IOC Report
lw2HMxuVuf.exe

loading gif

Files

File Path
Type
Category
Malicious
lw2HMxuVuf.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Program Files\CCleaner\CCUpdate.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files\CCleaner\CCleaner64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Program Files\CCleaner\CCleanerBugReport.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Program Files\CCleaner\CCleanerPerformanceOptimizerService.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Program Files\CCleaner\wa_3rd_party_host_32.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files\CCleaner\wa_3rd_party_host_64.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\OPSBBCA.tmp
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\CCleaner\CCleaner.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\CCleanerCrashDump.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Program Files\CCleaner\CCleanerDU.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\CCleaner\CCleanerPerformanceOptimizer.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\CCleaner\CCleanerReactivator.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\CCleaner\CCleanerReactivator.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files\CCleaner\Data\DUState.dat
JSON data
dropped
C:\Program Files\CCleaner\Data\StateHistory\DUState 2024-11-24 11-16-32-817.dat (copy)
JSON data
dropped
C:\Program Files\CCleaner\Data\StateHistory\DUState 2024-11-24 11-17-08-263.dat (copy)
JSON data
dropped
C:\Program Files\CCleaner\Data\StateHistory\InitialDUState V24_2.dat (copy)
JSON data
dropped
C:\Program Files\CCleaner\Data\burger_client\8866F8A9-70C9-43A2-BFBE-EE00AA2DC417\203abf8c-03ea-4cb7-b490-fe04ea1c26bb
data
dropped
C:\Program Files\CCleaner\Data\burger_client\8866F8A9-70C9-43A2-BFBE-EE00AA2DC417\44ED97C8-2D40-4A50-913D-673F6858B9AF
data
dropped
C:\Program Files\CCleaner\Data\usercfg.ini
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files\CCleaner\LOG\BugReport.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
modified
C:\Program Files\CCleaner\LOG\BugReport.status
ASCII text, with CRLF line terminators
dropped
C:\Program Files\CCleaner\LOG\DriverUpdEng.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files\CCleaner\LOG\DriverUpdEngTask.log
Unicode text, UTF-8 text, with no line terminators
dropped
C:\Program Files\CCleaner\LOG\DriverUpdaterLib.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files\CCleaner\LOG\DumpProcess.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
modified
C:\Program Files\CCleaner\LOG\burger_client\8866F8A9-70C9-43A2-BFBE-EE00AA2DC417\2bab7519-4020-4dae-a822-3e7f39e8fa82
data
dropped
C:\Program Files\CCleaner\LOG\burger_client\8866F8A9-70C9-43A2-BFBE-EE00AA2DC417\44ED97C8-2D40-4A50-913D-673F6858B9AF
data
dropped
C:\Program Files\CCleaner\LOG\event_manager.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
modified
C:\Program Files\CCleaner\LOG\pd.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files\CCleaner\LOG\su_adapter.log
Unicode text, UTF-8 (with BOM) text, with very long lines (820), with CRLF line terminators
dropped
C:\Program Files\CCleaner\LOG\su_controller.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files\CCleaner\LOG\su_telemetry.log
Unicode text, UTF-8 text, with no line terminators
dropped
C:\Program Files\CCleaner\LOG\unp31145570364458760i-unhandled.mdmp
Mini DuMP crash report, 19 streams, Sun Nov 24 11:14:54 2024, 0x241964 type
dropped
C:\Program Files\CCleaner\Lang\lang-1025.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1026.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1027.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1028.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1029.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1030.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1031.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1032.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1034.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1035.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1036.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1037.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1038.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1040.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1041.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1042.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1043.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1044.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1045.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1046.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1048.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1049.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1050.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1051.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1052.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1053.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1054.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1055.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1056.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1057.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1058.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1059.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1060.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1061.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1062.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1063.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1065.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1066.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1067.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1068.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1071.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1079.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1081.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1086.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1087.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1090.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1092.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1093.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1102.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1104.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1109.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1110.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-1155.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-2052.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-2070.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-2074.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-3098.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-5146.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Lang\lang-9999.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Setup\02cb0e58-d7f9-4650-aaa3-c382df995438.ini
Generic INItialization configuration [Signature]
dropped
C:\Program Files\CCleaner\Setup\92a778af-76d6-4186-8535-ae66d08f623f.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\Setup\9c909bc2-cad9-48a5-8b4a-a855a60d0635.xml
XML 1.0 document, ASCII text
dropped
C:\Program Files\CCleaner\Setup\config.def
ASCII text, with CRLF line terminators
dropped
C:\Program Files\CCleaner\gcapi_17324469042992.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\CCleaner\gcapi_1732446922760.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\CCleaner\gcapi_17324469293276.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\CCleaner\gcapi_dll.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\CCleaner\lc.dat (copy)
data
dropped
C:\Program Files\CCleaner\libwaapi.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\CCleaner\libwaheap.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\CCleaner\libwalocal.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\CCleaner\libwaresource.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\CCleaner\libwautils.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\CCleaner\libwavmodapi.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\CCleaner\uninst.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xaa2fa9d7, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\CCleaner\CCleaner Homepage.url
MS Windows 95 Internet shortcut text (URL=<http://www.ccleaner.com/ccleaner>), ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\CCleaner\CCleaner.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Nov 6 14:39:14 2024, mtime=Sun Nov 24 10:14:48 2024, atime=Wed Nov 6 14:39:14 2024, length=45359408, window=hide
dropped
C:\ProgramData\Piriform\CCleaner\CCleanerProgramDeactivator.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 35, database pages 20, cookie 0x12, schema 4, UTF-8, version-valid-for 35
dropped
C:\ProgramData\Piriform\CCleaner\CCleanerProgramDeactivatorCache.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 22, cookie 0xd, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\Piriform\CCleaner\burger_client\8866F8A9-70C9-43A2-BFBE-EE00AA2DC417\44ED97C8-2D40-4A50-913D-673F6858B9AF
data
dropped
C:\ProgramData\Piriform\CCleaner\burger_client\8866F8A9-70C9-43A2-BFBE-EE00AA2DC417\78c2e8b9-496a-4af2-a60d-3146ee3f9e1c
data
dropped
C:\Users\Public\Desktop\CCleaner.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Nov 6 14:39:14 2024, mtime=Sun Nov 24 10:14:43 2024, atime=Wed Nov 6 14:39:14 2024, length=45359408, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\wa_3rd_party_host_64.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\wa_3rd_party_host_32.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000002.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000005.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000007.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000009.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\MANIFEST-000002
MPEG-4 LOAS
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\MANIFEST-000005
MPEG-4 LOAS
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\MANIFEST-000007
MPEG-4 LOAS
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\MANIFEST-000009
MPEG-4 LOAS
dropped
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\10[1].json
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\Roboto-Light-v1[1].ttf
TrueType Font data, 17 tables, 1st "GPOS", 15 names, Microsoft, language 0x409, Copyright 2011 Google Inc. All Rights Reserved.Roboto LightRegularVersion 2.001151; 2014Roboto-L
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\icon-redundant-files-v1[1].png
PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\Roboto-Bold-v1[1].ttf
TrueType Font data, 18 tables, 1st "GDEF", 13 names, Microsoft, language 0x409, Copyright 2011 Google Inc. All Rights Reserved.RobotoBoldRoboto BoldVersion 2.001150; 2014Roboto
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\Roboto-Regular-v1[1].ttf
TrueType Font data, 18 tables, 1st "GDEF", 13 names, Microsoft, language 0x409, Copyright 2011 Google Inc. All Rights Reserved.RobotoRegularVersion 2.001101; 2014Roboto-Regular
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\V0UV4482.txt
Generic INItialization configuration [Common]
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\autumn_toaster_button_bg-v1[1].png
PNG image data, 422 x 105, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\icon-free-up-v1[1].png
PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\img-banner-garbage-v1[1].png
PNG image data, 82 x 52, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\Roboto-Bold-v1[1].ttf
TrueType Font data, 18 tables, 1st "GDEF", 13 names, Microsoft, language 0x409, Copyright 2011 Google Inc. All Rights Reserved.RobotoBoldRoboto BoldVersion 2.001150; 2014Roboto
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\icon-take-control-v1[1].png
PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\img-toaster-garbage-v1[1].png
PNG image data, 360 x 144, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\10[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\R7IW179X.txt
Generic INItialization configuration [Common]
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\RX3GZ0SR.txt
Generic INItialization configuration [Common]
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Roboto-Bold-v1[1].ttf
TrueType Font data, 18 tables, 1st "GDEF", 13 names, Microsoft, language 0x409, Copyright 2011 Google Inc. All Rights Reserved.RobotoBoldRoboto BoldVersion 2.001150; 2014Roboto
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Roboto-Light-v1[1].ttf
TrueType Font data, 17 tables, 1st "GPOS", 15 names, Microsoft, language 0x409, Copyright 2011 Google Inc. All Rights Reserved.Roboto LightRegularVersion 2.001151; 2014Roboto-L
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Roboto-Regular-v1[1].ttf
TrueType Font data, 18 tables, 1st "GDEF", 13 names, Microsoft, language 0x409, Copyright 2011 Google Inc. All Rights Reserved.RobotoRegularVersion 2.001101; 2014Roboto-Regular
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\Roboto-Regular-v1[2].ttf
TrueType Font data, 18 tables, 1st "GDEF", 13 names, Microsoft, language 0x409, Copyright 2011 Google Inc. All Rights Reserved.RobotoRegularVersion 2.001101; 2014Roboto-Regular
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\ZTA0I6KA.txt
Generic INItialization configuration [Common]
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\info[1].json
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\info[2].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\info[3].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.chk
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat
Extensible storage engine DataBase, version 0x620, checksum 0xe90d2be5, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.jfm
data
dropped
C:\Users\user\AppData\Local\Temp\6358C710-B89F-46B9-93F2-F6CAC44F5286
data
dropped
C:\Users\user\AppData\Local\Temp\CheckUpdate.log
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\D566D7D7-DCD6-471C-8109-BE0AD33199E3
data
dropped
C:\Users\user\AppData\Local\Temp\F07D8C6A-04B6-4025-869C-70A788D7B5C0
data
dropped
C:\Users\user\AppData\Local\Temp\OPSD146.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_24vkofhx.vjg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_btr0o3gs.1qx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bvinwzbu.ati.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cfn2fhoy.a3h.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dsrhdxjx.deb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gkfrcbtq.ffe.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_los2spzx.je4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_newecgpf.mab.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oaxwrmsj.2yy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uqskywbl.jp4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w32iczjm.tbz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ydhbtu23.hsf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\asw66ac836ee4d4c90c.tmp
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Temp\aswa246ed9ee05d79f1.tmp
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Temp\aswddb84324c9d9bb2d.tmp
GIF image data, version 89a, 1 x 1
dropped
C:\Users\user\AppData\Local\Temp\nsr3318.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ButtonEvent.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\INetC.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\UserInfo.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\a\asdk.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\g\gcapi_dll.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\modern-header.bmp
PC bitmap, Windows 3.x format, 150 x 57 x 24, image size 25764, resolution 3780 x 3780 px/m, cbSize 25818, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\modern-wizard.bmp
PC bitmap, Windows 3.x format, 164 x 314 x 24, image size 154488, resolution 3780 x 3780 px/m, cbSize 154542, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\nsDialogs.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\nsProcess.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\p\ServiceUninstaller.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\p\pfBL.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\pfUI.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\CC_Logo_40x96.png
PNG image data, 40 x 37, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\CC_logo_72x66.png
PNG image data, 72 x 66, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\Montserrat-Regular.otf
OpenType font data
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\PF_computer.png
PNG image data, 679 x 176, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1025.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1026.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1027.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1028.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1029.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1030.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1031.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1032.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1034.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1035.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1036.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1037.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1038.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1040.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1041.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1042.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1043.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1044.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1045.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1046.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1048.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1049.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1050.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1051.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1052.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1053.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1054.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1055.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1056.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1057.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1058.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1059.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1060.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1061.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1062.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1063.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1065.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1066.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1067.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1068.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1071.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1079.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1081.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1086.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1087.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1090.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1092.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1093.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1102.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1104.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1109.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1110.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-1155.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-2052.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-2070.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-2074.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-3098.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-5146.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsw3338.tmp\ui\res\lang-9999.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Q14I0EU6GPWYBDIEE0GM.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\YCSY57EUV1ZYRP474QZ8.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccc0fa1b9f86f7b3.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccc0fa1b9f86f7b3.customDestinations-ms~RF6a968f.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 10:15:01 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 10:15:01 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 10:15:01 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 10:15:01 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 10:15:00 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\webappsstore.sqlite-shm
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\Tasks\CCleanerCrashReporting.job
data
dropped
C:\Windows\Temp\D566D7D7-DCD6-471C-8109-BE0AD33199E3
data
dropped
C:\Windows\Temp\F07D8C6A-04B6-4025-869C-70A788D7B5C0
data
dropped
C:\Windows\Temp\waapi-1732446978\dee05ccdd54c4d9596188efc
ASCII text, with no line terminators
dropped
C:\Windows\Temp\waapi-1732446978\lc.dat
data
dropped
C:\Windows\Temp\waapi-1732447020\9bedc75df002c2da24d49a5b
ASCII text, with no line terminators
dropped
C:\Windows\Temp\waapi-1732447020\lc.dat
data
dropped
Chrome Cache Entry: 398
C source, ASCII text, with very long lines (64709), with CRLF, LF line terminators
dropped
Chrome Cache Entry: 399
JSON data
dropped
Chrome Cache Entry: 400
ASCII text, with very long lines (22445)
downloaded
Chrome Cache Entry: 401
Web Open Font Format (Version 2), TrueType, length 18588, version 1.0
downloaded
Chrome Cache Entry: 402
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 403
ASCII text, with very long lines (16769)
downloaded
Chrome Cache Entry: 404
JSON data
dropped
Chrome Cache Entry: 405
ASCII text, with very long lines (8065)
dropped
Chrome Cache Entry: 406
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 407
C source, ASCII text, with very long lines (64709), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 408
Unicode text, UTF-8 text, with very long lines (32054)
dropped
Chrome Cache Entry: 409
ASCII text, with very long lines (22445)
dropped
Chrome Cache Entry: 410
C source, ASCII text, with very long lines (65097)
dropped
Chrome Cache Entry: 411
ASCII text, with very long lines (19863), with no line terminators
downloaded
Chrome Cache Entry: 412
ASCII text, with very long lines (21734), with no line terminators
downloaded
Chrome Cache Entry: 413
HTML document, ASCII text, with very long lines (815)
downloaded
Chrome Cache Entry: 414
ASCII text, with very long lines (16769)
dropped
Chrome Cache Entry: 415
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 416
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 417
ASCII text, with no line terminators
dropped
Chrome Cache Entry: 418
ASCII text, with no line terminators
dropped
Chrome Cache Entry: 419
ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 420
ASCII text, with very long lines (11812)
downloaded
Chrome Cache Entry: 421
ASCII text, with very long lines (37729)
dropped
Chrome Cache Entry: 422
ASCII text, with very long lines (32764)
downloaded
Chrome Cache Entry: 423
ASCII text, with very long lines (5552)
dropped
Chrome Cache Entry: 424
ASCII text, with very long lines (58876), with no line terminators
dropped
Chrome Cache Entry: 425
Web Open Font Format (Version 2), TrueType, length 18536, version 1.0
downloaded
Chrome Cache Entry: 426
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 427
ASCII text, with very long lines (8065)
downloaded
Chrome Cache Entry: 428
ASCII text, with very long lines (16769)
dropped
Chrome Cache Entry: 429
ASCII text, with very long lines (29146)
downloaded
Chrome Cache Entry: 430
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 431
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 432
ASCII text, with very long lines (31295), with no line terminators
dropped
Chrome Cache Entry: 433
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 434
ASCII text, with very long lines (33615)
downloaded
Chrome Cache Entry: 435
HTML document, Unicode text, UTF-8 text, with very long lines (12724), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 436
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 437
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 438
ASCII text, with no line terminators
dropped
Chrome Cache Entry: 439
PNG image data, 76 x 62, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 440
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 441
JSON data
downloaded
Chrome Cache Entry: 442
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 132x132, components 3
dropped
Chrome Cache Entry: 443
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 444
ASCII text, with very long lines (16769)
downloaded
Chrome Cache Entry: 445
Web Open Font Format (Version 2), TrueType, length 18596, version 1.0
downloaded
Chrome Cache Entry: 446
Unicode text, UTF-8 text, with very long lines (51384), with no line terminators
downloaded
Chrome Cache Entry: 447
JSON data
downloaded
Chrome Cache Entry: 448
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 449
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1560x590, components 3
downloaded
Chrome Cache Entry: 450
ASCII text, with very long lines (37729)
downloaded
Chrome Cache Entry: 451
JSON data
dropped
Chrome Cache Entry: 452
ASCII text, with very long lines (57795)
dropped
Chrome Cache Entry: 453
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 454
PNG image data, 396 x 185, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 455
ASCII text, with very long lines (19863), with no line terminators
dropped
Chrome Cache Entry: 456
JSON data
downloaded
Chrome Cache Entry: 457
HTML document, ASCII text, with no line terminators
dropped
Chrome Cache Entry: 458
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 459
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1560x590, components 3
dropped
Chrome Cache Entry: 460
ASCII text, with very long lines (33615)
dropped
Chrome Cache Entry: 461
GIF image data, version 89a, 1 x 1
dropped
Chrome Cache Entry: 462
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 463
ASCII text, with very long lines (57795)
downloaded
Chrome Cache Entry: 464
JSON data
downloaded
Chrome Cache Entry: 465
JSON data
downloaded
Chrome Cache Entry: 466
ASCII text, with very long lines (64779)
dropped
Chrome Cache Entry: 467
JSON data
dropped
Chrome Cache Entry: 468
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 469
Unicode text, UTF-8 text, with very long lines (32054)
downloaded
Chrome Cache Entry: 470
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 471
ASCII text, with very long lines (31295), with no line terminators
downloaded
Chrome Cache Entry: 472
ASCII text, with very long lines (32764)
dropped
Chrome Cache Entry: 473
ASCII text, with very long lines (29146)
dropped
Chrome Cache Entry: 474
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 475
ASCII text, with very long lines (1223)
downloaded
Chrome Cache Entry: 476
ASCII text, with very long lines (65450)
downloaded
Chrome Cache Entry: 477
ASCII text
downloaded
Chrome Cache Entry: 478
ASCII text, with very long lines (9217)
downloaded
Chrome Cache Entry: 479
PNG image data, 396 x 185, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 480
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 481
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 482
ASCII text, with very long lines (65455)
dropped
Chrome Cache Entry: 483
Unicode text, UTF-8 text, with very long lines (51384), with no line terminators
dropped
Chrome Cache Entry: 484
JSON data
dropped
Chrome Cache Entry: 485
ASCII text, with very long lines (55521)
dropped
Chrome Cache Entry: 486
Unicode text, UTF-8 text, with very long lines (41169)
dropped
Chrome Cache Entry: 487
ASCII text, with very long lines (21734), with no line terminators
dropped
Chrome Cache Entry: 488
JSON data
dropped
Chrome Cache Entry: 489
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 132x132, components 3
downloaded
Chrome Cache Entry: 490
ASCII text, with very long lines (5552)
downloaded
Chrome Cache Entry: 491
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 492
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 493
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 494
JSON data
downloaded
Chrome Cache Entry: 495
JSON data
downloaded
Chrome Cache Entry: 496
HTML document, ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 497
GIF image data, version 89a, 1 x 1
downloaded
Chrome Cache Entry: 498
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 499
C source, ASCII text, with very long lines (65097)
downloaded
Chrome Cache Entry: 500
ASCII text, with very long lines (11812)
dropped
Chrome Cache Entry: 501
Unicode text, UTF-8 text, with very long lines (41169)
downloaded
Chrome Cache Entry: 502
ASCII text, with very long lines (64779)
downloaded
Chrome Cache Entry: 503
JSON data
downloaded
Chrome Cache Entry: 504
ASCII text, with very long lines (9217)
dropped
Chrome Cache Entry: 505
ASCII text, with no line terminators
dropped
Chrome Cache Entry: 506
HTML document, ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 507
ASCII text, with very long lines (65455)
downloaded
Chrome Cache Entry: 508
ASCII text, with very long lines (55521)
downloaded
Chrome Cache Entry: 509
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 511
ASCII text, with very long lines (58876), with no line terminators
downloaded
Chrome Cache Entry: 512
ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 513
PNG image data, 76 x 62, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 514
JSON data
dropped
Chrome Cache Entry: 515
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 516
ASCII text, with very long lines (65536), with no line terminators
downloaded
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 388 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\lw2HMxuVuf.exe
"C:\Users\user\Desktop\lw2HMxuVuf.exe"
malicious
C:\Program Files\CCleaner\CCleaner64.exe
"C:\Program Files\CCleaner\CCleaner64.exe" /createSkipUAC
malicious
C:\Program Files\CCleaner\CCUpdate.exe
"C:\Program Files\CCleaner\CCUpdate.exe" /reg
malicious
C:\Program Files\CCleaner\CCUpdate.exe
"C:\Program Files\CCleaner\CCUpdate.exe"
malicious
C:\Program Files\CCleaner\CCleanerBugReport.exe
"C:\Program Files\CCleaner\CCleanerBugReport.exe" --product 90 --send dumps|report --path "C:\Program Files\CCleaner\LOG" --programpath "C:\Program Files\CCleaner" --guid "aa2c86aa-7fc5-4c8e-a69d-19a7dbc0b72a" --version "6.30.11385" --silent
malicious
C:\Program Files\CCleaner\CCleaner64.exe
"C:\Program Files\CCleaner\CCleaner.exe" 0
malicious
C:\Program Files\CCleaner\CCleaner64.exe
"C:\Program Files\CCleaner\CCleaner64.exe"
malicious
C:\Program Files\CCleaner\CCUpdate.exe
CCUpdate.exe /emupdater /applydll "C:\Program Files\CCleaner\Setup\92a778af-76d6-4186-8535-ae66d08f623f.dll"
malicious
C:\Program Files\CCleaner\CCleaner64.exe
"C:\Program Files\CCleaner\CCleaner64.exe" /monitor
malicious
C:\Program Files\CCleaner\wa_3rd_party_host_32.exe
--pid=3276
malicious
C:\Program Files\CCleaner\CCleanerPerformanceOptimizerService.exe
"C:\Program Files\CCleaner\CCleanerPerformanceOptimizerService.exe"
malicious
C:\Program Files\CCleaner\wa_3rd_party_host_32.exe
--pid=2992
malicious
C:\Program Files\CCleaner\wa_3rd_party_host_64.exe
--pid=3276
malicious
C:\Program Files\CCleaner\CCleaner64.exe
"C:\Program Files\CCleaner\CCleaner64.exe" /MONITOR
malicious
C:\Program Files\CCleaner\CCleaner64.exe
"C:\Program Files\CCleaner\CCleaner.exe" /MONITOR /uac
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /C ""C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ExecutionPolicy Bypass "(Get-ItemProperty 'C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe').VersionInfo.FileDescription" > "C:\Users\user\AppData\Local\Temp\OPSBBCA.tmp" 2> "C:\Users\user\AppData\Local\Temp\OPSBBCB.tmp""
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ExecutionPolicy Bypass "(Get-ItemProperty 'C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe').VersionInfo.FileDescription"
malicious
C:\Program Files\CCleaner\wa_3rd_party_host_64.exe
--pid=2992
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /C ""C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ExecutionPolicy Bypass "(Get-ItemProperty 'C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe').VersionInfo.FileDescription" > "C:\Users\user\AppData\Local\Temp\OPSD146.tmp" 2> "C:\Users\user\AppData\Local\Temp\OPSD147.tmp""
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ExecutionPolicy Bypass "(Get-ItemProperty 'C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe').VersionInfo.FileDescription"
malicious
C:\Program Files\CCleaner\CCleaner64.exe
"C:\Program Files\CCleaner\CCleaner64.exe" /MONITOR
malicious
C:\Program Files\CCleaner\CCleaner64.exe
"C:\Program Files\CCleaner\CCleaner.exe" /MONITOR /uac
malicious
C:\Program Files\CCleaner\CCleanerCrashDump.exe
"C:\Program Files\CCleaner\CCleanerCrashDump.exe" --pid 1272 --exception_ptr 0000007E054FD2C0 --thread_id 5744 --dump_level 21 --dump_file "C:\Program Files\CCleaner\LOG\unp31145570364458760i-unhandled.mdmp" --comment "" --min_interval 60
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\CCleaner\CCleaner.exe
"C:\Program Files\CCleaner\CCleaner.exe" 0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://www.ccleaner.com/go/app_releasenotes?p=1&v=&l=1033&b=1&a=0
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=2004,i,4752939339511443600,2295827606538063107,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\wbem\unsecapp.exe
C:\Windows\system32\wbem\unsecapp.exe -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\CCleaner\CCleaner.exe
"C:\Program Files\CCleaner\CCleaner.exe" /MONITOR /uac
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\CCleaner\CCleaner.exe
"C:\Program Files\CCleaner\CCleaner.exe" /MONITOR /uac
C:\Program Files\CCleaner\CCleanerCrashDump.exe
"C:\Program Files\CCleaner\CCleanerCrashDump.exe" --pid 7236 --exception_ptr 0000005CCC9FD640 --thread_id 8100 --dump_level 21 --dump_file "C:\Program Files\CCleaner\LOG\unp31145570997760611i-unhandled.mdmp" --comment "" --min_interval 60
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 30 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.ccleaner.com/go/app_po_surveyContinueDemoViewSleepingProgramsPopup/PerformanceOptimizer/
unknown
https://connect.facebook.net/signals/config/2679475345708101?v=2.9.176&r=stable&domain=www.ccleaner.com&hme=872f04a0547459b3285cb03b0d7a47bfde40628f4b386809918a621e2688602f&ex_m=70%2C121%2C107%2C111%2C61%2C4%2C100%2C69%2C16%2C97%2C89%2C51%2C54%2C172%2C175%2C187%2C183%2C184%2C186%2C29%2C101%2C53%2C77%2C185%2C167%2C170%2C180%2C181%2C188%2C131%2C41%2C189%2C190%2C34%2C143%2C15%2C50%2C195%2C194%2C133%2C18%2C40%2C1%2C43%2C65%2C66%2C67%2C71%2C93%2C17%2C14%2C96%2C92%2C91%2C108%2C52%2C110%2C39%2C109%2C30%2C94%2C26%2C168%2C171%2C140%2C86%2C56%2C84%2C33%2C73%2C0%2C95%2C32%2C28%2C82%2C83%2C88%2C47%2C46%2C87%2C37%2C11%2C12%2C13%2C6%2C7%2C25%2C22%2C23%2C57%2C62%2C64%2C75%2C102%2C27%2C76%2C9%2C8%2C80%2C48%2C21%2C104%2C103%2C105%2C98%2C10%2C20%2C3%2C38%2C74%2C19%2C5%2C90%2C81%2C44%2C35%2C85%2C2%2C36%2C63%2C42%2C106%2C45%2C79%2C68%2C112%2C60%2C59%2C31%2C99%2C58%2C55%2C49%2C78%2C72%2C24%2C113
157.240.196.15
https://www.ccleaner.com/business/ccleaner-business-edition
unknown
https://ccleaner.com/go/app_cc_license_agreement
unknown
https://ipm-provider.ff.avast.com/?action=1&p_elm=229&p_lng=en&p_lid=en-us&p_ads=1&p_devrsrch=1&p_thrdprt=1&p_thrdtr=1&p_midex=1F2CCAD3812656C4930608337C4FB4A5DA9202DE17AF565647702A83E3FCF3B0&p_hid=aa2c86aa-7fc5-4c8e-a69d-19a7dbc0b72a&p_ubs=50&p_trs=0&p_alp=0&p_jar=0&p_cclic=&p_chcc=0&p_bld=mmm_ccl_012_999_a8k_m&p_dols=0&p_sols=0&p_pts=0&p_ftc=0&p_btc=0&p_pro=90&p_vep=6&p_ves=30&p_vbd=11385&p_osv=10.0&p_wsc2v_av=9011&p_gksw=0&p_chr=0&p_sbi=0&p_scbu=0&p_tos=0&p_bau=0&p_dvt=3&p_bsls=0&p_gis=0&p_fds=172544&p_cco=0&p_ccgx=0&p_cce=1&p_cced=0&p_ccnsv=0&p_ccnu=0&p_ccna=0&p_ccnl=0&p_lit=0&p_avt=cc-pro-trial&p_wvv=117.0.2045.47&p_age=0&p_tcy=0&p_pct=0&p_jct=0&p_lex=-1&p_ccgd=0&p_ccod=0&p_ccdb=0&p_pctn=0&p_iau=0&p_qcm=0&p_hcm=1&p_sum=1&p_ost=0&p_scr=1&p_fid=20241124
34.111.24.1
https://brain.jumpshot.com/avast/ss/reportjumpshot_silentscanresults://https://brain.jumpshot.com/av
unknown
https://analytics.avcdn.net/om
unknown
https://www.avast.com/lp-ppc-nbu-fav-cc
unknown
https://sp.analytics.yahoo.com/sp.pl?a=10000&d=Sun%2C%2024%20Nov%202024%2011%3A15%3A25%20GMT&n=5&b=CCleaner%20v6.30.11385&.yp=10180940&f=https%3A%2F%2Fwww.ccleaner.com%2Fknowledge%2Fccleaner-v6-30-11385%3Fcv%3Dv6-30-11385&enc=UTF-8&yv=1.16.5&tagmgr=gtm%2Cadobe
54.246.144.89
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://sciter.com/docs/content/script/Array.htm
unknown
https://analytics.avcdn.net/(
unknown
https://www.ccleaner.com/docs/ccleaner/ccleaner-settings/choosing-which-cookies-to-keep
unknown
https://s-trackoff.avcdn.net/trackoff/8ad1526a87b9617cf6dd677cdf9f87a0e3fd1555b6a8828d87ec2bef2850fa
unknown
https://install.avcdn.net/avg/iavs9x/avg_internet_security_setup.exeASWSig2A123D026AE3BEAC0AC7D4DC35
unknown
https://analytics.twitter.com/i/adsct?bci=3&dv=America%2FNew_York%26en-US%2Cen%26Google%20Inc.%26Win32%26255%261280%261024%264%2624%261280%26984%260%26na&eci=2&event_id=f0466fac-a653-4a79-868b-04f8676bc357&events=%5B%5B%22pageview%22%2C%7B%7D%5D%5D&integration=advertiser&p_id=Twitter&p_user_id=0&pl_id=1bd174fb-a78f-4078-9437-448582031ffa&tw_document_href=https%3A%2F%2Fwww.ccleaner.com%2Fknowledge%2Fccleaner-v6-30-11385%3Fcv%3Dv6-30-11385&tw_iframe_status=0&tw_order_quantity=0&tw_sale_amount=0&txn_id=o4ls7&type=javascript&version=2.3.31
104.244.42.195
http://p%03d.sb.avast.com/V1/MD/avast_streambackraw_%03d://CommChannelAddr_StreambackGetBody
unknown
https://cdn.cookielaw.org/scripttemplates/6.36.0/assets/v2/otPcCenter.json
104.18.87.42
http://ccleaner.tools.avcdn.net/tools/ccleaner/update/20180205.dll
unknown
https://analytics.avcdn.net/S
unknown
http://p%03d.sb.avast.com/V1/MD/Do
unknown
https://honzik.avcdn.net/setup/avast-vpn/release/avast_vpn_online_setup.exeASWSig2A06FCDABA5742BE662
unknown
https://ipm-provider.ff.avast.com/?action=1&p_elm=0&p_lng=en&p_lid=en-us&p_ads=1&p_devrsrch=1&p_thrdprt=1&p_thrdtr=1&p_midex=1F2CCAD3812656C4930608337C4FB4A5DA9202DE17AF565647702A83E3FCF3B0&p_hid=aa2c86aa-7fc5-4c8e-a69d-19a7dbc0b72a&p_ubs=50&p_trs=0&p_alp=0&p_jar=0&p_cclic=&p_chcc=0&p_bld=mmm_ccl_012_999_a8k_m&p_dols=0&p_sols=0&p_pts=0&p_ftc=0&p_btc=0&p_pro=90&p_vep=6&p_ves=30&p_vbd=11385&p_osv=10.0&p_wsc2v_av=9011&p_gksw=0&p_chr=0&p_sbi=0&p_scbu=0&p_tos=0&p_bau=0&p_dvt=3&p_bsls=0&p_gis=0&p_fds=172544&p_cco=0&p_ccgx=0&p_cce=1&p_cced=0&p_ccnsv=0&p_ccnu=0&p_ccna=0&p_ccnl=0&p_lit=0&p_avt=cc-pro-trial&p_wvv=117.0.2045.47&p_age=0&p_tcy=0&p_pct=0&p_jct=0&p_lex=-1&p_ccgd=0&p_ccod=0&p_ccdb=0&p_pctn=0&p_iau=0&p_qcm=0&p_hcm=1&p_sum=1&p_ost=0&p_scr=1&p_fid=20241124
34.111.24.1
http://ncc.avast.com/ncc.txter
unknown
https://winqual.sb.avast.com
unknown
https://piriform.zendesk.com/hc/en-us/articles/218109957-How-do-I-manage-browser-plugins-
unknown
http://honzik.avcdn.net/setup/avast-tu/release/avast_cleanup_online_setup.exeASWSig2A4C1A1197A19B18F
unknown
http://files.avast.com/beta9x/avast_free_antivirus_setup_online.exeASWSig2A5549FF2866EA44F68D28FB2B1
unknown
https://winqual.sb.avast.com/V1/MD
35.190.209.22
https://oms.ccleaner.com/b/ss/symanteccom/1/JS-2.22.0-LDQM/s18539589585813?AQB=1&ndh=1&pf=1&t=24%2F10%2F2024%206%3A15%3A21%200%20300&sdid=4523341CF3BE0AEE-41D4D261AA724F9B&mid=86915098161613896303235469939112226982&aamlh=6&ce=UTF-8&pageName=ccleaner%3Aus%3Aknowledge%3Accleaner-v6-30-11385&g=https%3A%2F%2Fwww.ccleaner.com%2Fknowledge%2Fccleaner-v6-30-11385%3Fcv%3Dv6-30-11385&cc=USD&server=norton&events=event69&aamb=6G1ynYcLPuiQxYZrsz_pkqfLG9yMXBpb2zX5dvJdYQJzPXImdj0y&c2=us&c3=en&c8=D%3Dv163&c14=D%3Dv16&v18=ccleaner%3Aus%3Aknowledge%3Accleaner-v6-30-11385&v21=D%3Dc21&v27=D%3Dc2&v28=D%3Dc3&c35=D%3DpageName&c41=ccleaner&v41=D%3Dc41&c46=html&c47=page&v47=s_code_norton%202024-10-07&c48=CCleaner%20v6.30.11385&v48=D%3Dc49&c49=knowledge&v49=D%3Dc48&v57=86915098161613896303235469939112226982&c59=ccleaner%3Aknowledge%3Accleaner-v6-30-11385&v59=D%3Dc59&v72=ccleaner&c75=D%3Dv57&v96=https%3A%2F%2Fwww.ccleaner.com%2Fknowledge%2Fccleaner-v6-30-11385&v164=ccleaner%3A999_a&s=1280x1024&c=24&j=1.6&v=N&k=Y&bw=1034&bh=870&mcorgid=67C716D751E567F70A490D4C%40AdobeOrg&AQE=1
63.140.62.27
https://license.piriform.com/0
unknown
https://s-trackoff.avcdn.net/avg/trackoff/7854df286ff1c4e1f4d81d466f4a1b0243b39837ac99c5b98817907f76
unknown
https://install.avcdn.net/beta9x/avast_pro_antivirus_setup_online.exeASWSig2A579D90FED0C6441EE7B258F
unknown
https://shepherd.ff.avast.com/?p_vep=6&p_ves=30&p_vbd=11385&p_lit=0&p_midex=1F2CCAD3812656C493060833
unknown
https://c5.adalyser.com/adalyser.js?cid=ccleaner
52.209.8.105
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
unknown
http://www.ccleaner.com/go/app_releasenotes?p=1&v=&l=1033&b=1&a=0
unknown
https://license.piriform.com//
unknown
http://emupdate.avcdn.net/
unknown
http://p%03d.sb.avast.com/V1/PD/Do
unknown
https://license.piriform.com/product/v1/installcheck?p=1&v=6.30.11385&vx=&l=1033&b=1&o=10W6&g=0&i=1&
unknown
https://winqual.sb.avast.com/.MD
unknown
https://www.facebook.com/tr/?id=2679475345708101&ev=PageView&dl=https%3A%2F%2Fwww.ccleaner.com%2Fknowledge%2Fccleaner-v6-30-11385%3Fcv%3Dv6-30-11385&rl=&if=false&ts=1732446936663&sw=1280&sh=1024&v=2.9.176&r=stable&ec=0&o=4126&fbp=fb.1.1732446936660.65224446665965545&cs_est=true&ler=empty&cdl=API_unavailable&it=1732446935268&coo=false&dpo=&tm=1&rqm=GET
157.240.196.35
https://sciter.com/forums/topic/plus-custom-output-formatter-wont-work-if-they-are-written-in-htm/#p
unknown
https://www.ccleaner.com/go/app_cc_help_preloading
unknown
https://ccleaner.com/go/app_cc_privacy_data_factsheet
unknown
https://ipm-provider.ff.avast.com/?p_elm=76&action=1&p_age=0&p_bau=0&p_bsls=0&p_chcc=2&p_chr=0&p_dvt
unknown
https://openid.avg.commy-devices.avast.comalpha-rollout-service.ff.avast.comhttps://openid.avast.com
unknown
http://emupdate.avcdn.net/files/emupdate/pong.txts
unknown
https://honzik.avcdn.net/setup/avast-bs/beta/avast_battery_saver_online_setup.exeASWSig2A3A3BE3789E6
unknown
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLCopyright
unknown
https://tr.outbrain.com/cachedClickId?marketerId=001ac0827d67b7b38319c9517e7fa2f4cc
172.179.182.7
http://ccleaner.tools.avcdn.net/tools/ccleaner/update
unknown
https://brain.jumpshot.com/avast/ss/jumpshot_silentscanresults2://https://brain.jumpshot.com/avast/s
unknown
https://honzik.avcdn.net/setup/avast-bg/release/avast_breach_guard_online_setup.exeASWSig2A2457920CE
unknown
http://www.ccleaner.com/ccleaner
unknown
http://www.ccleaner.com/inapp/notificationsContent-Type:
unknown
https://viruslab-samples.sb.avast.com
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
unknown
http://emupdate.avcdn.net/files/emupdate/pong.txt32.dll
unknown
http://www.zkysky.com.ar/This
unknown
https://analytics.avcdn.net/dll
unknown
https://driver-updater.ff.avast.com/api/v1/scanDrivers/
34.149.202.126
https://service.piriform.com/installcheck.aspx5.70.7909PrefsPrivacyShareData1stParty
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://dpm.demdex.net/ibs:dpid=411&dpuuid=Z0MKzAAAAHGmGQO-
54.229.91.192
https://static.hotjar.com/c/hotjar-857043.js?sv=6
18.66.102.106
https://cdn.cookielaw.org/scripttemplates/6.36.0/assets/otCommonStyles.css
104.18.87.42
https://shepherd.ff.avast.com/?p_lng=en&p_lid=en-us&p_ads=1&p_devrsrch=1&p_thrdprt=1&p_thrdtr=1&p_midex=1F2CCAD3812656C4930608337C4FB4A5DA9202DE17AF565647702A83E3FCF3B0&p_hid=aa2c86aa-7fc5-4c8e-a69d-19a7dbc0b72a&p_ubs=50&p_trs=0&p_alp=0&p_jar=0&p_cclic=&p_chcc=0&p_bld=mmm_ccl_012_999_a8k_m&p_dols=0&p_sols=0&p_pts=0&p_ftc=0&p_btc=0&p_pro=90&p_vep=6&p_ves=30&p_vbd=11385&p_osv=10.0&p_wsc2v_av=9011&p_gksw=0&p_chr=0&p_sbi=0&p_scbu=0&p_tos=0&p_bau=0&p_dvt=3&p_bsls=0&p_gis=0&p_fds=172544&p_cco=0&p_ccgx=0&p_cce=1&p_cced=0&p_ccnsv=0&p_ccnu=0&p_ccna=0&p_ccnl=0&p_lit=0&p_avt=cc-pro-trial&p_wvv=117.0.2045.47&p_age=0&p_tcy=0&p_pct=0&p_jct=0
34.160.176.28
https://honzik.avcdn.net/setup/avast-bs/release/avast_battery_saver_online_setup.exeASWSig2A072492C0
unknown
https://cdn.cookielaw.org/scripttemplates/otSDKStub.js
104.18.87.42
https://ip-info.ff.avast.com/v2/info
34.111.175.102
http://www.ccleaner.com/go/app_privacy?p=1&l=
unknown
https://shepherd.ff.avast.com/Mozilla/4.0
unknown
http://keys.backup.norton.com
unknown
http://ocsp.sectigo.com0
unknown
https://www.ccleaner.com/go/app_du_systemrestoreinfo
unknown
http://www.gimp.org/xmp/
unknown
https://s.yimg.com/wi/ytc.js
87.248.114.12
https://analytics.avcdn.net:443/receive3
unknown
http://www.avast.com0/
unknown
https://service.piriform.com/a
unknown
https://analytics.avcdn.net/receive3
34.117.223.223
https://www.ccleaner.com/go/app_du_survey
unknown
https://c5.adalyser.com/tracking/track/v3/p?stm=1732446933112&e=lce1&url=https%3A%2F%2Fwww.ccleaner.com%2Fknowledge%2Fccleaner-v6-30-11385%3Fcv%3Dv6-30-11385&cid=ccleaner&p=%7B%22et%22%3A1732446933109%2C%22nr%22%3A%22New%22%2C%22cg%22%3A%22Direct%22%2C%22dt%22%3A%22desktop%22%2C%22so%22%3A%22direct%22%2C%22me%22%3A%22none%22%2C%22ca%22%3A%22direct%22%2C%22co%22%3A%22(not%20set)%22%2C%22ke%22%3A%22(not%20set)%22%2C%22vid%22%3A%221%22%2C%22sid%22%3A%221b678712-0cc8-486d-89d0-05e165f88b18%22%2C%22duid%22%3A%226a43d717-b772-42a5-badd-e897920af092%22%2C%22cw%22%3A1732446933109%7D&userAgent=Mozilla%2F5.0%20(Windows%20NT%2010.0%3B%20Win64%3B%20x64)%20AppleWebKit%2F537.36%20(KHTML%2C%20like%20Gecko)%20Chrome%2F117.0.0.0%20Safari%2F537.36&domain=www.ccleaner.com
52.209.8.105
https://secure.ccleaner.com/502/uurl-90zu4qtn5p?x-source=833
unknown
https://www.facebook.com/privacy_sandbox/pixel/register/trigger/?id=2679475345708101&ev=PageView&dl=https%3A%2F%2Fwww.ccleaner.com%2Fknowledge%2Fccleaner-v6-30-11385%3Fcv%3Dv6-30-11385&rl=&if=false&ts=1732446936663&sw=1280&sh=1024&v=2.9.176&r=stable&ec=0&o=4126&fbp=fb.1.1732446936660.65224446665965545&cs_est=true&ler=empty&cdl=API_unavailable&it=1732446935268&coo=false&dpo=&tm=1&rqm=FGET
157.240.196.35
http://ccleaner.tools.avcdn.net/tools/ccleaner/update/updates.xml
unknown
http://domrep.ff.avast.com/http://api.webrep.avast.com/avast_webrepapi://http://ui.ff.avast.com/avas
unknown
https://shepherd.ff.avast.com/
unknown
https://ipm-provider.ff.avast.com/?p_elm=76&action=1&p_age=0&p_bau=0&p_bsls=0&p_chcc=2&p_chr=0&p_dvt=3&p_fds=172544&p_gis=0&p_hid=aa2c86aa-7fc5-4c8e-a69d-19a7dbc0b72a&p_lid=en-CH&p_lng=en&p_midex=1F2CCAD3812656C4930608337C4FB4A5DA9202DE17AF565647702A83E3FCF3B0&p_osv=10.0&p_pro=90&p_sbi=0&p_scbu=0&p_tos=0&p_vbd=11385&p_vep=6&p_ves=30&p_wid=1675281926
34.111.24.1
https://ip-info.ff.avast.com/v1/info
34.111.175.102
http://%s:%d;https=https://%s:%dHTTP/1.0%u.%u.%u.%u01234567890123456789abcdef0123456789ABCDEFCONOUT$
unknown
https://service.piriform.com/installcheck.aspx?p=1&v=6.30.11385&vx=&l=1033&b=1&o=10W6&g=0&i=1&a=0&e=
unknown
http://www.ccleaner.com/go/app_license?p=1&l=
unknown
http://www.ccleaner.com/go/app_license?p=1&l=1033&a=0
unknown
https://install.avcdn.net/iavs9x/avast_free_antivirus_setup_online.exeASWSig2A2EC0971AB07DE15C30023C
unknown
http://ccleaner.tools.avcdn.net/
unknown
https://honzik.avcdn.net/setup/avg-bg/release/avg_breach_guard_online_setup.exeASWSig2A14AA13983E189
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-info-gcp.ff.avast.com
34.111.175.102
dev.visualwebsiteoptimizer.com
34.96.102.137
platform.twitter.map.fastly.net
146.75.120.157
spdc-global.pbp.gysm.yahoodns.net
54.246.144.89
stats.g.doubleclick.net
66.102.1.155
adobetarget.data.adobedc.net
66.235.152.221
scontent.xx.fbcdn.net
157.240.196.15
idsync.rlcdn.com
35.244.154.8
t.co
172.66.0.227
script.hotjar.com
13.33.187.74
peso-1422535133.eu-west-1.elb.amazonaws.com
52.209.8.105
www.google.com
142.250.181.68
dcs-public-edge-irl1-150041215.eu-west-1.elb.amazonaws.com
54.229.91.192
2w99epxhne.data.adobedc.net
63.140.62.27
mstatic.ccleaner.com
20.50.2.53
static-cdn.hotjar.com
18.66.102.106
star-mini.c10r.facebook.com
157.240.196.35
ipm-gcp-prod.ff.avast.com
34.111.24.1
s.twitter.com
104.244.42.195
wndc1.outbrain.org
172.179.182.7
analytics-prod-gcp.ff.avast.com
34.117.223.223
ax-0001.ax-msedge.net
150.171.27.10
streamback-cl1.ns1.ff.avast.com
35.190.209.22
analytics-alv.google.com
216.239.36.181
shepherd-gcp.ff.avast.com
34.160.176.28
dcjdc5qmbbux7.cloudfront.net
108.158.75.13
td.doubleclick.net
172.217.19.2
driver-updater-gcp.ff.avast.com
34.149.202.126
cdn.cookielaw.org
104.18.87.42
geolocation.onetrust.com
172.64.155.119
edge.gycpi.b.yahoodns.net
87.248.114.12
static.ads-twitter.com
unknown
amplify.outbrain.com
unknown
license.piriform.com
unknown
emupdate.avcdn.net
unknown
siteintercept.qualtrics.com
unknown
cm.everesttech.net
unknown
ipm-provider.ff.avast.com
unknown
driver-updater.ff.avast.com
unknown
oms.ccleaner.com
unknown
wave.outbrain.com
unknown
static.hotjar.com
unknown
trial-eum-clientnsv4-s.akamaihd.net
unknown
c5.adalyser.com
unknown
8-46-123-75_s-2-20-68-230_ts-1732446949-clienttons-s.akamaihd.net
unknown
assets.adobedtm.com
unknown
trial-eum-clienttons-s.akamaihd.net
unknown
winqual.sb.avast.com
unknown
connect.facebook.net
unknown
px.ads.linkedin.com
unknown
ipmcdn.avast.com
unknown
symantec.demdex.net
unknown
684d0d45.akstat.io
unknown
s.yimg.com
unknown
service.piriform.com
unknown
download.avira.com
unknown
www.mczbf.com
unknown
sp.analytics.yahoo.com
unknown
s.go-mpulse.net
unknown
symantec.tt.omtrdc.net
unknown
shepherd.ff.avast.com
unknown
cdn-production.ccleaner.com
unknown
www.nortonlifelock.com
unknown
analytics.avcdn.net
unknown
dpm.demdex.net
unknown
s1.pir.fm
unknown
analytics.ff.avast.com
unknown
www.facebook.com
unknown
www.linkedin.com
unknown
baxhwsyxgzi4uz2dblsq-p08v2f-49ff2084c-clientnsv4-s.akamaihd.net
unknown
ncc.avast.com
unknown
zn4i1jhjmxub1nc6y-gendigital.siteintercept.qualtrics.com
unknown
cdn-uat.ccleaner.com
unknown
analytics.twitter.com
unknown
snap.licdn.com
unknown
ccleaner.tools.avcdn.net
unknown
www.ccleaner.com
unknown
analytics.google.com
unknown
ip-info.ff.avast.com
unknown
c.go-mpulse.net
unknown
tr.outbrain.com
unknown
There are 71 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.111.24.1
ipm-gcp-prod.ff.avast.com
United States
35.244.154.8
idsync.rlcdn.com
United States
192.168.2.5
unknown
unknown
66.102.1.155
stats.g.doubleclick.net
United States
104.18.32.137
unknown
United States
66.235.152.221
adobetarget.data.adobedc.net
United States
52.209.8.105
peso-1422535133.eu-west-1.elb.amazonaws.com
United States
162.159.140.229
unknown
United States
104.18.87.42
cdn.cookielaw.org
United States
34.149.202.126
driver-updater-gcp.ff.avast.com
United States
63.140.62.17
unknown
United States
172.64.155.119
geolocation.onetrust.com
United States
34.253.40.242
unknown
United States
239.255.255.250
unknown
Reserved
52.50.80.142
unknown
United States
63.34.142.90
unknown
United States
146.75.120.157
platform.twitter.map.fastly.net
Sweden
54.246.144.89
spdc-global.pbp.gysm.yahoodns.net
United States
157.240.196.35
star-mini.c10r.facebook.com
United States
127.0.0.1
unknown
unknown
20.50.2.53
mstatic.ccleaner.com
United States
18.66.102.106
static-cdn.hotjar.com
United States
63.140.62.27
2w99epxhne.data.adobedc.net
United States
172.179.182.7
wndc1.outbrain.org
United States
142.250.181.68
www.google.com
United States
34.96.102.137
dev.visualwebsiteoptimizer.com
United States
34.111.175.102
ip-info-gcp.ff.avast.com
United States
216.239.36.181
analytics-alv.google.com
United States
35.190.209.22
streamback-cl1.ns1.ff.avast.com
United States
54.229.91.192
dcs-public-edge-irl1-150041215.eu-west-1.elb.amazonaws.com
United States
172.217.19.2
td.doubleclick.net
United States
108.158.75.13
dcjdc5qmbbux7.cloudfront.net
United States
104.244.42.3
unknown
United States
104.244.42.195
s.twitter.com
United States
34.160.176.28
shepherd-gcp.ff.avast.com
United States
150.171.27.10
ax-0001.ax-msedge.net
United States
34.117.223.223
analytics-prod-gcp.ff.avast.com
United States
87.248.114.12
edge.gycpi.b.yahoodns.net
United Kingdom
13.33.187.74
script.hotjar.com
United States
157.240.196.15
scontent.xx.fbcdn.net
United States
172.66.0.227
t.co
United States
There are 31 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
SystemRestorePointCreationFrequency
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)TTL
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)TTL-Spread
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)AU2
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)AUTNV
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)AlphaIntegration
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)AlphaMigration
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)CCAM
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)CCNU
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)CCT
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DUSkipOnboarding
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DriverScanInterval
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DriverUpdater
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DriverUpdaterVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DumpReporting
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)GDDEBUG
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HCAddResults
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HCDirectCart
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HCResolveBtn
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HCSkipAdvanced
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HealthCheck
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HealthCheckIpm
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HealthCheckNF
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HealthCheckVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HideRegistry
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)NotificationCentre
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)OPSWATSoftwareUpdater
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)OPSWATSoftwareUpdaterHC
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PC
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PCCU
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PCCUD
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PE
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PENP
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)POSkipOnboarding
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PTOOF
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PerformanceOptimizerVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PrivacyPolicyDate
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)ProFeatureCounters
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)QuickCleanIpm
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)REU
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)SPERDI
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)SRDI
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)SUExclusions
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)ShowOffers3rdParty
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)SoftwareUpdater
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)SoftwareUpdaterIpm
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)Survey-Uninstall
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)TrialOnboarding
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)UpgradeButtonAppearance
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WUF
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WV2C
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WV2I
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WV2ID
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WV2T
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WV2U
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WelcomeScreen
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)CCPOC
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DTNP
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DUNP
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)LastUpdate
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)TTL
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)TTL-Spread
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)AU2
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)AUTNV
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)AlphaIntegration
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)AlphaMigration
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)CCAM
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)CCNU
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)CCT
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DUSkipOnboarding
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DriverScanInterval
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DriverUpdater
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DriverUpdaterVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DumpReporting
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)GDDEBUG
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HCAddResults
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HCDirectCart
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HCResolveBtn
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HCSkipAdvanced
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HealthCheck
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HealthCheckIpm
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HealthCheckNF
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HealthCheckVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HideRegistry
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)NotificationCentre
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)OPSWATSoftwareUpdater
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)OPSWATSoftwareUpdaterHC
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PC
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PCCU
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PCCUD
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PE
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PENP
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)POSkipOnboarding
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PTOOF
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PerformanceOptimizerVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PrivacyPolicyDate
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)ProFeatureCounters
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)QuickCleanIpm
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)REU
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)SPERDI
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)SRDI
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)SUExclusions
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)ShowOffers3rdParty
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)SoftwareUpdater
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)SoftwareUpdaterIpm
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)Survey-Uninstall
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)TrialOnboarding
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)UpgradeButtonAppearance
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WUF
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WV2C
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WV2I
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WV2ID
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WV2T
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WV2U
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WelcomeScreen
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)CCPOC
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DTNP
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DUNP
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)LastUpdate
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shell\Run CCleaner\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shell\Open CCleaner...\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
GD
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\cclaunch
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\cclaunch
URL Protocol
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\cclaunch\shell
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\cclaunch\shell\open
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\cclaunch\shell\open\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\ccleaner.exe
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\ccleaner.exe
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
DataFolder
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
ProgramFolder
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CCleaner
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CCleaner
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CCleaner
Publisher
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
FirstInstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CCleaner
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CCleaner
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CCleaner
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CCleaner
FTUEX
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CCleaner
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CCleaner
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
AcqSrc
HKEY_USERS.DEFAULT\Software\Piriform\CCleaner
AutoICS
HKEY_USERS.DEFAULT\Software\Piriform\CCleaner
Brandover
HKEY_USERS.DEFAULT\Software\Piriform\CCleaner
AcqSrc
HKEY_USERSS-1-5-19\SOFTWARE\Piriform\CCleaner
Brandover
HKEY_USERSS-1-5-19\SOFTWARE\Piriform\CCleaner
AcqSrc
HKEY_USERSS-1-5-20\SOFTWARE\Piriform\CCleaner
AutoICS
HKEY_USERSS-1-5-20\SOFTWARE\Piriform\CCleaner
AcqSrc
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
AutoICS
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
AcqSrc
HKEY_CURRENT_USER_Classes\Software\Piriform\CCleaner
AutoICS
HKEY_CURRENT_USER_Classes\Software\Piriform\CCleaner
Brandover
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
Language
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\partmgr
EnableCounterForIoctl
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
SkipUAC
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
Patches
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
LastAppliedPatchId
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner\properties
UseRegistry
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
DAST
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
T8062
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
HomeScreen
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
DefaultDetailedView
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
CheckTrialOffer
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
UpdateBackground
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
AlphaLSLUT
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
DUGuid
HKEY_LOCAL_MACHINE\SOFTWARE\1D0EC6DE-4A80-4CC3-A335-E6E41C951198
144807F0-DE37-4C62-9C05-EB4CC64A7A2F
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F
56C7A9DA-4B11-406A-8B1A-EFF157C294D6
HKEY_LOCAL_MACHINE\SOFTWARE\1D0EC6DE-4A80-4CC3-A335-E6E41C951198
5FD38555-4B16-40AE-9A09-E2C969CB74AF
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F
7CCD586D-2ABC-42FF-A23B-3731F4F183D9
HKEY_LOCAL_MACHINE\SOFTWARE\1D0EC6DE-4A80-4CC3-A335-E6E41C951198
8C5CFDF4-AB05-4EB0-8EF6-7B4620DC2CF3
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F
5E1D6A55-0134-486E-A166-38C2E4919BB1
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
FTU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
LatestICS
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
CookiesToSave
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
RunICS
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
LTR
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
UpdateKey
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
ServiceUseReporting
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
ServiceUseDebugLogging
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
LastDriverScan
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
NumOfOutdatedDrivers
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
OutdatedDriversCache
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
UpToDateDriversCache
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
StateSig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)TTL
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)TTL-Spread
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)AU2
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)AUTNV
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)AlphaIntegration
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)AlphaMigration
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)CCAM
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)CCNU
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)CCT
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DUSkipOnboarding
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DriverScanInterval
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DriverUpdater
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DriverUpdaterVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DumpReporting
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)GDDEBUG
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HCAddResults
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HCDirectCart
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HCResolveBtn
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HCSkipAdvanced
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HealthCheck
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HealthCheckIpm
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HealthCheckNF
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HealthCheckVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HideRegistry
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)NotificationCentre
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)OPSWATSoftwareUpdater
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)OPSWATSoftwareUpdaterHC
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PC
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PCCU
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PCCUD
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PE
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PENP
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)POSkipOnboarding
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PTOOF
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PerformanceOptimizerVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PrivacyPolicyDate
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)ProFeatureCounters
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)QuickCleanIpm
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)REU
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)SPERDI
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)SRDI
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)SUExclusions
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)ShowOffers3rdParty
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)SoftwareUpdater
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)SoftwareUpdaterIpm
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)Survey-Uninstall
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)TrialOnboarding
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)UpgradeButtonAppearance
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WUF
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WV2C
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WV2I
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WV2ID
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WV2T
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WV2U
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WelcomeScreen
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)CCPOC
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DTNP
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DUNP
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
LastCleaningScan
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
AmountToClean
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
NumOfItemsToClean
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
AlphaLSLUT
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
LastCheckCountry
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
LastPOScan
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)LastUpdate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)TTL
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)TTL-Spread
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)AU2
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)AUTNV
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)AlphaIntegration
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)AlphaMigration
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)CCAM
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)CCNU
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)CCT
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DUSkipOnboarding
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DriverScanInterval
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DriverUpdater
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DriverUpdaterVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DumpReporting
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)GDDEBUG
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HCAddResults
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HCDirectCart
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HCResolveBtn
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HCSkipAdvanced
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HealthCheck
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HealthCheckIpm
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HealthCheckNF
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HealthCheckVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)HideRegistry
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)NotificationCentre
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)OPSWATSoftwareUpdater
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)OPSWATSoftwareUpdaterHC
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PC
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PCCU
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PCCUD
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PE
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PENP
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)POSkipOnboarding
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PTOOF
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PerformanceOptimizerVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)PrivacyPolicyDate
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)ProFeatureCounters
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)QuickCleanIpm
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)REU
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)SPERDI
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)SRDI
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)SUExclusions
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)ShowOffers3rdParty
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)SoftwareUpdater
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)SoftwareUpdaterIpm
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)Survey-Uninstall
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)TrialOnboarding
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)UpgradeButtonAppearance
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WUF
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WV2C
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WV2I
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WV2ID
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WV2T
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WV2U
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)WelcomeScreen
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)CCPOC
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DTNP
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)DUNP
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
LastPOScan
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
NumOfAwakeSoftware
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
ActiveProgramsToSleepCache
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
FTU
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
AlphaLSLUT
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
AlphaLSLUT
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
CookiesToSave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
LastDriverScan
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
StateSig
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
LastCheckCountry
HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
(Cfg)LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
LastCleaningScan
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
AmountToClean
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
NumOfItemsToClean
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
CCleaner Smart Cleaning
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
SystemMonitoring
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
CountryCode
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
LastCheckCountry
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
AlphaLSLUT
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
AlphaLSLUT
HKEY_USERSS-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
OneDriveSetup
HKEY_USERSS-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
OneDriveSetup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
MicrosoftEdgeAutoLaunch_AA501BBC086EBD358E626B900A322692
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
CCleaner Smart Cleaning
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
AlphaLSLUT
HKEY_CURRENT_USER\SOFTWARE\Piriform\CCleaner
AlphaLSLUT
There are 495 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1479DB6B000
heap
page read and write
malicious
1479CAF6000
heap
page read and write
malicious
B7E000
stack
page read and write
14794623000
heap
page read and write
6A165000
unkown
page write copy
549B000
heap
page read and write
1479C9F0000
trusted library allocation
page read and write
5F3F000
heap
page read and write
6C4C000
heap
page read and write
7FF7D8069000
unkown
page read and write
7FF7D7C78000
unkown
page write copy
283DFEA9000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
283E0160000
trusted library allocation
page read and write
22E6AD40000
trusted library allocation
page read and write
1479D430000
trusted library allocation
page read and write
9DA000
heap
page read and write
1479440E000
heap
page read and write
2DF4000
heap
page read and write
283DF988000
heap
page read and write
9DE000
heap
page read and write
7FF7D8528000
unkown
page readonly
45A000
unkown
page read and write
6E77000
trusted library allocation
page read and write
5F21000
heap
page read and write
7FF66A23A000
unkown
page readonly
22E67CB0000
trusted library allocation
page read and write
1D24E8B0000
heap
page read and write
7680000
trusted library allocation
page read and write
7745000
trusted library allocation
page read and write
7730000
trusted library allocation
page read and write
7FF7D7CB6000
unkown
page write copy
6E78000
trusted library allocation
page read and write
14794A50000
trusted library allocation
page read and write
400000
unkown
page readonly
283DC520000
trusted library allocation
page read and write
283E0A21000
trusted library allocation
page read and write
3DEF000
heap
page read and write
7FF7D7CC7000
unkown
page write copy
324C6FB000
stack
page read and write
D21000
unkown
page execute read
283E0A4F000
trusted library allocation
page read and write
283E0A39000
trusted library allocation
page read and write
5EF5000
heap
page read and write
7FF66A217000
unkown
page read and write
283DFED8000
heap
page read and write
197BD8CA000
heap
page read and write
7FF7D7CB6000
unkown
page write copy
1478B58B000
heap
page read and write
7FF7D7C93000
unkown
page write copy
1270000
heap
page read and write
22E67CB0000
trusted library allocation
page read and write
773E000
trusted library allocation
page read and write
1D98000
unkown
page read and write
6C7A000
heap
page read and write
283E8AC0000
trusted library allocation
page read and write
7FF7D7CBA000
unkown
page write copy
7FF7D82E1000
unkown
page readonly
1479482F000
heap
page read and write
283DC024000
heap
page read and write
3DB5000
heap
page read and write
6C00000
heap
page read and write
508C000
heap
page read and write
197BD8CA000
heap
page read and write
3ED7000
heap
page read and write
283E0160000
trusted library allocation
page read and write
283DFAD3000
heap
page read and write
5F2D000
heap
page read and write
1479D3CD000
trusted library allocation
page read and write
6BF6000
heap
page read and write
283E8BA0000
trusted library allocation
page read and write
1479531F000
trusted library allocation
page read and write
7FF661996000
unkown
page write copy
22E65820000
trusted library allocation
page read and write
6E77000
trusted library allocation
page read and write
6C0C000
heap
page read and write
7FF7D827C000
unkown
page readonly
1479D450000
trusted library allocation
page read and write
3ECF000
heap
page read and write
7FF7D7CB4000
unkown
page write copy
7E052FE000
stack
page read and write
7740000
trusted library allocation
page read and write
1A43424D000
heap
page read and write
7FF7D82E1000
unkown
page readonly
7FF7D827F000
unkown
page readonly
197BE450000
heap
page read and write
3DDD000
heap
page read and write
283D90B0000
trusted library allocation
page read and write
3F01000
heap
page read and write
1479D3C0000
trusted library allocation
page read and write
1479D3AB000
trusted library allocation
page read and write
5DE1000
heap
page read and write
1478E382000
heap
page read and write
2DF4000
heap
page read and write
2DF4000
heap
page read and write
7E057FE000
stack
page read and write
283DC4D0000
trusted library allocation
page read and write
1479D500000
trusted library allocation
page read and write
3DF8000
heap
page read and write
3DB2000
heap
page read and write
3DB2000
heap
page read and write
6D3B000
heap
page read and write
79A0000
trusted library allocation
page read and write
D0B000
heap
page read and write
99F000
heap
page read and write
1D24E872000
heap
page read and write
6E97000
trusted library allocation
page read and write
283E0A3F000
trusted library allocation
page read and write
283DC531000
trusted library allocation
page read and write
1479215C000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
1479533F000
trusted library allocation
page read and write
5F07000
heap
page read and write
7FF7D7C78000
unkown
page write copy
40A000
unkown
page read and write
14795310000
trusted library allocation
page read and write
5F43000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
1479C843000
trusted library allocation
page read and write
5F46000
heap
page read and write
283E8BD0000
trusted library allocation
page read and write
1478DA80000
trusted library allocation
page read and write
197BD8CA000
heap
page read and write
1478CF7B000
heap
page read and write
6017000
heap
page read and write
6E88000
trusted library allocation
page read and write
885000
heap
page read and write
1478DA80000
trusted library allocation
page read and write
14794431000
heap
page read and write
1C034C20000
trusted library allocation
page read and write
1479D1F0000
trusted library allocation
page read and write
1478CEEE000
heap
page read and write
5FF8000
heap
page read and write
20C7000
unkown
page readonly
197BD840000
heap
page read and write
9B0000
unkown
page readonly
76F0000
trusted library allocation
page read and write
1479D4C0000
trusted library allocation
page read and write
1BE2000
unkown
page write copy
283E8A20000
trusted library allocation
page read and write
6C85000
heap
page read and write
1478D4E0000
trusted library allocation
page read and write
47E9000
heap
page read and write
283DC4E0000
trusted library allocation
page read and write
3E37000
heap
page read and write
197BBFA4000
heap
page read and write
A6F000
unkown
page read and write
1479D410000
trusted library allocation
page read and write
7FF7D7CB6000
unkown
page write copy
3DFE000
heap
page read and write
3E27000
heap
page read and write
6E78000
trusted library allocation
page read and write
3EDE000
heap
page read and write
3EBB000
heap
page read and write
283DF996000
heap
page read and write
6E90000
trusted library allocation
page read and write
1D24E89C000
heap
page read and write
6B485000
unkown
page readonly
7FF7D8175000
unkown
page readonly
2DF4000
heap
page read and write
1478D4E0000
trusted library allocation
page read and write
2DF4000
heap
page read and write
1A4323FB000
heap
page read and write
22E67338000
heap
page read and write
3D9E000
heap
page read and write
3DF7000
heap
page read and write
5671000
heap
page read and write
3E1E000
heap
page read and write
7FF66199D000
unkown
page write copy
3DA9000
heap
page read and write
7FF661A00000
unkown
page read and write
FBF000
stack
page read and write
283D6C42000
heap
page read and write
12CB000
heap
page read and write
6BE2000
heap
page read and write
7750000
trusted library allocation
page read and write
283E0A3F000
trusted library allocation
page read and write
1C17000
unkown
page write copy
14794435000
heap
page read and write
1478D4E0000
trusted library allocation
page read and write
12BB000
heap
page read and write
41E000
unkown
page read and write
283D90B0000
trusted library allocation
page read and write
A4048FE000
unkown
page readonly
7FF7D7D2F000
unkown
page write copy
12E1000
heap
page read and write
2DF4000
heap
page read and write
3DB1000
heap
page read and write
6BF2000
heap
page read and write
3200000
heap
page read and write
14795317000
trusted library allocation
page read and write
77D8000
trusted library allocation
page read and write
7FF7D8175000
unkown
page readonly
7FF7D7211000
unkown
page execute read
14794888000
heap
page read and write
7E04BFE000
stack
page read and write
283E8BD0000
trusted library allocation
page read and write
7FF7D7CB4000
unkown
page write copy
2DF4000
heap
page read and write
5FF8000
heap
page read and write
283DBFFF000
heap
page read and write
1D24E893000
heap
page read and write
7FF7D8528000
unkown
page readonly
7790000
trusted library allocation
page read and write
283D93F0000
remote allocation
page read and write
A4052FE000
unkown
page readonly
5671000
heap
page read and write
3265000
heap
page read and write
22E6AD40000
trusted library allocation
page read and write
6C89000
heap
page read and write
147943AB000
heap
page read and write
197BC060000
heap
page read and write
1479C840000
trusted library allocation
page read and write
1479D3B0000
trusted library allocation
page read and write
79A000
unkown
page readonly
6BF2000
heap
page read and write
197BDFD3000
heap
page read and write
197BC080000
trusted library allocation
page read and write
2DF4000
heap
page read and write
1479CD38000
heap
page read and write
6005000
heap
page read and write
6C0C000
heap
page read and write
3E98000
heap
page read and write
12CB000
heap
page read and write
283DFC39000
heap
page read and write
1A434264000
heap
page read and write
3D9E000
heap
page read and write
1FBD000
unkown
page readonly
6B239000
unkown
page write copy
1D24E857000
heap
page read and write
3D39000
heap
page read and write
197BD895000
heap
page read and write
1479FEB7000
heap
page read and write
1C06000
unkown
page read and write
6002000
heap
page read and write
283DFDC8000
heap
page read and write
887000
heap
page read and write
1C39000
unkown
page read and write
283E8B00000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
9B0000
unkown
page readonly
7FF7D8282000
unkown
page readonly
283D85CA000
heap
page read and write
C70000
heap
page read and write
7FF7D7D1F000
unkown
page write copy
22E6724D000
heap
page read and write
A4051FC000
stack
page read and write
6CA3000
heap
page read and write
283E8C10000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
3E09000
heap
page read and write
2DF4000
heap
page read and write
283DF98F000
heap
page read and write
7FF7D8534000
unkown
page readonly
6E78000
trusted library allocation
page read and write
6C4A000
heap
page read and write
7FF7D7CBA000
unkown
page write copy
283DFFA2000
heap
page read and write
7960000
trusted library allocation
page read and write
2DF4000
heap
page read and write
147943EB000
heap
page read and write
3ED7000
heap
page read and write
6BEC000
heap
page read and write
14792085000
heap
page read and write
283E8B60000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
D77000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
6002000
heap
page read and write
6C59000
heap
page read and write
2DF4000
heap
page read and write
283DFCB0000
heap
page read and write
3E09000
heap
page read and write
14795338000
trusted library allocation
page read and write
283D9275000
heap
page read and write
7740000
trusted library allocation
page read and write
2DF4000
heap
page read and write
1479D3B0000
trusted library allocation
page read and write
283DFC55000
heap
page read and write
2DF4000
heap
page read and write
14790980000
trusted library allocation
page read and write
283E0A3F000
trusted library allocation
page read and write
5F45000
heap
page read and write
A405AFE000
unkown
page readonly
283D6D73000
heap
page read and write
14794886000
heap
page read and write
1478E385000
heap
page read and write
14794A50000
trusted library allocation
page read and write
283D6D73000
heap
page read and write
41AF000
stack
page read and write
283E0160000
trusted library allocation
page read and write
14794865000
heap
page read and write
7E056FF000
stack
page read and write
283DC520000
trusted library allocation
page read and write
7730000
trusted library allocation
page read and write
20C4000
unkown
page readonly
197BE538000
heap
page read and write
2DF4000
heap
page read and write
14794A50000
trusted library allocation
page read and write
6FC000
stack
page read and write
7FF7D827C000
unkown
page readonly
283DF999000
heap
page read and write
234D000
unkown
page readonly
6D88000
trusted library allocation
page read and write
7FF7D6811000
unkown
page execute read
6C66000
heap
page read and write
283E0160000
trusted library allocation
page read and write
197BE479000
heap
page read and write
6BC8000
heap
page read and write
14790B00000
trusted library allocation
page read and write
79A0000
trusted library allocation
page read and write
22E65820000
trusted library allocation
page read and write
77C0000
trusted library allocation
page read and write
197BBFAA000
heap
page read and write
1479FE70000
heap
page read and write
1479474F000
heap
page read and write
5F4D000
heap
page read and write
7FF669EF1000
unkown
page execute read
14794431000
heap
page read and write
6C299000
unkown
page readonly
197BDA23000
heap
page read and write
283D6D73000
heap
page read and write
197BD89C000
heap
page read and write
7FF66A1B4000
unkown
page write copy
79A0000
trusted library allocation
page read and write
7E058FE000
stack
page read and write
1479440E000
heap
page read and write
14794FA0000
trusted library allocation
page read and write
2129000
unkown
page readonly
1C2D000
unkown
page write copy
A34000
unkown
page readonly
1479FEF8000
heap
page read and write
7FF661491000
unkown
page execute read
1D24E7F9000
heap
page read and write
6EC0000
trusted library allocation
page read and write
7FF7D82E1000
unkown
page readonly
2DF4000
heap
page read and write
3DDD000
heap
page read and write
283D8651000
heap
page read and write
22E67265000
heap
page read and write
283DFFAA000
heap
page read and write
6A88000
trusted library allocation
page read and write
1D24E837000
heap
page read and write
1478CEDE000
heap
page read and write
5FF8000
heap
page read and write
283E0A4F000
trusted library allocation
page read and write
6A164000
unkown
page read and write
7FF7D827F000
unkown
page readonly
489000
unkown
page read and write
1479D1F0000
trusted library allocation
page read and write
2DF4000
heap
page read and write
4040000
remote allocation
page read and write
2DF4000
heap
page read and write
2A8D000
stack
page read and write
1479FF1C000
heap
page read and write
7FF7D5E10000
unkown
page readonly
6BC0000
heap
page read and write
2DF4000
heap
page read and write
283DFE89000
heap
page read and write
283E0A20000
trusted library allocation
page read and write
59EE000
stack
page read and write
1479C840000
trusted library allocation
page read and write
677D000
stack
page read and write
5050000
heap
page read and write
1D24E8B0000
heap
page read and write
7FF7D7C78000
unkown
page write copy
3ECA000
heap
page read and write
283E8B18000
trusted library allocation
page read and write
1D24E89C000
heap
page read and write
14794431000
heap
page read and write
7730000
trusted library allocation
page read and write
5F4D000
heap
page read and write
D75000
heap
page read and write
1D24E8CB000
heap
page read and write
D21000
unkown
page execute read
2DF4000
heap
page read and write
1479D480000
trusted library allocation
page read and write
283E0A4F000
trusted library allocation
page read and write
197BD8AD000
heap
page read and write
5F21000
heap
page read and write
22E67325000
heap
page read and write
14794435000
heap
page read and write
14794784000
heap
page read and write
283E0160000
trusted library allocation
page read and write
14794A48000
heap
page read and write
1478DA80000
trusted library allocation
page read and write
1478CF05000
heap
page read and write
1C02FF1A000
heap
page read and write
14794433000
heap
page read and write
7FF7D7C8C000
unkown
page write copy
6F08000
trusted library allocation
page read and write
1479208A000
heap
page read and write
810000
unkown
page readonly
3EE1000
heap
page read and write
D7C000
heap
page read and write
12DF000
heap
page read and write
1A434265000
heap
page read and write
5084000
heap
page read and write
14794A48000
heap
page read and write
1D24E893000
heap
page read and write
22E684A7000
heap
page read and write
5F4D000
heap
page read and write
BA0000
heap
page read and write
6BC7000
heap
page read and write
14794F90000
trusted library allocation
page read and write
6C59000
heap
page read and write
283DFC54000
heap
page read and write
9B1000
unkown
page execute read
77D0000
trusted library allocation
page read and write
147943CB000
heap
page read and write
541F000
stack
page read and write
283DC520000
trusted library allocation
page read and write
2DF4000
heap
page read and write
1A4341FE000
heap
page read and write
12E9000
heap
page read and write
1479FEC8000
heap
page read and write
1479460D000
heap
page read and write
6011000
heap
page read and write
1479216E000
heap
page read and write
283DF974000
heap
page read and write
A73000
unkown
page readonly
283E0A48000
trusted library allocation
page read and write
31C000
stack
page read and write
283E0A3F000
trusted library allocation
page read and write
531F000
stack
page read and write
1478CEED000
heap
page read and write
22E67CB0000
trusted library allocation
page read and write
7FF7D7CC7000
unkown
page write copy
A404FFB000
stack
page read and write
3DB2000
heap
page read and write
1478CF05000
heap
page read and write
14794620000
heap
page read and write
7FF66A21E000
unkown
page read and write
1479FEE9000
heap
page read and write
773A000
trusted library allocation
page read and write
283E0A21000
trusted library allocation
page read and write
6BD1000
heap
page read and write
76E0000
trusted library allocation
page read and write
5F26000
heap
page read and write
7E04CFF000
stack
page read and write
A73000
unkown
page readonly
4D9000
unkown
page read and write
283E0A3F000
trusted library allocation
page read and write
6BE7000
heap
page read and write
1479FE70000
heap
page read and write
197BD940000
heap
page read and write
2DF4000
heap
page read and write
63A0000
trusted library allocation
page read and write
9DA000
heap
page read and write
34EF000
stack
page read and write
1479D460000
trusted library allocation
page read and write
1479C5A0000
trusted library allocation
page read and write
1D24E89C000
heap
page read and write
14794A50000
trusted library allocation
page read and write
283E0A47000
trusted library allocation
page read and write
197BC011000
heap
page read and write
1479FE75000
heap
page read and write
76E0000
trusted library allocation
page read and write
283DFE9C000
heap
page read and write
54C8000
heap
page read and write
1479FF17000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
283E0A3F000
trusted library allocation
page read and write
283DFEFD000
heap
page read and write
9B5000
heap
page read and write
5FF8000
heap
page read and write
283DFD02000
heap
page read and write
1D24E877000
heap
page read and write
1478CF0A000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
1338000
heap
page read and write
1478CF05000
heap
page read and write
283E0A47000
trusted library allocation
page read and write
14794780000
heap
page read and write
2FD0000
trusted library allocation
page read and write
14794889000
heap
page read and write
133D000
heap
page read and write
14794884000
heap
page read and write
6E87000
trusted library allocation
page read and write
5F50000
heap
page read and write
5F25000
heap
page read and write
7E059FD000
stack
page read and write
197BD8C2000
heap
page read and write
77A0000
trusted library allocation
page read and write
1478D5D4000
heap
page read and write
1478CED6000
heap
page read and write
1479C840000
trusted library allocation
page read and write
66D000
unkown
page read and write
3D0000
heap
page read and write
283E8BB0000
trusted library allocation
page read and write
197BBFCF000
heap
page read and write
6C63B000
unkown
page readonly
3EB5000
heap
page read and write
773E000
trusted library allocation
page read and write
2DF4000
heap
page read and write
197BD988000
heap
page read and write
6C90000
heap
page read and write
1479D360000
trusted library allocation
page read and write
7FF66186A000
unkown
page readonly
7FF7D7CB4000
unkown
page write copy
3E09000
heap
page read and write
3E48000
heap
page read and write
14794623000
heap
page read and write
283E08E0000
trusted library allocation
page read and write
1D24E8C1000
heap
page read and write
4BE0000
heap
page read and write
7FF7D8534000
unkown
page readonly
29DD000
stack
page read and write
1479D3C1000
trusted library allocation
page read and write
147909D0000
trusted library allocation
page read and write
918000
heap
page read and write
A6F000
unkown
page write copy
197BE3E0000
trusted library allocation
page read and write
6AB71000
unkown
page execute read
6BF8000
heap
page read and write
283E0A21000
trusted library allocation
page read and write
1479D1F0000
trusted library allocation
page read and write
D75000
heap
page read and write
283DFC54000
heap
page read and write
D78000
heap
page read and write
6B823000
unkown
page readonly
6F07000
trusted library allocation
page read and write
3E1D000
heap
page read and write
1479D3C0000
trusted library allocation
page read and write
283DFCD9000
heap
page read and write
D00000
heap
page read and write
283E8B00000
trusted library allocation
page read and write
22E672ED000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
7E055FB000
stack
page read and write
3DF9000
heap
page read and write
1478E1F5000
heap
page read and write
471000
unkown
page read and write
283E0A40000
trusted library allocation
page read and write
6EA7000
trusted library allocation
page read and write
6C47000
heap
page read and write
A6F000
unkown
page read and write
1479473C000
heap
page read and write
CC0000
heap
page read and write
77D8000
trusted library allocation
page read and write
BB5000
heap
page read and write
283DF99E000
heap
page read and write
3E54000
heap
page read and write
197BD8CA000
heap
page read and write
283E8C10000
trusted library allocation
page read and write
261E000
stack
page read and write
283DFD16000
heap
page read and write
283D926A000
heap
page read and write
77E0000
trusted library allocation
page read and write
1A4323EB000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
5F2D000
heap
page read and write
6C571000
unkown
page write copy
321000
unkown
page execute read
6C93000
heap
page read and write
3E3A000
heap
page read and write
6C552000
unkown
page read and write
6C16000
heap
page read and write
D31000
heap
page read and write
7E051FD000
stack
page read and write
5F3F000
heap
page read and write
D65000
heap
page read and write
14794F60000
trusted library allocation
page read and write
3E31000
heap
page read and write
147947CF000
heap
page read and write
2DF4000
heap
page read and write
7FF7D756B000
unkown
page readonly
1479441D000
heap
page read and write
5FFB000
heap
page read and write
811000
unkown
page readonly
283D85CA000
heap
page read and write
6BF2000
heap
page read and write
6A0F0000
unkown
page readonly
3E5F000
heap
page read and write
7FF7D5E11000
unkown
page execute read
14794754000
heap
page read and write
6CA3000
heap
page read and write
6BFD000
heap
page read and write
9B1000
unkown
page execute read
283DFD17000
heap
page read and write
9BE000
heap
page read and write
5F0000
unkown
page readonly
197BE3E0000
trusted library allocation
page read and write
9B0000
unkown
page readonly
D77000
heap
page read and write
1C034D80000
remote allocation
page read and write
1C034CB0000
trusted library allocation
page read and write
1479D1F0000
trusted library allocation
page read and write
283E0A21000
trusted library allocation
page read and write
14790AF0000
trusted library allocation
page read and write
283D9275000
heap
page read and write
1663000
unkown
page readonly
283E0A39000
trusted library allocation
page read and write
14794A50000
trusted library allocation
page read and write
77C0000
trusted library allocation
page read and write
14795347000
trusted library allocation
page read and write
1D24E8D8000
heap
page read and write
6C0B000
heap
page read and write
12E9000
heap
page read and write
7FF6619A7000
unkown
page write copy
1A432380000
heap
page read and write
197BE5D0000
trusted library allocation
page read and write
147946D4000
heap
page read and write
3DBA000
heap
page read and write
3DCD000
heap
page read and write
2DF4000
heap
page read and write
6C59000
heap
page read and write
3E1A000
heap
page read and write
7F55000
trusted library allocation
page read and write
7FF661A06000
unkown
page readonly
3EA9000
heap
page read and write
14794844000
heap
page read and write
1479C5A0000
trusted library allocation
page read and write
283D85BF000
heap
page read and write
1FAB000
unkown
page read and write
283D6D40000
trusted library allocation
page read and write
3E09000
heap
page read and write
5F07000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
1478E3B2000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
283D6C49000
heap
page read and write
283DFDC8000
heap
page read and write
7FF7D7A18000
unkown
page readonly
283DC553000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
3DFD000
heap
page read and write
7FF7D7D48000
unkown
page write copy
3E2A000
heap
page read and write
1478CEEB000
heap
page read and write
380000
heap
page read and write
3E0C000
heap
page read and write
3DB2000
heap
page read and write
1D24E89C000
heap
page read and write
12DF000
heap
page read and write
1479FF17000
heap
page read and write
6C15000
heap
page read and write
14794A50000
trusted library allocation
page read and write
3D2E000
heap
page read and write
283D6C5A000
heap
page read and write
5F33000
heap
page read and write
197BE3E0000
trusted library allocation
page read and write
1479532E000
trusted library allocation
page read and write
1479D3B0000
trusted library allocation
page read and write
3DFE000
heap
page read and write
6E78000
trusted library allocation
page read and write
1478CEFA000
heap
page read and write
1D24E874000
heap
page read and write
3EA4000
heap
page read and write
7740000
trusted library allocation
page read and write
3EC4000
heap
page read and write
22E67245000
heap
page read and write
283DF997000
heap
page read and write
3E9A000
heap
page read and write
14790B20000
trusted library allocation
page read and write
1A1C000
unkown
page readonly
283DC530000
trusted library allocation
page read and write
283E0A38000
trusted library allocation
page read and write
5F55000
heap
page read and write
197BE440000
remote allocation
page read and write
3E24000
heap
page read and write
6B7E5000
unkown
page readonly
820000
heap
page read and write
14794A50000
trusted library allocation
page read and write
456000
unkown
page read and write
6BFD000
heap
page read and write
147947CE000
heap
page read and write
14790B03000
trusted library allocation
page read and write
1D24E8EE000
heap
page read and write
147943E2000
heap
page read and write
6B235000
unkown
page read and write
22E684CE000
heap
page read and write
7758000
trusted library allocation
page read and write
1479D1F0000
trusted library allocation
page read and write
6D30000
heap
page read and write
59AD000
stack
page read and write
283DFEFC000
heap
page read and write
1479FE91000
heap
page read and write
3D86000
heap
page read and write
5C1C000
stack
page read and write
1D24E8C5000
heap
page read and write
7A8000
unkown
page readonly
3DF5000
heap
page read and write
880000
heap
page read and write
6E9F000
trusted library allocation
page read and write
5F47000
heap
page read and write
22E6724C000
heap
page read and write
283DF988000
heap
page read and write
7E04EFC000
stack
page read and write
5FF8000
heap
page read and write
D00000
heap
page read and write
283E0A3F000
trusted library allocation
page read and write
1478D4E0000
trusted library allocation
page read and write
14794575000
heap
page read and write
7FF7D7D2E000
unkown
page read and write
283DFCF9000
heap
page read and write
6C05000
heap
page read and write
3F01000
heap
page read and write
5F4A000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
14794A50000
trusted library allocation
page read and write
1479D3BA000
trusted library allocation
page read and write
7748000
trusted library allocation
page read and write
7730000
trusted library allocation
page read and write
7FF661994000
unkown
page read and write
22E67258000
heap
page read and write
1C22000
unkown
page write copy
1D24E8CB000
heap
page read and write
283DFE9F000
heap
page read and write
6C5A000
heap
page read and write
3DF8000
heap
page read and write
6CA3000
heap
page read and write
D31000
heap
page read and write
77A0000
trusted library allocation
page read and write
6C58000
heap
page read and write
283E0A3F000
trusted library allocation
page read and write
1C22000
unkown
page write copy
22E67275000
heap
page read and write
2640000
heap
page read and write
3D46000
heap
page read and write
283E0A4F000
trusted library allocation
page read and write
283E8B60000
trusted library allocation
page read and write
283E8A90000
trusted library allocation
page read and write
197BD975000
heap
page read and write
197BC080000
trusted library allocation
page read and write
14794833000
heap
page read and write
283E8B1C000
trusted library allocation
page read and write
6BEC000
heap
page read and write
1A434254000
heap
page read and write
22E6725F000
heap
page read and write
1478CED6000
heap
page read and write
283E13CF000
heap
page read and write
197BDFD3000
heap
page read and write
14794A50000
trusted library allocation
page read and write
283E0A39000
trusted library allocation
page read and write
6049000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
5F3F000
heap
page read and write
321000
unkown
page execute read
1479D380000
trusted library allocation
page read and write
6006000
heap
page read and write
5F4D000
heap
page read and write
A404356000
stack
page read and write
2DF4000
heap
page read and write
6F1F000
trusted library allocation
page read and write
1A4341F0000
heap
page read and write
3DEF000
heap
page read and write
5F2A000
heap
page read and write
3DFC000
heap
page read and write
7FF7D8061000
unkown
page read and write
283DC012000
heap
page read and write
3E3D000
heap
page read and write
5EE1000
heap
page read and write
3EEC000
heap
page read and write
3E2C000
heap
page read and write
CED000
heap
page read and write
7FF7D7D42000
unkown
page write copy
1479486F000
heap
page read and write
7670000
trusted library allocation
page read and write
76F0000
trusted library allocation
page read and write
283DC520000
trusted library allocation
page read and write
3E09000
heap
page read and write
1479FF11000
heap
page read and write
2359000
unkown
page readonly
1BFB000
unkown
page read and write
7730000
trusted library allocation
page read and write
3E36000
heap
page read and write
1478D4E0000
trusted library allocation
page read and write
5F46000
heap
page read and write
6BDD000
heap
page read and write
5F50000
heap
page read and write
283DF998000
heap
page read and write
3DB2000
heap
page read and write
1BE5000
unkown
page write copy
1A1C000
unkown
page readonly
1479D540000
trusted library allocation
page read and write
3EA4000
heap
page read and write
283D6D74000
heap
page read and write
6EB0000
trusted library allocation
page read and write
1301000
heap
page read and write
6E78000
trusted library allocation
page read and write
22E67CB0000
trusted library allocation
page read and write
1D24E872000
heap
page read and write
1478CF0A000
heap
page read and write
283D6D74000
heap
page read and write
2DF4000
heap
page read and write
7FF7D7CDE000
unkown
page write copy
5FFB000
heap
page read and write
7FF7D8282000
unkown
page readonly
738000
heap
page read and write
14790980000
trusted library allocation
page read and write
3EE2000
heap
page read and write
1155000
heap
page read and write
508B000
heap
page read and write
1BE4000
unkown
page read and write
7FF66A220000
unkown
page readonly
7FF7D827F000
unkown
page readonly
14794433000
heap
page read and write
1479FEB7000
heap
page read and write
14792165000
heap
page read and write
197BE3E0000
trusted library allocation
page read and write
1D24E7F0000
heap
page read and write
283DFE2E000
heap
page read and write
283DFCEF000
heap
page read and write
283D90B0000
trusted library allocation
page read and write
14794607000
heap
page read and write
3E1C000
heap
page read and write
198000
stack
page read and write
5F15000
heap
page read and write
7FF6619A9000
unkown
page read and write
197BE3F0000
heap
page readonly
6BFA000
heap
page read and write
1479FEB7000
heap
page read and write
14790980000
trusted library allocation
page read and write
14795318000
trusted library allocation
page read and write
9BE000
heap
page read and write
283DF998000
heap
page read and write
283DF98D000
heap
page read and write
8821000
heap
page read and write
1479478B000
heap
page read and write
7FF7D8088000
unkown
page readonly
3E05000
heap
page read and write
197BD8CA000
heap
page read and write
5671000
heap
page read and write
3E48000
heap
page read and write
7FF7D7A18000
unkown
page readonly
3DAA000
heap
page read and write
14794618000
heap
page read and write
7700000
trusted library allocation
page read and write
1BF8000
unkown
page write copy
22E6725D000
heap
page read and write
1479CA20000
trusted library allocation
page read and write
1D24E855000
heap
page read and write
3D99000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
283D85AE000
heap
page read and write
5F37000
heap
page read and write
7790000
trusted library allocation
page read and write
7748000
trusted library allocation
page read and write
283E1301000
heap
page read and write
14795313000
trusted library allocation
page read and write
D17000
heap
page read and write
93E000
stack
page read and write
7FF7D6811000
unkown
page execute read
913000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
6F18000
trusted library allocation
page read and write
283E13D4000
heap
page read and write
22E65820000
trusted library allocation
page read and write
283DF988000
heap
page read and write
3EA4000
heap
page read and write
1C034C50000
trusted library allocation
page read and write
1479FE8F000
heap
page read and write
14792165000
heap
page read and write
283E8AFE000
trusted library allocation
page read and write
283DFEFD000
heap
page read and write
3E09000
heap
page read and write
6C66000
heap
page read and write
1D24E872000
heap
page read and write
6E88000
trusted library allocation
page read and write
197BE5D0000
trusted library allocation
page read and write
5F4D000
heap
page read and write
7940000
trusted library allocation
page read and write
1478B5A1000
heap
page read and write
5F21000
heap
page read and write
33EE000
stack
page read and write
7FF63C49B000
unkown
page write copy
2DF4000
heap
page read and write
1341000
heap
page read and write
5F33000
heap
page read and write
3D10000
heap
page read and write
283DFADA000
heap
page read and write
7FF661490000
unkown
page readonly
7E05CFC000
stack
page read and write
147943FD000
heap
page read and write
7FF7D7D35000
unkown
page read and write
283D6C3E000
heap
page read and write
279E000
stack
page read and write
283E8B18000
trusted library allocation
page read and write
6C63000
heap
page read and write
283D8595000
heap
page read and write
6011000
heap
page read and write
7950000
trusted library allocation
page read and write
1479D3AB000
trusted library allocation
page read and write
A4059FD000
stack
page read and write
6BEB000
heap
page read and write
2DF4000
heap
page read and write
197BBF35000
heap
page read and write
1479D3C8000
trusted library allocation
page read and write
1A4341FB000
heap
page read and write
6C550000
unkown
page write copy
6049000
heap
page read and write
1C034BE0000
trusted library allocation
page read and write
283D85C2000
heap
page read and write
3040000
remote allocation
page read and write
283E8B10000
trusted library allocation
page read and write
1D24E891000
heap
page read and write
283E8BC0000
trusted library allocation
page read and write
6C08000
heap
page read and write
14794362000
heap
page read and write
412000
unkown
page read and write
2644000
heap
page read and write
15CF000
stack
page read and write
6E78000
trusted library allocation
page read and write
3E4C000
heap
page read and write
197BE5D0000
trusted library allocation
page read and write
197BE487000
heap
page read and write
283E0A40000
trusted library allocation
page read and write
7FF7D84FA000
unkown
page readonly
D9E000
stack
page read and write
4040000
remote allocation
page read and write
887000
heap
page read and write
7FF7D8088000
unkown
page readonly
197BE3E0000
trusted library allocation
page read and write
7E05BFE000
stack
page read and write
6C08000
heap
page read and write
6E77000
trusted library allocation
page read and write
1479D3B0000
trusted library allocation
page read and write
1D24E7E0000
remote allocation
page read and write
14794614000
heap
page read and write
77E0000
trusted library allocation
page read and write
303E000
stack
page read and write
147947CF000
heap
page read and write
1479D380000
trusted library allocation
page read and write
283E0A3F000
trusted library allocation
page read and write
2DF4000
heap
page read and write
1479C9F0000
trusted library allocation
page read and write
283E13D4000
heap
page read and write
283E1301000
heap
page read and write
197BBFFC000
heap
page read and write
40E000
unkown
page read and write
6B242000
unkown
page read and write
197BD8C6000
heap
page read and write
7FF66198A000
unkown
page write copy
283E0A27000
trusted library allocation
page read and write
2B8D000
stack
page read and write
97A000
stack
page read and write
1479FF1C000
heap
page read and write
7FF7D7D47000
unkown
page read and write
283E0A3F000
trusted library allocation
page read and write
1D24E8B0000
heap
page read and write
7FF7D756B000
unkown
page readonly
2DF4000
heap
page read and write
283DFCF3000
heap
page read and write
643A000
heap
page read and write
166E000
stack
page read and write
4B90000
heap
page read and write
197BD988000
heap
page read and write
9B1000
unkown
page execute read
2DF4000
heap
page read and write
1479478B000
heap
page read and write
1478CF0A000
heap
page read and write
283D859C000
heap
page read and write
3EC5000
heap
page read and write
DB9000
heap
page read and write
5F2D000
heap
page read and write
6B720000
unkown
page readonly
1479D1F0000
trusted library allocation
page read and write
1479D3B0000
trusted library allocation
page read and write
480D000
heap
page read and write
283E0160000
trusted library allocation
page read and write
1A4323C0000
heap
page read and write
197BE440000
remote allocation
page read and write
7740000
trusted library allocation
page read and write
14795347000
trusted library allocation
page read and write
2DF4000
heap
page read and write
7FF6619A5000
unkown
page read and write
2DF4000
heap
page read and write
1C034C24000
trusted library allocation
page read and write
A73000
unkown
page readonly
1479D380000
trusted library allocation
page read and write
5EE8000
heap
page read and write
2DF4000
heap
page read and write
283E8B18000
trusted library allocation
page read and write
14795319000
trusted library allocation
page read and write
283DC550000
trusted library allocation
page read and write
5F50000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
3E98000
heap
page read and write
283E0430000
trusted library allocation
page read and write
197BBF52000
heap
page read and write
6E77000
trusted library allocation
page read and write
3E34000
heap
page read and write
28DD000
stack
page read and write
1478B5CE000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
3DD3000
heap
page read and write
7FF66198A000
unkown
page read and write
197BE5D0000
trusted library allocation
page read and write
283DFC0F000
heap
page read and write
7270000
trusted library allocation
page read and write
283E0160000
trusted library allocation
page read and write
14795337000
trusted library allocation
page read and write
1D24E8B0000
heap
page read and write
1479CAFB000
heap
page read and write
408000
unkown
page readonly
14795338000
trusted library allocation
page read and write
1479FEF0000
heap
page read and write
3EAF000
heap
page read and write
3E32000
heap
page read and write
1C034D30000
trusted library allocation
page read and write
6C62D000
unkown
page read and write
1479D3C1000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
3E63000
heap
page read and write
147943EB000
heap
page read and write
1478CFC6000
heap
page read and write
283E0160000
trusted library allocation
page read and write
2DF4000
heap
page read and write
283E13D1000
heap
page read and write
283E13CF000
heap
page read and write
197BE5D0000
trusted library allocation
page read and write
D15000
heap
page read and write
5C24000
heap
page read and write
1478E3B5000
heap
page read and write
197BC080000
trusted library allocation
page read and write
197BC090000
heap
page read and write
6E97000
trusted library allocation
page read and write
A4049FE000
stack
page read and write
283D6D73000
heap
page read and write
7270000
trusted library allocation
page read and write
3E3D000
heap
page read and write
6B813000
unkown
page write copy
7FF7D5E11000
unkown
page execute read
6E78000
trusted library allocation
page read and write
1479460D000
heap
page read and write
283DC550000
trusted library allocation
page read and write
1479532F000
trusted library allocation
page read and write
41FE000
stack
page read and write
1D24E893000
heap
page read and write
283DFDF8000
heap
page read and write
3DD8000
heap
page read and write
63A0000
trusted library allocation
page read and write
6C74000
heap
page read and write
3E09000
heap
page read and write
2DF4000
heap
page read and write
283DFCEC000
heap
page read and write
197BE4E2000
heap
page read and write
14794888000
heap
page read and write
283D6C2E000
heap
page read and write
283D85AE000
heap
page read and write
3D37000
heap
page read and write
283DC520000
trusted library allocation
page read and write
14794A50000
trusted library allocation
page read and write
1479436B000
heap
page read and write
7FF7D7C91000
unkown
page read and write
6EA7000
trusted library allocation
page read and write
5F97000
heap
page read and write
6C66000
heap
page read and write
2DF4000
heap
page read and write
3E09000
heap
page read and write
7FF7D6811000
unkown
page execute read
283E0160000
trusted library allocation
page read and write
14794784000
heap
page read and write
283D6D74000
heap
page read and write
14794633000
heap
page read and write
3DEF000
heap
page read and write
6C15000
heap
page read and write
1479D3C9000
trusted library allocation
page read and write
283E0A4F000
trusted library allocation
page read and write
6C74000
heap
page read and write
7FF66A23A000
unkown
page readonly
7FF7D8534000
unkown
page readonly
2F3D000
stack
page read and write
25C0000
heap
page read and write
147909D0000
trusted library allocation
page read and write
1BE2000
unkown
page write copy
12BB000
heap
page read and write
14794361000
heap
page read and write
12E9000
heap
page read and write
2DF4000
heap
page read and write
475000
unkown
page read and write
7FF7D756B000
unkown
page readonly
1A434231000
heap
page read and write
197BC080000
trusted library allocation
page read and write
3D99000
heap
page read and write
14794616000
heap
page read and write
64D000
unkown
page read and write
283E08E0000
trusted library allocation
page read and write
3D2D000
heap
page read and write
14794784000
heap
page read and write
400F000
stack
page read and write
3D9E000
heap
page read and write
197BE440000
remote allocation
page read and write
1D24E8D6000
heap
page read and write
3DEA000
heap
page read and write
549C000
heap
page read and write
6E98000
trusted library allocation
page read and write
283E0A3F000
trusted library allocation
page read and write
7FF661491000
unkown
page execute read
14794404000
heap
page read and write
7E04FFB000
stack
page read and write
6008000
heap
page read and write
6E97000
trusted library allocation
page read and write
6D3E000
heap
page read and write
14795318000
trusted library allocation
page read and write
14790B18000
trusted library allocation
page read and write
5F50000
heap
page read and write
7930000
trusted library allocation
page read and write
1479CAF3000
heap
page read and write
7FF661490000
unkown
page readonly
283E8B00000
trusted library allocation
page read and write
14794544000
heap
page read and write
14794A50000
trusted library allocation
page read and write
7FF7D8174000
unkown
page write copy
12E9000
heap
page read and write
14794394000
heap
page read and write
5F46000
heap
page read and write
9BB000
heap
page read and write
1479433A000
heap
page read and write
6C74000
heap
page read and write
D5F000
heap
page read and write
7FF7D827F000
unkown
page readonly
1479FEE9000
heap
page read and write
5F46000
heap
page read and write
283E0A3F000
trusted library allocation
page read and write
14795357000
trusted library allocation
page read and write
197BC080000
trusted library allocation
page read and write
3E2F000
heap
page read and write
1479C840000
trusted library allocation
page read and write
283E0430000
trusted library allocation
page read and write
7FF7D7CB6000
unkown
page write copy
408000
unkown
page readonly
12DF000
heap
page read and write
1D24E8B8000
heap
page read and write
2DF4000
heap
page read and write
1479535F000
trusted library allocation
page read and write
7730000
trusted library allocation
page read and write
14794431000
heap
page read and write
1C034F0E000
heap
page read and write
2E7F000
stack
page read and write
5F45000
heap
page read and write
7FF66199C000
unkown
page read and write
283E0A40000
trusted library allocation
page read and write
14794532000
heap
page read and write
283DFD12000
heap
page read and write
283D6C6C000
heap
page read and write
7E04DFD000
stack
page read and write
6E78000
trusted library allocation
page read and write
14794438000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
3CE000
stack
page read and write
1479D3B0000
trusted library allocation
page read and write
2DF4000
heap
page read and write
2DF4000
heap
page read and write
49D000
unkown
page read and write
7FF7D82E1000
unkown
page readonly
3E97000
heap
page read and write
197BC080000
trusted library allocation
page read and write
1479D530000
trusted library allocation
page read and write
12BD000
heap
page read and write
283E13C1000
heap
page read and write
3510000
trusted library allocation
page read and write
6011000
heap
page read and write
5F2D000
heap
page read and write
7830000
trusted library allocation
page read and write
1479D440000
trusted library allocation
page read and write
283DFF14000
heap
page read and write
1479CA00000
trusted library allocation
page read and write
887000
heap
page read and write
12E2000
heap
page read and write
6B56C000
unkown
page readonly
AB0000
heap
page read and write
5F25000
heap
page read and write
283D8E01000
heap
page read and write
283DC4D0000
trusted library allocation
page read and write
5EFC000
heap
page read and write
1479D510000
trusted library allocation
page read and write
7E053FE000
stack
page read and write
5F37000
heap
page read and write
22E6AD40000
trusted library allocation
page read and write
5F37000
heap
page read and write
283E8AFE000
trusted library allocation
page read and write
5F35000
heap
page read and write
9DC000
heap
page read and write
7FF7D7CD1000
unkown
page read and write
1479D1F0000
trusted library allocation
page read and write
96000
stack
page read and write
2DF4000
heap
page read and write
22E68740000
remote allocation
page read and write
1478B5AB000
heap
page read and write
87C000
stack
page read and write
3E6E000
heap
page read and write
3E63000
heap
page read and write
1478E3BA000
heap
page read and write
22E67CB0000
trusted library allocation
page read and write
283DFDAD000
heap
page read and write
1478B585000
heap
page read and write
197BD8A1000
heap
page read and write
63A0000
trusted library allocation
page read and write
47D000
unkown
page read and write
6C79000
heap
page read and write
321000
unkown
page execute read
1D24E8B4000
heap
page read and write
1D24E8CB000
heap
page read and write
1C2B000
unkown
page read and write
283D85C3000
heap
page read and write
12C6000
heap
page read and write
7FF7D82E1000
unkown
page readonly
6CA3000
heap
page read and write
5FF9000
heap
page read and write
14794431000
heap
page read and write
3E08000
heap
page read and write
3D28000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
7FF7D7CDD000
unkown
page read and write
1A434264000
heap
page read and write
1479FE75000
heap
page read and write
7FF7D7CD6000
unkown
page read and write
63A0000
trusted library allocation
page read and write
283DC530000
trusted library allocation
page read and write
6BE3000
heap
page read and write
1479C840000
trusted library allocation
page read and write
D75000
heap
page read and write
1478E194000
heap
page read and write
283E8B01000
trusted library allocation
page read and write
D0B000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
197BBFE1000
heap
page read and write
283D6D73000
heap
page read and write
1BF2000
unkown
page read and write
197BD8CA000
heap
page read and write
7FF7D7D1D000
unkown
page read and write
3E1B000
heap
page read and write
283E8B09000
trusted library allocation
page read and write
6007000
heap
page read and write
7FF7D5E11000
unkown
page execute read
197BDFD3000
heap
page read and write
283DFEA1000
heap
page read and write
1478E1FC000
heap
page read and write
283DC550000
trusted library allocation
page read and write
7FF7D8088000
unkown
page readonly
9B0000
unkown
page readonly
14795317000
trusted library allocation
page read and write
5F07000
heap
page read and write
3EA0000
heap
page read and write
1479D460000
trusted library allocation
page read and write
1D24E7C0000
heap
page read and write
197BD8AC000
heap
page read and write
1479CA10000
trusted library allocation
page read and write
7FF7D7CD3000
unkown
page write copy
283D85CA000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
14794889000
heap
page read and write
1479216E000
heap
page read and write
6E87000
trusted library allocation
page read and write
22E684CE000
heap
page read and write
197BD9CA000
heap
page read and write
1479C5A0000
trusted library allocation
page read and write
14795347000
trusted library allocation
page read and write
1479D1F0000
trusted library allocation
page read and write
6E98000
trusted library allocation
page read and write
2129000
unkown
page readonly
3DDB000
heap
page read and write
6A70000
trusted library allocation
page read and write
5F1F000
heap
page read and write
12E9000
heap
page read and write
1479FE88000
heap
page read and write
7E04AF7000
stack
page read and write
283E0A3F000
trusted library allocation
page read and write
2DF4000
heap
page read and write
14794633000
heap
page read and write
2D7E000
stack
page read and write
197BD8D7000
heap
page read and write
283DC4D0000
trusted library allocation
page read and write
7FF7D7CC7000
unkown
page write copy
A4058FE000
unkown
page readonly
A34000
unkown
page readonly
3E09000
heap
page read and write
4FB0000
heap
page read and write
6BFC000
heap
page read and write
54C3000
heap
page read and write
7700000
trusted library allocation
page read and write
10F6000
stack
page read and write
3E40000
heap
page read and write
283DFDE3000
heap
page read and write
7920000
trusted library allocation
page read and write
7E054FC000
stack
page read and write
283DC533000
trusted library allocation
page read and write
CAF000
stack
page read and write
D77000
heap
page read and write
D31000
heap
page read and write
14794761000
heap
page read and write
283DF98D000
heap
page read and write
7FF7D7D37000
unkown
page write copy
1479D490000
trusted library allocation
page read and write
6C04000
heap
page read and write
7FF7D7A18000
unkown
page readonly
505A000
heap
page read and write
3D9E000
heap
page read and write
147909D0000
trusted library allocation
page read and write
283E8B00000
trusted library allocation
page read and write
7FF63C3B0000
unkown
page readonly
6E77000
trusted library allocation
page read and write
197BE3E0000
trusted library allocation
page read and write
6BD0000
heap
page read and write
283E0870000
trusted library allocation
page read and write
2DF4000
heap
page read and write
147943F2000
heap
page read and write
A404AFE000
unkown
page readonly
7FF7D5E10000
unkown
page readonly
77C0000
trusted library allocation
page read and write
283DF9BA000
heap
page read and write
C3E000
stack
page read and write
7F50000
trusted library allocation
page read and write
9DE000
heap
page read and write
283D9260000
heap
page read and write
1479D520000
trusted library allocation
page read and write
283E0A4F000
trusted library allocation
page read and write
1D250447000
heap
page read and write
2DF4000
heap
page read and write
1C17000
unkown
page write copy
1479531A000
trusted library allocation
page read and write
7FF66198D000
unkown
page write copy
586E000
stack
page read and write
22E6AD40000
trusted library allocation
page read and write
5F1000
unkown
page execute read
BAF000
stack
page read and write
2DF4000
heap
page read and write
197BDFD4000
heap
page read and write
1A4341FB000
heap
page read and write
283E1398000
heap
page read and write
283D6C08000
heap
page read and write
6C8C000
heap
page read and write
887000
heap
page read and write
3E9E000
heap
page read and write
1FBD000
unkown
page write copy
283DC520000
trusted library allocation
page read and write
8F0000
heap
page read and write
2DF4000
heap
page read and write
6BDE000
heap
page read and write
283D85C2000
heap
page read and write
77D0000
trusted library allocation
page read and write
14794774000
heap
page read and write
6C0C000
heap
page read and write
283D93F0000
remote allocation
page read and write
283E0A21000
trusted library allocation
page read and write
6C6F000
heap
page read and write
1478CEF2000
heap
page read and write
3E09000
heap
page read and write
6E78000
trusted library allocation
page read and write
283E8AF0000
trusted library allocation
page read and write
14794606000
heap
page read and write
283E8A90000
trusted library allocation
page read and write
1479D3BE000
trusted library allocation
page read and write
12E9000
heap
page read and write
283D6D40000
trusted library allocation
page read and write
6001000
heap
page read and write
5F96000
heap
page read and write
1479D3C8000
trusted library allocation
page read and write
4EFC000
stack
page read and write
6A0F1000
unkown
page execute read
7FF7D8282000
unkown
page readonly
14794541000
heap
page read and write
79A0000
trusted library allocation
page read and write
2DF4000
heap
page read and write
14794751000
heap
page read and write
283E0A2F000
trusted library allocation
page read and write
9B1000
unkown
page execute read
283D9232000
heap
page read and write
1A4323E4000
heap
page read and write
283D6C29000
heap
page read and write
283DBFFF000
heap
page read and write
1478D4E0000
trusted library allocation
page read and write
283E8B0D000
trusted library allocation
page read and write
197BBF95000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
1479D1F0000
trusted library allocation
page read and write
283D85AC000
heap
page read and write
1FBE000
unkown
page readonly
6530000
trusted library allocation
page read and write
6C52000
heap
page read and write
6002000
heap
page read and write
9DD000
heap
page read and write
197BD8C3000
heap
page read and write
54C8000
heap
page read and write
6EA0000
trusted library allocation
page read and write
1479460C000
heap
page read and write
1478DA80000
trusted library allocation
page read and write
6E77000
trusted library allocation
page read and write
6BE0000
heap
page read and write
283DC540000
trusted library allocation
page read and write
22E6725C000
heap
page read and write
1479457B000
heap
page read and write
12BB000
heap
page read and write
1479D470000
trusted library allocation
page read and write
6C71000
heap
page read and write
6E98000
trusted library allocation
page read and write
1301000
heap
page read and write
645000
unkown
page read and write
12CB000
heap
page read and write
1479452D000
heap
page read and write
5FF8000
heap
page read and write
3D9E000
heap
page read and write
2DF4000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
1C14000
unkown
page write copy
231F000
unkown
page readonly
7741000
trusted library allocation
page read and write
2DF4000
heap
page read and write
283E8B0D000
trusted library allocation
page read and write
6F0F000
trusted library allocation
page read and write
1BF7000
unkown
page read and write
870000
heap
page read and write
3E06000
heap
page read and write
2359000
unkown
page readonly
6C59000
heap
page read and write
1D24E84D000
heap
page read and write
887000
heap
page read and write
283DFC3B000
heap
page read and write
6E97000
trusted library allocation
page read and write
6005000
heap
page read and write
12E1000
heap
page read and write
1D24E84B000
heap
page read and write
6E9F000
trusted library allocation
page read and write
283E8BE0000
trusted library allocation
page read and write
2DF4000
heap
page read and write
7FF7D6811000
unkown
page execute read
283E8B00000
trusted library allocation
page read and write
1479D1F0000
trusted library allocation
page read and write
1336000
heap
page read and write
22E6A97A000
heap
page read and write
283D85C3000
heap
page read and write
3EE7000
heap
page read and write
283DFE9F000
heap
page read and write
14794402000
heap
page read and write
6C74000
heap
page read and write
14795320000
trusted library allocation
page read and write
1D24E7C5000
heap
page read and write
283D90B0000
trusted library allocation
page read and write
1C034C10000
trusted library allocation
page read and write
283D85C6000
heap
page read and write
6E97000
trusted library allocation
page read and write
3EE4000
heap
page read and write
6E7F000
trusted library allocation
page read and write
4B2C000
stack
page read and write
1479215C000
heap
page read and write
283E8BE0000
trusted library allocation
page read and write
14792094000
heap
page read and write
6A166000
unkown
page read and write
1C07000
unkown
page write copy
283DFCC7000
heap
page read and write
1478CEF5000
heap
page read and write
1D24E8C0000
heap
page read and write
2DF4000
heap
page read and write
7FF7D5E10000
unkown
page readonly
1D24E760000
heap
page read and write
6E80000
trusted library allocation
page read and write
12D4000
heap
page read and write
6017000
heap
page read and write
133A000
heap
page read and write
7FF7D7D41000
unkown
page read and write
147943AC000
heap
page read and write
7730000
trusted library allocation
page read and write
2B99000
heap
page read and write
22E6725D000
heap
page read and write
6BD9000
heap
page read and write
147943EB000
heap
page read and write
77B0000
trusted library allocation
page read and write
14794784000
heap
page read and write
3E44000
heap
page read and write
1478DCB0000
remote allocation
page read and write
1D250436000
heap
page read and write
8821000
heap
page read and write
7FF7D7D01000
unkown
page read and write
283E0A40000
trusted library allocation
page read and write
1479D550000
trusted library allocation
page read and write
9B5000
heap
page read and write
1A432409000
heap
page read and write
5055000
heap
page read and write
43E000
unkown
page read and write
289D000
stack
page read and write
7FF7D827C000
unkown
page readonly
3DED000
heap
page read and write
1A4341FB000
heap
page read and write
197BD8BA000
heap
page read and write
1479D3C5000
trusted library allocation
page read and write
14790B30000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
1A434221000
heap
page read and write
197BE121000
heap
page read and write
3DD8000
heap
page read and write
283DF98F000
heap
page read and write
6BC1000
heap
page read and write
22E67CB0000
trusted library allocation
page read and write
1D24E8C5000
heap
page read and write
7FF7D8088000
unkown
page readonly
197BBFF3000
heap
page read and write
1479FF17000
heap
page read and write
1D24E826000
heap
page read and write
2DF4000
heap
page read and write
14795328000
trusted library allocation
page read and write
1479CD38000
heap
page read and write
D31000
heap
page read and write
773E000
trusted library allocation
page read and write
1D24E89C000
heap
page read and write
14795318000
trusted library allocation
page read and write
1298000
heap
page read and write
1479FE86000
heap
page read and write
3E09000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
5FF8000
heap
page read and write
14794A50000
trusted library allocation
page read and write
6D3B000
heap
page read and write
1A4341F9000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
6C66000
heap
page read and write
7FF7D8082000
unkown
page read and write
283D6C90000
heap
page read and write
3E3E000
heap
page read and write
1D24E8D8000
heap
page read and write
7FF7D827F000
unkown
page readonly
14790980000
trusted library allocation
page read and write
7FF7D7211000
unkown
page execute read
3EAC000
heap
page read and write
1D24E81D000
heap
page read and write
1690000
heap
page read and write
283E8BF0000
trusted library allocation
page read and write
3D46000
heap
page read and write
6D80000
trusted library allocation
page read and write
1478CF06000
heap
page read and write
2FBE000
stack
page read and write
6EEF000
trusted library allocation
page read and write
3E5B000
heap
page read and write
7FF7D7CD8000
unkown
page read and write
283E8B00000
trusted library allocation
page read and write
14795318000
trusted library allocation
page read and write
197BD8C3000
heap
page read and write
6BC7000
heap
page read and write
1479478B000
heap
page read and write
283DF96B000
heap
page read and write
6B569000
unkown
page readonly
283D6D40000
trusted library allocation
page read and write
1479FEB8000
heap
page read and write
283DFC4D000
heap
page read and write
1479FE91000
heap
page read and write
5FF8000
heap
page read and write
22E6726F000
heap
page read and write
7FF7D7211000
unkown
page execute read
6EE7000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
3DDC000
heap
page read and write
197BBF72000
heap
page read and write
6BF3000
heap
page read and write
7730000
trusted library allocation
page read and write
7FF7D8282000
unkown
page readonly
1A4325C0000
heap
page read and write
197BE3E0000
trusted library allocation
page read and write
773A000
trusted library allocation
page read and write
6002000
heap
page read and write
3DED000
heap
page read and write
6BE0000
heap
page read and write
14790B10000
trusted library allocation
page read and write
1479D1F0000
trusted library allocation
page read and write
772B000
trusted library allocation
page read and write
283D6D40000
trusted library allocation
page read and write
12CB000
heap
page read and write
7FF7D8528000
unkown
page readonly
14794438000
heap
page read and write
283DF96A000
heap
page read and write
508E000
heap
page read and write
14794A50000
trusted library allocation
page read and write
7FF7D7CB4000
unkown
page write copy
283E0160000
trusted library allocation
page read and write
283E8BA0000
trusted library allocation
page read and write
6442000
heap
page read and write
283D6D40000
trusted library allocation
page read and write
3DB1000
heap
page read and write
5F2D000
heap
page read and write
2FD0000
trusted library allocation
page read and write
3D86000
heap
page read and write
1C034D80000
remote allocation
page read and write
2DF4000
heap
page read and write
6E78000
trusted library allocation
page read and write
5671000
heap
page read and write
197BD8BF000
heap
page read and write
5DD0000
heap
page read and write
2DF4000
heap
page read and write
283DFEC9000
heap
page read and write
1D24E7E0000
remote allocation
page read and write
6BFF000
heap
page read and write
283E0A40000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
3E10000
heap
page read and write
12DF000
heap
page read and write
1D24E877000
heap
page read and write
DDC000
stack
page read and write
2DF4000
heap
page read and write
1D24E8B7000
heap
page read and write
7FF7D84FA000
unkown
page readonly
14794A50000
trusted library allocation
page read and write
7FF669EF1000
unkown
page execute read
7E05DFD000
stack
page read and write
283E0A3F000
trusted library allocation
page read and write
3E3C000
heap
page read and write
147909D0000
trusted library allocation
page read and write
283E8AFA000
trusted library allocation
page read and write
1D24E877000
heap
page read and write
197BDFD4000
heap
page read and write
4040000
remote allocation
page read and write
283DC530000
trusted library allocation
page read and write
320000
unkown
page readonly
1D24E7A0000
heap
page readonly
6CA3000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
197BC080000
trusted library allocation
page read and write
283E8C20000
trusted library allocation
page read and write
9B1000
unkown
page execute read
283DF8EC000
heap
page read and write
1BFC000
unkown
page write copy
D15000
heap
page read and write
416000
unkown
page read and write
1479D520000
trusted library allocation
page read and write
14790B01000
trusted library allocation
page read and write
1C034D40000
trusted library allocation
page read and write
40A000
unkown
page write copy
1479D1F0000
trusted library allocation
page read and write
1479D1F0000
trusted library allocation
page read and write
3E3B000
heap
page read and write
1479475A000
heap
page read and write
7E050FC000
stack
page read and write
63A0000
trusted library allocation
page read and write
3EB4000
heap
page read and write
197BE468000
heap
page read and write
1A4341F1000
heap
page read and write
283D6C53000
heap
page read and write
283DFF00000
heap
page read and write
283E0430000
trusted library allocation
page read and write
14795313000
trusted library allocation
page read and write
1A4341FE000
heap
page read and write
3E5D000
heap
page read and write
25B0000
heap
page read and write
7FF7D7CC7000
unkown
page write copy
6BE7000
heap
page read and write
283DF99E000
heap
page read and write
283DF95E000
heap
page read and write
5671000
heap
page read and write
1A434266000
heap
page read and write
3E60000
heap
page read and write
3E40000
heap
page read and write
14794865000
heap
page read and write
283E0670000
trusted library allocation
page read and write
14795340000
trusted library allocation
page read and write
2DF4000
heap
page read and write
12DF000
heap
page read and write
197BD8AE000
heap
page read and write
283D85CA000
heap
page read and write
1479FEDE000
heap
page read and write
1478DA80000
trusted library allocation
page read and write
1479D3BE000
trusted library allocation
page read and write
14794438000
heap
page read and write
14794620000
heap
page read and write
283E8BB0000
trusted library allocation
page read and write
1478CEEE000
heap
page read and write
D31000
heap
page read and write
14794780000
heap
page read and write
3DD7000
heap
page read and write
A73000
unkown
page readonly
3DE9000
heap
page read and write
3E06000
heap
page read and write
283DBF3B000
heap
page read and write
2DF4000
heap
page read and write
6003000
heap
page read and write
3DED000
heap
page read and write
9B0000
heap
page read and write
2DF4000
heap
page read and write
283DFED3000
heap
page read and write
2DF4000
heap
page read and write
283E13B2000
heap
page read and write
6C7E000
heap
page read and write
283D93F0000
remote allocation
page read and write
3DB2000
heap
page read and write
283E0A3F000
trusted library allocation
page read and write
1A43240A000
heap
page read and write
283DC548000
trusted library allocation
page read and write
6C570000
unkown
page read and write
197BC015000
heap
page read and write
A34000
unkown
page readonly
3DD3000
heap
page read and write
283D85CA000
heap
page read and write
283E0160000
trusted library allocation
page read and write
2DF4000
heap
page read and write
1478CEE0000
heap
page read and write
283DFD95000
heap
page read and write
14794431000
heap
page read and write
D65000
heap
page read and write
79B0000
trusted library allocation
page read and write
283E0160000
trusted library allocation
page read and write
283E8B80000
trusted library allocation
page read and write
22E67CB0000
trusted library allocation
page read and write
14794606000
heap
page read and write
14794606000
heap
page read and write
283E8B80000
trusted library allocation
page read and write
5F4D000
heap
page read and write
3D99000
heap
page read and write
197BD8CA000
heap
page read and write
6002000
heap
page read and write
197BC00D000
heap
page read and write
283DBF3B000
heap
page read and write
2DF4000
heap
page read and write
5FFD000
heap
page read and write
133A000
heap
page read and write
2DF4000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
887000
heap
page read and write
283D6C3A000
heap
page read and write
3E25000
heap
page read and write
283D6D40000
trusted library allocation
page read and write
1290000
heap
page read and write
9B0000
unkown
page readonly
6B812000
unkown
page read and write
6017000
heap
page read and write
3ED7000
heap
page read and write
283D922D000
heap
page read and write
9BE000
heap
page read and write
1478D4E0000
trusted library allocation
page read and write
6B47C000
unkown
page read and write
6A80000
trusted library allocation
page read and write
283D6D73000
heap
page read and write
1479532B000
trusted library allocation
page read and write
5F46000
heap
page read and write
5F1F000
heap
page read and write
1478CF0A000
heap
page read and write
4BDD000
stack
page read and write
3DD8000
heap
page read and write
197BE520000
heap
page read and write
5D2E000
stack
page read and write
6EC7000
trusted library allocation
page read and write
283E0A38000
trusted library allocation
page read and write
22E67301000
heap
page read and write
14794780000
heap
page read and write
5F26000
heap
page read and write
14794620000
heap
page read and write
649000
unkown
page read and write
22E65820000
trusted library allocation
page read and write
1D24E84F000
heap
page read and write
6B5CD000
unkown
page readonly
1D24E8E7000
heap
page read and write
1D24E84B000
heap
page read and write
2DF4000
heap
page read and write
CB0000
remote allocation
page read and write
3E16000
heap
page read and write
14799310000
trusted library allocation
page read and write
1478E1BE000
heap
page read and write
2DF4000
heap
page read and write
D00000
heap
page read and write
5AEF000
stack
page read and write
7FF7D7211000
unkown
page execute read
3DEF000
heap
page read and write
5F3C000
heap
page read and write
2DF4000
heap
page read and write
77D0000
trusted library allocation
page read and write
7FF7D8534000
unkown
page readonly
2DF4000
heap
page read and write
283E8B05000
trusted library allocation
page read and write
3040000
remote allocation
page read and write
283DC540000
trusted library allocation
page read and write
2DF4000
heap
page read and write
7800000
trusted library allocation
page read and write
197BBF3B000
heap
page read and write
2DF4000
heap
page read and write
D15000
heap
page read and write
802000
unkown
page write copy
63A0000
trusted library allocation
page read and write
1479FEF5000
heap
page read and write
5082000
heap
page read and write
6D70000
trusted library allocation
page read and write
7FF66A0F9000
unkown
page readonly
400000
unkown
page readonly
3D4C000
heap
page read and write
283D90B0000
trusted library allocation
page read and write
7FF63C3B1000
unkown
page execute read
7740000
trusted library allocation
page read and write
1D24E877000
heap
page read and write
1301000
heap
page read and write
6B815000
unkown
page write copy
283D6D73000
heap
page read and write
7FF7D7CB4000
unkown
page write copy
22E6725D000
heap
page read and write
1C3C000
unkown
page write copy
6C10000
heap
page read and write
3D92000
heap
page read and write
6BDD000
heap
page read and write
14CE000
stack
page read and write
3DDD000
heap
page read and write
7FF7D8088000
unkown
page readonly
14795338000
trusted library allocation
page read and write
197BD8CA000
heap
page read and write
22E67245000
heap
page read and write
283DF908000
heap
page read and write
283D85CA000
heap
page read and write
3D84000
heap
page read and write
3D37000
heap
page read and write
7E054F6000
stack
page read and write
6BC3000
heap
page read and write
283D863C000
heap
page read and write
283E0160000
trusted library allocation
page read and write
7FF7D8282000
unkown
page readonly
CFC000
heap
page read and write
1D24E8B0000
heap
page read and write
A4057FE000
stack
page read and write
283E0A21000
trusted library allocation
page read and write
6B567000
unkown
page readonly
6BD8000
heap
page read and write
6D39000
heap
page read and write
1478CEF6000
heap
page read and write
197BE4E6000
heap
page read and write
6E80000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
283DF98D000
heap
page read and write
1150000
heap
page read and write
887000
heap
page read and write
283E4A20000
trusted library allocation
page read and write
197BDFD0000
heap
page read and write
5470000
heap
page read and write
1479D4F0000
trusted library allocation
page read and write
1479D1F0000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
77E0000
trusted library allocation
page read and write
1478DA80000
trusted library allocation
page read and write
7FF7D7D26000
unkown
page write copy
22E68740000
remote allocation
page read and write
6E89000
trusted library allocation
page read and write
147909D0000
trusted library allocation
page read and write
283DF996000
heap
page read and write
7FF7D7211000
unkown
page execute read
633F000
stack
page read and write
22E67257000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
283D85CA000
heap
page read and write
7FF7D7D02000
unkown
page write copy
7FF63C4A5000
unkown
page readonly
197BC02A000
heap
page read and write
283E8BF0000
trusted library allocation
page read and write
197BE47F000
heap
page read and write
283E0A20000
trusted library allocation
page read and write
7970000
trusted library allocation
page read and write
283D90B0000
trusted library allocation
page read and write
2DF4000
heap
page read and write
283D6D40000
trusted library allocation
page read and write
1478DCB0000
remote allocation
page read and write
7FF7D5E10000
unkown
page readonly
4F60000
heap
page read and write
3DED000
heap
page read and write
D31000
heap
page read and write
6C93000
heap
page read and write
7FF7D7A18000
unkown
page readonly
6BD3000
heap
page read and write
7FF7D5E10000
unkown
page readonly
99B000
heap
page read and write
14790B00000
trusted library allocation
page read and write
6A14B000
unkown
page readonly
3D3A000
heap
page read and write
3EBB000
heap
page read and write
7740000
trusted library allocation
page read and write
9BE000
heap
page read and write
1478CF0A000
heap
page read and write
7FF63C452000
unkown
page readonly
5F4D000
heap
page read and write
7FF7D7D21000
unkown
page read and write
14790B10000
trusted library allocation
page read and write
197BD8CA000
heap
page read and write
8E0000
heap
page read and write
2DF4000
heap
page read and write
2FD0000
trusted library allocation
page read and write
2EBE000
stack
page read and write
324CAFF000
stack
page read and write
283E0160000
trusted library allocation
page read and write
1A434266000
heap
page read and write
1C14000
unkown
page write copy
3ED7000
heap
page read and write
6D3A000
heap
page read and write
A6F000
unkown
page write copy
283D85CA000
heap
page read and write
1D24E877000
heap
page read and write
D78000
heap
page read and write
7730000
trusted library allocation
page read and write
1D25041B000
heap
page read and write
1479D4E0000
trusted library allocation
page read and write
1478D4E0000
trusted library allocation
page read and write
7741000
trusted library allocation
page read and write
283E0A21000
trusted library allocation
page read and write
6CA3000
heap
page read and write
6C55000
heap
page read and write
2DF4000
heap
page read and write
126E000
stack
page read and write
5F3F000
heap
page read and write
5F1F000
heap
page read and write
7FF66198F000
unkown
page write copy
283E0A21000
trusted library allocation
page read and write
7E05AFD000
stack
page read and write
1479533F000
trusted library allocation
page read and write
54C2000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
283E0A3F000
trusted library allocation
page read and write
283E0A28000
trusted library allocation
page read and write
1479480F000
heap
page read and write
22E6724F000
heap
page read and write
283D859E000
heap
page read and write
6ED8000
trusted library allocation
page read and write
5EED000
heap
page read and write
197BD93C000
heap
page read and write
1A4323E7000
heap
page read and write
1478DA80000
trusted library allocation
page read and write
1479FEEE000
heap
page read and write
2DF4000
heap
page read and write
1478CF0A000
heap
page read and write
197BBFBD000
heap
page read and write
2DF4000
heap
page read and write
283DF909000
heap
page read and write
283E0A4F000
trusted library allocation
page read and write
14794751000
heap
page read and write
2DF4000
heap
page read and write
197BDFD4000
heap
page read and write
1478CEEE000
heap
page read and write
6EE7000
trusted library allocation
page read and write
6EDF000
trusted library allocation
page read and write
1479FE88000
heap
page read and write
2FD0000
trusted library allocation
page read and write
3E28000
heap
page read and write
1301000
heap
page read and write
6BC5000
heap
page read and write
283E0A3F000
trusted library allocation
page read and write
508D000
heap
page read and write
7700000
trusted library allocation
page read and write
7FF7D5E11000
unkown
page execute read
22E67269000
heap
page read and write
22E659F4000
heap
page read and write
3E18000
heap
page read and write
1D24E893000
heap
page read and write
147943CF000
heap
page read and write
6CA3000
heap
page read and write
4808000
heap
page read and write
7840000
trusted library allocation
page read and write
3DD7000
heap
page read and write
283E0A21000
trusted library allocation
page read and write
A34000
unkown
page readonly
1C034BE1000
trusted library allocation
page read and write
7FF6619AA000
unkown
page write copy
3040000
remote allocation
page read and write
14794430000
heap
page read and write
22E67B31000
heap
page read and write
1479D3CD000
trusted library allocation
page read and write
7FF7D7A18000
unkown
page readonly
283DC540000
trusted library allocation
page read and write
1479D1F0000
trusted library allocation
page read and write
6E78000
trusted library allocation
page read and write
6C52000
heap
page read and write
1D24E82B000
heap
page read and write
3E6A000
heap
page read and write
14794573000
heap
page read and write
6BF9000
heap
page read and write
22E6AD40000
trusted library allocation
page read and write
54CA000
heap
page read and write
D30000
heap
page read and write
1478E4B4000
heap
page read and write
14790980000
trusted library allocation
page read and write
6AB70000
unkown
page readonly
1479FEF0000
heap
page read and write
5F3F000
heap
page read and write
147909D0000
trusted library allocation
page read and write
283E8AF0000
trusted library allocation
page read and write
7FF7D8528000
unkown
page readonly
283D85D7000
heap
page read and write
3DD8000
heap
page read and write
2DF4000
heap
page read and write
1BF4000
unkown
page write copy
2DF4000
heap
page read and write
7FF7D7CC7000
unkown
page write copy
3EF9000
heap
page read and write
283DF99E000
heap
page read and write
1D24E8C5000
heap
page read and write
1D250441000
heap
page read and write
5F45000
heap
page read and write
D00000
heap
page read and write
1478E4B2000
heap
page read and write
283E8B09000
trusted library allocation
page read and write
283DFED8000
heap
page read and write
6BC3000
heap
page read and write
1478E18E000
heap
page read and write
CE0000
heap
page read and write
6BCC000
heap
page read and write
14795312000
trusted library allocation
page read and write
1D24E660000
heap
page read and write
1479D3C5000
trusted library allocation
page read and write
283E0A27000
trusted library allocation
page read and write
3DB2000
heap
page read and write
197BE4BD000
heap
page read and write
283DF98D000
heap
page read and write
2DF4000
heap
page read and write
BFE000
stack
page read and write
7FF7D6811000
unkown
page execute read
6BE9000
heap
page read and write
1478CEFF000
heap
page read and write
283E8AEB000
trusted library allocation
page read and write
14794417000
heap
page read and write
EBF000
stack
page read and write
86E000
stack
page read and write
14790AE0000
trusted library allocation
page read and write
1479FE51000
heap
page read and write
7FF7D827C000
unkown
page readonly
283E0A3F000
trusted library allocation
page read and write
1478CEEA000
heap
page read and write
3DED000
heap
page read and write
6008000
heap
page read and write
197BBFE8000
heap
page read and write
7FF7D84FA000
unkown
page readonly
3DDB000
heap
page read and write
283E0A27000
trusted library allocation
page read and write
283DFE9C000
heap
page read and write
1479FEA6000
heap
page read and write
6B81F000
unkown
page read and write
22E6726E000
heap
page read and write
2DF4000
heap
page read and write
A73000
unkown
page readonly
7820000
trusted library allocation
page read and write
283E8A80000
trusted library allocation
page read and write
7FF7D8175000
unkown
page readonly
15D0000
heap
page read and write
6011000
heap
page read and write
D31000
heap
page read and write
283D85AD000
heap
page read and write
47F0000
heap
page read and write
14795330000
trusted library allocation
page read and write
3DEF000
heap
page read and write
2DF4000
heap
page read and write
47FA000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
A6F000
unkown
page write copy
283DC530000
trusted library allocation
page read and write
1478DCB0000
remote allocation
page read and write
3E53000
heap
page read and write
283E0A4F000
trusted library allocation
page read and write
283E4A20000
trusted library allocation
page read and write
2DF4000
heap
page read and write
3DB2000
heap
page read and write
5FC7000
heap
page read and write
1478E334000
heap
page read and write
508D000
heap
page read and write
3D99000
heap
page read and write
283D6D73000
heap
page read and write
283D6C70000
heap
page read and write
1478CFB3000
heap
page read and write
3E41000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
1A434222000
heap
page read and write
12CB000
heap
page read and write
283E8B18000
trusted library allocation
page read and write
6E97000
trusted library allocation
page read and write
6BED000
heap
page read and write
9DE000
heap
page read and write
197BE3E0000
trusted library allocation
page read and write
6CA3000
heap
page read and write
283DF988000
heap
page read and write
7FF7D7CB6000
unkown
page write copy
976000
stack
page read and write
6ED8000
trusted library allocation
page read and write
6C556000
unkown
page write copy
14794431000
heap
page read and write
1A4341F9000
heap
page read and write
6BD6000
heap
page read and write
1C05000
unkown
page write copy
283E0A21000
trusted library allocation
page read and write
5EE0000
heap
page read and write
14794620000
heap
page read and write
283D8675000
heap
page read and write
1D2503F0000
heap
page read and write
1478E181000
heap
page read and write
283E0160000
trusted library allocation
page read and write
14790AE0000
trusted library allocation
page read and write
1479457E000
heap
page read and write
283E0A21000
trusted library allocation
page read and write
283DC530000
trusted library allocation
page read and write
3DDB000
heap
page read and write
6C66000
heap
page read and write
6049000
heap
page read and write
3E08000
heap
page read and write
283D85CA000
heap
page read and write
283E0430000
trusted library allocation
page read and write
14794A50000
trusted library allocation
page read and write
197BDFD3000
heap
page read and write
773A000
trusted library allocation
page read and write
7FF7D7C98000
unkown
page write copy
283DC4D0000
trusted library allocation
page read and write
1479D3C0000
trusted library allocation
page read and write
1479C850000
trusted library allocation
page read and write
1479D1F0000
trusted library allocation
page read and write
7FF7D7C78000
unkown
page write copy
3DAF000
heap
page read and write
283DF908000
heap
page read and write
14794A48000
heap
page read and write
6BF0000
heap
page read and write
197BBF00000
heap
page read and write
1FA3000
unkown
page read and write
283DFC4D000
heap
page read and write
147943EB000
heap
page read and write
CB0000
remote allocation
page read and write
6C66000
heap
page read and write
1479FE51000
heap
page read and write
283DFCEA000
heap
page read and write
2DF4000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
197BD9C3000
heap
page read and write
14794A50000
trusted library allocation
page read and write
1F99000
unkown
page read and write
600A000
heap
page read and write
A4050FE000
unkown
page readonly
1479D3C0000
trusted library allocation
page read and write
6C5A000
heap
page read and write
5671000
heap
page read and write
7730000
trusted library allocation
page read and write
283E0A38000
trusted library allocation
page read and write
1478CEDD000
heap
page read and write
7740000
trusted library allocation
page read and write
5F29000
heap
page read and write
1D24E740000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
77F0000
trusted library allocation
page read and write
5F4D000
heap
page read and write
14795317000
trusted library allocation
page read and write
14795320000
trusted library allocation
page read and write
197BD9D6000
heap
page read and write
14790B00000
trusted library allocation
page read and write
DB0000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
283DFC3B000
heap
page read and write
3DBA000
heap
page read and write
1479D458000
trusted library allocation
page read and write
283DFE36000
heap
page read and write
14794625000
heap
page read and write
320000
unkown
page readonly
1D24E8D8000
heap
page read and write
283D8688000
heap
page read and write
283D6C78000
heap
page read and write
6D35000
heap
page read and write
7FF7D7C97000
unkown
page read and write
6B940000
unkown
page readonly
1479FF1C000
heap
page read and write
283DF971000
heap
page read and write
14795319000
trusted library allocation
page read and write
3E06000
heap
page read and write
1A4341FE000
heap
page read and write
9DE000
heap
page read and write
20C4000
unkown
page readonly
1C034C53000
trusted library allocation
page read and write
1479CA10000
trusted library allocation
page read and write
1479C840000
trusted library allocation
page read and write
7FF66198E000
unkown
page read and write
1479D1F0000
trusted library allocation
page read and write
283E0A39000
trusted library allocation
page read and write
1479533F000
trusted library allocation
page read and write
7741000
trusted library allocation
page read and write
772B000
trusted library allocation
page read and write
1479FEB7000
heap
page read and write
3EB8000
heap
page read and write
14795348000
trusted library allocation
page read and write
2DF4000
heap
page read and write
197BBF8B000
heap
page read and write
77C0000
trusted library allocation
page read and write
162D000
stack
page read and write
1D24E8D6000
heap
page read and write
283DC548000
trusted library allocation
page read and write
6C89000
heap
page read and write
3E23000
heap
page read and write
1479C5A0000
trusted library allocation
page read and write
22E67CB0000
trusted library allocation
page read and write
9B1000
unkown
page execute read
3DFA000
heap
page read and write
283DC548000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
7FF7D8174000
unkown
page write copy
3E09000
heap
page read and write
1D24E8D6000
heap
page read and write
197BD8C2000
heap
page read and write
283E0A37000
trusted library allocation
page read and write
401000
unkown
page execute read
5F3F000
heap
page read and write
6EA7000
trusted library allocation
page read and write
7FF661A06000
unkown
page readonly
7FF7D7CDC000
unkown
page write copy
231F000
unkown
page readonly
1479D3B0000
trusted library allocation
page read and write
3DCD000
heap
page read and write
283E8B50000
trusted library allocation
page read and write
283E139E000
heap
page read and write
7FF66186A000
unkown
page readonly
6A168000
unkown
page readonly
1479FEF8000
heap
page read and write
283E8BA0000
trusted library allocation
page read and write
1FA8000
unkown
page read and write
A73000
unkown
page readonly
283E8A20000
trusted library allocation
page read and write
A34000
unkown
page readonly
2DF4000
heap
page read and write
1479D430000
trusted library allocation
page read and write
3E3F000
heap
page read and write
14794623000
heap
page read and write
6BD2000
heap
page read and write
6C04000
heap
page read and write
7730000
trusted library allocation
page read and write
7FF669EF0000
unkown
page readonly
1478CF0A000
heap
page read and write
283E0A27000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
7FF7D8175000
unkown
page readonly
1D24E8B8000
heap
page read and write
22E65820000
trusted library allocation
page read and write
3D99000
heap
page read and write
8E8000
heap
page read and write
14794406000
heap
page read and write
283D90B0000
trusted library allocation
page read and write
5670000
heap
page read and write
3EAF000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
283DC024000
heap
page read and write
7FF63C4AD000
unkown
page readonly
887000
heap
page read and write
3DDB000
heap
page read and write
6BED000
heap
page read and write
283E8C10000
trusted library allocation
page read and write
3EF3000
heap
page read and write
5671000
heap
page read and write
2DF4000
heap
page read and write
1A4323A0000
heap
page read and write
14794573000
heap
page read and write
147943A8000
heap
page read and write
5F3F000
heap
page read and write
3F01000
heap
page read and write
1478D911000
heap
page read and write
283DFFA2000
heap
page read and write
5F1F000
heap
page read and write
283E8AEB000
trusted library allocation
page read and write
1A4323F0000
heap
page read and write
1479460D000
heap
page read and write
3EA2000
heap
page read and write
283E8B00000
trusted library allocation
page read and write
45F000
unkown
page read and write
2DF4000
heap
page read and write
147947CE000
heap
page read and write
197BDFD3000
heap
page read and write
6CA0000
trusted library allocation
page read and write
22E6725A000
heap
page read and write
6B721000
unkown
page execute read
1A434231000
heap
page read and write
197BBE00000
heap
page read and write
197BC003000
heap
page read and write
7FF7D8174000
unkown
page write copy
2DF4000
heap
page read and write
283E0A47000
trusted library allocation
page read and write
283E8B10000
trusted library allocation
page read and write
1479D1F0000
trusted library allocation
page read and write
3D49000
heap
page read and write
283E0A39000
trusted library allocation
page read and write
283DC4E0000
trusted library allocation
page read and write
1479D4E0000
trusted library allocation
page read and write
14795318000
trusted library allocation
page read and write
1479D1F0000
trusted library allocation
page read and write
1479D4E0000
trusted library allocation
page read and write
234D000
unkown
page readonly
283E08E0000
trusted library allocation
page read and write
197BD951000
heap
page read and write
22E684AB000
heap
page read and write
7E05EFE000
stack
page read and write
6C61000
heap
page read and write
772B000
trusted library allocation
page read and write
283D6D40000
trusted library allocation
page read and write
7F50000
trusted library allocation
page read and write
CFC000
heap
page read and write
1D24E8CB000
heap
page read and write
147947CE000
heap
page read and write
79A0000
trusted library allocation
page read and write
2DF4000
heap
page read and write
6E88000
trusted library allocation
page read and write
1479D3BA000
trusted library allocation
page read and write
1479D440000
trusted library allocation
page read and write
283DFEFC000
heap
page read and write
20CA000
unkown
page readonly
1C04000
unkown
page read and write
22E65820000
trusted library allocation
page read and write
283E8C20000
trusted library allocation
page read and write
283E8C20000
trusted library allocation
page read and write
1479C840000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
197BBF30000
heap
page read and write
7990000
trusted library allocation
page read and write
1479FE6A000
heap
page read and write
14794577000
heap
page read and write
7FF7D8528000
unkown
page readonly
6BF0000
heap
page read and write
283DFC39000
heap
page read and write
283E8B50000
trusted library allocation
page read and write
197BD8BC000
heap
page read and write
2DF4000
heap
page read and write
58AC000
stack
page read and write
6C626000
unkown
page read and write
7FF6619FA000
unkown
page read and write
728000
heap
page read and write
5F4D000
heap
page read and write
14794A50000
trusted library allocation
page read and write
5C25000
heap
page read and write
77B0000
trusted library allocation
page read and write
197BE120000
heap
page read and write
283D6D74000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
A4047FE000
stack
page read and write
7FF7D8534000
unkown
page readonly
6C52000
heap
page read and write
9B0000
unkown
page readonly
1C034D80000
remote allocation
page read and write
1D24E856000
heap
page read and write
5FFF000
heap
page read and write
3E3A000
heap
page read and write
7FF7D7C78000
unkown
page write copy
6C44000
heap
page read and write
6B814000
unkown
page read and write
7FF7D756B000
unkown
page readonly
283E0430000
trusted library allocation
page read and write
1479D370000
trusted library allocation
page read and write
147943AB000
heap
page read and write
197BDFD3000
heap
page read and write
1D250435000
heap
page read and write
22E65820000
trusted library allocation
page read and write
1478E189000
heap
page read and write
D17000
heap
page read and write
6BDF000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
283E8B00000
trusted library allocation
page read and write
1478CF0A000
heap
page read and write
3D49000
heap
page read and write
7FF7D8057000
unkown
page read and write
1478CF0A000
heap
page read and write
5FFF000
heap
page read and write
283DC531000
trusted library allocation
page read and write
6BD4000
heap
page read and write
14795358000
trusted library allocation
page read and write
283D85C3000
heap
page read and write
6C5A000
heap
page read and write
283E0160000
trusted library allocation
page read and write
3DEF000
heap
page read and write
283DC520000
trusted library allocation
page read and write
7FF7D5E11000
unkown
page execute read
2DF4000
heap
page read and write
7700000
trusted library allocation
page read and write
1D24E8D8000
heap
page read and write
6C93000
heap
page read and write
14790AF0000
trusted library allocation
page read and write
1D24E893000
heap
page read and write
3E3D000
heap
page read and write
14795350000
trusted library allocation
page read and write
6C74000
heap
page read and write
197BDFD3000
heap
page read and write
6BF0000
heap
page read and write
283D8595000
heap
page read and write
1A432650000
heap
page read and write
4F3E000
stack
page read and write
3E3A000
heap
page read and write
1479D3B0000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
1478E377000
heap
page read and write
20C7000
unkown
page readonly
9BE000
heap
page read and write
197BBEE0000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
7FF7D7CD7000
unkown
page write copy
3E06000
heap
page read and write
283E0160000
trusted library allocation
page read and write
14794889000
heap
page read and write
6002000
heap
page read and write
14790980000
trusted library allocation
page read and write
5F3F000
heap
page read and write
1A4323C8000
heap
page read and write
12C6000
heap
page read and write
7FF7D84FA000
unkown
page readonly
2DF4000
heap
page read and write
147947CE000
heap
page read and write
623E000
stack
page read and write
283DFCFC000
heap
page read and write
147951D0000
trusted library allocation
page read and write
7FF7D756B000
unkown
page readonly
7FF66A1B7000
unkown
page write copy
1479D1F0000
trusted library allocation
page read and write
3DDB000
heap
page read and write
5671000
heap
page read and write
1479D460000
trusted library allocation
page read and write
9DE000
heap
page read and write
283D85BA000
heap
page read and write
283E0A30000
trusted library allocation
page read and write
22E6ADA0000
trusted library allocation
page read and write
3D4C000
heap
page read and write
197BBFC4000
heap
page read and write
1663000
unkown
page readonly
283E8AC0000
trusted library allocation
page read and write
D15000
heap
page read and write
197BE45C000
heap
page read and write
147949E6000
heap
page read and write
283E0160000
trusted library allocation
page read and write
283D85A5000
heap
page read and write
1479C840000
trusted library allocation
page read and write
7FF7D8063000
unkown
page read and write
508B000
heap
page read and write
1A432370000
heap
page read and write
147943A4000
heap
page read and write
3E5A000
heap
page read and write
197BC095000
heap
page read and write
6E97000
trusted library allocation
page read and write
7FF7D84FA000
unkown
page readonly
7FF7D827C000
unkown
page readonly
283E0A38000
trusted library allocation
page read and write
283DC550000
trusted library allocation
page read and write
6B047000
unkown
page readonly
6B478000
unkown
page read and write
14794888000
heap
page read and write
283D85B6000
heap
page read and write
22E68740000
remote allocation
page read and write
7FF66A220000
unkown
page readonly
1478B5A5000
heap
page read and write
147943E6000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
2DF4000
heap
page read and write
283E13D0000
heap
page read and write
283E8AC0000
trusted library allocation
page read and write
1479478B000
heap
page read and write
3D4C000
heap
page read and write
1A434210000
heap
page read and write
7FF7D8065000
unkown
page read and write
148F000
stack
page read and write
6C88000
heap
page read and write
5F4D000
heap
page read and write
197BD8A5000
heap
page read and write
D21000
unkown
page execute read
1478E3BA000
heap
page read and write
6C05000
heap
page read and write
283E0A21000
trusted library allocation
page read and write
283DF997000
heap
page read and write
1478CEE8000
heap
page read and write
197BD8C3000
heap
page read and write
5C20000
heap
page read and write
6049000
heap
page read and write
6D70000
trusted library allocation
page read and write
3E41000
heap
page read and write
5F07000
heap
page read and write
3DEF000
heap
page read and write
2DF4000
heap
page read and write
283E0870000
trusted library allocation
page read and write
283E0A27000
trusted library allocation
page read and write
6BC7000
heap
page read and write
5F07000
heap
page read and write
1D24E87C000
heap
page read and write
1479FEB7000
heap
page read and write
1C034BE0000
trusted library allocation
page read and write
2DF4000
heap
page read and write
6017000
heap
page read and write
283E0A3F000
trusted library allocation
page read and write
1479FEF0000
heap
page read and write
6BC3000
heap
page read and write
73F000
heap
page read and write
14794614000
heap
page read and write
1A432409000
heap
page read and write
3DDB000
heap
page read and write
14795318000
trusted library allocation
page read and write
D3E000
stack
page read and write
1479476C000
heap
page read and write
14790AF0000
trusted library allocation
page read and write
283DC520000
trusted library allocation
page read and write
14795347000
trusted library allocation
page read and write
1479D1F0000
trusted library allocation
page read and write
9DB000
heap
page read and write
12DF000
heap
page read and write
283E8BA0000
trusted library allocation
page read and write
2DF4000
heap
page read and write
47ED000
heap
page read and write
1478DA80000
trusted library allocation
page read and write
2DF4000
heap
page read and write
1A434264000
heap
page read and write
14794780000
heap
page read and write
CFC000
heap
page read and write
14794A50000
trusted library allocation
page read and write
1A434211000
heap
page read and write
6C5F000
heap
page read and write
283DFED8000
heap
page read and write
720000
heap
page read and write
283E8A80000
trusted library allocation
page read and write
C7F000
stack
page read and write
283E8B01000
trusted library allocation
page read and write
14795311000
trusted library allocation
page read and write
6E98000
trusted library allocation
page read and write
283DC540000
trusted library allocation
page read and write
5DE0000
heap
page read and write
1D24E8D6000
heap
page read and write
283D85A1000
heap
page read and write
1479C9E0000
trusted library allocation
page read and write
1341000
heap
page read and write
22E65820000
trusted library allocation
page read and write
1479D1F0000
trusted library allocation
page read and write
5F2D000
heap
page read and write
1A4325A0000
trusted library allocation
page read and write
7FF66A0F9000
unkown
page readonly
1A434231000
heap
page read and write
14795318000
trusted library allocation
page read and write
1479D3C9000
trusted library allocation
page read and write
1478E1FC000
heap
page read and write
283D90B0000
trusted library allocation
page read and write
3EA4000
heap
page read and write
7FF7D7CBA000
unkown
page write copy
14794625000
heap
page read and write
1479FE8F000
heap
page read and write
197BD8AE000
heap
page read and write
77D8000
trusted library allocation
page read and write
14794A50000
trusted library allocation
page read and write
1C02FF1A000
heap
page read and write
7FF7D7C8B000
unkown
page read and write
283E0430000
trusted library allocation
page read and write
12CB000
heap
page read and write
283DF909000
heap
page read and write
BB0000
heap
page read and write
147943AF000
heap
page read and write
6B941000
unkown
page execute read
283D85BC000
heap
page read and write
6ED8000
trusted library allocation
page read and write
14794435000
heap
page read and write
283DF92E000
heap
page read and write
14794A50000
trusted library allocation
page read and write
3DD3000
heap
page read and write
283E0A38000
trusted library allocation
page read and write
283E8AC0000
trusted library allocation
page read and write
1479CA00000
trusted library allocation
page read and write
283E0A3F000
trusted library allocation
page read and write
667C000
stack
page read and write
1D24E8E8000
heap
page read and write
7FF7D7CBA000
unkown
page write copy
1479D1F0000
trusted library allocation
page read and write
1D24E8C5000
heap
page read and write
283E0A3F000
trusted library allocation
page read and write
197BD89E000
heap
page read and write
283DFC0F000
heap
page read and write
6BFD000
heap
page read and write
6B234000
unkown
page write copy
3DED000
heap
page read and write
7FF669EF0000
unkown
page readonly
12E1000
heap
page read and write
283D6C34000
heap
page read and write
5FF8000
heap
page read and write
5F3F000
heap
page read and write
7670000
trusted library allocation
page read and write
B90000
heap
page read and write
324C8FE000
stack
page read and write
1D24E853000
heap
page read and write
811000
unkown
page readonly
147946CD000
heap
page read and write
3D99000
heap
page read and write
1140000
heap
page read and write
12E9000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
14794FB0000
trusted library allocation
page read and write
77C0000
trusted library allocation
page read and write
14792195000
heap
page read and write
283E0A21000
trusted library allocation
page read and write
6B243000
unkown
page write copy
14794535000
heap
page read and write
6BEA000
heap
page read and write
7FF7D7CBA000
unkown
page write copy
8CE000
stack
page read and write
283E8B05000
trusted library allocation
page read and write
401000
unkown
page execute read
CB0000
remote allocation
page read and write
1478E43C000
heap
page read and write
283DC012000
heap
page read and write
6BD6000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
14794633000
heap
page read and write
283E0160000
trusted library allocation
page read and write
A6F000
unkown
page read and write
6E98000
trusted library allocation
page read and write
2DF4000
heap
page read and write
1D24E8EE000
heap
page read and write
92D000
heap
page read and write
D66000
heap
page read and write
197BDFD4000
heap
page read and write
14792195000
heap
page read and write
1D24E84E000
heap
page read and write
3E25000
heap
page read and write
197BE48C000
heap
page read and write
283DFCFC000
heap
page read and write
CC8000
heap
page read and write
283E8AFA000
trusted library allocation
page read and write
9DD000
heap
page read and write
3D4C000
heap
page read and write
1479D1F0000
trusted library allocation
page read and write
20CA000
unkown
page readonly
6C19000
heap
page read and write
1479D420000
trusted library allocation
page read and write
1479D1F0000
trusted library allocation
page read and write
1478E194000
heap
page read and write
6EE0000
trusted library allocation
page read and write
14794625000
heap
page read and write
6C4E000
heap
page read and write
283DFF03000
heap
page read and write
3E53000
heap
page read and write
1479C5A0000
trusted library allocation
page read and write
40AE000
stack
page read and write
283DFC55000
heap
page read and write
14794433000
heap
page read and write
2DF4000
heap
page read and write
197BD895000
heap
page read and write
283E8AC1000
trusted library allocation
page read and write
147943AF000
heap
page read and write
507E000
heap
page read and write
6A00000
trusted library allocation
page read and write
6D3D000
heap
page read and write
6C66000
heap
page read and write
283E0160000
trusted library allocation
page read and write
283DC520000
trusted library allocation
page read and write
7700000
trusted library allocation
page read and write
7FF7D8174000
unkown
page write copy
197BDFD3000
heap
page read and write
6EB1000
trusted library allocation
page read and write
3DDC000
heap
page read and write
1D24E7E0000
remote allocation
page read and write
1D24E8DF000
heap
page read and write
6E77000
trusted library allocation
page read and write
6C7E000
heap
page read and write
5F07000
heap
page read and write
7FF66A1B4000
unkown
page read and write
6BC3000
heap
page read and write
A34000
unkown
page readonly
CEF000
heap
page read and write
197BD8B6000
heap
page read and write
147943AC000
heap
page read and write
197BC080000
trusted library allocation
page read and write
There are 2619 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://www.ccleaner.com/knowledge/ccleaner-v6-30-11385?cv=v6-30-11385
https://www.ccleaner.com/knowledge/ccleaner-v6-30-11385?cv=v6-30-11385
https://www.ccleaner.com/knowledge/ccleaner-v6-30-11385?cv=v6-30-11385
https://www.ccleaner.com/knowledge/ccleaner-v6-30-11385?cv=v6-30-11385
https://www.ccleaner.com/knowledge/ccleaner-v6-30-11385?cv=v6-30-11385
https://www.ccleaner.com/knowledge/ccleaner-v6-30-11385?cv=v6-30-11385
https://www.ccleaner.com/knowledge/ccleaner-v6-30-11385?cv=v6-30-11385
https://www.ccleaner.com/knowledge/ccleaner-v6-30-11385?cv=v6-30-11385