IOC Report
SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\Animation.gif (copy)
GIF image data, version 89a, 48 x 48
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\Cookies.txt (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\English.ini (copy)
Generic INItialization configuration [Actions]
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\GExts.txt (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\HomePage.url (copy)
MS Windows 95 Internet shortcut text (URL=<https:/smartpctools.com/>), ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\IDs.txt (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SList.db (copy)
SQLite 3.x database, last written using SQLite version 3011000, page size 1024, file counter 3, database pages 1069, cookie 0x18, schema 4, UTF-8, version-valid-for 3
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SList.txt (copy)
Non-ISO extended-ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SchedTasks.txt (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\Services1.txt (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\Services2.txt (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SiteNtf.txt (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.chm (copy)
MS Windows HtmlHelp Data
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-0G7HO.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-1PMDN.tmp
Non-ISO extended-ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-5C8ME.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-5SAIC.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-5U6HD.tmp
GIF image data, version 89a, 48 x 48
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-64K5H.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-9M7P5.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-AQ7RN.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-G591B.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-IMR9G.tmp
SQLite 3.x database, last written using SQLite version 3034000, file counter 37, database pages 366, cookie 0x1a, schema 4, UTF-8, version-valid-for 37
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-J06LH.tmp
MS Windows 95 Internet shortcut text (URL=<https:/smartpctools.com/>), ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-JPQCC.tmp
Generic INItialization configuration [Actions]
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-MAA00.tmp
MS Windows HtmlHelp Data
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-OJI0N.tmp
SQLite 3.x database, last written using SQLite version 3011000, page size 1024, file counter 3, database pages 1069, cookie 0x18, schema 4, UTF-8, version-valid-for 3
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-RADPK.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-T33J2.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-UJHD8.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-VNBPS.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\net.db
SQLite 3.x database, last written using SQLite version 3008002, file counter 46, database pages 495, cookie 0x23, schema 4, UTF-8, version-valid-for 46
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\net.db-journal
SQLite Rollback Journal
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\sqlite3.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\unins000.dat
InnoSetup Log Smart PC Optimizer, version 0x418, 33246 bytes, 320946\37\user, C:\Program Files (x86)\Smart PC Solutions\
modified
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\unins000.msg
InnoSetup messages, version 6.0.0, 261 messages (UTF-16), Cancel installation
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Smart PC Optimizer\Smart PC Optimizer.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Fri Nov 1 15:29:11 2024, mtime=Fri Nov 1 15:29:12 2024, atime=Thu Jun 6 16:01:34 2024, length=10108672, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Smart PC Optimizer\Uninstall Smart PC Optimizer.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Fri Nov 1 15:29:11 2024, mtime=Fri Nov 1 15:29:11 2024, atime=Fri Nov 1 15:29:06 2024, length=3211008, window=hide
dropped
C:\ProgramData\Smart PC Optimizer\Cookies.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Smart PC Optimizer\IDs.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Smart PC Optimizer\SiteNtf.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\etilqs_I1ILvxs6kEp1KhT
data
dropped
C:\Users\user\AppData\Local\Temp\etilqs_JWNpwFtbnaJDtjB
SQLite 3.x database, last written using SQLite version 3008002, file counter 1, database pages 495, cookie 0x22, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\etilqs_POd7nxzFOxLz1DA
data
dropped
C:\Users\user\AppData\Local\Temp\etilqs_ROWTifMlhA9KCNq
data
dropped
C:\Users\user\AppData\Local\Temp\etilqs_RPFYbDcyr5M8aXZ
data
dropped
C:\Users\user\AppData\Local\Temp\etilqs_RcsaLkG2dfLS9xf
SQLite 3.x database, last written using SQLite version 3008002, file counter 1, database pages 495, cookie 0x23, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\etilqs_UtghfP7ll7e0aLx
data
dropped
C:\Users\user\AppData\Local\Temp\etilqs_aYX7yC26KPGltMI
data
dropped
C:\Users\user\AppData\Local\Temp\etilqs_gmKXNtbyQ1CVkmf
data
dropped
C:\Users\user\AppData\Local\Temp\etilqs_k9SCgWIsi5WAVhH
data
dropped
C:\Users\user\AppData\Local\Temp\etilqs_sptMYOWonC3jT1l
SQLite 3.x database, last written using SQLite version 3008002, file counter 1, database pages 495, cookie 0x21, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\etilqs_w1OJMPBi4rLIi4J
SQLite 3.x database, last written using SQLite version 3008002, file counter 1, database pages 495, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\fxt49A9.tmp.png
PNG image data, 22 x 22, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
modified
C:\Users\user\AppData\Local\Temp\is-TJ8GA.tmp\SetupImage.bmp
PC bitmap, Windows 3.x format, 453 x 56 x 24, image size 76162, resolution 2834 x 2834 px/m, cbSize 76216, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\is-TJ8GA.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Smart PC Optimizer\Backup\Extensions.ini
Generic INItialization configuration [4Edge relevant text changes]
modified
C:\Users\user\AppData\Roaming\Smart PC Optimizer\Log\Tasks.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\Smart PC Optimizer.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Fri Nov 1 15:29:11 2024, mtime=Fri Nov 1 15:29:11 2024, atime=Thu Jun 6 16:01:34 2024, length=10108672, window=hide
dropped
There are 55 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exe
"C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exe"
malicious
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe
"C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer" /START
malicious
C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exe
"C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe"
C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
"C:\Users\user~1\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp" /SL5="$2044E,5851923,832512,C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe"

URLs

Name
IP
Malicious
https://collect.smartpcupdate.com/
unknown
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
https://subscriptions.smartpctools.com
unknown
https://smartpctools.com/privacy-policy/S
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://mail.google.com/mail/installwebapp?usp=chrome_default
unknown
http://find.naupoint.com
unknown
https://smartpctools.com/smart-pc-optimizer/A
unknown
http://www.gimp.org/xmp/
unknown
http://www.lienvandekelder.com
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://collect.smartpcupdate.com/api/collect
178.63.52.39
https://smartpctools.com/files/drivermanager.exel
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://www.indyproject.org/
unknown
https://docs.google.com/document/installwebapp?usp=chrome_default
unknown
https://docs.google.com/presentation/installwebapp?usp=chrome_default
unknown
http://find.naupoint.comE-4
unknown
http://www.lienvandekelder.be
unknown
https://www.remobjects.com/ps
unknown
https://collect.avqtools.com/api/debugU
unknown
https://techsupport.smartpcupdate.com
unknown
https://www.innosetup.com/
unknown
https://smartpctools.com/smart-driver-manager/
unknown
https://smartpctools.com/privacy-policy/
unknown
https://www.youtube.com/s/notifications/manifest/cr_install.html
unknown
http://www.lienvandekelder.beQ
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
unknown
http://ocsp.sectigo.com0/
unknown
https://sectigo.com/CPS0
unknown
https://smartpctools.com/eula/
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.lienvandekelder.com/
unknown
https://collect.smartpcupdate.com/k
unknown
http://find.naupoint.comStart
unknown
http://www.google.com/search?q=
unknown
https://smartpctools.com/files/drivermanager.exe
unknown
https://smartpctools.com/support/
unknown
https://collect.avqtools.com/api/debug?program=pchs_cleaner_v
unknown
https://collect.avqtools.com/
unknown
https://docs.google.com/spreadsheets/installwebapp?usp=chrome_default
unknown
https://collect.avqtools.com/debug.txt
116.203.251.147
https://store.payproglobal.com/checkout?products%5b1%5d%5bid%5d=90862&page-template=18224&products%5
unknown
https://smartpctools.com/smart-pc-optimizer/
unknown
https://chromewebstore.google.com/
unknown
https://chrome.google.com/webstore/
unknown
https://store.payproglobal.com/checkout?products
unknown
There are 40 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
collect.smartpcupdate.com
178.63.52.39
collect.avqtools.com
116.203.251.147

IPs

IP
Domain
Country
Malicious
116.203.251.147
collect.avqtools.com
Germany
178.63.52.39
collect.smartpcupdate.com
Germany

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
BuildID
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
UpgradeID
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
Version
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
Language
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
SendDebugLogs
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
HomePageURL
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
SupportURL
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
BuyNowURL
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
ProURL1
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
ProURL2
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
EulaURL
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
PrivacyURL
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
AdsDownloadURL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.spo_encrypted\OpenWithProgids
SmartPCOptimizer.spo_encrypted
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SmartPCOptimizer.spo_encrypted
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SmartPCOptimizer.spo_encrypted\DefaultIcon
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SmartPCOptimizer.spo_encrypted\shell\open\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\SmartPCOptimizer.exe\SupportedTypes
.spo_encrypted
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Smart PC Optimizer_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Smart PC Optimizer_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Smart PC Optimizer_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Smart PC Optimizer_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Smart PC Optimizer_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Smart PC Optimizer_is1
Inno Setup: Selected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Smart PC Optimizer_is1
Inno Setup: Deselected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Smart PC Optimizer_is1
Inno Setup: Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Smart PC Optimizer_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Smart PC Optimizer_is1
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Smart PC Optimizer_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Smart PC Optimizer_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Smart PC Optimizer_is1
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Smart PC Optimizer_is1
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Smart PC Optimizer_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Smart PC Optimizer_is1
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Smart PC Optimizer_is1
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Smart PC Optimizer_is1
MajorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Smart PC Optimizer_is1
MinorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Smart PC Optimizer_is1
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Smart PC Optimizer_is1
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Smart PC Optimizer_is1
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
TrayAllowed
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
OnWinStartup
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
sch_enabled
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
s_SmartEnabled
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
s_SmartDate
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
s_Mode
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
s_Date
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
s_Time
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
s_Exec
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
MonitorNotifications
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
LastNotification
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
ShownNotifications
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
NewAppNotifications
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
NewExtNotifications
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
StartupNotifications
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
LowDiskSpaceNotifications
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
LowFreeMemNotifications
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
CrashNotifications
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
NoAVNotifications
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
BigCacheSizeNotifications
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
CookieNotifications
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
SlowStartupNotifications
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
RecycleBinNotifications
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
BigDownloadsSizeNotifications
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
s_SmartMode
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
UninstallNotifications
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
MinFreeDiskSpace
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
MinFreeMemory
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
MinCacheSize
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
MinCookieNumber
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
CheckUpdates
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
LastUpdCheck
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
SoftwareNotifications
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
LastSrvNotification
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
LastSrvCheck
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
LastDebug
HKEY_CURRENT_USER\SOFTWARE\Licenses\5f97448e5c6d46cbb85e2c0d70d2c32f
AC_Enabled
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
AC_Check1
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
AC_Check2
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
AC_Check3
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
AC_Check4
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
AC_Skip1
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
AC_Skip2
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
AC_Interval
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
AC_Date
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
AllowTechInfo
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
AllowSilentUpgrade
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
UsageReportShown
HKEY_CURRENT_USER\SOFTWARE\Licenses\5f97448e5c6d46cbb85e2c0d70d2c32f
HI
HKEY_CURRENT_USER\SOFTWARE\Licenses\5f97448e5c6d46cbb85e2c0d70d2c32f
AI1
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
ActiveBrowser
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
SI2
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
LastDebug
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
BackupDir
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Licenses\5f97448e5c6d46cbb85e2c0d70d2c32f
InstallationDate
HKEY_CURRENT_USER\SOFTWARE\Licenses\5f97448e5c6d46cbb85e2c0d70d2c32f
TrialDate
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
NLaunches
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
LogDir
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
UndoDir
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
ItemsToMainScan
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
ItemsToRegistryScan
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
ItemsToPrivacyScan
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
ItemsToRecoveryScan
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
UseExclusions
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
ShowRebootMessage
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
ShowRecycleBin
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
ShowTips
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
LastScanCanceled
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
LastCleanExecuted
HKEY_CURRENT_USER\SOFTWARE\Licenses\5f97448e5c6d46cbb85e2c0d70d2c32f
DC_Ext
HKEY_CURRENT_USER\SOFTWARE\Smart PC Solutions\Smart PC Optimizer
s_SmartDate
There are 108 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7110000
direct allocation
page read and write
malicious
3B30000
heap
page read and write
391E000
heap
page read and write
73D1D000
unkown
page read and write
7F9000
heap
page read and write
788D000
heap
page read and write
3948000
heap
page read and write
257E000
direct allocation
page read and write
A50000
heap
page read and write
3B24000
heap
page read and write
265C000
direct allocation
page read and write
29BE000
direct allocation
page read and write
2466000
direct allocation
page read and write
7864000
heap
page read and write
39B2000
heap
page read and write
236B000
direct allocation
page read and write
3997000
heap
page read and write
6702000
heap
page read and write
784F000
heap
page read and write
3B50000
heap
page read and write
106D000
heap
page read and write
7FDD8000
direct allocation
page read and write
E10000
heap
page read and write
3A01000
heap
page read and write
B2E000
heap
page read and write
5B77000
direct allocation
page read and write
19D000
stack
page read and write
65F6000
heap
page read and write
58D0000
heap
page read and write
66BE000
heap
page read and write
6454000
heap
page read and write
747A000
direct allocation
page read and write
3B6F000
heap
page read and write
4B9000
unkown
page read and write
AD6000
unkown
page write copy
64E000
stack
page read and write
53AA000
direct allocation
page read and write
3B80000
heap
page read and write
2341000
direct allocation
page read and write
2553000
heap
page read and write
66C0000
heap
page read and write
73D1F000
unkown
page readonly
39BC000
heap
page read and write
3B5B000
heap
page read and write
7481000
direct allocation
page read and write
25E6000
direct allocation
page read and write
344E000
stack
page read and write
652E000
heap
page read and write
2C70000
direct allocation
page read and write
2458000
direct allocation
page read and write
3924000
heap
page read and write
83B000
heap
page read and write
6505000
heap
page read and write
3A52000
heap
page read and write
22B1000
direct allocation
page read and write
3B50000
heap
page read and write
65B4000
heap
page read and write
7FD90000
direct allocation
page read and write
3AD6000
heap
page read and write
3B45000
heap
page read and write
7D0000
heap
page read and write
240D000
direct allocation
page read and write
22CE000
direct allocation
page read and write
7340000
direct allocation
page read and write
6572000
heap
page read and write
65B4000
heap
page read and write
3490000
direct allocation
page read and write
2C90000
trusted library allocation
page read and write
3A72000
heap
page read and write
3B44000
heap
page read and write
6439000
heap
page read and write
65B5000
heap
page read and write
308E000
stack
page read and write
3936000
heap
page read and write
659C000
heap
page read and write
107C000
heap
page read and write
838000
heap
page read and write
3530000
heap
page read and write
66BD000
heap
page read and write
1052000
heap
page read and write
7889000
heap
page read and write
5890000
heap
page read and write
3AE4000
heap
page read and write
651A000
heap
page read and write
34BF000
stack
page read and write
FF3000
heap
page read and write
23E9000
direct allocation
page read and write
3B96000
heap
page read and write
3A76000
heap
page read and write
2360000
direct allocation
page read and write
FE2000
heap
page read and write
2927000
direct allocation
page read and write
AF7000
heap
page read and write
107D000
heap
page read and write
3BBA000
heap
page read and write
7FD40000
direct allocation
page read and write
EB3000
direct allocation
page read and write
3910000
heap
page read and write
652E000
heap
page read and write
3B88000
heap
page read and write
7821000
heap
page read and write
64A8000
heap
page read and write
65B3000
heap
page read and write
23FF000
direct allocation
page read and write
3951000
heap
page read and write
66C8000
heap
page read and write
231E000
direct allocation
page read and write
6456000
heap
page read and write
3AD9000
heap
page read and write
3707000
direct allocation
page read and write
2326000
direct allocation
page read and write
BB0000
heap
page read and write
6499000
heap
page read and write
3B8C000
heap
page read and write
3A97000
heap
page read and write
6460000
heap
page read and write
788D000
heap
page read and write
80A000
heap
page read and write
2EDF000
stack
page read and write
3A32000
heap
page read and write
3B7C000
heap
page read and write
6F5F000
stack
page read and write
3AD9000
heap
page read and write
3A52000
heap
page read and write
B11000
heap
page read and write
6609000
heap
page read and write
6481000
heap
page read and write
6469000
heap
page read and write
23FC000
direct allocation
page read and write
830000
heap
page read and write
65DD000
heap
page read and write
3AB6000
heap
page read and write
80F000
heap
page read and write
44F0000
heap
page read and write
7885000
heap
page read and write
A0E000
stack
page read and write
3924000
heap
page read and write
8E0000
heap
page read and write
6422000
heap
page read and write
6413000
heap
page read and write
39C3000
heap
page read and write
6572000
heap
page read and write
656F000
heap
page read and write
39E9000
heap
page read and write
53D9000
direct allocation
page read and write
65C6000
heap
page read and write
23A1000
direct allocation
page read and write
3B8A000
heap
page read and write
B17000
heap
page read and write
3A7B000
heap
page read and write
5ADF000
direct allocation
page read and write
652C000
heap
page read and write
E19000
direct allocation
page read and write
2540000
direct allocation
page read and write
7FE00000
direct allocation
page read and write
3BC9000
heap
page read and write
398D000
heap
page read and write
397F000
heap
page read and write
3B31000
heap
page read and write
3AC7000
heap
page read and write
768D000
direct allocation
page read and write
785C000
heap
page read and write
363E000
stack
page read and write
3A8C000
heap
page read and write
2440000
heap
page read and write
3B4D000
heap
page read and write
3AD7000
heap
page read and write
37A6000
direct allocation
page read and write
398B000
heap
page read and write
3B6E000
heap
page read and write
A10000
heap
page read and write
3930000
heap
page read and write
3BB2000
heap
page read and write
652C000
heap
page read and write
6CE0000
trusted library allocation
page read and write
73D16000
unkown
page readonly
650E000
heap
page read and write
82C000
heap
page read and write
3B0A000
heap
page read and write
63E1000
heap
page read and write
56F0000
direct allocation
page read and write
3B2C000
heap
page read and write
3746000
direct allocation
page read and write
3630000
unkown
page read and write
2646000
direct allocation
page read and write
3B27000
heap
page read and write
6612000
heap
page read and write
64EA000
heap
page read and write
6490000
heap
page read and write
F70000
heap
page read and write
785C000
heap
page read and write
5AC7000
direct allocation
page read and write
2C90000
trusted library allocation
page read and write
A68000
heap
page read and write
34FC000
stack
page read and write
2EE0000
direct allocation
page execute and read and write
2654000
direct allocation
page read and write
AD6000
unkown
page read and write
887000
heap
page read and write
29F0000
direct allocation
page execute and read and write
3AD9000
heap
page read and write
39E1000
heap
page read and write
3946000
heap
page read and write
652A000
heap
page read and write
6449000
heap
page read and write
3B50000
heap
page read and write
2491000
direct allocation
page read and write
2F80000
heap
page read and write
FDE000
heap
page read and write
643E000
heap
page read and write
66B6000
heap
page read and write
23B7000
direct allocation
page read and write
6447000
heap
page read and write
106C000
heap
page read and write
7886000
heap
page read and write
3BD8000
heap
page read and write
39E1000
heap
page read and write
23F0000
direct allocation
page read and write
7842000
heap
page read and write
3B3E000
heap
page read and write
2414000
direct allocation
page read and write
3E4E000
stack
page read and write
AF5000
heap
page read and write
237D000
direct allocation
page read and write
19B000
stack
page read and write
720000
heap
page read and write
88A000
heap
page read and write
3AEA000
heap
page read and write
AC4000
heap
page read and write
228A000
direct allocation
page read and write
FF2000
heap
page read and write
34C7000
direct allocation
page read and write
3A69000
heap
page read and write
39E0000
heap
page read and write
6571000
heap
page read and write
64E9000
heap
page read and write
5307000
direct allocation
page read and write
3BDA000
heap
page read and write
3AD9000
heap
page read and write
238C000
direct allocation
page read and write
827000
heap
page read and write
9A000
stack
page read and write
6422000
heap
page read and write
6572000
heap
page read and write
2317000
direct allocation
page read and write
6702000
heap
page read and write
3ABA000
heap
page read and write
293E000
direct allocation
page read and write
66E3000
heap
page read and write
104C000
heap
page read and write
6591000
heap
page read and write
65CB000
heap
page read and write
80C000
heap
page read and write
3997000
heap
page read and write
4FD0000
direct allocation
page read and write
37BF000
direct allocation
page read and write
652A000
heap
page read and write
6097B000
unkown
page readonly
3922000
heap
page read and write
7867000
heap
page read and write
78B000
heap
page read and write
9B000
stack
page read and write
7670000
direct allocation
page read and write
6466000
heap
page read and write
66F2000
heap
page read and write
4380000
remote allocation
page read and write
F00000
heap
page read and write
3A94000
heap
page read and write
5890000
heap
page read and write
FF2000
heap
page read and write
29CD000
direct allocation
page read and write
321E000
stack
page read and write
358E000
stack
page read and write
629B000
direct allocation
page read and write
3A86000
heap
page read and write
39E1000
heap
page read and write
3988000
heap
page read and write
830000
heap
page read and write
39AD000
heap
page read and write
106E000
heap
page read and write
667D000
heap
page read and write
39B4000
heap
page read and write
D16000
unkown
page readonly
2BFD000
direct allocation
page read and write
3B1B000
heap
page read and write
2DCF000
stack
page read and write
60900000
unkown
page readonly
AA5000
heap
page read and write
398F000
heap
page read and write
24DE000
stack
page read and write
39E8000
heap
page read and write
3F9E000
stack
page read and write
3B12000
heap
page read and write
2432000
direct allocation
page read and write
56F8000
direct allocation
page read and write
3946000
heap
page read and write
7F0000
heap
page read and write
3A94000
heap
page read and write
3A52000
heap
page read and write
66F9000
heap
page read and write
ACA000
heap
page read and write
3934000
heap
page read and write
7860000
heap
page read and write
FE1000
heap
page read and write
400000
unkown
page readonly
3977000
heap
page read and write
E3D000
direct allocation
page read and write
3B82000
heap
page read and write
63E1000
heap
page read and write
2540000
direct allocation
page read and write
64E9000
heap
page read and write
248A000
direct allocation
page read and write
3A54000
heap
page read and write
24E0000
heap
page read and write
644F000
heap
page read and write
66CB000
heap
page read and write
667C000
heap
page read and write
3A11000
heap
page read and write
2638000
direct allocation
page read and write
E5B000
direct allocation
page read and write
6097D000
unkown
page read and write
4C6000
unkown
page readonly
3CCF000
stack
page read and write
3A52000
heap
page read and write
FFD000
heap
page read and write
2DDE000
stack
page read and write
3BA7000
heap
page read and write
5C5F000
stack
page read and write
3A91000
heap
page read and write
53E1000
direct allocation
page read and write
784F000
heap
page read and write
65D4000
heap
page read and write
400000
unkown
page readonly
3760000
direct allocation
page read and write
B13000
heap
page read and write
53B3000
direct allocation
page read and write
1058000
heap
page read and write
22C7000
direct allocation
page read and write
3B6E000
heap
page read and write
56B2000
direct allocation
page read and write
4C2000
unkown
page write copy
888000
heap
page read and write
5AEA000
direct allocation
page read and write
39D0000
heap
page read and write
A40000
heap
page read and write
FD9000
heap
page read and write
7A6000
unkown
page read and write
65B3000
heap
page read and write
56F2000
direct allocation
page read and write
E4C000
heap
page read and write
6591000
heap
page read and write
2384000
direct allocation
page read and write
3938000
heap
page read and write
5892000
heap
page read and write
3A01000
heap
page read and write
254E000
direct allocation
page read and write
107D000
heap
page read and write
7AC000
unkown
page read and write
64A6000
heap
page read and write
401000
unkown
page execute read
3998000
heap
page read and write
65B4000
heap
page read and write
7A4000
unkown
page read and write
7856000
heap
page read and write
A60000
heap
page read and write
6639000
heap
page read and write
76B1000
direct allocation
page read and write
826000
heap
page read and write
56E8000
direct allocation
page read and write
39E0000
heap
page read and write
B35000
heap
page read and write
3B6E000
heap
page read and write
3B1E000
heap
page read and write
36E6000
direct allocation
page read and write
65B3000
heap
page read and write
B00000
heap
page read and write
AE9000
heap
page read and write
377D000
direct allocation
page read and write
3A00000
heap
page read and write
5B20000
direct allocation
page read and write
6CE000
unkown
page read and write
5890000
heap
page read and write
3F4D000
stack
page read and write
2690000
direct allocation
page read and write
2920000
direct allocation
page read and write
3AA7000
heap
page read and write
3A75000
heap
page read and write
AF6000
unkown
page read and write
2577000
direct allocation
page read and write
8A5000
heap
page read and write
767000
heap
page read and write
31CE000
stack
page read and write
3977000
heap
page read and write
6465000
heap
page read and write
6526000
heap
page read and write
E4D000
heap
page read and write
7FDF0000
direct allocation
page read and write
22BF000
direct allocation
page read and write
65D1000
heap
page read and write
237D000
direct allocation
page read and write
2309000
direct allocation
page read and write
EBA000
direct allocation
page read and write
65B5000
heap
page read and write
3A08000
heap
page read and write
2630000
direct allocation
page read and write
B07000
unkown
page write copy
3A02000
heap
page read and write
3768000
direct allocation
page read and write
39E0000
heap
page read and write
65B6000
heap
page read and write
65B5000
heap
page read and write
3B61000
heap
page read and write
6457000
heap
page read and write
64EA000
heap
page read and write
3932000
heap
page read and write
7EB000
heap
page read and write
66ED000
heap
page read and write
3923000
heap
page read and write
652A000
heap
page read and write
E79000
direct allocation
page read and write
E4E000
heap
page read and write
3B53000
heap
page read and write
6475000
heap
page read and write
5A40000
direct allocation
page read and write
C50000
heap
page read and write
3925000
heap
page read and write
3B4A000
heap
page read and write
260B000
direct allocation
page read and write
3A02000
heap
page read and write
1F0000
heap
page read and write
3B7C000
heap
page read and write
2629000
direct allocation
page read and write
39A0000
heap
page read and write
6572000
heap
page read and write
100D000
heap
page read and write
65B3000
heap
page read and write
824000
heap
page read and write
7840000
heap
page read and write
785E000
heap
page read and write
6427000
heap
page read and write
18D000
stack
page read and write
65BB000
heap
page read and write
57D0000
heap
page read and write
7CB000
unkown
page read and write
2E0E000
stack
page read and write
7855000
heap
page read and write
3C6E000
stack
page read and write
3B54000
heap
page read and write
64E9000
heap
page read and write
825000
heap
page read and write
4C4000
unkown
page readonly
63E1000
heap
page read and write
1074000
heap
page read and write
3922000
heap
page read and write
425E000
stack
page read and write
66BE000
heap
page read and write
3ABA000
heap
page read and write
83B000
heap
page read and write
53CC000
direct allocation
page read and write
6096F000
unkown
page readonly
3B54000
heap
page read and write
66D9000
heap
page read and write
3924000
heap
page read and write
3AAD000
heap
page read and write
23E2000
direct allocation
page read and write
647F000
heap
page read and write
644C000
heap
page read and write
53C2000
direct allocation
page read and write
778000
heap
page read and write
25F4000
direct allocation
page read and write
3A8A000
heap
page read and write
3B1B000
heap
page read and write
6465000
heap
page read and write
5B0F000
stack
page read and write
829000
heap
page read and write
5B13000
direct allocation
page read and write
645D000
heap
page read and write
646B000
heap
page read and write
39C3000
heap
page read and write
3930000
heap
page read and write
3B5C000
heap
page read and write
93000
stack
page read and write
66DF000
heap
page read and write
FFE000
heap
page read and write
3B54000
heap
page read and write
37CF000
stack
page read and write
22DC000
direct allocation
page read and write
22A3000
direct allocation
page read and write
813000
heap
page read and write
5B17000
direct allocation
page read and write
640A000
heap
page read and write
7866000
heap
page read and write
401000
unkown
page execute read
E4A000
heap
page read and write
107C000
heap
page read and write
65E0000
heap
page read and write
3B15000
heap
page read and write
6E0000
heap
page read and write
3B4A000
heap
page read and write
E6B000
direct allocation
page read and write
3925000
heap
page read and write
7850000
heap
page read and write
6F60000
direct allocation
page read and write
73D01000
unkown
page execute read
E72000
direct allocation
page read and write
AC7000
heap
page read and write
242B000
direct allocation
page read and write
3985000
heap
page read and write
D12000
unkown
page readonly
4B7000
unkown
page read and write
73D00000
unkown
page readonly
65D1000
heap
page read and write
3A55000
heap
page read and write
7C4000
unkown
page read and write
23A8000
direct allocation
page read and write
3BAA000
heap
page read and write
652A000
heap
page read and write
6513000
heap
page read and write
3935000
heap
page read and write
23C5000
direct allocation
page read and write
6465000
heap
page read and write
3B62000
heap
page read and write
AD8000
unkown
page read and write
394E000
stack
page read and write
3AC2000
heap
page read and write
435F000
stack
page read and write
56AC000
direct allocation
page read and write
22F9000
direct allocation
page read and write
3AD6000
heap
page read and write
3974000
heap
page read and write
E4C000
heap
page read and write
266A000
direct allocation
page read and write
53EA000
direct allocation
page read and write
895000
heap
page read and write
56D9000
direct allocation
page read and write
5890000
heap
page read and write
106D000
heap
page read and write
394E000
heap
page read and write
65B2000
heap
page read and write
3B5F000
heap
page read and write
652E000
heap
page read and write
2351000
direct allocation
page read and write
25ED000
direct allocation
page read and write
644F000
heap
page read and write
7851000
heap
page read and write
3AA8000
heap
page read and write
3A6D000
heap
page read and write
2C81000
direct allocation
page read and write
7686000
direct allocation
page read and write
3B0A000
heap
page read and write
3A5E000
heap
page read and write
663B000
heap
page read and write
238C000
direct allocation
page read and write
E4B000
heap
page read and write
6608000
heap
page read and write
785C000
heap
page read and write
3BCC000
stack
page read and write
3A4F000
stack
page read and write
3769000
direct allocation
page read and write
39A8000
heap
page read and write
3BD1000
heap
page read and write
39A3000
heap
page read and write
652A000
heap
page read and write
B23000
heap
page read and write
3AD7000
heap
page read and write
23BE000
direct allocation
page read and write
6423000
heap
page read and write
22E3000
direct allocation
page read and write
3B0C000
heap
page read and write
770000
heap
page read and write
7CE000
unkown
page read and write
19B000
stack
page read and write
3951000
heap
page read and write
3AD7000
heap
page read and write
B2D000
heap
page read and write
3BDA000
heap
page read and write
3A95000
heap
page read and write
368F000
stack
page read and write
2530000
heap
page read and write
3490000
heap
page read and write
2788000
direct allocation
page read and write
F9F000
heap
page read and write
304F000
stack
page read and write
104F000
heap
page read and write
3ABA000
heap
page read and write
6572000
heap
page read and write
34A2000
direct allocation
page read and write
E4A000
heap
page read and write
65D4000
heap
page read and write
2300000
direct allocation
page read and write
3B60000
heap
page read and write
3B54000
heap
page read and write
56C5000
direct allocation
page read and write
3B72000
heap
page read and write
E9D000
direct allocation
page read and write
2AE0000
direct allocation
page execute and read and write
646D000
heap
page read and write
730000
heap
page read and write
1003000
heap
page read and write
25C9000
direct allocation
page read and write
667C000
heap
page read and write
65F6000
heap
page read and write
3932000
heap
page read and write
82A000
heap
page read and write
3BCE000
heap
page read and write
6519000
heap
page read and write
1052000
heap
page read and write
6D6000
unkown
page read and write
536C000
direct allocation
page read and write
7FB40000
direct allocation
page read and write
44EF000
stack
page read and write
786E000
heap
page read and write
7CE000
unkown
page write copy
23A8000
direct allocation
page read and write
41DE000
stack
page read and write
5AA0000
direct allocation
page read and write
56B0000
direct allocation
page read and write
3BC9000
heap
page read and write
652B000
heap
page read and write
3A11000
heap
page read and write
7869000
heap
page read and write
3B0A000
heap
page read and write
3B69000
heap
page read and write
64A8000
heap
page read and write
3A6B000
heap
page read and write
7AE000
unkown
page read and write
3490000
direct allocation
page read and write
58D1000
heap
page read and write
3B98000
heap
page read and write
5397000
direct allocation
page read and write
2663000
direct allocation
page read and write
6284000
direct allocation
page read and write
F20000
heap
page read and write
FE1000
heap
page read and write
8A1000
heap
page read and write
39D0000
heap
page read and write
3950000
heap
page read and write
3B90000
heap
page read and write
409F000
stack
page read and write
3E0D000
stack
page read and write
3934000
heap
page read and write
398A000
heap
page read and write
7C6000
unkown
page read and write
6097A000
unkown
page read and write
6C7000
unkown
page write copy
5A93000
direct allocation
page read and write
3A90000
heap
page read and write
65EC000
heap
page read and write
3986000
heap
page read and write
E4E000
heap
page read and write
7841000
heap
page read and write
FF3000
heap
page read and write
3958000
heap
page read and write
3B2A000
heap
page read and write
56A7000
direct allocation
page read and write
88A000
heap
page read and write
785E000
heap
page read and write
3AEA000
heap
page read and write
19A000
stack
page read and write
3951000
heap
page read and write
B31000
heap
page read and write
3AEB000
heap
page read and write
22AA000
direct allocation
page read and write
81E000
heap
page read and write
3B0A000
heap
page read and write
6523000
heap
page read and write
65DA000
heap
page read and write
7C4000
unkown
page read and write
3B50000
heap
page read and write
539E000
direct allocation
page read and write
3A52000
heap
page read and write
7AE000
stack
page read and write
3933000
heap
page read and write
640D000
heap
page read and write
3AEB000
heap
page read and write
64EA000
heap
page read and write
39B4000
heap
page read and write
E4A000
heap
page read and write
400000
unkown
page readonly
AE0000
unkown
page read and write
888000
heap
page read and write
648B000
heap
page read and write
3A6F000
heap
page read and write
41F0000
heap
page read and write
3B50000
heap
page read and write
7250000
heap
page read and write
846000
heap
page read and write
3A01000
heap
page read and write
3AA9000
heap
page read and write
6D1000
unkown
page read and write
37B0000
direct allocation
page read and write
7FE00000
direct allocation
page read and write
E96000
direct allocation
page read and write
3970000
heap
page read and write
62BC000
direct allocation
page read and write
7C6000
unkown
page read and write
32CF000
stack
page read and write
AC7000
heap
page read and write
6464000
heap
page read and write
784A000
heap
page read and write
2BB0000
heap
page read and write
3980000
heap
page read and write
3BAA000
heap
page read and write
6592000
heap
page read and write
378D000
direct allocation
page read and write
3772000
direct allocation
page read and write
A00000
heap
page read and write
E8F000
direct allocation
page read and write
40DD000
stack
page read and write
3AEB000
heap
page read and write
96F000
stack
page read and write
2358000
direct allocation
page read and write
ADC000
heap
page read and write
6703000
heap
page read and write
3A94000
heap
page read and write
3922000
heap
page read and write
64E8000
heap
page read and write
7D3000
unkown
page readonly
6441000
heap
page read and write
649F000
heap
page read and write
239A000
direct allocation
page read and write
600000
heap
page read and write
3B34000
heap
page read and write
1057000
heap
page read and write
E50000
heap
page read and write
3BB3000
heap
page read and write
767F000
direct allocation
page read and write
5AA8000
direct allocation
page read and write
3AEF000
heap
page read and write
83F000
heap
page read and write
1072000
heap
page read and write
299F000
direct allocation
page read and write
B2B000
heap
page read and write
648A000
heap
page read and write
64E9000
heap
page read and write
6638000
heap
page read and write
AC3000
heap
page read and write
3B96000
heap
page read and write
AE1000
heap
page read and write
22D5000
direct allocation
page read and write
3A08000
heap
page read and write
838000
heap
page read and write
FED000
heap
page read and write
3A76000
heap
page read and write
331E000
stack
page read and write
8A9000
heap
page read and write
39E0000
heap
page read and write
3B2C000
heap
page read and write
A9E000
stack
page read and write
B10000
unkown
page readonly
E20000
direct allocation
page read and write
886000
heap
page read and write
667C000
heap
page read and write
6096E000
unkown
page read and write
56D4000
direct allocation
page read and write
39B4000
heap
page read and write
3B13000
heap
page read and write
EC1000
direct allocation
page read and write
65B7000
heap
page read and write
64F5000
heap
page read and write
6571000
heap
page read and write
3B55000
heap
page read and write
7250000
direct allocation
page read and write
3ADA000
heap
page read and write
3993000
heap
page read and write
3B1A000
heap
page read and write
3B17000
heap
page read and write
340F000
stack
page read and write
2B98000
direct allocation
page read and write
3B2C000
heap
page read and write
3796000
direct allocation
page read and write
398F000
heap
page read and write
2368000
direct allocation
page read and write
A84000
heap
page read and write
3A94000
heap
page read and write
6454000
heap
page read and write
7A4000
unkown
page write copy
39B8000
heap
page read and write
64E9000
heap
page read and write
D0E000
unkown
page readonly
2540000
direct allocation
page read and write
804000
heap
page read and write
6508000
heap
page read and write
3BAD000
heap
page read and write
80F000
heap
page read and write
3998000
heap
page read and write
3BB9000
heap
page read and write
3B75000
heap
page read and write
6180000
direct allocation
page read and write
E4B000
heap
page read and write
6430000
heap
page read and write
3A6D000
heap
page read and write
247C000
direct allocation
page read and write
36CE000
stack
page read and write
65B4000
heap
page read and write
656E000
heap
page read and write
E4B000
heap
page read and write
6BD0000
trusted library allocation
page read and write
2C78000
direct allocation
page read and write
3A32000
heap
page read and write
66C1000
heap
page read and write
43EE000
stack
page read and write
66C8000
heap
page read and write
3911000
heap
page read and write
5890000
heap
page read and write
3AEB000
heap
page read and write
64A9000
heap
page read and write
65D1000
heap
page read and write
6639000
heap
page read and write
E4E000
heap
page read and write
3BA1000
heap
page read and write
394B000
heap
page read and write
318F000
stack
page read and write
3D0C000
stack
page read and write
2A53000
heap
page read and write
2406000
direct allocation
page read and write
3A10000
heap
page read and write
801000
heap
page read and write
7880000
heap
page read and write
642C000
heap
page read and write
6591000
heap
page read and write
647D000
heap
page read and write
23AF000
direct allocation
page read and write
37CF000
direct allocation
page read and write
AE7000
heap
page read and write
3A52000
heap
page read and write
5A0E000
stack
page read and write
243A000
direct allocation
page read and write
3936000
heap
page read and write
3937000
heap
page read and write
4B7000
unkown
page write copy
6422000
heap
page read and write
34F0000
direct allocation
page read and write
2C66000
direct allocation
page read and write
766000
heap
page read and write
824000
heap
page read and write
265F000
stack
page read and write
3BB0000
heap
page read and write
3972000
heap
page read and write
2558000
direct allocation
page read and write
3958000
heap
page read and write
236F000
direct allocation
page read and write
3B4C000
heap
page read and write
D14000
unkown
page readonly
64FC000
heap
page read and write
1010000
heap
page read and write
6096E000
unkown
page write copy
104C000
heap
page read and write
DC0000
heap
page read and write
104C000
heap
page read and write
3748000
direct allocation
page read and write
19D000
stack
page read and write
9B000
stack
page read and write
6619000
heap
page read and write
785F000
heap
page read and write
2F0F000
stack
page read and write
65C8000
heap
page read and write
7FE35000
direct allocation
page read and write
393E000
heap
page read and write
5A98000
direct allocation
page read and write
818000
heap
page read and write
846000
heap
page read and write
401000
unkown
page execute read
3A08000
heap
page read and write
3A82000
heap
page read and write
5B0F000
direct allocation
page read and write
60980000
unkown
page readonly
6DE000
unkown
page readonly
3B54000
heap
page read and write
832000
heap
page read and write
2483000
direct allocation
page read and write
3B67000
heap
page read and write
65C1000
heap
page read and write
784A000
heap
page read and write
652B000
heap
page read and write
39A6000
heap
page read and write
4380000
remote allocation
page read and write
AFE000
unkown
page read and write
B03000
unkown
page read and write
B0F000
heap
page read and write
3AE7000
heap
page read and write
7678000
direct allocation
page read and write
6639000
heap
page read and write
2622000
direct allocation
page read and write
3B5B000
heap
page read and write
B0C000
unkown
page read and write
107B000
heap
page read and write
5384000
direct allocation
page read and write
2604000
direct allocation
page read and write
39E1000
heap
page read and write
39B4000
heap
page read and write
ADC000
heap
page read and write
3948000
heap
page read and write
24F0000
direct allocation
page execute and read and write
56DD000
direct allocation
page read and write
3AEA000
heap
page read and write
3B36000
heap
page read and write
39DC000
heap
page read and write
6438000
heap
page read and write
3AD9000
heap
page read and write
33BE000
stack
page read and write
FAC000
heap
page read and write
96000
stack
page read and write
3B55000
heap
page read and write
3A64000
heap
page read and write
BB9000
heap
page read and write
3BB1000
heap
page read and write
6515000
heap
page read and write
3921000
heap
page read and write
6C9000
unkown
page read and write
B0E000
unkown
page readonly
3A32000
heap
page read and write
263F000
direct allocation
page read and write
66C1000
heap
page read and write
E88000
direct allocation
page read and write
234A000
direct allocation
page read and write
788D000
heap
page read and write
53BE000
direct allocation
page read and write
3A8C000
stack
page read and write
785D000
heap
page read and write
3A9C000
heap
page read and write
6C7000
unkown
page read and write
3BD9000
heap
page read and write
106F000
heap
page read and write
3990000
heap
page read and write
EF0000
heap
page read and write
25FD000
direct allocation
page read and write
1079000
heap
page read and write
29E0000
heap
page read and write
F27000
heap
page read and write
3B57000
heap
page read and write
3978000
heap
page read and write
3BAD000
heap
page read and write
529C000
direct allocation
page read and write
2690000
direct allocation
page read and write
64A7000
heap
page read and write
5250000
direct allocation
page read and write
666A000
heap
page read and write
53A6000
direct allocation
page read and write
3ACB000
heap
page read and write
6464000
heap
page read and write
A10000
heap
page read and write
D7F000
stack
page read and write
3B9C000
heap
page read and write
E80000
direct allocation
page read and write
3B5C000
heap
page read and write
3A75000
heap
page read and write
5A42000
direct allocation
page read and write
105B000
heap
page read and write
AE4000
heap
page read and write
667C000
heap
page read and write
66BE000
heap
page read and write
391D000
heap
page read and write
663B000
heap
page read and write
6499000
heap
page read and write
22F2000
direct allocation
page read and write
663B000
heap
page read and write
3A11000
heap
page read and write
3BCD000
heap
page read and write
107E000
heap
page read and write
3B54000
heap
page read and write
64A7000
heap
page read and write
53EE000
direct allocation
page read and write
E48000
heap
page read and write
1050000
heap
page read and write
3B5C000
heap
page read and write
3B0D000
heap
page read and write
3A11000
heap
page read and write
65B4000
heap
page read and write
3AD6000
heap
page read and write
3B96000
heap
page read and write
3BD8000
heap
page read and write
3948000
heap
page read and write
74D0000
direct allocation
page read and write
7820000
heap
page read and write
104F000
heap
page read and write
380E000
stack
page read and write
39B4000
heap
page read and write
2310000
direct allocation
page read and write
3930000
heap
page read and write
EC8000
direct allocation
page read and write
65F6000
heap
page read and write
29E4000
direct allocation
page read and write
64A8000
heap
page read and write
6BB0000
heap
page read and write
391E000
heap
page read and write
3B96000
heap
page read and write
76CE000
direct allocation
page read and write
B35000
heap
page read and write
391D000
heap
page read and write
4380000
remote allocation
page read and write
7D2000
unkown
page read and write
2474000
direct allocation
page read and write
AD2000
heap
page read and write
3640000
direct allocation
page read and write
83E000
heap
page read and write
3958000
heap
page read and write
3A53000
heap
page read and write
7845000
heap
page read and write
65F6000
heap
page read and write
2424000
direct allocation
page read and write
3B78000
heap
page read and write
25D0000
direct allocation
page read and write
7D5000
unkown
page readonly
3B2C000
heap
page read and write
3ADE000
heap
page read and write
785F000
heap
page read and write
3BA1000
heap
page read and write
34AB000
direct allocation
page read and write
23A1000
direct allocation
page read and write
3B8F000
stack
page read and write
652D000
heap
page read and write
3720000
direct allocation
page read and write
354F000
stack
page read and write
786B000
heap
page read and write
7872000
heap
page read and write
56CB000
direct allocation
page read and write
2376000
direct allocation
page read and write
6E0000
unkown
page readonly
53AE000
direct allocation
page read and write
66E9000
heap
page read and write
3739000
direct allocation
page read and write
ADE000
unkown
page read and write
3ACF000
heap
page read and write
7CB000
unkown
page read and write
FEC000
heap
page read and write
838000
heap
page read and write
56E4000
direct allocation
page read and write
82A000
heap
page read and write
7AB000
unkown
page read and write
667C000
heap
page read and write
EAC000
direct allocation
page read and write
ACB000
heap
page read and write
56FD000
direct allocation
page read and write
3A64000
heap
page read and write
6478000
heap
page read and write
22EB000
direct allocation
page read and write
3B55000
heap
page read and write
6619000
heap
page read and write
F88000
heap
page read and write
2CCE000
stack
page read and write
83F000
heap
page read and write
2A50000
heap
page read and write
2393000
direct allocation
page read and write
8A8000
heap
page read and write
64A0000
heap
page read and write
3B18000
heap
page read and write
39C0000
heap
page read and write
3939000
heap
page read and write
53BC000
direct allocation
page read and write
400000
unkown
page readonly
39B3000
heap
page read and write
53A1000
direct allocation
page read and write
A16000
heap
page read and write
106C000
heap
page read and write
AF0000
heap
page read and write
391E000
heap
page read and write
1055000
heap
page read and write
3911000
heap
page read and write
3BD9000
heap
page read and write
63E0000
heap
page read and write
256F000
direct allocation
page read and write
3B39000
heap
page read and write
A48000
heap
page read and write
AB9000
heap
page read and write
53C4000
direct allocation
page read and write
648E000
heap
page read and write
1052000
heap
page read and write
25DE000
direct allocation
page read and write
2BB3000
heap
page read and write
6571000
heap
page read and write
E45000
heap
page read and write
3B5F000
heap
page read and write
5B1B000
direct allocation
page read and write
53D3000
direct allocation
page read and write
BB5000
heap
page read and write
650A000
heap
page read and write
3ADB000
heap
page read and write
3AA1000
heap
page read and write
3A64000
heap
page read and write
785C000
heap
page read and write
E40000
heap
page read and write
391D000
heap
page read and write
6DE0000
trusted library allocation
page read and write
6400000
heap
page read and write
C7E000
stack
page read and write
3927000
heap
page read and write
C3F000
stack
page read and write
4E0000
heap
page read and write
3A00000
heap
page read and write
7260000
heap
page read and write
2F83000
heap
page read and write
AD9000
heap
page read and write
53CE000
direct allocation
page read and write
EA4000
direct allocation
page read and write
89B000
heap
page read and write
6443000
heap
page read and write
E56000
heap
page read and write
65F7000
heap
page read and write
680000
heap
page read and write
703000
unkown
page readonly
3949000
heap
page read and write
ACE000
heap
page read and write
2F4E000
stack
page read and write
3937000
heap
page read and write
239A000
direct allocation
page read and write
E54000
direct allocation
page read and write
667D000
heap
page read and write
6418000
heap
page read and write
5FE000
stack
page read and write
3933000
heap
page read and write
64EC000
heap
page read and write
1076000
heap
page read and write
25D7000
direct allocation
page read and write
60901000
unkown
page execute read
760000
heap
page read and write
3AE7000
heap
page read and write
7B5000
unkown
page write copy
34B5000
direct allocation
page read and write
390F000
stack
page read and write
2498000
direct allocation
page read and write
22B8000
direct allocation
page read and write
65F6000
heap
page read and write
FEC000
heap
page read and write
370E000
direct allocation
page read and write
2393000
direct allocation
page read and write
2F10000
heap
page read and write
401000
unkown
page execute read
3A76000
heap
page read and write
3997000
heap
page read and write
6D9000
unkown
page write copy
5B5E000
stack
page read and write
37C6000
direct allocation
page read and write
667C000
heap
page read and write
65E3000
heap
page read and write
3B77000
heap
page read and write
A6F000
stack
page read and write
3934000
heap
page read and write
6473000
heap
page read and write
643D000
heap
page read and write
39E7000
heap
page read and write
3A95000
heap
page read and write
39B4000
heap
page read and write
3758000
direct allocation
page read and write
3A21000
heap
page read and write
64A8000
heap
page read and write
7A4000
unkown
page read and write
397E000
heap
page read and write
25C2000
direct allocation
page read and write
39C1000
heap
page read and write
6444000
heap
page read and write
3B2C000
heap
page read and write
AE8000
unkown
page write copy
3B6E000
heap
page read and write
7A6000
unkown
page read and write
2547000
direct allocation
page read and write
3A60000
heap
page read and write
3B3C000
heap
page read and write
371E000
direct allocation
page read and write
64E9000
heap
page read and write
259B000
direct allocation
page read and write
3B5B000
heap
page read and write
39B8000
heap
page read and write
7D8000
heap
page read and write
7F2000
heap
page read and write
2550000
heap
page read and write
F80000
heap
page read and write
4C0000
unkown
page read and write
83B000
heap
page read and write
330E000
stack
page read and write
66D3000
heap
page read and write
2671000
direct allocation
page read and write
8F0000
heap
page read and write
66D0000
heap
page read and write
There are 1164 hidden memdumps, click here to show them.