JockerSoft\CodecInstaller\CodecInstaller.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\JockerSoft\CodecInstaller\CrawlerSetup12.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\JockerSoft\CodecInstaller\TrIDDefs.TRD
RIFF (little-endian) data, TrID defs package
dropped
malicious
C:\Program Files (x86)\JockerSoft\CodecInstaller\de\CodecInstaller.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\JockerSoft\CodecInstaller\es\CodecInstaller.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\JockerSoft\CodecInstaller\filterdatalib.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\JockerSoft\CodecInstaller\fr\CodecInstaller.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\JockerSoft\CodecInstaller\hu\CodecInstaller.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\JockerSoft\CodecInstaller\it\CodecInstaller.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\JockerSoft\CodecInstaller\pl\CodecInstaller.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\JockerSoft\CodecInstaller\pt\CodecInstaller.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\JockerSoft\CodecInstaller\ru\CodecInstaller.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\JockerSoft\CodecInstaller\setupHelper.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\JockerSoft\CodecInstaller\sv\CodecInstaller.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\JockerSoft\CodecInstaller\tr\CodecInstaller.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\JockerSoft\CodecInstaller\trid.exe
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Program Files (x86)\JockerSoft\CodecInstaller\uninst.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-56AVD.tmp\CrawlerSetup12.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-QHN33.tmp\_isetup\_RegDLL.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-QHN33.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsaFDD9.tmp
data
dropped
malicious
C:\Program Files (x86)\Crawler\Languages\TBR5_CS.cab
Microsoft Cabinet archive data, many, 19900 bytes, 2 files, at 0x2c +A "info.ini" +A "language.ini", number 1, 2 datablocks, 0x1 compression
dropped
C:\Program Files (x86)\Crawler\Languages\TBR5_DA.cab
Microsoft Cabinet archive data, many, 17466 bytes, 2 files, at 0x2c +A "info.ini" +A "language.ini", number 1, 2 datablocks, 0x1 compression
dropped
C:\Program Files (x86)\Crawler\Languages\TBR5_DE.cab
Microsoft Cabinet archive data, many, 20613 bytes, 2 files, at 0x2c +A "info.ini" +A "language.ini", number 1, 2 datablocks, 0x1 compression
dropped
C:\Program Files (x86)\Crawler\Languages\TBR5_EN.cab
Microsoft Cabinet archive data, many, 15401 bytes, 2 files, at 0x2c +A "info.ini" +A "language.ini", number 1, 2 datablocks, 0x1 compression
dropped
C:\Program Files (x86)\Crawler\Languages\TBR5_ES.cab
Microsoft Cabinet archive data, many, 20947 bytes, 2 files, at 0x2c +A "info.ini" +A "language.ini", number 1, 2 datablocks, 0x1 compression
dropped
C:\Program Files (x86)\Crawler\Languages\TBR5_FR.cab
Microsoft Cabinet archive data, many, 20917 bytes, 2 files, at 0x2c +A "info.ini" +A "language.ini", number 1, 2 datablocks, 0x1 compression
dropped
C:\Program Files (x86)\Crawler\Languages\TBR5_IT.cab
Microsoft Cabinet archive data, many, 20397 bytes, 2 files, at 0x2c +A "info.ini" +A "language.ini", number 1, 2 datablocks, 0x1 compression
dropped
C:\Program Files (x86)\Crawler\Languages\TBR5_NL.cab
Microsoft Cabinet archive data, many, 17781 bytes, 2 files, at 0x2c +A "info.ini" +A "language.ini", number 1, 2 datablocks, 0x1 compression
dropped
C:\Program Files (x86)\Crawler\Languages\TBR5_PL.cab
Microsoft Cabinet archive data, many, 18529 bytes, 2 files, at 0x2c +A "info.ini" +A "language.ini", number 1, 2 datablocks, 0x1 compression
dropped
C:\Program Files (x86)\Crawler\Languages\TBR5_PT-BR.cab
Microsoft Cabinet archive data, many, 19933 bytes, 2 files, at 0x2c +A "info.ini" +A "language.ini", number 1, 2 datablocks, 0x1 compression
dropped
C:\Program Files (x86)\Crawler\Languages\TBR5_PT.cab
Microsoft Cabinet archive data, many, 20404 bytes, 2 files, at 0x2c +A "info.ini" +A "language.ini", number 1, 2 datablocks, 0x1 compression
dropped
C:\Program Files (x86)\Crawler\Languages\TBR5_RU.cab
Microsoft Cabinet archive data, many, 20289 bytes, 2 files, at 0x2c +A "info.ini" +A "language.ini", number 1, 3 datablocks, 0x1 compression
dropped
C:\Program Files (x86)\Crawler\TBR5LanguageAct\info.ini
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Crawler\TBR5LanguageAct\language.ini
Unicode text, UTF-8 text, with very long lines (418), with CRLF line terminators
dropped
C:\Program Files (x86)\Crawler\adrkeys.dat
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Crawler\confirm.dat
ASCII text, with no line terminators
modified
C:\Program Files (x86)\JockerSoft\CodecInstaller\AUTORUN.INF
Microsoft Windows Autorun file
dropped
C:\Program Files (x86)\JockerSoft\CodecInstaller\App.ico
MS Windows icon resource - 5 icons, 16x16, 8 bits/pixel, 32x32, 8 bits/pixel
dropped
C:\Program Files (x86)\JockerSoft\CodecInstaller\CodecInstaller.exe.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\JockerSoft\CodecInstaller\CodecInstaller.exe.manifest
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\JockerSoft\CodecInstaller\CodecInstaller.pdb
MSVC program database ver 7.00, 512*739 bytes
dropped
C:\Program Files (x86)\JockerSoft\CodecInstaller\CodecInstaller.url
MS Windows 95 Internet shortcut text (URL=<http://www.jockersoft.com>), ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\JockerSoft\CodecInstaller\README.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\JockerSoft\CodecInstaller\audiohex.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\JockerSoft\CodecInstaller\codecDatabase
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\JockerSoft\CodecInstaller\codecList.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\JockerSoft\CodecInstaller\codecinstaller_faq.html
HTML document, ASCII text, with very long lines (570), with CRLF line terminators
dropped
C:\Program Files (x86)\JockerSoft\CodecInstaller\example\codecList.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\JockerSoft\CodecInstaller\example\sample_video_file.avi.png
PNG image data, 256 x 312, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\JockerSoft\CodecInstaller\example\sample_video_file.avi.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\JockerSoft\CodecInstaller\fourcc.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\JockerSoft\CodecInstaller\gpl.txt
ASCII text
dropped
C:\Program Files (x86)\JockerSoft\CodecInstaller\lgpl.txt
ASCII text
dropped
C:\Program Files (x86)\JockerSoft\CodecInstaller\license.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\JockerSoft\CodecInstaller\myVideoFile.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\CodecInstaller\CodecInstaller.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Sun Apr 15 15:04:26 2012, mtime=Mon May 27 00:00:00 2024, atime=Sun Apr 15 15:04:26 2012, length=1065984, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\CodecInstaller\Help.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Aug 2 13:15:18 2007, mtime=Mon May 27 00:00:01 2024, atime=Thu Aug 2 13:15:18 2007, length=2794, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\CodecInstaller\Website.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Mon May 27 00:00:01 2024, mtime=Mon May 27 00:00:01 2024, atime=Mon May 27 00:00:01 2024, length=51, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Crawler Toolbar\More Crawler Products.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Mon May 27 00:00:07 2024, mtime=Mon May 27 00:00:09 2024, atime=Mon Mar 26 05:04:48 2012, length=2558088, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Crawler Toolbar\Toolbar Help.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Mon May 27 00:00:07 2024, mtime=Mon May 27 00:00:09 2024, atime=Mon Mar 26 05:04:48 2012, length=2558088, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Crawler Toolbar\Toolbar Settings.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=1, Archive, ctime=Mon May 27 00:00:07 2024, mtime=Mon May 27 00:00:09 2024, atime=Mon Mar 26 05:04:48 2012, length=2558088, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Crawler Toolbar\Uninstall Crawler Toolbar.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=1, Archive, ctime=Mon May 27 00:00:07 2024, mtime=Mon May 27 00:00:09 2024, atime=Mon Mar 26 05:04:48 2012, length=2558088, window=hide
dropped
C:\Users\Public\Desktop\CodecInstaller.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Sun Apr 15 15:04:26 2012, mtime=Mon May 27 00:00:00 2024, atime=Sun Apr 15 15:04:26 2012, length=1065984, window=hide
dropped
C:\Users\user\AppData\Local\JockerSoft\CodecInstaller.exe_Url_4t2i51jukdgmkdlwbxp45yg0m0woj4n0\2.10.4.0\emywetrs.newcfg
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\JockerSoft\CodecInstaller.exe_Url_4t2i51jukdgmkdlwbxp45yg0m0woj4n0\2.10.4.0\sxdjhiao.newcfg
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\JockerSoft\CodecInstaller.exe_Url_4t2i51jukdgmkdlwbxp45yg0m0woj4n0\2.10.4.0\user.config (copy)
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\JockerSoft\CodecInstaller.exe_Url_4t2i51jukdgmkdlwbxp45yg0m0woj4n0\2.10.4.0\we99acby.newcfg
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-QHN33.tmp\AFAsearch.bmp (copy)
PC bitmap, Windows 3.x format, 440 x 98 x 8, image size 43122, resolution 2834 x 2834 px/m, 255 important colors, cbSize 44196, bits offset 1074
dropped
C:\Users\user\AppData\Local\Temp\is-QHN33.tmp\AFAsearch_CT5.bmp (copy)
PC bitmap, Windows 3.x format, 440 x 98 x 8, image size 43122, resolution 2834 x 2834 px/m, 255 important colors, cbSize 44196, bits offset 1074
dropped
C:\Users\user\AppData\Local\Temp\is-QHN33.tmp\_isetup\_shfoldr.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-QHN33.tmp\homepage.bmp (copy)
PC bitmap, Windows 3.x format, 290 x 67 x 8, image size 19566, resolution 2834 x 2834 px/m, cbSize 20644, bits offset 1078
dropped
C:\Users\user\AppData\Local\Temp\is-QHN33.tmp\is-0Q9LH.tmp
PC bitmap, Windows 3.x format, 440 x 98 x 8, image size 43122, resolution 2834 x 2834 px/m, 255 important colors, cbSize 44196, bits offset 1074
dropped
C:\Users\user\AppData\Local\Temp\is-QHN33.tmp\is-90ROM.tmp
PC bitmap, Windows 3.x format, 347 x 26 x 24, resolution 2880 x 2880 px/m, cbSize 27198, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\is-QHN33.tmp\is-BHBEO.tmp
PC bitmap, Windows 3.x format, 290 x 67 x 8, image size 19566, resolution 2834 x 2834 px/m, cbSize 20644, bits offset 1078
dropped
C:\Users\user\AppData\Local\Temp\is-QHN33.tmp\is-HJ565.tmp
PC bitmap, Windows 3.x format, 440 x 98 x 8, image size 43122, resolution 2834 x 2834 px/m, 255 important colors, cbSize 44196, bits offset 1074
dropped
C:\Users\user\AppData\Local\Temp\is-QHN33.tmp\is-O3IUA.tmp
PC bitmap, Windows 3.x format, 211 x 30 x 24, image size 19080, cbSize 19134, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\is-QHN33.tmp\rank.bmp (copy)
PC bitmap, Windows 3.x format, 211 x 30 x 24, image size 19080, cbSize 19134, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\is-QHN33.tmp\sbar.bmp (copy)
PC bitmap, Windows 3.x format, 347 x 26 x 24, resolution 2880 x 2880 px/m, cbSize 27198, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\nspFDE9.tmp\InstallOptions.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nspFDE9.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nspFDE9.tmp\crawler.ini
Generic INItialization configuration [Field 1]
dropped
C:\Users\user\AppData\Local\Temp\nspFDE9.tmp\crawlerscreen.bmp
PC bitmap, Windows 3.x format, 416 x 73 x 8, image size 30368, resolution 2835 x 2835 px/m, cbSize 31446, bits offset 1078
dropped
C:\Users\user\AppData\Local\Temp\nspFDE9.tmp\ioSpecial.ini
Generic INItialization configuration [Field 1]
dropped
C:\Users\user\AppData\Local\Temp\nspFDE9.tmp\modern-header.bmp
PC bitmap, Windows 3.x format, 150 x 57 x 8, image size 8664, resolution 7874 x 7874 px/m, cbSize 9742, bits offset 1078
dropped
C:\Users\user\AppData\Local\Temp\nspFDE9.tmp\modern-wizard.bmp
PC bitmap, Windows 3.x format, 164 x 314 x 8, image size 51496, resolution 2834 x 2834 px/m, cbSize 52574, bits offset 1078
dropped
There are 87 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\setup_CodecInstaller_full.exe
"C:\Users\user\Desktop\setup_CodecInstaller_full.exe"
malicious
C:\Program Files (x86)\JockerSoft\CodecInstaller\CrawlerSetup12.exe
"C:\Program Files (x86)\JockerSoft\CodecInstaller\CrawlerSetup12.exe" /NORESTART /verysilent
malicious
C:\Users\user\AppData\Local\Temp\is-56AVD.tmp\CrawlerSetup12.tmp
"C:\Users\user\AppData\Local\Temp\is-56AVD.tmp\CrawlerSetup12.tmp" /SL5="$304AA,2431449,71680,C:\Program Files (x86)\JockerSoft\CodecInstaller\CrawlerSetup12.exe" /NORESTART /verysilent
malicious
C:\Program Files (x86)\JockerSoft\CodecInstaller\CodecInstaller.exe
"C:\Program Files (x86)\JockerSoft\CodecInstaller\CodecInstaller.exe"
malicious
C:\Program Files (x86)\Crawler\CToolbar.exe
"C:\Program Files (x86)\Crawler\CToolbar.exe" /REGSVR
malicious

URLs

Name
IP
Malicious
http://www.mmedia.com.twFNUM
unknown
http://darchiver.narod.ru/FNUM
unknown
http://www.ddisoftware.com/qimage/FNUM
unknown
http://www.rdg.ac.uk/ITS/Topic/Graphics/GrGImagi01/FNUM
unknown
http://iesdp.gibberlings3.net/file_formats/ie_formats/chr_v2.htmFNUM
unknown
http://tng3d.com/index.phpFNUM
unknown
http://www.cadifra.comFNUM
unknown
http://www.ortim.deFNUM
unknown
http://www.smartdraw.comFNUM
unknown
http://www.smalleranimals.com/pickaxe.htmFNUM
unknown
http://www.maxthon.com/FNUM
unknown
http://www.emeditor.comFNUM
unknown
http://www.iti.deFNUM
unknown
http://ecards.funutilities.com/ecards/000204/Family.html?tbid=%tb_id
unknown
http://www.bars.lg.ua/slim/#introFNUM
unknown
http://www.godot64.de/german/welcome.htmFNUM
unknown
http://www.applian.com/FNUM
unknown
http://www.fontbureau.com/designers
unknown
http://www.saba.com/products/centra/FNUM
unknown
http://www.hitmill.com/programming/vb/filetypes.htmlFNUM
unknown
http://developer.valvesoftware.com/wiki/StudiomdlFNUM
unknown
http://www.astonshell.com/FNUM
unknown
http://www.redzion.com/
unknown
http://www.litsoft.com/FNUM
unknown
http://apple2.org.za/gswv/a2zine/Docs/DiskImage_2MG_Info.txtFNUM
unknown
http://www.photofont.comFNUM
unknown
http://iesdp.gibberlings3.net/file_formats/ie_formats/sav_v1.htmFNUM
unknown
http://www.lancos.com/prog.htmlFNUM
unknown
http://mwolson.org/static/doc/muse/Introduction.htmlFNUM
unknown
http://www.crawler.com/help/default.aspx?b=2&m=CR_Options_Help&i=
unknown
http://www.muvee.comFNUM
unknown
http://www.cyberlink.com/products/powerproducerFNUM
unknown
http://dnl.crawler.com/dnl/config/250/CrawlerRadio_Setup.exe
unknown
http://wiki.mobileread.com/wiki/WOLFFNUM
unknown
http://www.teambg.com/iesdp/FilesFormats/WEDformat.htmFNUM
unknown
http://www.realtick.com/FNUM
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.tsp.ece.mcgill.ca/MMSP/Documents/AudioFormats/CSL/CSL.htmlFNUM
unknown
http://www.idrisi.com/FNUM
unknown
http://www.powertodolist.com/FNUM
unknown
http://www.encode.ru/FNUM
unknown
http://www.cloanto.com/FNUM
unknown
http://www.epocnova.com/mediasafe.htmlFNUM
unknown
http://ecards.funutilities.com/ecards/000307/Wedding.html?tbid=%tb_id
unknown
http://dnl.imtoolpack.com/Dnl/config/250/IMToolPackSetup.exe
unknown
http://www.improvision.com/products/openlab/FNUM
unknown
http://www.trimble.comFNUM
unknown
http://mark0.net/soft-trid-e.html
unknown
http://wiki.panotools.org/Hugin_Main_windowFNUM
unknown
http://www.pitrinec.com/pkindex.htmFNUM
unknown
http://www.stardock.com/products/objectbar/FNUM
unknown
http://click.linksynergy.com/fs-bin/click?id=OEteVqYv4Mw&offerid=96200.10000001&type=3&subid=0
unknown
http://wrath.t35.comDEF
unknown
http://psycle.pastnotecut.org/portal.phpFNUM
unknown
http://get.games.yahoo.com/proddesc?gamekey=chuzzleFNUM
unknown
http://www.crystaloffice.com/maple/FNUM
unknown
http://joost.endoria.net/icontweaker/home/FNUM
unknown
http://home20.inet.tele.dk/hexmaster/bcs/tech_ref.htmFNUM
unknown
http://www.anrdoezrs.net/click-1714332-3996279
unknown
http://www.jockersoft.com/english/codecinstaller_index.phpr
unknown
http://www.overdrive.com/FNUM
unknown
http://www.oatsoft.org/Software/RemoteKeysFNUM
unknown
http://www.crawler.com/help/default.aspx?src=tbmenu&b=2&m=CR_Options_Help&i=an
unknown
http://panks.tripod.com/DEF
unknown
http://www.think3.com/en/product_development/thinkdesign.aspFNUM
unknown
http://pencil-animation.org/FNUM
unknown
http://sweetheartgames.com/FNUM
unknown
http://wiki.openstreetmap.org/wiki/ProtocolBufBinary#File_formatFNUM
unknown
http://www.quinnware.com/list_plugins.php?type=inputFNUM
unknown
http://www.aerofly.com/FNUM
unknown
http://www.vernier.com/products/software/ga/FNUM
unknown
http://www.crawler.com/search/dispatcher.aspx?tp=dic&qkw=#search#&tbid=#TbId#
unknown
http://www.yanceydesktop.com/eBooks/ebooks.htmFNUM
unknown
http://ecards.funutilities.com/ecards/000506/Thank-You.html?tbid=%tb_id
unknown
http://jss.sourceforge.net/moddoc/psm-form.txtFNUM
unknown
http://www.cimatron.com/FNUM
unknown
http://droid.sourceforge.net/FNUM
unknown
http://www.orcadpcb.com/FNUM
unknown
http://nsis.sf.net/NSIS_Error
unknown
http://cfg.crawler.com/cr_config.asmx/getCursor?CursorID=%currentcursor%
unknown
http://www.vernier.com/soft/lp.htmlFNUM
unknown
http://www.hilgraeve.com/htpe/index.htmlFNUM
unknown
http://www.avery.comFNUM
unknown
http://www.macdisk.com/conven.php3FNUM
unknown
http://www.accelrys.com/cerius2/FNUM
unknown
http://www.b1.org/FNUM
unknown
http://www.opendarwin.org/projects/xar/FNUM
unknown
http://www.tdsway.com/FNUM
unknown
http://www.teambg.com/iesdp/FilesFormats/CHRformat.htmFNUM
unknown
http://iesdp.gibberlings3.net/file_formats/ie_formats/bif_v1.htm#bifc_v1FNUM
unknown
http://www.planetsquires.com/firefly.htmFNUM
unknown
http://vp.video.google.com/videodownload?version=0&secureurl=STRN
unknown
http://www.solidworks.com/FNUM
unknown
http://www.idsoftware.com/games/quake/quake2/FNUM
unknown
http://paulbourke.net/dataformats/tp/FNUM
unknown
http://www.pgp.com/FNUM
unknown
http://www.familysearch.org/eng/paf/FNUM
unknown
http://www.teach2000.org/FNUM
unknown
http://www.crawler.com/legal/about.aspx
unknown
http://www.oracle.com/FNUM
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.jockersoft.com
172.67.130.88

IPs

IP
Domain
Country
Malicious
172.67.130.88
www.jockersoft.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{8736C681-37A0-40C6-A0F0-4C083409151C}\iexplore\AllowedDomains\*
NULL
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
C:\Program Files (x86)\Crawler\CToolbar.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{8736C681-37A0-40C6-A0F0-4C083409151C}\iexplore
Flags
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\PROTOCOLS\Handler\tbr
NULL
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\PROTOCOLS\Handler\tbr
CLSID
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1CB20BF0-BBAE-40A7-93F4-6435FF3D0411}
NULL
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1CB20BF0-BBAE-40A7-93F4-6435FF3D0411}
NoExplorer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar
{4B3803EA-5230-4DC3-A7FC-33638F3D3542}
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\CodecInstaller.exe
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\CodecInstaller
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\CodecInstaller
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\CodecInstaller
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\CodecInstaller
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\CodecInstaller
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\CodecInstaller
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\CodecInstaller
NSIS:Language2.7
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
InnoLang
HKEY_CURRENT_USER\SOFTWARE\CToolbar
INNOWIN
HKEY_CURRENT_USER\SOFTWARE\CToolbar
UNDERTABS
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Setup
TB_ID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Setup
UPDATE_DOMAIN
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Setup
UPDATE_BRAND
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Setup
CT5_INSTALL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Setup
ReposFix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Import
_TBR_KEEPSP
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Import
_TBR_NoSPDailyCheck
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Import
_TBR_BBAInfoShow
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Import
_TBR_SEAInfoShow
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Import
_TBR_ASINFOShow
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Import
_TBR_ERINFOShow
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Import
_TBR_SEAInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Import
_TBR_ASINFO
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Import
_TBR_ERINFO
HKEY_CURRENT_USER\SOFTWARE\CToolbar
FF_INSTSET_SEARCH
HKEY_CURRENT_USER\SOFTWARE\CToolbar
FF_SEARCH
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Import
_TBR_HPInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Import
_TBR_HPINFOShow
HKEY_CURRENT_USER\SOFTWARE\CToolbar
OriginalHP
HKEY_CURRENT_USER\SOFTWARE\CToolbar
FF_INSTSET_HOMEPAGE
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Import
TBR_AFA_DONE
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Import
_TBR_KEEPSP
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Import
_TBR_NoSPDailyCheck
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main
Start Page
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit
Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device
CLSID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device
MidiOutId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device
CLSID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device
DSGuid
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Multimedia\ActiveMovie\Filter Cache64
0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CodecInstaller_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CodecInstaller_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CodecInstaller_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CodecInstaller_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CodecInstaller_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CodecInstaller_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CodecInstaller_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CodecInstaller_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CodecInstaller_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CodecInstaller_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CodecInstaller_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CodecInstaller_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CodecInstaller_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CodecInstaller_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication
Name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication
ID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MPEG2Demultiplexer
StreamType
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MPEG2Demultiplexer
WriteCapture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MPEG2Demultiplexer
WriteCaptureDir
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MPEG2Demultiplexer
WriteCapturePath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
BRAND
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
BRAND_LONG
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
BRAND_CODE
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
BRAND_DOMAIN
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
BRAND_FOLDER
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_CS_ShortName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_CS_LongName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_CS_Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_CS_UTF8
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_CS_SortID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_DA_ShortName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_DA_LongName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_DA_Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_DA_UTF8
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_DA_SortID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_DE_ShortName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_DE_LongName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_DE_Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_DE_UTF8
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_DE_SortID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_EN_ShortName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_EN_LongName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_EN_Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_EN_UTF8
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_EN_SortID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_ES_ShortName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_ES_LongName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_ES_Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_ES_UTF8
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_ES_SortID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_FR_ShortName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_FR_LongName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_FR_Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_FR_UTF8
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_FR_SortID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_IT_ShortName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_IT_LongName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_IT_Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_IT_UTF8
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_IT_SortID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_NL_ShortName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_NL_LongName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_NL_Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_NL_UTF8
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_NL_SortID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_PL_ShortName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_PL_LongName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_PL_Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_PL_UTF8
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_PL_SortID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_PT-BR_ShortName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_PT-BR_LongName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_PT-BR_Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_PT-BR_UTF8
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_PT-BR_SortID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_PT_ShortName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_PT_LongName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_PT_Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_PT_UTF8
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_PT_SortID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_RU_ShortName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_RU_LongName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_RU_Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_RU_UTF8
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
lng_TBR5_RU_SortID
HKEY_CURRENT_USER\SOFTWARE\CToolbar
Language
HKEY_CURRENT_USER\SOFTWARE\CToolbar
TBR5_Language_Ver
HKEY_CURRENT_USER\SOFTWARE\CToolbar
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
LOCAL_IT
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
INSTALLUSER
HKEY_CURRENT_USER\SOFTWARE\CToolbar
CRINFOShow
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\PlugIns
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Install
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Import
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Export
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Downloads
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
CFG_URL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
CFG_CHECK_HOUR
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
INSTALL_CONFIRM_1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
INSTALL_CONFIRM_SYS
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
UNINST_NAME
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
UNINST_PUBLISHER
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
UNINST_HELPINFO
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
UNINST_ABOUTINFO
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
UNINST_UPDATEINFO
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
UNINST_CONFIRM
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
UNINSTALL_INFO_1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
UNINSTALL_INFO_2
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
RANDOM_SKIN
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
SKIN_CONFIRM
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
RANDOM_CURSOR
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
CURSOR_CONFIRM
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
MANUAL_UPDATE
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
DOWN_QUEUE
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
DOWN_DETAIL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
DOWN_SHOW
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
DOWN_ASK
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
EXIT_PROC
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
DLG_HELP
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
WHATS_THIS
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
HELP_URL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
INSTALL_WAIT
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
FF_SEARCH_URL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
TERMS_URL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
PRIVACY_URL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
PRODUCTS_URL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
DOWN5_DETAIL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
DOWN5_QUEUE
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
DOWN5_ASK
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
DOWN5_SHOW
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
SAVE_CFG_HIT
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
MAIN_URL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
CT5_UPGD_NOTIFY_URL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
FF_CT5_UPGD_NOTIFY_URL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
CT51_UPGD_NOTIFY_URL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
CONFIRM_SRC
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
HOME_PAGE_DEF_DWN
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
SPT_CFG
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
CrawlerTBID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Installer\UserData
TUID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
STUI
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
TUID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
INSTALL_CONFIRMED
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
INSTALL_LEVEL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
D_CFG_UPD
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
D_SCHED
HKEY_CURRENT_USER\SOFTWARE\CToolbar\Server
P_USR
HKEY_CURRENT_USER\SOFTWARE\CToolbar\Server
P_ADMIN
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
CFG_SRV_V
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
CFG_V_LST
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
CFG_PLUGINS
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
CFG_STATS
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
LAST_ASK_UPDATE
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
SSAIMODE
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
CT5_INSTALL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
ReposFix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Server
TB_ID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
TB_ID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\CToolbar_UNINSTALL
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\CToolbar_UNINSTALL
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\CToolbar_UNINSTALL
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\CToolbar_UNINSTALL
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\CToolbar_UNINSTALL
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\CToolbar_UNINSTALL
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\CToolbar_UNINSTALL
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FBF1B8D2-9A06-4174-A8B5-E38606DDB92B}
AppName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FBF1B8D2-9A06-4174-A8B5-E38606DDB92B}
AppPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FBF1B8D2-9A06-4174-A8B5-E38606DDB92B}
Policy
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7459F1D0-9FB6-4D71-AA7B-9DECB34EB704}
AppName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7459F1D0-9FB6-4D71-AA7B-9DECB34EB704}
AppPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7459F1D0-9FB6-4D71-AA7B-9DECB34EB704}
Policy
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{506F578A-91E1-46CE-830F-E2F4268E9966}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{506F578A-91E1-46CE-830F-E2F4268E9966}\1.0\FLAGS
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{506F578A-91E1-46CE-830F-E2F4268E9966}\1.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{506F578A-91E1-46CE-830F-E2F4268E9966}\1.0\HELPDIR
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{604EA016-1EDE-41E6-A23E-76CF8F2A4808}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{604EA016-1EDE-41E6-A23E-76CF8F2A4808}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{604EA016-1EDE-41E6-A23E-76CF8F2A4808}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{604EA016-1EDE-41E6-A23E-76CF8F2A4808}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{604EA016-1EDE-41E6-A23E-76CF8F2A4808}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{604EA016-1EDE-41E6-A23E-76CF8F2A4808}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{604EA016-1EDE-41E6-A23E-76CF8F2A4808}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{604EA016-1EDE-41E6-A23E-76CF8F2A4808}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E9BBD270-4B87-4EE2-912F-6635674986C0}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E9BBD270-4B87-4EE2-912F-6635674986C0}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E9BBD270-4B87-4EE2-912F-6635674986C0}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E9BBD270-4B87-4EE2-912F-6635674986C0}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B3BA5582-79A9-464D-A7FA-711C5888C6E9}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B3BA5582-79A9-464D-A7FA-711C5888C6E9}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B3BA5582-79A9-464D-A7FA-711C5888C6E9}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B3BA5582-79A9-464D-A7FA-711C5888C6E9}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B3BA5582-79A9-464D-A7FA-711C5888C6E9}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B3BA5582-79A9-464D-A7FA-711C5888C6E9}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B3BA5582-79A9-464D-A7FA-711C5888C6E9}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{41349826-5C7F-4BF0-8279-5DAF1DE6E9AE}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{41349826-5C7F-4BF0-8279-5DAF1DE6E9AE}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{41349826-5C7F-4BF0-8279-5DAF1DE6E9AE}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{41349826-5C7F-4BF0-8279-5DAF1DE6E9AE}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{41349826-5C7F-4BF0-8279-5DAF1DE6E9AE}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{01C78433-6FDF-4E5A-A82D-B535C32E03DF}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{01C78433-6FDF-4E5A-A82D-B535C32E03DF}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{01C78433-6FDF-4E5A-A82D-B535C32E03DF}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{01C78433-6FDF-4E5A-A82D-B535C32E03DF}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{01C78433-6FDF-4E5A-A82D-B535C32E03DF}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{E79BB61D-7F1A-41DF-8AD0-402795E3B566}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{E79BB61D-7F1A-41DF-8AD0-402795E3B566}\1.0\FLAGS
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{E79BB61D-7F1A-41DF-8AD0-402795E3B566}\1.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{E79BB61D-7F1A-41DF-8AD0-402795E3B566}\1.0\HELPDIR
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1DDA201E-5B42-4352-933E-21A92B297E3B}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1DDA201E-5B42-4352-933E-21A92B297E3B}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1DDA201E-5B42-4352-933E-21A92B297E3B}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ctbcommon.Buttons
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ctbcommon.Buttons\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1DDA201E-5B42-4352-933E-21A92B297E3B}\ProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1DDA201E-5B42-4352-933E-21A92B297E3B}\Version
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1DDA201E-5B42-4352-933E-21A92B297E3B}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1DDA201E-5B42-4352-933E-21A92B297E3B}
PluginName
HKEY_CURRENT_USER\SOFTWARE\CToolbar\Files\COMMON
FFShowTime
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\PlugIns\COMMON
CRT5_SUPPORT
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\PlugIns\COMMON
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\PlugIns
ALL_PLUGINS
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\PlugIns\COMMON
INSTALLED
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\PlugIns\COMMON
LIB
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\PlugIns\COMMON
CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\PlugIns\COMMON
COMMON_ALL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files\APP
FILENAME
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files\TBR
FILENAME
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files\COMMON
FILENAME
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files\COMMON
TYPE
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files\COMMON
PATH
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files\COMMON
URL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files\COMMON
CFGVER
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files\COMMON
DOWNSIZE
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files\COMMON
DOWNVER
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files\COMMON
DISABLEVER
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files\COMMON
ASKVER
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files\COMMON
ASKCOUNT
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files\COMMON
DOWNSTATE
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files\COMMON
DOWNCAPTION
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files\COMMON
DOWNCAB
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files
ALL_FILES
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{183643C8-EE67-4574-9A38-927852E34163}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{183643C8-EE67-4574-9A38-927852E34163}\LocalServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CToolbar.TB4Server
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CToolbar.TB4Server\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{183643C8-EE67-4574-9A38-927852E34163}\ProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{183643C8-EE67-4574-9A38-927852E34163}\Version
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{183643C8-EE67-4574-9A38-927852E34163}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{183643C8-EE67-4574-9A38-927852E34163}\LocalServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{54ECA872-DB2A-4C6B-BBB2-F3777C6786CC}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{54ECA872-DB2A-4C6B-BBB2-F3777C6786CC}\LocalServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CToolbar.TB4Client
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CToolbar.TB4Client\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{54ECA872-DB2A-4C6B-BBB2-F3777C6786CC}\ProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{54ECA872-DB2A-4C6B-BBB2-F3777C6786CC}\Version
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{54ECA872-DB2A-4C6B-BBB2-F3777C6786CC}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{54ECA872-DB2A-4C6B-BBB2-F3777C6786CC}\LocalServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8736C681-37A0-40C6-A0F0-4C083409151C}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8736C681-37A0-40C6-A0F0-4C083409151C}\LocalServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CToolbar.TB4Script
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CToolbar.TB4Script\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8736C681-37A0-40C6-A0F0-4C083409151C}\ProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8736C681-37A0-40C6-A0F0-4C083409151C}\Version
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8736C681-37A0-40C6-A0F0-4C083409151C}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8736C681-37A0-40C6-A0F0-4C083409151C}\LocalServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8736C681-37A0-40C6-A0F0-4C083409151C}\Implemented Categories
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8736C681-37A0-40C6-A0F0-4C083409151C}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8736C681-37A0-40C6-A0F0-4C083409151C}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
UsedStartMenu
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4D25FB7A-8902-4291-960E-9ADA051CFBBF}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4D25FB7A-8902-4291-960E-9ADA051CFBBF}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4D25FB7A-8902-4291-960E-9ADA051CFBBF}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ctbr.R404Pro
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ctbr.R404Pro\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4D25FB7A-8902-4291-960E-9ADA051CFBBF}\ProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1CB20BF0-BBAE-40A7-93F4-6435FF3D0411}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1CB20BF0-BBAE-40A7-93F4-6435FF3D0411}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1CB20BF0-BBAE-40A7-93F4-6435FF3D0411}\InprocServer32
ThreadingModel
HKEY_CURRENT_USER\SOFTWARE\CToolbar
DM_FOLDER
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Export
TBR_BBEXMODE
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Export
TBR_Home_Page
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Export
TBR_Home_Page_Info
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Export
TBR_SEARCH_PAGE_INFO
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Export
TBR_BROWSERBAR_DIALOG
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Export
TBR_Home_Page_DEF
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Export
TBR_SEARCH_DIALOG_DEF
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Export
TBR_BROWSERBAR_DIALOG_DEF
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Export
TBR_SEARCH_OVERRIDE
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Export
TBR_SEARCH_DIALOG
HKEY_CURRENT_USER\SOFTWARE\CToolbar
KImport_Hash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{1CB20BF0-BBAE-40A7-93F4-6435FF3D0411}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{1CB20BF0-BBAE-40A7-93F4-6435FF3D0411}
NULL
HKEY_CURRENT_USER\SOFTWARE\CToolbar
CT_MANUAL_HIDE
HKEY_CURRENT_USER\SOFTWARE\CToolbar
LastDll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Installer\UserData\Crawler
C
HKEY_CURRENT_USER\SOFTWARE\CToolbar
CSHOW
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B3803EA-5230-4DC3-A7FC-33638F3D3542}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B3803EA-5230-4DC3-A7FC-33638F3D3542}\InprocServer32
NULL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{4B3803EA-5230-4DC3-A7FC-33638F3D3542}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{4B3803EA-5230-4DC3-A7FC-33638F3D3542}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B3803EA-5230-4DC3-A7FC-33638F3D3542}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
AllowUseDefskin
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
BRAND_FOLDER
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
BRAND_FOLDER
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
BRAND_FOLDER
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar
BRAND_FOLDER
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{506F578A-91E1-46CE-830F-E2F4268E9966}\1.0\HELPDIR
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4D25FB7A-8902-4291-960E-9ADA051CFBBF}
NULL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{1CB20BF0-BBAE-40A7-93F4-6435FF3D0411}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{1CB20BF0-BBAE-40A7-93F4-6435FF3D0411}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1CB20BF0-BBAE-40A7-93F4-6435FF3D0411}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B3803EA-5230-4DC3-A7FC-33638F3D3542}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files\COMMON
PATH
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files\COMMON
URL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files\COMMON
CFGVER
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files\COMMON
DOWNVER
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files\COMMON
DISABLEVER
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files\COMMON
ASKVER
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files\COMMON
DOWNCAPTION
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CToolbar\Files\COMMON
DOWNCAB
There are 367 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5279000
heap
page read and write
71D5000
heap
page read and write
5A70000
heap
page read and write
31C0000
trusted library allocation
page read and write
278D000
heap
page read and write
31C0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
9B000
stack
page read and write
7FF4CE470000
trusted library allocation
page execute and read and write
5925000
heap
page read and write
413000
unkown
page readonly
683000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page execute and read and write
3100000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
5386000
heap
page read and write
23EB000
direct allocation
page read and write
3100000
trusted library allocation
page read and write
1CE20000
trusted library allocation
page read and write
5A4C000
heap
page read and write
31D6000
direct allocation
page read and write
31C0000
trusted library allocation
page read and write
2240000
direct allocation
page read and write
5821000
heap
page read and write
2120000
direct allocation
page read and write
664000
heap
page read and write
31C0000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
6D0000
heap
page read and write
2406000
direct allocation
page read and write
6A0D000
heap
page read and write
2AAB000
trusted library allocation
page read and write
1F0000
heap
page read and write
527D000
heap
page read and write
543D000
heap
page read and write
3100000
trusted library allocation
page read and write
5C63000
heap
page read and write
31C0000
trusted library allocation
page read and write
5925000
heap
page read and write
5A6B000
heap
page read and write
31C0000
trusted library allocation
page read and write
620000
heap
page read and write
6CAE000
heap
page read and write
53CE000
heap
page read and write
23CF000
direct allocation
page read and write
6D6000
heap
page read and write
5AAB000
heap
page read and write
2000000
heap
page read and write
7C0000
heap
page read and write
2942000
trusted library allocation
page read and write
580000
heap
page read and write
5D16000
heap
page read and write
2B11000
heap
page read and write
5315000
heap
page read and write
96000
stack
page read and write
31C0000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
6DDF000
heap
page read and write
1F33E000
stack
page read and write
527E000
heap
page read and write
23B3000
direct allocation
page read and write
319E000
direct allocation
page read and write
2981000
heap
page read and write
5BD1000
heap
page read and write
2130000
direct allocation
page read and write
6E2A000
direct allocation
page read and write
2451000
direct allocation
page read and write
32C0000
trusted library allocation
page read and write
42D000
unkown
page readonly
31C0000
trusted library allocation
page read and write
5926000
heap
page read and write
1B31A000
heap
page read and write
1B240000
heap
page read and write
28FE000
trusted library allocation
page read and write
5A17000
heap
page read and write
6E4000
heap
page read and write
1D51E000
heap
page read and write
59C4000
heap
page read and write
53E7000
heap
page read and write
1B40A000
trusted library allocation
page read and write
6A5000
heap
page read and write
19A000
stack
page read and write
6661000
heap
page read and write
6F0000
heap
page execute and read and write
1CDA0000
trusted library allocation
page read and write
69E000
heap
page read and write
5514000
heap
page read and write
31C0000
trusted library allocation
page read and write
71C000
heap
page read and write
2E56000
direct allocation
page read and write
2A80000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
54DF000
heap
page read and write
28E1000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
5928000
heap
page read and write
31C0000
trusted library allocation
page read and write
6DB4000
heap
page read and write
5D3F000
heap
page read and write
31C0000
trusted library allocation
page read and write
9B000
stack
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
525000
heap
page read and write
2B6C000
trusted library allocation
page read and write
5339000
heap
page read and write
31A6000
direct allocation
page read and write
3100000
trusted library allocation
page read and write
5462000
heap
page read and write
280A000
trusted library allocation
page read and write
7FFD9BA85000
trusted library allocation
page read and write
592C000
heap
page read and write
5CD3000
heap
page read and write
6A4000
heap
page read and write
69D000
heap
page read and write
5929000
heap
page read and write
5274000
heap
page read and write
2376000
direct allocation
page read and write
5550000
direct allocation
page read and write
74A000
heap
page read and write
5D95000
heap
page read and write
19B000
stack
page read and write
69D3000
heap
page read and write
429000
unkown
page read and write
3100000
trusted library allocation
page read and write
2250000
direct allocation
page read and write
32C0000
trusted library allocation
page read and write
6E0000
heap
page read and write
31C0000
trusted library allocation
page read and write
85E000
stack
page read and write
23FE000
stack
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
1B01E000
stack
page read and write
5AAE000
heap
page read and write
32C0000
trusted library allocation
page read and write
5814000
direct allocation
page read and write
81E000
stack
page read and write
552D000
heap
page read and write
32C0000
trusted library allocation
page read and write
293D000
heap
page read and write
5B69000
heap
page read and write
32C0000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
2AC5000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
5814000
direct allocation
page read and write
5B5B000
heap
page read and write
23BA000
direct allocation
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
5B06000
heap
page read and write
2C32000
trusted library allocation
page read and write
6993000
heap
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
7FFD9B9D6000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
592E000
heap
page read and write
1B238000
heap
page read and write
7FFD9BB50000
trusted library allocation
page execute and read and write
6A25000
heap
page read and write
2B76000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
5270000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
227C000
direct allocation
page read and write
527F000
heap
page read and write
31C0000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
2D0F000
stack
page read and write
1F4000
heap
page read and write
3100000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
400000
unkown
page readonly
3100000
trusted library allocation
page read and write
4F2000
unkown
page read and write
6BE000
heap
page read and write
2F90000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
2925000
trusted library allocation
page read and write
89E000
stack
page read and write
650000
heap
page read and write
31C0000
trusted library allocation
page read and write
4F2000
heap
page read and write
5F3E000
heap
page read and write
5925000
heap
page read and write
2425000
direct allocation
page read and write
3100000
trusted library allocation
page read and write
5276000
heap
page read and write
40D000
unkown
page write copy
2C6F000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
2EA3000
direct allocation
page read and write
5BAC000
heap
page read and write
20FF000
stack
page read and write
2E4E000
direct allocation
page read and write
3100000
trusted library allocation
page read and write
54C0000
heap
page read and write
600000
heap
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
7FFD9BA8D000
trusted library allocation
page execute and read and write
32C0000
trusted library allocation
page read and write
5182000
heap
page read and write
6DA000
heap
page read and write
4F7000
unkown
page write copy
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
5279000
heap
page read and write
31F3000
direct allocation
page read and write
2E6B000
direct allocation
page read and write
1B350000
heap
page execute and read and write
32C0000
trusted library allocation
page read and write
2741000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
5BC3000
heap
page read and write
31C0000
trusted library allocation
page read and write
AF0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
6AC000
heap
page read and write
32C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
2200000
direct allocation
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
220C000
direct allocation
page read and write
32C0000
trusted library allocation
page read and write
4CA000
heap
page read and write
3100000
trusted library allocation
page read and write
5925000
heap
page read and write
31AE000
direct allocation
page read and write
32C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
2143000
direct allocation
page read and write
3150000
direct allocation
page read and write
31C0000
trusted library allocation
page read and write
2E72000
direct allocation
page read and write
571000
unkown
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
53D1000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
58E000
stack
page read and write
6CEA000
heap
page read and write
2E8E000
stack
page read and write
5925000
heap
page read and write
2EB1000
direct allocation
page read and write
3100000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
1D4A0000
heap
page read and write
32C0000
trusted library allocation
page read and write
980000
heap
page read and write
5270000
trusted library allocation
page read and write
2782000
trusted library allocation
page read and write
5BCE000
heap
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
1F4000
heap
page read and write
7C0000
heap
page read and write
795000
heap
page read and write
31C0000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
23F8000
direct allocation
page read and write
8AC000
heap
page read and write
5A70000
heap
page read and write
31C0000
trusted library allocation
page read and write
1B248000
heap
page read and write
3197000
direct allocation
page read and write
31C0000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
2209000
direct allocation
page read and write
2C10000
trusted library allocation
page read and write
23D6000
direct allocation
page read and write
32C0000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
770000
heap
page read and write
421000
unkown
page read and write
31C0000
trusted library allocation
page read and write
1B460000
heap
page read and write
3100000
trusted library allocation
page read and write
5B59000
heap
page read and write
2E64000
direct allocation
page read and write
779000
heap
page read and write
31C0000
trusted library allocation
page read and write
527B000
heap
page read and write
32C0000
trusted library allocation
page read and write
2F8F000
stack
page read and write
32C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
197000
stack
page read and write
31C0000
trusted library allocation
page read and write
4A0000
heap
page read and write
23A5000
direct allocation
page read and write
5924000
heap
page read and write
31C0000
trusted library allocation
page read and write
6AC000
heap
page read and write
7FFD9BB02000
trusted library allocation
page read and write
67E000
heap
page read and write
31C0000
trusted library allocation
page read and write
221E000
stack
page read and write
3100000
trusted library allocation
page read and write
57E000
unkown
page readonly
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
2877000
trusted library allocation
page read and write
543D000
heap
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
5362000
heap
page read and write
66C000
heap
page read and write
3100000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
2E4F000
stack
page read and write
3100000
trusted library allocation
page read and write
5C02000
heap
page read and write
59F6000
heap
page read and write
342F000
stack
page read and write
4DC000
heap
page read and write
3100000
trusted library allocation
page read and write
2350000
direct allocation
page read and write
31C0000
trusted library allocation
page read and write
2234000
heap
page read and write
31C0000
trusted library allocation
page read and write
85B000
heap
page read and write
1B420000
trusted library section
page read and write
2946000
heap
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
31E4000
direct allocation
page read and write
6ED000
heap
page read and write
31C0000
trusted library allocation
page read and write
5277000
heap
page read and write
808000
heap
page read and write
5EA5000
heap
page read and write
6A50000
direct allocation
page read and write
1B410000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
540B000
heap
page read and write
3100000
trusted library allocation
page read and write
2146000
direct allocation
page read and write
32C0000
trusted library allocation
page read and write
2415000
direct allocation
page read and write
3150000
direct allocation
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
7E3000
heap
page read and write
60D6000
heap
page read and write
5927000
heap
page read and write
32C0000
trusted library allocation
page read and write
6290000
direct allocation
page read and write
5923000
heap
page read and write
666A000
heap
page read and write
31EC000
direct allocation
page read and write
F0000
unkown
page readonly
2E4E000
direct allocation
page read and write
31C8000
direct allocation
page read and write
31C0000
trusted library allocation
page read and write
5A2A000
heap
page read and write
293E000
stack
page read and write
592E000
heap
page read and write
6C2C000
heap
page read and write
6F3000
heap
page execute and read and write
690000
heap
page read and write
6953000
heap
page read and write
533F000
heap
page read and write
3100000
trusted library allocation
page read and write
2B00000
heap
page read and write
2903000
trusted library allocation
page read and write
2A3F000
stack
page read and write
540000
heap
page read and write
2B10000
heap
page read and write
6F37000
heap
page read and write
2143E000
stack
page read and write
2240000
direct allocation
page read and write
59CC000
heap
page read and write
8CB000
heap
page read and write
31C0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
2230000
heap
page read and write
69B2000
heap
page read and write
568000
unkown
page read and write
32C0000
trusted library allocation
page read and write
1E900000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
5EB4000
direct allocation
page read and write
32C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
22A0000
direct allocation
page read and write
31FA000
direct allocation
page read and write
401000
unkown
page execute read
31C0000
trusted library allocation
page read and write
19C000
stack
page read and write
5AAA000
heap
page read and write
5920000
heap
page read and write
1B4E4000
heap
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
5299000
trusted library allocation
page read and write
578000
unkown
page write copy
6048000
heap
page read and write
31C0000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
5270000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
40D000
unkown
page read and write
5B11000
heap
page read and write
5AFD000
heap
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
22A0000
direct allocation
page read and write
6AF000
heap
page read and write
54BF000
heap
page read and write
3100000
trusted library allocation
page read and write
96000
stack
page read and write
63D000
heap
page read and write
5E2C000
heap
page read and write
3100000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
6DD000
heap
page read and write
29EB000
trusted library allocation
page read and write
1B1EC000
stack
page read and write
31C0000
trusted library allocation
page read and write
3172000
direct allocation
page read and write
1CE2F000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
527E000
heap
page read and write
31C0000
trusted library allocation
page read and write
293B000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
1B404000
trusted library allocation
page read and write
5B02000
heap
page read and write
32C0000
trusted library allocation
page read and write
5550000
direct allocation
page read and write
31C0000
trusted library allocation
page read and write
1CDC7000
unkown
page execute read
3100000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
534000
stack
page read and write
592E000
heap
page read and write
710000
heap
page read and write
65A000
heap
page read and write
2905000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
5172000
heap
page read and write
32C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
28A1000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
5273000
heap
page read and write
31C0000
trusted library allocation
page read and write
1CF30000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
666F000
heap
page read and write
32C0000
trusted library allocation
page read and write
666C000
heap
page read and write
5B26000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
592A000
heap
page read and write
70E000
stack
page read and write
31C0000
trusted library allocation
page read and write
5BBA000
heap
page read and write
1CB4F000
trusted library allocation
page read and write
7FFD9BA7A000
trusted library allocation
page execute and read and write
986000
heap
page read and write
31C0000
trusted library allocation
page read and write
893000
heap
page read and write
3173000
direct allocation
page read and write
5D78000
heap
page read and write
214F000
stack
page read and write
32C0000
trusted library allocation
page read and write
242D000
direct allocation
page read and write
6C89000
heap
page read and write
32C0000
trusted library allocation
page read and write
69D000
heap
page read and write
2EB1000
direct allocation
page read and write
6BB000
heap
page read and write
5A97000
heap
page read and write
243C000
direct allocation
page read and write
3100000
trusted library allocation
page read and write
2396000
direct allocation
page read and write
5B7C000
heap
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
5B7B000
heap
page read and write
62B000
heap
page read and write
2153D000
stack
page read and write
2146000
direct allocation
page read and write
5DB7000
heap
page read and write
31C0000
trusted library allocation
page read and write
5305000
heap
page read and write
32C0000
trusted library allocation
page read and write
5924000
heap
page read and write
5EBF000
heap
page read and write
953000
heap
page read and write
2130000
direct allocation
page read and write
6A0000
heap
page read and write
54A5000
heap
page read and write
5272000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
2ACF000
trusted library allocation
page read and write
5924000
heap
page read and write
810000
heap
page read and write
31C0000
trusted library allocation
page read and write
7FFD9B9C6000
trusted library allocation
page execute and read and write
1B450000
heap
page read and write
2114000
direct allocation
page read and write
32C0000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
1CE10000
trusted library allocation
page read and write
42D000
unkown
page readonly
5B5B000
heap
page read and write
32C0000
trusted library allocation
page read and write
529B000
trusted library allocation
page read and write
3150000
heap
page read and write
763000
heap
page read and write
31C0000
trusted library allocation
page read and write
5BEB000
heap
page read and write
8AF000
heap
page read and write
31C0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
401000
unkown
page execute read
6D2000
heap
page read and write
5B7F000
heap
page read and write
6650000
direct allocation
page read and write
2AFE000
stack
page read and write
53EE000
heap
page read and write
3100000
trusted library allocation
page read and write
5A8F000
heap
page read and write
3199000
direct allocation
page read and write
400000
unkown
page readonly
3100000
trusted library allocation
page read and write
AF7000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
2422000
direct allocation
page read and write
6E28000
direct allocation
page read and write
6E7000
heap
page read and write
31C0000
trusted library allocation
page read and write
5FC1000
heap
page read and write
32C0000
trusted library allocation
page read and write
655000
heap
page read and write
69E2000
heap
page read and write
3100000
trusted library allocation
page read and write
6AC000
heap
page read and write
1A7A0000
trusted library allocation
page read and write
1CB40000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
5A4C000
heap
page read and write
70C7000
heap
page read and write
5B90000
heap
page read and write
2E56000
direct allocation
page read and write
5816000
direct allocation
page read and write
541F000
heap
page read and write
3100000
trusted library allocation
page read and write
236B000
direct allocation
page read and write
3100000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
1B400000
trusted library allocation
page read and write
5171000
heap
page read and write
31C0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
1B370000
heap
page read and write
31C0000
trusted library allocation
page read and write
31CE000
stack
page read and write
31C0000
trusted library allocation
page read and write
5AF9000
heap
page read and write
1B444000
trusted library allocation
page read and write
5B82000
heap
page read and write
5DCC000
heap
page read and write
6669000
heap
page read and write
7FFD9BAFF000
trusted library allocation
page read and write
1C9D0000
heap
page read and write
5B3D000
heap
page read and write
53A3000
heap
page read and write
31C0000
trusted library allocation
page read and write
6A0000
heap
page read and write
6D33000
heap
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
31C0000
heap
page read and write
5B90000
heap
page read and write
20000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
5BB3000
heap
page read and write
1B41F000
trusted library allocation
page read and write
5272000
heap
page read and write
820000
direct allocation
page execute and read and write
1B2C3000
heap
page read and write
4EF000
unkown
page write copy
2934000
heap
page read and write
970000
trusted library section
page readonly
2148000
direct allocation
page read and write
6A9000
heap
page read and write
592A000
heap
page read and write
1D39E000
stack
page read and write
850000
heap
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
F0000
unkown
page readonly
31C0000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
317A000
direct allocation
page read and write
2E94000
direct allocation
page read and write
32C0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
6D0000
heap
page read and write
5BE8000
heap
page read and write
527C000
heap
page read and write
31C0000
trusted library allocation
page read and write
2848000
trusted library allocation
page read and write
5B3E000
heap
page read and write
7FFD9BAF9000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
238F000
direct allocation
page read and write
54A1000
heap
page read and write
3100000
trusted library allocation
page read and write
5EC1000
direct allocation
page read and write
31CF000
direct allocation
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
2EA3000
direct allocation
page read and write
6961000
heap
page read and write
2F90000
trusted library allocation
page read and write
1B250000
heap
page read and write
3100000
trusted library allocation
page read and write
527D000
heap
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
1CA0A000
heap
page read and write
3100000
trusted library allocation
page read and write
2EAA000
direct allocation
page read and write
31C0000
trusted library allocation
page read and write
950000
heap
page read and write
3100000
trusted library allocation
page read and write
5550000
direct allocation
page read and write
21DF000
stack
page read and write
32C0000
trusted library allocation
page read and write
6662000
heap
page read and write
5550000
direct allocation
page read and write
5E31000
heap
page read and write
7FFD9BA14000
trusted library allocation
page execute and read and write
2110000
direct allocation
page read and write
32C0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
7150000
heap
page read and write
2EB8000
direct allocation
page read and write
31C0000
trusted library allocation
page read and write
42C000
unkown
page read and write
237E000
direct allocation
page read and write
32C0000
trusted library allocation
page read and write
5BF0000
direct allocation
page read and write
32C0000
trusted library allocation
page read and write
783000
heap
page read and write
5C9A000
heap
page read and write
7FFD9BAB2000
trusted library allocation
page execute and read and write
3100000
trusted library allocation
page read and write
1CF2E000
stack
page read and write
2A9A000
trusted library allocation
page read and write
5AC4000
heap
page read and write
440000
heap
page read and write
32C0000
trusted library allocation
page read and write
6A44000
heap
page read and write
3100000
trusted library allocation
page read and write
2408000
direct allocation
page read and write
7AD000
heap
page read and write
5503000
heap
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
680000
heap
page read and write
31C0000
trusted library allocation
page read and write
3164000
direct allocation
page read and write
31C0000
trusted library allocation
page read and write
5A18000
heap
page read and write
2C73000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
3156000
direct allocation
page read and write
3100000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
1F2000
unkown
page readonly
32C0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
56D000
unkown
page read and write
32C0000
trusted library allocation
page read and write
8A5000
heap
page read and write
6B4000
heap
page read and write
6AB000
heap
page read and write
3100000
trusted library allocation
page read and write
7FFD9B9C2000
trusted library allocation
page execute and read and write
9D5000
heap
page read and write
5C3F000
heap
page read and write
2838000
trusted library allocation
page read and write
527E000
heap
page read and write
31C0000
trusted library allocation
page read and write
683000
heap
page read and write
316C000
direct allocation
page read and write
3100000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
B55000
heap
page read and write
31C0000
trusted library allocation
page read and write
2E5D000
direct allocation
page read and write
32C0000
trusted library allocation
page read and write
4EF000
unkown
page read and write
31C0000
trusted library allocation
page read and write
445F000
stack
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
1CE1F000
trusted library allocation
page read and write
6D58000
heap
page read and write
3100000
trusted library allocation
page read and write
5AF5000
heap
page read and write
1B276000
heap
page read and write
32C0000
trusted library allocation
page read and write
9D0000
heap
page read and write
1B440000
trusted library allocation
page read and write
18E000
stack
page read and write
67E000
heap
page read and write
6E0000
heap
page read and write
23E4000
direct allocation
page read and write
3100000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
267F000
stack
page read and write
2E8D000
direct allocation
page read and write
6983000
heap
page read and write
3410000
heap
page read and write
32C0000
trusted library allocation
page read and write
2E72000
direct allocation
page read and write
3100000
trusted library allocation
page read and write
54F3000
heap
page read and write
1B225000
heap
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
284A000
trusted library allocation
page read and write
5403000
heap
page read and write
31C0000
trusted library allocation
page read and write
1CF3D000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
652000
heap
page read and write
897000
heap
page read and write
1C5D0000
trusted library allocation
page read and write
5CB8000
heap
page read and write
31C0000
trusted library allocation
page read and write
5929000
heap
page read and write
544A000
heap
page read and write
2E9C000
direct allocation
page read and write
5279000
heap
page read and write
29A8000
trusted library allocation
page read and write
2580000
heap
page read and write
31C0000
trusted library allocation
page read and write
31DD000
direct allocation
page read and write
32C0000
trusted library allocation
page read and write
855000
heap
page read and write
409000
unkown
page write copy
1B230000
heap
page read and write
31C0000
trusted library allocation
page read and write
5B1C000
heap
page read and write
2358000
direct allocation
page read and write
5DEF000
heap
page read and write
48E000
stack
page read and write
3100000
trusted library allocation
page read and write
620000
heap
page read and write
401000
unkown
page execute read
5171000
heap
page read and write
3100000
trusted library allocation
page read and write
530000
heap
page read and write
528A000
trusted library allocation
page read and write
83E000
stack
page read and write
3100000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
6172000
heap
page read and write
5923000
heap
page read and write
3100000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
5820000
heap
page read and write
6E0C000
heap
page read and write
6C4F000
heap
page read and write
3100000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
6E5000
heap
page read and write
3100000
trusted library allocation
page read and write
4920000
trusted library allocation
page read and write
6D02000
heap
page read and write
31C0000
trusted library allocation
page read and write
4F4000
unkown
page read and write
5E50000
heap
page read and write
31C0000
trusted library allocation
page read and write
840000
heap
page read and write
3201000
direct allocation
page read and write
3100000
trusted library allocation
page read and write
31B4000
direct allocation
page read and write
31C0000
trusted library allocation
page read and write
240D000
direct allocation
page read and write
2EB8000
direct allocation
page read and write
680000
heap
page read and write
32C0000
trusted library allocation
page read and write
B50000
heap
page read and write
231F000
stack
page read and write
31C0000
trusted library allocation
page read and write
3208000
direct allocation
page read and write
31C0000
trusted library allocation
page read and write
F2000
unkown
page readonly
2A91000
trusted library allocation
page read and write
5926000
heap
page read and write
2128000
direct allocation
page read and write
223F000
direct allocation
page read and write
5270000
heap
page read and write
32CF000
stack
page read and write
400000
unkown
page readonly
5EC5000
heap
page read and write
31C0000
trusted library allocation
page read and write
28DF000
stack
page read and write
239E000
direct allocation
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
5926000
heap
page read and write
1B4E8000
heap
page read and write
6B4000
heap
page read and write
2EAA000
direct allocation
page read and write
296B000
trusted library allocation
page read and write
4C0000
heap
page read and write
332E000
stack
page read and write
5A54000
heap
page read and write
32C0000
trusted library allocation
page read and write
407000
unkown
page readonly
32C0000
trusted library allocation
page read and write
2E8D000
direct allocation
page read and write
32C0000
trusted library allocation
page read and write
5D19000
heap
page read and write
1B48F000
heap
page read and write
31C0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
592D000
heap
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
7F0000
heap
page read and write
3080000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
2950000
heap
page read and write
6FC3000
heap
page read and write
1D4DA000
heap
page read and write
32C0000
trusted library allocation
page read and write
7FFD9BA8A000
trusted library allocation
page execute and read and write
6A0E000
heap
page read and write
5272000
heap
page read and write
7FFD9BB10000
trusted library allocation
page execute and read and write
228C000
direct allocation
page read and write
1B220000
heap
page read and write
31C0000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
5A83000
heap
page read and write
2434000
direct allocation
page read and write
5ADD000
heap
page read and write
12745000
trusted library allocation
page read and write
5281000
trusted library allocation
page read and write
1CD58000
stack
page read and write
31C0000
trusted library allocation
page read and write
592D000
heap
page read and write
31C0000
trusted library allocation
page read and write
7FFD9B9BA000
trusted library allocation
page execute and read and write
32C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
6C2000
heap
page read and write
31C0000
trusted library allocation
page read and write
6F1000
heap
page read and write
2881000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
2E47000
direct allocation
page read and write
3100000
trusted library allocation
page read and write
1CF3A000
trusted library allocation
page read and write
664000
heap
page read and write
5920000
direct allocation
page read and write
7FFD9B9B2000
trusted library allocation
page execute and read and write
5171000
heap
page read and write
3100000
trusted library allocation
page read and write
1CF38000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
1CDAF000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
5ACD000
heap
page read and write
2957000
heap
page read and write
7044000
heap
page read and write
6664000
heap
page read and write
409000
unkown
page read and write
32C0000
trusted library allocation
page read and write
5270000
trusted library allocation
page read and write
520000
heap
page read and write
3191000
direct allocation
page read and write
2144000
direct allocation
page read and write
8AA000
heap
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
3470000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
400000
unkown
page readonly
315D000
direct allocation
page read and write
32C0000
trusted library allocation
page read and write
5480000
heap
page read and write
31C0000
trusted library allocation
page read and write
84A000
heap
page read and write
410000
unkown
page write copy
277F000
stack
page read and write
31C0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
430000
heap
page read and write
31C0000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
983000
heap
page read and write
3100000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
2E9C000
direct allocation
page read and write
32C0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
5550000
direct allocation
page read and write
59E2000
heap
page read and write
3100000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
5E8F000
heap
page read and write
32C0000
trusted library allocation
page read and write
660000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
3100000
trusted library allocation
page read and write
210F000
stack
page read and write
32C0000
trusted library allocation
page read and write
2969000
heap
page read and write
32C0000
trusted library allocation
page read and write
85A000
heap
page read and write
1D4C5000
heap
page read and write
5C87000
heap
page read and write
29E9000
trusted library allocation
page read and write
27DE000
stack
page read and write
32C0000
trusted library allocation
page read and write
5816000
direct allocation
page read and write
3100000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
5CE000
stack
page read and write
6D9B000
heap
page read and write
21FF000
stack
page read and write
31C0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
7FFD9B9DF000
trusted library allocation
page execute and read and write
B4F000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
5928000
heap
page read and write
31C0000
trusted library allocation
page read and write
400000
unkown
page readonly
2E64000
direct allocation
page read and write
31C0000
trusted library allocation
page read and write
6CB000
heap
page read and write
2163E000
stack
page read and write
6C9000
heap
page read and write
2973000
heap
page read and write
31C0000
trusted library allocation
page read and write
6C0000
heap
page read and write
5F0000
heap
page read and write
1B1F0000
heap
page read and write
31C0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
5A3B000
heap
page read and write
527C000
heap
page read and write
32C0000
trusted library allocation
page read and write
288B000
trusted library allocation
page read and write
6A2000
heap
page read and write
32C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
69B7000
heap
page read and write
2960000
heap
page read and write
3100000
trusted library allocation
page read and write
7FFD9BA72000
trusted library allocation
page execute and read and write
5926000
heap
page read and write
3181000
direct allocation
page read and write
539D000
heap
page read and write
8A0000
heap
page read and write
568000
unkown
page write copy
1B23C000
heap
page read and write
5C17000
heap
page read and write
31C0000
trusted library allocation
page read and write
2350000
direct allocation
page read and write
32C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
244A000
direct allocation
page read and write
5374000
heap
page read and write
1D29E000
stack
page read and write
31C0000
trusted library allocation
page read and write
7AE000
stack
page read and write
3100000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
527C000
heap
page read and write
592F000
heap
page read and write
32C0000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
3188000
direct allocation
page read and write
401000
unkown
page execute read
576000
unkown
page read and write
401000
unkown
page execute read
32C0000
trusted library allocation
page read and write
760000
heap
page read and write
3100000
trusted library allocation
page read and write
407000
unkown
page readonly
12741000
trusted library allocation
page read and write
1B390000
trusted library section
page read and write
3100000
trusted library allocation
page read and write
6A0000
heap
page read and write
31C0000
trusted library allocation
page read and write
32C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
2E7A000
direct allocation
page read and write
53AD000
heap
page read and write
7EE000
stack
page read and write
8A2000
heap
page read and write
6933000
heap
page read and write
31C0000
trusted library allocation
page read and write
23AC000
direct allocation
page read and write
2E94000
direct allocation
page read and write
2950000
trusted library allocation
page read and write
4FC000
unkown
page readonly
22B1000
direct allocation
page read and write
5550000
direct allocation
page read and write
2B20000
heap
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
6C2000
heap
page read and write
31C0000
trusted library allocation
page read and write
6A0000
heap
page read and write
7FFD9B9E3000
trusted library allocation
page execute and read and write
31C0000
trusted library allocation
page read and write
1B495000
heap
page read and write
2D4E000
stack
page read and write
4460000
direct allocation
page read and write
31C0000
trusted library allocation
page read and write
2AD7000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
5AB7000
heap
page read and write
1C5F2000
trusted library allocation
page read and write
7FF4CE460000
trusted library allocation
page execute and read and write
5AE2000
heap
page read and write
21E0000
heap
page read and write
31C0000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
420000
heap
page read and write
23DD000
direct allocation
page read and write
31C0000
trusted library allocation
page read and write
6290000
direct allocation
page read and write
3100000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
1B2A8000
heap
page read and write
There are 1082 hidden memdumps, click here to show them.