Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
chica-pc-shield-1-75-0-1300-en-win.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe (copy)
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\7z.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\danish.lng (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\dutch.lng (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\english.lng (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\finnish.lng (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\french.lng (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\german.lng (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\is-0HFFJ.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\is-3614V.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\is-36Q7V.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\is-5A794.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\is-5RTRO.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\is-DLO1P.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\is-GM6MD.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\is-P4B2K.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\is-S8JRA.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\is-UFVDK.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\italian.lng (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\norwegian.lng (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\spanish.lng (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\swedish.lng (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\changes.txt (copy)
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcspt.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsservice.exe (copy)
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-0DUR6.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-382MP.tmp
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-6H2TN.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-6PN99.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-9INTD.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-CI4PM.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-CU77C.tmp
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-DB4G5.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-J2CDD.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-K9CAE.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-KP3IJ.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-L12IJ.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-S0PAI.tmp
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-SJQ69.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-T6R1L.tmp
|
Rich Text Format data, version 1, ANSI, code page 1252
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-UQ1R3.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\license.rtf (copy)
|
Rich Text Format data, version 1, ANSI, code page 1252
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\mbam.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\mbamcore.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\mbamext.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\mbamnet.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\mbamtoast.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\ssubtmr6.dll (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\unins000.dat
|
InnoSetup Log ChicaPC-Shield, version 0x30, 10690 bytes, 467601\user, "C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield"
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\unins000.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\unins000.msg
|
InnoSetup messages, version 5.5.0, 220 messages (ASCII), &About Setup...
|
dropped
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\vbalsgrid6.ocx (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\build.conf (copy)
|
data
|
dropped
|
||
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\config.conf (copy)
|
data
|
dropped
|
||
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\custom.conf (copy)
|
data
|
dropped
|
||
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\database.conf (copy)
|
data
|
dropped
|
||
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\html.conf (copy)
|
data
|
dropped
|
||
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\is-26J2K.tmp
|
data
|
dropped
|
||
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\is-41DE0.tmp
|
data
|
dropped
|
||
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\is-7JP9T.tmp
|
data
|
dropped
|
||
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\is-9E5DG.tmp
|
data
|
dropped
|
||
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\is-A47L8.tmp
|
data
|
dropped
|
||
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\is-AF3S0.tmp
|
data
|
dropped
|
||
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\is-AJB53.tmp
|
data
|
dropped
|
||
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\is-NKMPM.tmp
|
data
|
dropped
|
||
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\is-NN3CS.tmp
|
data
|
dropped
|
||
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\local.conf
|
data
|
dropped
|
||
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\manifest.conf (copy)
|
data
|
dropped
|
||
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\messaging.conf (copy)
|
data
|
dropped
|
||
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\news.conf (copy)
|
data
|
dropped
|
||
C:\ProgramData\ChicaLogic\ChicaPC-Shield\is-Q97HV.tmp
|
data
|
dropped
|
||
C:\ProgramData\ChicaLogic\ChicaPC-Shield\rules.ref (copy)
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0xe5e072a7, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ChicaLogic\ChicaPC-Shield\ChicaPC-Shield Notifications.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Wed Oct 30 14:57:41 2024, mtime=Wed Oct 30 14:57:41 2024, atime=Thu Apr 4 17:51:30 2013, length=788040, window=hide
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ChicaLogic\ChicaPC-Shield\ChicaPC-Shield.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Wed Oct 30 14:57:41 2024, mtime=Wed Oct 30 14:57:41 2024, atime=Thu Apr 4 17:51:30 2013, length=973448, window=hide
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ChicaLogic\ChicaPC-Shield\Uninstall ChicaPC-Shield.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Wed Oct 30 14:57:40 2024, mtime=Wed Oct 30 14:57:40 2024, atime=Wed Oct 30 14:57:01 2024, length=712264, window=hide
|
dropped
|
||
C:\Users\Public\Desktop\ChicaPC-Shield.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Wed Oct 30 14:57:41 2024, mtime=Wed Oct 30 14:57:42 2024, atime=Thu Apr 4 17:51:30 2013, length=973448, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-93AED.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-93AED.tmp\_isetup\_shfoldr.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-93AED.tmp\mbam.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DF2964631E0BFA171F.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DF49A45B89983BB0A7.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DF9084460160876095.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
C:\Windows\System32\drivers\is-VCK25.tmp
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\system32\drivers\cpcs.sys (copy)
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
There are 82 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\regsvr32.exe
|
"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\mbamext.dll"
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe
|
"C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe" /starttrial
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe
|
"C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe" /install /silent
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe
|
"C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe"
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe
|
"C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe" /update
|
||
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe
|
"C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe"
|
||
C:\Users\user\Desktop\chica-pc-shield-1-75-0-1300-en-win.exe
|
"C:\Users\user\Desktop\chica-pc-shield-1-75-0-1300-en-win.exe"
|
||
C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp
|
"C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp" /SL5="$20430,8630815,54272,C:\Users\user\Desktop\chica-pc-shield-1-75-0-1300-en-win.exe"
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\ssubtmr6.dll"
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\vbalsgrid6.ocx"
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
regsvr32.exe /s "C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\ssubtmr6.dll"
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
regsvr32.exe /s "C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\vbalsgrid6.ocx"
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
regsvr32.exe /s "C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\ssubtmr6.dll"
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
regsvr32.exe /s "C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\vbalsgrid6.ocx"
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
regsvr32.exe /s "C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\ssubtmr6.dll"
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
regsvr32.exe /s "C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\vbalsgrid6.ocx"
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://best-pc.co.kr
|
unknown
|
||
http://cdn.static.mal
|
unknown
|
||
http://cdn.static.malwarebytes.org/clie
|
unknown
|
||
http://downloads.malwarebytes.org/mbam-download.phpon
|
unknown
|
||
http://www.aimp.ru
|
unknown
|
||
http://www.chicalogic.com
|
unknown
|
||
http://cdn.static.malwareb
|
unknown
|
||
http://data-cdn.mbamupdates.com/v1/custom/chicalogic/version.chk
|
65.9.66.84
|
||
http://77.78.240.87/ebb.php
|
unknown
|
||
http://xml.org/sax/features/namespace-prefixes
|
unknown
|
||
http://wfef5.mine.nu/config.asp
|
unknown
|
||
http://www.malwarebytes.org
|
unknown
|
||
http://cdn.static.malwarebytes.org/client_resources/1.7/images/StartupLite_64x64.png
|
unknown
|
||
http://www.malwarebytes.oY
|
unknown
|
||
http://xml.org/sax/features/string-interning
|
unknown
|
||
http://www.ntkrnl.comy
|
unknown
|
||
http://www.chicalogic.com/pc-shield-rew
|
unknown
|
||
http://182.237.1.106:333/32.exe
|
unknown
|
||
http://www.GoCasino.com11
|
unknown
|
||
http://www.6071.com/
|
unknown
|
||
http://topagacilaboratuari.com/topagaci.com
|
unknown
|
||
http://link0125baixa2010.fromru.com/arroxa.exe
|
unknown
|
||
http://cha.91mt.com/asp/xg.asp
|
unknown
|
||
http://www.ntkrnl.com
|
unknown
|
||
http://www.go2000.cn.&
|
unknown
|
||
http://www.malwarebytes.org/products/file
|
unknown
|
||
http://www.malwarebytes.or
|
unknown
|
||
http://www.malwarebytes.org/products/mbar
|
unknown
|
||
http://www.zippay.ru/robo-pay.php?lang=
|
unknown
|
||
http://www.abyssmedia.com
|
unknown
|
||
http://www.grandesgans.com/Vista.comr.
|
unknown
|
||
http://cdn.static.malwarebytes.org/client_resources/1.7/images/FileAssassin_64x64.png
|
unknown
|
||
http://www.heaventools.com)
|
unknown
|
||
http://bsalsa.com/
|
unknown
|
||
http://www.appinf.com/features/no-whitespace-in-element-content
|
unknown
|
||
http://www.innosetup.com/
|
unknown
|
||
http://saskentbbq.com/sasmate
|
unknown
|
||
http://www.baidu.com
|
unknown
|
||
http://www.emule-project.net
|
unknown
|
||
http://www.malwarebytes.org/products/fileass
|
unknown
|
||
http://www.contoso.com/PostAccepter.aspxQ5
|
unknown
|
||
http://www.malwarebytes.org/products
|
unknown
|
||
http://www.Parodieront.com
|
unknown
|
||
http://www.malwarebytes.org/products/fileassassin
|
unknown
|
||
http://www.abyssmedia.comz
|
unknown
|
||
http://www.super-ec.cnhttp://wghai.com/echttp://qsyou.com
|
unknown
|
||
http://xdinheirox.rememberit.com.au/
|
unknown
|
||
http://www.abyssmedia.comion
|
unknown
|
||
http://cdn.static.malwareby
|
unknown
|
||
http://www.malwarebytes.org/products/fil
|
unknown
|
||
http://anthneic.blogspot.com/
|
unknown
|
||
http://www.malwarebytes.org/products/
|
unknown
|
||
http://as.starware.com
|
unknown
|
||
http://www.go2000.cn
|
unknown
|
||
http://cdn.static.malwarebytes.org/client_resources/1.7/images/Chameleon_64x64.png
|
unknown
|
||
http://www.niudoudou.com/web/download/
|
unknown
|
||
http://data-cdn.mbamupdates.com/v0/clients/chicalogic/mbam.check.program
|
65.9.66.84
|
||
http://www.qqceo.net
|
unknown
|
||
http://cdn.static.malwa
|
unknown
|
||
http://geral.gratixhost.com.br/publicidade/publicidade.js
|
unknown
|
||
http://cdn.static.malwarebytes.org/client_r
|
unknown
|
||
http://http.proxy.icq.com/hello
|
unknown
|
||
http://wara6.homeftp.org/c
|
unknown
|
||
http://xml.org/sax/features/validation
|
unknown
|
||
http://cdn.static.malwarebytes.org/client_resources/1.7/images/anti_rootkit_64x64.png
|
unknown
|
||
Http://WwW.YlmF.CoM
|
unknown
|
||
http://data-cdn.mbamupdates.com/v1/news/chicalogic/version.chk
|
65.9.66.84
|
||
http://xml.org/sax/properties/lexical-handler
|
unknown
|
||
http://www.appinf.com/features/enable-partial-reads
|
unknown
|
||
http://www.jetswap.comD
|
unknown
|
||
http://link0125baixa2010.fromru.com/arroxa.exeC:
|
unknown
|
||
http://wsy539.myrice.com
|
unknown
|
||
http://www.cookst.com/sentry/api/20110306.exeW
|
unknown
|
||
http://cdn.stat
|
unknown
|
||
http://w.clic
|
unknown
|
||
http://www.chukotka.kz/cache/msn.php?id=0
|
unknown
|
||
http://www.ww-xxooxx-ch.net
|
unknown
|
||
http://redirecionamentosb.com/sw4.packer
|
unknown
|
||
http://www.desksave.de
|
unknown
|
||
http://cdn.static.malwareb-
|
unknown
|
||
http://www.ankord.com/)
|
unknown
|
||
http://redirecionamentosb.com/sw4.pac
|
unknown
|
||
http://xml.org/sax/features/external-parameter-entities
|
unknown
|
||
http://www.malwarebytes.org/products/startuplite
|
unknown
|
||
http://www.malwarebytes.o
|
unknown
|
||
http://data-cdn.mbamupdates.com/v1/config/chicalogic/version.chk
|
65.9.66.84
|
||
http://www.w3.
|
unknown
|
||
http://d1.kuai8.com
|
unknown
|
||
http://www.appinf.com/features/no-whitespace-in-element-contenthttp://xml.org/sax/features/validatio
|
unknown
|
||
http://www.eyuyan.com)
|
unknown
|
||
http://sms911.ru
|
unknown
|
||
http://b.ez173.com/
|
unknown
|
||
http://www.best-pc.co.kr
|
unknown
|
||
http://www.grandesgans.com/Vista.com
|
unknown
|
||
http://www.8es.cn/code/adview_pic.php
|
unknown
|
||
http://www.pdfforge.org/
|
unknown
|
||
http://www.czsoft.go1.icpcn.com/
|
unknown
|
||
http://www.a0?a.co0
|
unknown
|
||
http://c.ez173.com/
|
unknown
|
||
http://www.GoCasino.com
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
data-cdn.mbamupdates.com
|
65.9.66.84
|
||
edge.data-cdn.mbamupdates.com
|
unknown
|
||
hw.data-cdn.mbamupdates.com
|
unknown
|
||
llnw.data-cdn.mbamupdates.com
|
unknown
|
||
stats.mbamupdates.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
65.9.66.84
|
data-cdn.mbamupdates.com
|
United States
|
||
65.9.66.107
|
unknown
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AllFilesystemObjects\shellex\ContextMenuHandlers\MBAMShlExt
|
NULL
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\CPCSProtector\Instances
|
DefaultInstance
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\CPCSProtector\Instances\CPCSProtector Instance
|
Altitude
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\CPCSProtector\Instances\CPCSProtector Instance
|
Flags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
advancedheuristics
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
downloadprogram
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
hidereg
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
detectp2p
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
detectpum
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
detectpup
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
updatewarn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
updatewarndays
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
useproxy
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
useauthentication
|
||
HKEY_CURRENT_USER\SOFTWARE\ChicaPC-Shield
|
alwaysscanfiles
|
||
HKEY_CURRENT_USER\SOFTWARE\ChicaPC-Shield
|
alwaysscanheuristics
|
||
HKEY_CURRENT_USER\SOFTWARE\ChicaPC-Shield
|
alwaysscanmemory
|
||
HKEY_CURRENT_USER\SOFTWARE\ChicaPC-Shield
|
alwaysscanregistry
|
||
HKEY_CURRENT_USER\SOFTWARE\ChicaPC-Shield
|
alwaysscanstartups
|
||
HKEY_CURRENT_USER\SOFTWARE\ChicaPC-Shield
|
autosavelog
|
||
HKEY_CURRENT_USER\SOFTWARE\ChicaPC-Shield
|
openlog
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
contextmenu
|
||
HKEY_CURRENT_USER\SOFTWARE\ChicaPC-Shield
|
defaultscan
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
reportthreats
|
||
HKEY_CURRENT_USER\SOFTWARE\ChicaPC-Shield
|
terminateie
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
startwithwindows
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
startfsdisabled
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
startipdisabled
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
silentipmode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
autoquarantine
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
notifyinstallprogram
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
trialpromptshown
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
autoquarantinenotify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
alwaysscanarchives
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\cpcs.exe
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\cpcs.exe
|
Path
|
||
HKEY_CURRENT_USER\SOFTWARE\ChicaPC-Shield
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
InstallPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
|
ChicaPC-Shield
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
dbdate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
dbversion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
programversion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
programbuild
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
|
Inno Setup: Setup Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
|
Inno Setup: App Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
|
Inno Setup: Icon Group
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
|
Inno Setup: User
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
|
Inno Setup: Selected Tasks
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
|
Inno Setup: Deselected Tasks
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
|
Inno Setup: Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
|
DisplayIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
|
QuietUninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
|
MajorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
|
MinorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
|
GlobalAssocChangedCounter
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\MBAMShlExt
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MBAMExt.MBAMShlExt.1
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MBAMExt.MBAMShlExt.1\CLSID
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MBAMExt.MBAMShlExt
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MBAMExt.MBAMShlExt\CLSID
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MBAMExt.MBAMShlExt\CurVer
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{57CE581A-0CB6-4266-9CA0-19364C90A0B3}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{57CE581A-0CB6-4266-9CA0-19364C90A0B3}\ProgID
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{57CE581A-0CB6-4266-9CA0-19364C90A0B3}\VersionIndependentProgID
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{57CE581A-0CB6-4266-9CA0-19364C90A0B3}\InprocServer32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{57CE581A-0CB6-4266-9CA0-19364C90A0B3}\InprocServer32
|
ThreadingModel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{57CE581A-0CB6-4266-9CA0-19364C90A0B3}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{AFF1A83B-6C83-4342-8E68-1648DE06CB65}\1.0
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{AFF1A83B-6C83-4342-8E68-1648DE06CB65}\1.0\FLAGS
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{AFF1A83B-6C83-4342-8E68-1648DE06CB65}\1.0\0\win64
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{AFF1A83B-6C83-4342-8E68-1648DE06CB65}\1.0\HELPDIR
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{015FAC74-0374-494A-A02D-316D562C0FCE}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{015FAC74-0374-494A-A02D-316D562C0FCE}\ProxyStubClsid32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{015FAC74-0374-494A-A02D-316D562C0FCE}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{015FAC74-0374-494A-A02D-316D562C0FCE}\TypeLib
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{015FAC74-0374-494A-A02D-316D562C0FCE}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{015FAC74-0374-494A-A02D-316D562C0FCE}\ProxyStubClsid32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{015FAC74-0374-494A-A02D-316D562C0FCE}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{015FAC74-0374-494A-A02D-316D562C0FCE}\TypeLib
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{71A2702D-C7D8-11D2-BEF8-525400DFB47A}\1.0
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{71A2702D-C7D8-11D2-BEF8-525400DFB47A}\1.0\FLAGS
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{71A2702D-C7D8-11D2-BEF8-525400DFB47A}\1.0\0\win32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{71A2702D-C7D8-11D2-BEF8-525400DFB47A}\1.0\HELPDIR
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}\ProxyStubClsid32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}\ProxyStubClsid32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}\ProxyStubClsid32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}\ProxyStubClsid32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}\ProxyStubClsid32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}\ProxyStubClsid32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}\ProxyStubClsid32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A27034-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A27034-C7D8-11D2-BEF8-525400DFB47A}\ProgID
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A27034-C7D8-11D2-BEF8-525400DFB47A}\InprocServer32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A27034-C7D8-11D2-BEF8-525400DFB47A}\InprocServer32
|
ThreadingModel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A27034-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A27034-C7D8-11D2-BEF8-525400DFB47A}\VERSION
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.CTimer
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.CTimer\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}\ProxyStubClsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}\ProxyStubClsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A2702F-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A2702F-C7D8-11D2-BEF8-525400DFB47A}\ProgID
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A2702F-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A2702F-C7D8-11D2-BEF8-525400DFB47A}\VERSION
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.ISubclass
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.ISubclass\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}\ProxyStubClsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A27032-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A27032-C7D8-11D2-BEF8-525400DFB47A}\ProgID
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A27032-C7D8-11D2-BEF8-525400DFB47A}\InprocServer32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A27032-C7D8-11D2-BEF8-525400DFB47A}\InprocServer32
|
ThreadingModel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A27032-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A27032-C7D8-11D2-BEF8-525400DFB47A}\VERSION
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.GSubclass
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.GSubclass\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{DE8CE233-DD83-481D-844C-C07B96589D3A}\1.1
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{DE8CE233-DD83-481D-844C-C07B96589D3A}\1.1\FLAGS
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{DE8CE233-DD83-481D-844C-C07B96589D3A}\1.1\0\win32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{DE8CE233-DD83-481D-844C-C07B96589D3A}\1.1\HELPDIR
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}\ProxyStubClsid32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}\TypeLib
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}\ProxyStubClsid32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}\TypeLib
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}\ProxyStubClsid32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}\TypeLib
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{464D3E06-7D5B-416F-A6EE-0FFB1A5E931B}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{464D3E06-7D5B-416F-A6EE-0FFB1A5E931B}\ProxyStubClsid32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{464D3E06-7D5B-416F-A6EE-0FFB1A5E931B}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{464D3E06-7D5B-416F-A6EE-0FFB1A5E931B}\TypeLib
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{464D3E06-7D5B-416F-A6EE-0FFB1A5E931B}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{459A91BC-193F-4A70-959C-BFF69D781142}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{459A91BC-193F-4A70-959C-BFF69D781142}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EDFD7DF-030D-4144-952E-9D7D86691CDB}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EDFD7DF-030D-4144-952E-9D7D86691CDB}\ProxyStubClsid32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{1EDFD7DF-030D-4144-952E-9D7D86691CDB}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{1EDFD7DF-030D-4144-952E-9D7D86691CDB}\ProxyStubClsid32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC90EAA6-69B8-4DE4-9A7B-5B2C5B3FEACD}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC90EAA6-69B8-4DE4-9A7B-5B2C5B3FEACD}\ProgID
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC90EAA6-69B8-4DE4-9A7B-5B2C5B3FEACD}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC90EAA6-69B8-4DE4-9A7B-5B2C5B3FEACD}\VERSION
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.IGridCellOwnerDraw
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.IGridCellOwnerDraw\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66718B8E-A382-4FE2-AA7A-926F9D8C4621}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66718B8E-A382-4FE2-AA7A-926F9D8C4621}\ProxyStubClsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66718B8E-A382-4FE2-AA7A-926F9D8C4621}\ProxyStubClsid32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66718B8E-A382-4FE2-AA7A-926F9D8C4621}\Forward
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{459A91BC-193F-4A70-959C-BFF69D781142}\ProxyStubClsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9BD3A001-42A2-491E-AACA-9512F6CF4CDB}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9BD3A001-42A2-491E-AACA-9512F6CF4CDB}\ProgID
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9BD3A001-42A2-491E-AACA-9512F6CF4CDB}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9BD3A001-42A2-491E-AACA-9512F6CF4CDB}\VERSION
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridCell
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridCell\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E9FB490-7EE2-46E9-B52A-9DE91DD218F4}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E9FB490-7EE2-46E9-B52A-9DE91DD218F4}\ProxyStubClsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E9FB490-7EE2-46E9-B52A-9DE91DD218F4}\ProxyStubClsid32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E9FB490-7EE2-46E9-B52A-9DE91DD218F4}\Forward
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D2129738-6A78-4BCB-915A-412982CAA23D}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D2129738-6A78-4BCB-915A-412982CAA23D}\ProgID
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D2129738-6A78-4BCB-915A-412982CAA23D}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D2129738-6A78-4BCB-915A-412982CAA23D}\VERSION
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridSortObject
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridSortObject\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BC39A57D-DF2C-45B4-BFFD-7D55E911C1B2}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BC39A57D-DF2C-45B4-BFFD-7D55E911C1B2}\ProxyStubClsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BC39A57D-DF2C-45B4-BFFD-7D55E911C1B2}\ProxyStubClsid32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BC39A57D-DF2C-45B4-BFFD-7D55E911C1B2}\Forward
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}\ProxyStubClsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5DA1F2B-B2BF-4DFC-BC9A-439133543A67}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5DA1F2B-B2BF-4DFC-BC9A-439133543A67}\ProgID
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5DA1F2B-B2BF-4DFC-BC9A-439133543A67}\InprocServer32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5DA1F2B-B2BF-4DFC-BC9A-439133543A67}\InprocServer32
|
ThreadingModel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5DA1F2B-B2BF-4DFC-BC9A-439133543A67}\Control
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5DA1F2B-B2BF-4DFC-BC9A-439133543A67}\ToolboxBitmap32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5DA1F2B-B2BF-4DFC-BC9A-439133543A67}\MiscStatus
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5DA1F2B-B2BF-4DFC-BC9A-439133543A67}\MiscStatus\1
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5DA1F2B-B2BF-4DFC-BC9A-439133543A67}\TypeLib
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5DA1F2B-B2BF-4DFC-BC9A-439133543A67}\VERSION
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.vbalGrid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.vbalGrid\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}\ProxyStubClsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EDFD7DF-030D-4144-952E-9D7D86691CDB}\ProxyStubClsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{459A91BC-193F-4A70-959C-BFF69D781142}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{464D3E06-7D5B-416F-A6EE-0FFB1A5E931B}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EDFD7DF-030D-4144-952E-9D7D86691CDB}
|
NULL
|
||
HKEY_CURRENT_USER\SOFTWARE\ChicaPC-Shield
|
selectedrives
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
trialended
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
SchedulerQueue
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
|
trialpromptshown
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.CTimer
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.CTimer\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.ISubclass
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.ISubclass\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.GSubclass
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.GSubclass\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.IGridCellOwnerDraw
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.IGridCellOwnerDraw\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridCell
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridCell\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridSortObject
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridSortObject\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.vbalGrid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.vbalGrid\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{464D3E06-7D5B-416F-A6EE-0FFB1A5E931B}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{459A91BC-193F-4A70-959C-BFF69D781142}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EDFD7DF-030D-4144-952E-9D7D86691CDB}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{459A91BC-193F-4A70-959C-BFF69D781142}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{464D3E06-7D5B-416F-A6EE-0FFB1A5E931B}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EDFD7DF-030D-4144-952E-9D7D86691CDB}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_USERS.DEFAULT\Software\ChicaPC-Shield
|
alwaysscanfiles
|
||
HKEY_USERS.DEFAULT\Software\ChicaPC-Shield
|
alwaysscanheuristics
|
||
HKEY_USERS.DEFAULT\Software\ChicaPC-Shield
|
alwaysscanmemory
|
||
HKEY_USERS.DEFAULT\Software\ChicaPC-Shield
|
alwaysscanregistry
|
||
HKEY_USERS.DEFAULT\Software\ChicaPC-Shield
|
alwaysscanstartups
|
||
HKEY_USERS.DEFAULT\Software\ChicaPC-Shield
|
autosavelog
|
||
HKEY_USERS.DEFAULT\Software\ChicaPC-Shield
|
openlog
|
||
HKEY_USERS.DEFAULT\Software\ChicaPC-Shield
|
defaultscan
|
||
HKEY_USERS.DEFAULT\Software\ChicaPC-Shield
|
terminateie
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.CTimer
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.CTimer\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.ISubclass
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.ISubclass\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.GSubclass
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.GSubclass\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.IGridCellOwnerDraw
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.IGridCellOwnerDraw\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridCell
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridCell\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridSortObject
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridSortObject\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.vbalGrid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.vbalGrid\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{464D3E06-7D5B-416F-A6EE-0FFB1A5E931B}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{459A91BC-193F-4A70-959C-BFF69D781142}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EDFD7DF-030D-4144-952E-9D7D86691CDB}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{459A91BC-193F-4A70-959C-BFF69D781142}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{464D3E06-7D5B-416F-A6EE-0FFB1A5E931B}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EDFD7DF-030D-4144-952E-9D7D86691CDB}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.CTimer
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.CTimer\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.ISubclass
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.ISubclass\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.GSubclass
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.GSubclass\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.IGridCellOwnerDraw
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.IGridCellOwnerDraw\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridCell
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridCell\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridSortObject
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridSortObject\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.vbalGrid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.vbalGrid\Clsid
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{464D3E06-7D5B-416F-A6EE-0FFB1A5E931B}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{459A91BC-193F-4A70-959C-BFF69D781142}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EDFD7DF-030D-4144-952E-9D7D86691CDB}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{459A91BC-193F-4A70-959C-BFF69D781142}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{464D3E06-7D5B-416F-A6EE-0FFB1A5E931B}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EDFD7DF-030D-4144-952E-9D7D86691CDB}
|
NULL
|
There are 330 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
8334000
|
heap
|
page read and write
|
||
4663000
|
heap
|
page read and write
|
||
8271000
|
heap
|
page read and write
|
||
847A000
|
heap
|
page read and write
|
||
E02A000
|
heap
|
page read and write
|
||
322E000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
326B000
|
heap
|
page read and write
|
||
71A000
|
heap
|
page read and write
|
||
3553000
|
heap
|
page read and write
|
||
6F8B1000
|
unkown
|
page readonly
|
||
648000
|
heap
|
page read and write
|
||
3217000
|
heap
|
page read and write
|
||
E3AA87E000
|
stack
|
page read and write
|
||
313F000
|
heap
|
page read and write
|
||
A357000
|
heap
|
page read and write
|
||
3293000
|
heap
|
page read and write
|
||
A60A000
|
heap
|
page read and write
|
||
1E5BCE50000
|
trusted library allocation
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
65A000
|
heap
|
page read and write
|
||
31BC000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
DDFE000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
7A3000
|
heap
|
page read and write
|
||
71A000
|
heap
|
page read and write
|
||
DFE7000
|
heap
|
page read and write
|
||
21A8000
|
heap
|
page read and write
|
||
A1C1000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
707A000
|
heap
|
page read and write
|
||
356E000
|
heap
|
page read and write
|
||
150000
|
heap
|
page read and write
|
||
325F000
|
heap
|
page read and write
|
||
1E5B782B000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
4D9F000
|
stack
|
page read and write
|
||
D450000
|
heap
|
page read and write
|
||
3225000
|
heap
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
D10C000
|
heap
|
page read and write
|
||
3764000
|
heap
|
page read and write
|
||
DD4A000
|
heap
|
page read and write
|
||
4D1E000
|
stack
|
page read and write
|
||
215B000
|
heap
|
page read and write
|
||
33A1000
|
heap
|
page read and write
|
||
6BCC3000
|
unkown
|
page readonly
|
||
2124000
|
direct allocation
|
page read and write
|
||
E112000
|
heap
|
page read and write
|
||
A3C000
|
stack
|
page read and write
|
||
AA4E000
|
heap
|
page read and write
|
||
A093000
|
heap
|
page read and write
|
||
7A3000
|
heap
|
page read and write
|
||
6BD4B000
|
unkown
|
page readonly
|
||
500000
|
heap
|
page read and write
|
||
A48C000
|
heap
|
page read and write
|
||
A1FE000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
751000
|
heap
|
page read and write
|
||
E3AACFE000
|
unkown
|
page readonly
|
||
3565000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
6B5000
|
heap
|
page read and write
|
||
1E5BCD30000
|
trusted library allocation
|
page read and write
|
||
643000
|
heap
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
334B000
|
heap
|
page read and write
|
||
33A1000
|
heap
|
page read and write
|
||
6DD000
|
heap
|
page read and write
|
||
DD8C000
|
heap
|
page read and write
|
||
3114000
|
heap
|
page read and write
|
||
1E5B7913000
|
heap
|
page read and write
|
||
734000
|
heap
|
page read and write
|
||
31C9000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
31C1000
|
heap
|
page read and write
|
||
A5C7000
|
heap
|
page read and write
|
||
DF4E000
|
heap
|
page read and write
|
||
AF8E000
|
heap
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
6BD48000
|
unkown
|
page read and write
|
||
DFD6000
|
heap
|
page read and write
|
||
2158000
|
heap
|
page read and write
|
||
1E5B8000000
|
heap
|
page read and write
|
||
A55F000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
2128000
|
direct allocation
|
page read and write
|
||
46EC000
|
heap
|
page read and write
|
||
2159000
|
heap
|
page read and write
|
||
A411000
|
heap
|
page read and write
|
||
1E5BCCD0000
|
trusted library allocation
|
page read and write
|
||
417C000
|
heap
|
page read and write
|
||
D7D0000
|
heap
|
page read and write
|
||
1E5BCC60000
|
trusted library allocation
|
page read and write
|
||
3316000
|
heap
|
page read and write
|
||
D604000
|
heap
|
page read and write
|
||
DFF8000
|
heap
|
page read and write
|
||
AB10000
|
heap
|
page read and write
|
||
751000
|
heap
|
page read and write
|
||
31D4000
|
heap
|
page read and write
|
||
33A3000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
751000
|
heap
|
page read and write
|
||
3221000
|
heap
|
page read and write
|
||
313A000
|
heap
|
page read and write
|
||
323C000
|
stack
|
page read and write
|
||
DCC4000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
4270000
|
heap
|
page read and write
|
||
3287000
|
heap
|
page read and write
|
||
607000
|
unkown
|
page readonly
|
||
33CF000
|
heap
|
page read and write
|
||
3779000
|
heap
|
page read and write
|
||
33A2000
|
heap
|
page read and write
|
||
A4D7000
|
heap
|
page read and write
|
||
D7AE000
|
heap
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
A3D7000
|
heap
|
page read and write
|
||
E3A9CFE000
|
unkown
|
page readonly
|
||
72F000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
D80C000
|
heap
|
page read and write
|
||
2130000
|
direct allocation
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
215C000
|
direct allocation
|
page read and write
|
||
3571000
|
heap
|
page read and write
|
||
A6BE000
|
heap
|
page read and write
|
||
943000
|
unkown
|
page readonly
|
||
72F000
|
stack
|
page read and write
|
||
A38B000
|
heap
|
page read and write
|
||
1E5BCE40000
|
heap
|
page read and write
|
||
376D000
|
heap
|
page read and write
|
||
42F0000
|
trusted library allocation
|
page read and write
|
||
499000
|
unkown
|
page write copy
|
||
21A8000
|
heap
|
page read and write
|
||
643000
|
heap
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
734000
|
heap
|
page read and write
|
||
A0FC000
|
heap
|
page read and write
|
||
DD52000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
A6F8000
|
heap
|
page read and write
|
||
43E000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
728000
|
heap
|
page read and write
|
||
3283000
|
heap
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
7EB000
|
stack
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
E06C000
|
heap
|
page read and write
|
||
6BB51000
|
unkown
|
page execute read
|
||
734000
|
heap
|
page read and write
|
||
643000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
D581000
|
heap
|
page read and write
|
||
21AB000
|
heap
|
page read and write
|
||
A30F000
|
heap
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
213C000
|
direct allocation
|
page read and write
|
||
21A9000
|
heap
|
page read and write
|
||
64B000
|
heap
|
page read and write
|
||
A621000
|
heap
|
page read and write
|
||
1E5BD030000
|
trusted library allocation
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
2184000
|
direct allocation
|
page read and write
|
||
215A000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
3375000
|
heap
|
page read and write
|
||
1E5BD090000
|
remote allocation
|
page read and write
|
||
3221000
|
heap
|
page read and write
|
||
1E5BCE1F000
|
heap
|
page read and write
|
||
6F850000
|
unkown
|
page readonly
|
||
3828000
|
heap
|
page read and write
|
||
21A8000
|
heap
|
page read and write
|
||
DCE6000
|
heap
|
page read and write
|
||
D1D1000
|
heap
|
page read and write
|
||
2153000
|
heap
|
page read and write
|
||
D472000
|
heap
|
page read and write
|
||
649000
|
heap
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
33A1000
|
heap
|
page read and write
|
||
AF8E000
|
heap
|
page read and write
|
||
1E5BCCF0000
|
trusted library allocation
|
page read and write
|
||
325A000
|
heap
|
page read and write
|
||
32C8000
|
heap
|
page read and write
|
||
D30A000
|
heap
|
page read and write
|
||
A44A000
|
heap
|
page read and write
|
||
3224000
|
heap
|
page read and write
|
||
BF7E000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
1E5BCC70000
|
trusted library allocation
|
page read and write
|
||
E06C000
|
heap
|
page read and write
|
||
21A3000
|
heap
|
page read and write
|
||
D427000
|
heap
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
DD9E000
|
heap
|
page read and write
|
||
1E5BCE2C000
|
heap
|
page read and write
|
||
E08E000
|
heap
|
page read and write
|
||
7CD000
|
stack
|
page read and write
|
||
A673000
|
heap
|
page read and write
|
||
303A000
|
heap
|
page read and write
|
||
4160000
|
trusted library allocation
|
page read and write
|
||
3570000
|
trusted library allocation
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
A2ED000
|
heap
|
page read and write
|
||
1E5B8100000
|
heap
|
page read and write
|
||
46E5000
|
heap
|
page read and write
|
||
E00A000
|
heap
|
page read and write
|
||
23F0000
|
direct allocation
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
46ED000
|
heap
|
page read and write
|
||
3560000
|
heap
|
page read and write
|
||
33AA000
|
heap
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
69B000
|
heap
|
page read and write
|
||
734000
|
heap
|
page read and write
|
||
3852000
|
heap
|
page read and write
|
||
356F000
|
stack
|
page read and write
|
||
2153000
|
heap
|
page read and write
|
||
3111000
|
heap
|
page read and write
|
||
DDD0000
|
heap
|
page read and write
|
||
21A3000
|
heap
|
page read and write
|
||
A536000
|
heap
|
page read and write
|
||
3231000
|
heap
|
page read and write
|
||
AA48000
|
heap
|
page read and write
|
||
DFC6000
|
heap
|
page read and write
|
||
3217000
|
heap
|
page read and write
|
||
2290000
|
direct allocation
|
page read and write
|
||
6534000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
D814000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
21A8000
|
heap
|
page read and write
|
||
649000
|
heap
|
page read and write
|
||
3291000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
A336000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
354D000
|
heap
|
page read and write
|
||
3653000
|
heap
|
page read and write
|
||
9F2B000
|
heap
|
page read and write
|
||
6BD4B000
|
unkown
|
page readonly
|
||
69C000
|
heap
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
74D000
|
heap
|
page read and write
|
||
E3A99FC000
|
stack
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
46EB000
|
heap
|
page read and write
|
||
DD8C000
|
heap
|
page read and write
|
||
4188000
|
heap
|
page read and write
|
||
46E7000
|
heap
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
A5DD000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
64A000
|
heap
|
page read and write
|
||
3286000
|
heap
|
page read and write
|
||
31F5000
|
heap
|
page read and write
|
||
33A1000
|
heap
|
page read and write
|
||
E3AA0FE000
|
unkown
|
page readonly
|
||
B056000
|
heap
|
page read and write
|
||
9E70000
|
heap
|
page read and write
|
||
A1CD000
|
heap
|
page read and write
|
||
31D9000
|
heap
|
page read and write
|
||
CFD9000
|
heap
|
page read and write
|
||
7871000
|
heap
|
page read and write
|
||
A511000
|
heap
|
page read and write
|
||
3332000
|
heap
|
page read and write
|
||
DDBA000
|
heap
|
page read and write
|
||
AF74000
|
heap
|
page read and write
|
||
A5DD000
|
heap
|
page read and write
|
||
A4CC000
|
heap
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
AC8D000
|
heap
|
page read and write
|
||
3175000
|
heap
|
page read and write
|
||
DE34000
|
heap
|
page read and write
|
||
1E5BCD63000
|
trusted library allocation
|
page read and write
|
||
3577000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
DFC4000
|
heap
|
page read and write
|
||
4230000
|
trusted library allocation
|
page read and write
|
||
E3AA17E000
|
stack
|
page read and write
|
||
A08B000
|
heap
|
page read and write
|
||
3291000
|
heap
|
page read and write
|
||
1E5BCEEC000
|
heap
|
page read and write
|
||
58A000
|
heap
|
page read and write
|
||
1E5B8C60000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
3770000
|
heap
|
page read and write
|
||
5070000
|
heap
|
page read and write
|
||
748000
|
heap
|
page read and write
|
||
311D000
|
heap
|
page read and write
|
||
21A3000
|
heap
|
page read and write
|
||
3126000
|
heap
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
2158000
|
heap
|
page read and write
|
||
2150000
|
direct allocation
|
page read and write
|
||
E3AAAFE000
|
unkown
|
page readonly
|
||
A5C7000
|
heap
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
DEF8000
|
heap
|
page read and write
|
||
31EF000
|
heap
|
page read and write
|
||
3853000
|
heap
|
page read and write
|
||
DFC4000
|
heap
|
page read and write
|
||
3D26000
|
heap
|
page read and write
|
||
2153000
|
heap
|
page read and write
|
||
A220000
|
heap
|
page read and write
|
||
6BB50000
|
unkown
|
page readonly
|
||
A709000
|
heap
|
page read and write
|
||
A070000
|
heap
|
page read and write
|
||
8E0000
|
unkown
|
page readonly
|
||
3225000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
9EB1000
|
heap
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
3298000
|
heap
|
page read and write
|
||
80E000
|
stack
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
1E5B788F000
|
heap
|
page read and write
|
||
2158000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
6BD3A000
|
unkown
|
page write copy
|
||
21AB000
|
heap
|
page read and write
|
||
1EA5000
|
heap
|
page read and write
|
||
336F000
|
heap
|
page read and write
|
||
328D000
|
heap
|
page read and write
|
||
88A000
|
heap
|
page read and write
|
||
3114000
|
heap
|
page read and write
|
||
3391000
|
heap
|
page read and write
|
||
A514000
|
heap
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
4760000
|
heap
|
page read and write
|
||
A54E000
|
heap
|
page read and write
|
||
620000
|
unkown
|
page readonly
|
||
313A000
|
heap
|
page read and write
|
||
4220000
|
heap
|
page read and write
|
||
A55F000
|
heap
|
page read and write
|
||
64A000
|
heap
|
page read and write
|
||
215B000
|
heap
|
page read and write
|
||
A248000
|
heap
|
page read and write
|
||
A39A000
|
heap
|
page read and write
|
||
1E5BCD20000
|
trusted library allocation
|
page read and write
|
||
3AD7000
|
heap
|
page read and write
|
||
3846000
|
heap
|
page read and write
|
||
DC0A000
|
heap
|
page read and write
|
||
3291000
|
heap
|
page read and write
|
||
DF80000
|
heap
|
page read and write
|
||
A166000
|
heap
|
page read and write
|
||
A5A2000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
33A1000
|
heap
|
page read and write
|
||
23F0000
|
direct allocation
|
page read and write
|
||
A259000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
2159000
|
heap
|
page read and write
|
||
3762000
|
heap
|
page read and write
|
||
DC61000
|
heap
|
page read and write
|
||
CDB6000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
376C000
|
heap
|
page read and write
|
||
A5C7000
|
heap
|
page read and write
|
||
3349000
|
heap
|
page read and write
|
||
33D4000
|
heap
|
page read and write
|
||
2158000
|
heap
|
page read and write
|
||
31E0000
|
trusted library allocation
|
page read and write
|
||
1E5B7902000
|
heap
|
page read and write
|
||
321D000
|
heap
|
page read and write
|
||
A294000
|
heap
|
page read and write
|
||
9734000
|
heap
|
page read and write
|
||
D757000
|
heap
|
page read and write
|
||
6BCC3000
|
unkown
|
page readonly
|
||
31B5000
|
heap
|
page read and write
|
||
32FB000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
21A9000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
2158000
|
heap
|
page read and write
|
||
328D000
|
heap
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
DF82000
|
heap
|
page read and write
|
||
D4B1000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
311D000
|
heap
|
page read and write
|
||
3396000
|
heap
|
page read and write
|
||
3760000
|
heap
|
page read and write
|
||
E3AA27E000
|
stack
|
page read and write
|
||
2250000
|
heap
|
page read and write
|
||
321D000
|
heap
|
page read and write
|
||
DC6E000
|
heap
|
page read and write
|
||
21A3000
|
heap
|
page read and write
|
||
D1A2000
|
heap
|
page read and write
|
||
40D000
|
unkown
|
page write copy
|
||
64E000
|
heap
|
page read and write
|
||
3223000
|
heap
|
page read and write
|
||
46DD000
|
heap
|
page read and write
|
||
2178000
|
direct allocation
|
page read and write
|
||
D61D000
|
heap
|
page read and write
|
||
A8F9000
|
heap
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
D799000
|
heap
|
page read and write
|
||
3217000
|
heap
|
page read and write
|
||
9F11000
|
heap
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
A852000
|
heap
|
page read and write
|
||
31B8000
|
heap
|
page read and write
|
||
4190000
|
heap
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
64B000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
A11D000
|
heap
|
page read and write
|
||
31D6000
|
heap
|
page read and write
|
||
40B000
|
unkown
|
page write copy
|
||
98F000
|
stack
|
page read and write
|
||
1E5B8391000
|
trusted library allocation
|
page read and write
|
||
A69D000
|
heap
|
page read and write
|
||
21A9000
|
heap
|
page read and write
|
||
1E5B7800000
|
heap
|
page read and write
|
||
A62F000
|
heap
|
page read and write
|
||
100B000
|
stack
|
page read and write
|
||
1FE000
|
stack
|
page read and write
|
||
649000
|
heap
|
page read and write
|
||
D4D3000
|
heap
|
page read and write
|
||
A3D4000
|
heap
|
page read and write
|
||
A1CB000
|
heap
|
page read and write
|
||
A01C000
|
heap
|
page read and write
|
||
A220000
|
heap
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
D28B000
|
heap
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
A217000
|
heap
|
page read and write
|
||
D6EC000
|
heap
|
page read and write
|
||
DDAE000
|
heap
|
page read and write
|
||
74D000
|
heap
|
page read and write
|
||
E0F3000
|
heap
|
page read and write
|
||
44A000
|
heap
|
page read and write
|
||
717000
|
heap
|
page read and write
|
||
296E000
|
stack
|
page read and write
|
||
1E5BCE40000
|
trusted library allocation
|
page read and write
|
||
987A000
|
heap
|
page read and write
|
||
33A3000
|
heap
|
page read and write
|
||
A4CC000
|
heap
|
page read and write
|
||
A5B5000
|
heap
|
page read and write
|
||
E01A000
|
heap
|
page read and write
|
||
3760000
|
heap
|
page read and write
|
||
324E000
|
heap
|
page read and write
|
||
1E5BCE55000
|
heap
|
page read and write
|
||
215A000
|
heap
|
page read and write
|
||
BC000
|
stack
|
page read and write
|
||
2187000
|
direct allocation
|
page read and write
|
||
3185000
|
heap
|
page read and write
|
||
DBA6000
|
heap
|
page read and write
|
||
3396000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
356A000
|
heap
|
page read and write
|
||
2120000
|
direct allocation
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
3777000
|
heap
|
page read and write
|
||
6BB51000
|
unkown
|
page execute read
|
||
A57A000
|
heap
|
page read and write
|
||
3C63000
|
heap
|
page read and write
|
||
3362000
|
heap
|
page read and write
|
||
316F000
|
heap
|
page read and write
|
||
339D000
|
heap
|
page read and write
|
||
D7F2000
|
heap
|
page read and write
|
||
DFC4000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
A514000
|
heap
|
page read and write
|
||
3560000
|
heap
|
page read and write
|
||
A5B8000
|
heap
|
page read and write
|
||
4184000
|
heap
|
page read and write
|
||
D6AC000
|
heap
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
A04E000
|
heap
|
page read and write
|
||
1E5BCF02000
|
heap
|
page read and write
|
||
2F7C000
|
stack
|
page read and write
|
||
40B000
|
unkown
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
A06B000
|
heap
|
page read and write
|
||
A086000
|
heap
|
page read and write
|
||
2168000
|
direct allocation
|
page read and write
|
||
32EF000
|
heap
|
page read and write
|
||
2B4E000
|
heap
|
page read and write
|
||
3148000
|
heap
|
page read and write
|
||
2BBD000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
319B000
|
heap
|
page read and write
|
||
335E000
|
heap
|
page read and write
|
||
E3A9AFE000
|
unkown
|
page readonly
|
||
2290000
|
direct allocation
|
page read and write
|
||
A073000
|
heap
|
page read and write
|
||
E114000
|
heap
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
E0F1000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
31B4000
|
heap
|
page read and write
|
||
46D4000
|
heap
|
page read and write
|
||
2C6D000
|
heap
|
page read and write
|
||
A0A4000
|
heap
|
page read and write
|
||
3151000
|
heap
|
page read and write
|
||
87B000
|
heap
|
page read and write
|
||
2BB3000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
32C5000
|
heap
|
page read and write
|
||
1E5BCDC0000
|
trusted library allocation
|
page read and write
|
||
31EF000
|
heap
|
page read and write
|
||
DCE6000
|
heap
|
page read and write
|
||
21A9000
|
heap
|
page read and write
|
||
1E5BCE00000
|
heap
|
page read and write
|
||
A701000
|
heap
|
page read and write
|
||
2178000
|
direct allocation
|
page read and write
|
||
99D6000
|
heap
|
page read and write
|
||
88F000
|
stack
|
page read and write
|
||
A3C0000
|
heap
|
page read and write
|
||
3196000
|
heap
|
page read and write
|
||
DDAE000
|
heap
|
page read and write
|
||
DCE0000
|
heap
|
page read and write
|
||
2159000
|
heap
|
page read and write
|
||
A09F000
|
heap
|
page read and write
|
||
DFB4000
|
heap
|
page read and write
|
||
215A000
|
heap
|
page read and write
|
||
E3AB4FE000
|
unkown
|
page readonly
|
||
3223000
|
heap
|
page read and write
|
||
D76B000
|
heap
|
page read and write
|
||
A073000
|
heap
|
page read and write
|
||
33AA000
|
heap
|
page read and write
|
||
A101000
|
heap
|
page read and write
|
||
21A8000
|
heap
|
page read and write
|
||
AC81000
|
heap
|
page read and write
|
||
46D7000
|
heap
|
page read and write
|
||
E3AAEFE000
|
unkown
|
page readonly
|
||
3111000
|
heap
|
page read and write
|
||
1E5B8015000
|
heap
|
page read and write
|
||
D77F000
|
heap
|
page read and write
|
||
E3A9BF9000
|
stack
|
page read and write
|
||
5B0000
|
unkown
|
page readonly
|
||
1E5BCD20000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
heap
|
page read and write
|
||
217C000
|
direct allocation
|
page read and write
|
||
46F2000
|
heap
|
page read and write
|
||
D6DB000
|
heap
|
page read and write
|
||
31FB000
|
heap
|
page read and write
|
||
1E5B7FA0000
|
trusted library section
|
page readonly
|
||
21D8000
|
direct allocation
|
page read and write
|
||
6BCD5000
|
unkown
|
page readonly
|
||
6E9000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
74B000
|
heap
|
page read and write
|
||
71A000
|
heap
|
page read and write
|
||
A094000
|
heap
|
page read and write
|
||
2F3B000
|
stack
|
page read and write
|
||
3397000
|
heap
|
page read and write
|
||
AA6F000
|
heap
|
page read and write
|
||
1EA0000
|
heap
|
page read and write
|
||
64A000
|
heap
|
page read and write
|
||
3291000
|
heap
|
page read and write
|
||
64B000
|
heap
|
page read and write
|
||
2158000
|
heap
|
page read and write
|
||
D66D000
|
heap
|
page read and write
|
||
A070000
|
heap
|
page read and write
|
||
9BA5000
|
heap
|
page read and write
|
||
3564000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
751000
|
heap
|
page read and write
|
||
D46E000
|
heap
|
page read and write
|
||
4D5E000
|
stack
|
page read and write
|
||
2B48000
|
heap
|
page read and write
|
||
DE13000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1E5B7879000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1E5B7FB0000
|
trusted library section
|
page readonly
|
||
E3A95F7000
|
stack
|
page read and write
|
||
A482000
|
heap
|
page read and write
|
||
A53D000
|
heap
|
page read and write
|
||
311D000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
21A9000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
734000
|
heap
|
page read and write
|
||
74D000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
32DD000
|
heap
|
page read and write
|
||
643000
|
heap
|
page read and write
|
||
32B4000
|
heap
|
page read and write
|
||
21A8000
|
heap
|
page read and write
|
||
DDD0000
|
heap
|
page read and write
|
||
A3B1000
|
heap
|
page read and write
|
||
A0AE000
|
heap
|
page read and write
|
||
565000
|
heap
|
page read and write
|
||
22D5000
|
heap
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
2158000
|
direct allocation
|
page read and write
|
||
D614000
|
heap
|
page read and write
|
||
E0B1000
|
heap
|
page read and write
|
||
3239000
|
heap
|
page read and write
|
||
AAA1000
|
heap
|
page read and write
|
||
33A5000
|
heap
|
page read and write
|
||
354D000
|
heap
|
page read and write
|
||
22B0000
|
heap
|
page read and write
|
||
31F3000
|
heap
|
page read and write
|
||
3133000
|
heap
|
page read and write
|
||
9D87000
|
heap
|
page read and write
|
||
D596000
|
heap
|
page read and write
|
||
21AA000
|
heap
|
page read and write
|
||
64A000
|
heap
|
page read and write
|
||
1E5BE000000
|
heap
|
page read and write
|
||
607000
|
unkown
|
page readonly
|
||
A1ED000
|
heap
|
page read and write
|
||
E3AA6FE000
|
unkown
|
page readonly
|
||
893000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
A640000
|
heap
|
page read and write
|
||
3776000
|
heap
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
355F000
|
heap
|
page read and write
|
||
21A9000
|
heap
|
page read and write
|
||
72F000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
CFA5000
|
heap
|
page read and write
|
||
D5B7000
|
heap
|
page read and write
|
||
355F000
|
heap
|
page read and write
|
||
A55D000
|
heap
|
page read and write
|
||
1E5B78A1000
|
heap
|
page read and write
|
||
A2A1000
|
heap
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
65E000
|
heap
|
page read and write
|
||
3C13000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
6BD42000
|
unkown
|
page read and write
|
||
3110000
|
direct allocation
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
1E5B8640000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
D200000
|
heap
|
page read and write
|
||
A493000
|
heap
|
page read and write
|
||
A364000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
D648000
|
heap
|
page read and write
|
||
46D0000
|
heap
|
page read and write
|
||
5AB000
|
stack
|
page read and write
|
||
3BA3000
|
heap
|
page read and write
|
||
21AB000
|
heap
|
page read and write
|
||
1E5BCD60000
|
trusted library allocation
|
page read and write
|
||
31A4000
|
heap
|
page read and write
|
||
71A000
|
heap
|
page read and write
|
||
D31E000
|
heap
|
page read and write
|
||
1E20000
|
heap
|
page read and write
|
||
2BFB000
|
stack
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
2159000
|
heap
|
page read and write
|
||
3326000
|
heap
|
page read and write
|
||
3565000
|
heap
|
page read and write
|
||
46E000
|
unkown
|
page readonly
|
||
64B000
|
heap
|
page read and write
|
||
A5ED000
|
heap
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
215E000
|
heap
|
page read and write
|
||
9F2B000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
32A9000
|
heap
|
page read and write
|
||
3223000
|
heap
|
page read and write
|
||
1E5B811B000
|
heap
|
page read and write
|
||
A08E000
|
heap
|
page read and write
|
||
A554000
|
heap
|
page read and write
|
||
355F000
|
heap
|
page read and write
|
||
2158000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
3579000
|
heap
|
page read and write
|
||
33FC000
|
heap
|
page read and write
|
||
2158000
|
heap
|
page read and write
|
||
5B1000
|
unkown
|
page execute read
|
||
49C000
|
stack
|
page read and write
|
||
E3AA2FE000
|
unkown
|
page readonly
|
||
A445000
|
heap
|
page read and write
|
||
A69B000
|
heap
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
2138000
|
direct allocation
|
page read and write
|
||
A36D000
|
heap
|
page read and write
|
||
A5A4000
|
heap
|
page read and write
|
||
E3A927B000
|
stack
|
page read and write
|
||
64E000
|
stack
|
page read and write
|
||
17E000
|
stack
|
page read and write
|
||
21A8000
|
heap
|
page read and write
|
||
1CC0000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
6D5000
|
heap
|
page read and write
|
||
A3FF000
|
heap
|
page read and write
|
||
3286000
|
heap
|
page read and write
|
||
B046000
|
heap
|
page read and write
|
||
D77F000
|
heap
|
page read and write
|
||
DD58000
|
heap
|
page read and write
|
||
733000
|
heap
|
page read and write
|
||
DDDC000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
3265000
|
heap
|
page read and write
|
||
DC90000
|
heap
|
page read and write
|
||
1E5BCEF4000
|
heap
|
page read and write
|
||
6ED000
|
heap
|
page read and write
|
||
DEC8000
|
heap
|
page read and write
|
||
A4FB000
|
heap
|
page read and write
|
||
1E5BCDD0000
|
trusted library allocation
|
page read and write
|
||
4176000
|
heap
|
page read and write
|
||
A4B5000
|
heap
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
46E000
|
unkown
|
page readonly
|
||
D66A000
|
heap
|
page read and write
|
||
130000
|
heap
|
page read and write
|
||
DDAE000
|
heap
|
page read and write
|
||
C15000
|
heap
|
page read and write
|
||
A43A000
|
heap
|
page read and write
|
||
A7B3000
|
heap
|
page read and write
|
||
2158000
|
heap
|
page read and write
|
||
328D000
|
heap
|
page read and write
|
||
E3AA1FE000
|
unkown
|
page readonly
|
||
21AE000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
323D000
|
heap
|
page read and write
|
||
49D000
|
unkown
|
page write copy
|
||
64E000
|
heap
|
page read and write
|
||
3293000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
A14E000
|
heap
|
page read and write
|
||
46E000
|
unkown
|
page readonly
|
||
A13D000
|
heap
|
page read and write
|
||
3246000
|
heap
|
page read and write
|
||
1E5BCE8E000
|
heap
|
page read and write
|
||
443000
|
heap
|
page read and write
|
||
339D000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
305A000
|
heap
|
page read and write
|
||
A13A000
|
heap
|
page read and write
|
||
A6E0000
|
heap
|
page read and write
|
||
2153000
|
heap
|
page read and write
|
||
A5CC000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
4864000
|
heap
|
page read and write
|
||
1E5B7FE0000
|
trusted library section
|
page readonly
|
||
3249000
|
heap
|
page read and write
|
||
33A8000
|
heap
|
page read and write
|
||
CEB6000
|
heap
|
page read and write
|
||
3242000
|
heap
|
page read and write
|
||
3E2F000
|
stack
|
page read and write
|
||
3252000
|
heap
|
page read and write
|
||
A9C3000
|
heap
|
page read and write
|
||
CDDF000
|
heap
|
page read and write
|
||
712000
|
heap
|
page read and write
|
||
2158000
|
heap
|
page read and write
|
||
62E000
|
stack
|
page read and write
|
||
215A000
|
heap
|
page read and write
|
||
680000
|
direct allocation
|
page execute and read and write
|
||
32FF000
|
heap
|
page read and write
|
||
A126000
|
heap
|
page read and write
|
||
354D000
|
heap
|
page read and write
|
||
49B000
|
unkown
|
page read and write
|
||
31DE000
|
heap
|
page read and write
|
||
A546000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
3556000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
D384000
|
heap
|
page read and write
|
||
21AA000
|
heap
|
page read and write
|
||
3670000
|
heap
|
page read and write
|
||
734000
|
heap
|
page read and write
|
||
1E5B78B3000
|
heap
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
649000
|
heap
|
page read and write
|
||
3281000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7934000
|
heap
|
page read and write
|
||
A1DD000
|
heap
|
page read and write
|
||
4F26000
|
direct allocation
|
page read and write
|
||
3192000
|
heap
|
page read and write
|
||
AA81000
|
heap
|
page read and write
|
||
D836000
|
heap
|
page read and write
|
||
33A3000
|
heap
|
page read and write
|
||
3B27000
|
heap
|
page read and write
|
||
DF70000
|
heap
|
page read and write
|
||
DD8C000
|
heap
|
page read and write
|
||
A6D4000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
9F47000
|
heap
|
page read and write
|
||
21A9000
|
heap
|
page read and write
|
||
A4F0000
|
heap
|
page read and write
|
||
9F2D000
|
heap
|
page read and write
|
||
E3AA9FE000
|
unkown
|
page readonly
|
||
21A3000
|
heap
|
page read and write
|
||
9FFA000
|
heap
|
page read and write
|
||
4E00000
|
heap
|
page read and write
|
||
647000
|
heap
|
page read and write
|
||
A0AE000
|
heap
|
page read and write
|
||
9E87000
|
heap
|
page read and write
|
||
DCF8000
|
heap
|
page read and write
|
||
6F8C6000
|
unkown
|
page read and write
|
||
DF80000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
3292000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
3560000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
A51B000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
21AA000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
21A8000
|
heap
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
6471000
|
heap
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
A4A9000
|
heap
|
page read and write
|
||
6F851000
|
unkown
|
page execute read
|
||
DC72000
|
heap
|
page read and write
|
||
A378000
|
heap
|
page read and write
|
||
A514000
|
heap
|
page read and write
|
||
4880000
|
trusted library allocation
|
page read and write
|
||
2790000
|
trusted library allocation
|
page read and write
|
||
D151000
|
heap
|
page read and write
|
||
C828000
|
heap
|
page read and write
|
||
2DAE000
|
heap
|
page read and write
|
||
3164000
|
heap
|
page read and write
|
||
4170000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
3571000
|
heap
|
page read and write
|
||
3283000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
515000
|
heap
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
607000
|
heap
|
page read and write
|
||
215A000
|
heap
|
page read and write
|
||
3295000
|
heap
|
page read and write
|
||
21A9000
|
heap
|
page read and write
|
||
A2B2000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
DE20000
|
heap
|
page read and write
|
||
A37E000
|
heap
|
page read and write
|
||
3129000
|
heap
|
page read and write
|
||
21A8000
|
heap
|
page read and write
|
||
3556000
|
heap
|
page read and write
|
||
21A9000
|
heap
|
page read and write
|
||
3E64000
|
heap
|
page read and write
|
||
A418000
|
heap
|
page read and write
|
||
A5DD000
|
heap
|
page read and write
|
||
A3F6000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
4190000
|
heap
|
page read and write
|
||
21A8000
|
heap
|
page read and write
|
||
A5F000
|
stack
|
page read and write
|
||
A5CA000
|
heap
|
page read and write
|
||
2159000
|
heap
|
page read and write
|
||
311A000
|
heap
|
page read and write
|
||
72F000
|
heap
|
page read and write
|
||
1E5B7874000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
A546000
|
heap
|
page read and write
|
||
A343000
|
heap
|
page read and write
|
||
2118000
|
direct allocation
|
page read and write
|
||
3295000
|
heap
|
page read and write
|
||
AAED000
|
heap
|
page read and write
|
||
3397000
|
heap
|
page read and write
|
||
9671000
|
heap
|
page read and write
|
||
329E000
|
heap
|
page read and write
|
||
E3AA67E000
|
stack
|
page read and write
|
||
42E0000
|
heap
|
page read and write
|
||
6BD3A000
|
unkown
|
page write copy
|
||
DEF9000
|
heap
|
page read and write
|
||
3687000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
3222000
|
heap
|
page read and write
|
||
4E63000
|
direct allocation
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
1E5B7900000
|
heap
|
page read and write
|
||
3291000
|
heap
|
page read and write
|
||
7A3000
|
heap
|
page read and write
|
||
32D8000
|
heap
|
page read and write
|
||
3561000
|
heap
|
page read and write
|
||
411000
|
unkown
|
page readonly
|
||
6F8B1000
|
unkown
|
page readonly
|
||
6AD000
|
heap
|
page read and write
|
||
320D000
|
heap
|
page read and write
|
||
21AA000
|
heap
|
page read and write
|
||
92C000
|
unkown
|
page readonly
|
||
2159000
|
heap
|
page read and write
|
||
10F5000
|
heap
|
page read and write
|
||
A0D6000
|
heap
|
page read and write
|
||
8D34000
|
heap
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
315D000
|
heap
|
page read and write
|
||
3397000
|
heap
|
page read and write
|
||
314C000
|
heap
|
page read and write
|
||
438C000
|
stack
|
page read and write
|
||
3780000
|
heap
|
page read and write
|
||
7A8000
|
heap
|
page read and write
|
||
ABEA000
|
heap
|
page read and write
|
||
2158000
|
heap
|
page read and write
|
||
DB21000
|
heap
|
page read and write
|
||
329D000
|
heap
|
page read and write
|
||
D3A5000
|
heap
|
page read and write
|
||
DF2C000
|
heap
|
page read and write
|
||
2B51000
|
heap
|
page read and write
|
||
3556000
|
heap
|
page read and write
|
||
2158000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
3851000
|
heap
|
page read and write
|
||
3560000
|
heap
|
page read and write
|
||
6EB000
|
heap
|
page read and write
|
||
A5E2000
|
heap
|
page read and write
|
||
9E93000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
3221000
|
heap
|
page read and write
|
||
DD99000
|
heap
|
page read and write
|
||
355E000
|
heap
|
page read and write
|
||
2158000
|
heap
|
page read and write
|
||
2158000
|
heap
|
page read and write
|
||
3341000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
215B000
|
heap
|
page read and write
|
||
21A8000
|
direct allocation
|
page read and write
|
||
A491000
|
heap
|
page read and write
|
||
A424000
|
heap
|
page read and write
|
||
620000
|
unkown
|
page readonly
|
||
E3A9FFB000
|
stack
|
page read and write
|
||
D107000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
216C000
|
direct allocation
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
4120000
|
heap
|
page read and write
|
||
56C0000
|
heap
|
page read and write
|
||
333D000
|
heap
|
page read and write
|
||
39E9000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
667A000
|
heap
|
page read and write
|
||
DF4E000
|
heap
|
page read and write
|
||
9EB7000
|
heap
|
page read and write
|
||
6F8CC000
|
unkown
|
page readonly
|
||
A0B8000
|
heap
|
page read and write
|
||
DE64000
|
heap
|
page read and write
|
||
215B000
|
heap
|
page read and write
|
||
A1E000
|
stack
|
page read and write
|
||
2D9A000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
A6CE000
|
heap
|
page read and write
|
||
3838000
|
heap
|
page read and write
|
||
31C8000
|
heap
|
page read and write
|
||
21AA000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
418C000
|
heap
|
page read and write
|
||
A2FE000
|
heap
|
page read and write
|
||
4179000
|
heap
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
D78D000
|
heap
|
page read and write
|
||
3565000
|
heap
|
page read and write
|
||
2180000
|
direct allocation
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
D075000
|
heap
|
page read and write
|
||
6BD42000
|
unkown
|
page read and write
|
||
6F8CC000
|
unkown
|
page readonly
|
||
E3AA57E000
|
stack
|
page read and write
|
||
339D000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
E02B000
|
heap
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
331D000
|
heap
|
page read and write
|
||
DEEA000
|
heap
|
page read and write
|
||
3352000
|
heap
|
page read and write
|
||
D5B7000
|
heap
|
page read and write
|
||
31D4000
|
heap
|
page read and write
|
||
A3B000
|
stack
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
E3AB47E000
|
stack
|
page read and write
|
||
2158000
|
heap
|
page read and write
|
||
3181000
|
heap
|
page read and write
|
||
21A9000
|
heap
|
page read and write
|
||
A210000
|
heap
|
page read and write
|
||
5170000
|
heap
|
page read and write
|
||
7A8000
|
heap
|
page read and write
|
||
A568000
|
heap
|
page read and write
|
||
649000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
D6FD000
|
heap
|
page read and write
|
||
31A6000
|
heap
|
page read and write
|
||
3391000
|
heap
|
page read and write
|
||
327C000
|
heap
|
page read and write
|
||
A4E9000
|
heap
|
page read and write
|
||
A5B4000
|
heap
|
page read and write
|
||
3815000
|
heap
|
page read and write
|
||
1E5B8C41000
|
trusted library allocation
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
337B000
|
heap
|
page read and write
|
||
2157000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
A6E7000
|
heap
|
page read and write
|
||
4A00000
|
trusted library allocation
|
page read and write
|
||
A14E000
|
heap
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
2178000
|
direct allocation
|
page read and write
|
||
2153000
|
heap
|
page read and write
|
||
354F000
|
heap
|
page read and write
|
||
20F0000
|
direct allocation
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
21A7000
|
heap
|
page read and write
|
||
3216000
|
heap
|
page read and write
|
||
318D000
|
heap
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
3396000
|
heap
|
page read and write
|
||
6BD35000
|
unkown
|
page read and write
|
||
8E7A000
|
heap
|
page read and write
|
||
32EC000
|
heap
|
page read and write
|
||
4870000
|
heap
|
page read and write
|
||
86A000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
312B000
|
heap
|
page read and write
|
||
2159000
|
heap
|
page read and write
|
||
329D000
|
heap
|
page read and write
|
||
A09C000
|
heap
|
page read and write
|
||
64B000
|
heap
|
page read and write
|
||
22D9000
|
heap
|
page read and write
|
||
21AB000
|
heap
|
page read and write
|
||
A4A5000
|
heap
|
page read and write
|
||
A84B000
|
heap
|
page read and write
|
||
E06C000
|
heap
|
page read and write
|
||
21AA000
|
heap
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
3286000
|
heap
|
page read and write
|
||
A3D4000
|
heap
|
page read and write
|
||
A0B3000
|
heap
|
page read and write
|
||
21A8000
|
heap
|
page read and write
|
||
346E000
|
stack
|
page read and write
|
||
1E5B7F90000
|
trusted library section
|
page readonly
|
||
640000
|
heap
|
page read and write
|
||
6F851000
|
unkown
|
page execute read
|
||
3169000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
318D000
|
heap
|
page read and write
|
||
734000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
1E5B8002000
|
heap
|
page read and write
|
||
3555000
|
heap
|
page read and write
|
||
E01A000
|
heap
|
page read and write
|
||
2108000
|
direct allocation
|
page read and write
|
||
A176000
|
heap
|
page read and write
|
||
D5C2000
|
heap
|
page read and write
|
||
A5A6000
|
heap
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
746000
|
heap
|
page read and write
|
||
45B000
|
stack
|
page read and write
|
||
215B000
|
heap
|
page read and write
|
||
321D000
|
heap
|
page read and write
|
||
3294000
|
heap
|
page read and write
|
||
A5B5000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
E08E000
|
heap
|
page read and write
|
||
A533000
|
heap
|
page read and write
|
||
31E5000
|
heap
|
page read and write
|
||
3848000
|
heap
|
page read and write
|
||
DFE8000
|
heap
|
page read and write
|
||
A26D000
|
heap
|
page read and write
|
||
6F8C6000
|
unkown
|
page read and write
|
||
DF76000
|
heap
|
page read and write
|
||
32F5000
|
heap
|
page read and write
|
||
32CC000
|
heap
|
page read and write
|
||
9FD9000
|
heap
|
page read and write
|
||
356E000
|
heap
|
page read and write
|
||
A4A2000
|
heap
|
page read and write
|
||
A0DB000
|
heap
|
page read and write
|
||
3570000
|
heap
|
page read and write
|
||
30C000
|
stack
|
page read and write
|
||
AC24000
|
heap
|
page read and write
|
||
734000
|
heap
|
page read and write
|
||
D4B6000
|
heap
|
page read and write
|
||
4D0F000
|
stack
|
page read and write
|
||
375D000
|
heap
|
page read and write
|
||
418A000
|
heap
|
page read and write
|
||
1E5B783F000
|
heap
|
page read and write
|
||
2CB000
|
stack
|
page read and write
|
||
A5DD000
|
heap
|
page read and write
|
||
643000
|
heap
|
page read and write
|
||
354E000
|
heap
|
page read and write
|
||
21A8000
|
heap
|
page read and write
|
||
33A3000
|
heap
|
page read and write
|
||
3393000
|
heap
|
page read and write
|
||
A7C000
|
stack
|
page read and write
|
||
DB64000
|
heap
|
page read and write
|
||
A166000
|
heap
|
page read and write
|
||
D4FA000
|
heap
|
page read and write
|
||
751000
|
heap
|
page read and write
|
||
649000
|
heap
|
page read and write
|
||
215A000
|
heap
|
page read and write
|
||
A8FF000
|
heap
|
page read and write
|
||
21A8000
|
heap
|
page read and write
|
||
1E5BCF0A000
|
heap
|
page read and write
|
||
4E5C000
|
direct allocation
|
page read and write
|
||
5A3000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
9FB5000
|
heap
|
page read and write
|
||
1E5BD040000
|
trusted library allocation
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
5B1000
|
unkown
|
page execute read
|
||
3A19000
|
heap
|
page read and write
|
||
E3A9DFB000
|
stack
|
page read and write
|
||
A086000
|
heap
|
page read and write
|
||
748000
|
heap
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
A43B000
|
heap
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
2140000
|
direct allocation
|
page read and write
|
||
E06C000
|
heap
|
page read and write
|
||
1E5B8820000
|
trusted library allocation
|
page read and write
|
||
728000
|
heap
|
page read and write
|
||
1E5BCEFD000
|
heap
|
page read and write
|
||
21A3000
|
heap
|
page read and write
|
||
AFC9000
|
heap
|
page read and write
|
||
DFD6000
|
heap
|
page read and write
|
||
DF1A000
|
heap
|
page read and write
|
||
E3AA97E000
|
stack
|
page read and write
|
||
746000
|
heap
|
page read and write
|
||
33A5000
|
heap
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
3591000
|
heap
|
page read and write
|
||
215B000
|
heap
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
318D000
|
heap
|
page read and write
|
||
DE42000
|
heap
|
page read and write
|
||
322D000
|
heap
|
page read and write
|
||
64A000
|
heap
|
page read and write
|
||
3565000
|
heap
|
page read and write
|
||
2159000
|
heap
|
page read and write
|
||
A2B2000
|
heap
|
page read and write
|
||
3312000
|
heap
|
page read and write
|
||
A164000
|
heap
|
page read and write
|
||
A573000
|
heap
|
page read and write
|
||
1E5BCEBF000
|
heap
|
page read and write
|
||
DD08000
|
heap
|
page read and write
|
||
A56E000
|
heap
|
page read and write
|
||
B002000
|
heap
|
page read and write
|
||
1E5BCF04000
|
heap
|
page read and write
|
||
1E5B7710000
|
heap
|
page read and write
|
||
42A000
|
heap
|
page read and write
|
||
3211000
|
heap
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
3277000
|
heap
|
page read and write
|
||
DE86000
|
heap
|
page read and write
|
||
1E5B8113000
|
heap
|
page read and write
|
||
3291000
|
heap
|
page read and write
|
||
D206000
|
heap
|
page read and write
|
||
2137000
|
direct allocation
|
page read and write
|
||
A536000
|
heap
|
page read and write
|
||
D206000
|
heap
|
page read and write
|
||
33BA000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
1EEA000
|
heap
|
page read and write
|
||
318D000
|
heap
|
page read and write
|
||
A2FE000
|
heap
|
page read and write
|
||
D31A000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
E3AA7FE000
|
unkown
|
page readonly
|
||
6DF000
|
heap
|
page read and write
|
||
A37C000
|
heap
|
page read and write
|
||
E008000
|
heap
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
AD34000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
662000
|
heap
|
page read and write
|
||
A5B4000
|
heap
|
page read and write
|
||
A4A7000
|
heap
|
page read and write
|
||
1EE0000
|
heap
|
page read and write
|
||
21A4000
|
direct allocation
|
page read and write
|
||
D328000
|
heap
|
page read and write
|
||
B1E000
|
stack
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
6F850000
|
unkown
|
page readonly
|
||
A086000
|
heap
|
page read and write
|
||
DD58000
|
heap
|
page read and write
|
||
31B2000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
751000
|
heap
|
page read and write
|
||
3932000
|
heap
|
page read and write
|
||
33D4000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
A595000
|
heap
|
page read and write
|
||
A094000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
A293000
|
heap
|
page read and write
|
||
3295000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
32E9000
|
heap
|
page read and write
|
||
354D000
|
heap
|
page read and write
|
||
21A0000
|
direct allocation
|
page read and write
|
||
39F0000
|
heap
|
page read and write
|
||
A14E000
|
heap
|
page read and write
|
||
A155000
|
heap
|
page read and write
|
||
377F000
|
heap
|
page read and write
|
||
2100000
|
direct allocation
|
page read and write
|
||
22FC000
|
heap
|
page read and write
|
||
A8F2000
|
heap
|
page read and write
|
||
A626000
|
heap
|
page read and write
|
||
1E5B7FC0000
|
trusted library section
|
page readonly
|
||
9BC0000
|
heap
|
page read and write
|
||
1E5B7730000
|
heap
|
page read and write
|
||
49A000
|
unkown
|
page write copy
|
||
3356000
|
heap
|
page read and write
|
||
A321000
|
heap
|
page read and write
|
||
DD08000
|
heap
|
page read and write
|
||
3211000
|
heap
|
page read and write
|
||
1E5BCD34000
|
trusted library allocation
|
page read and write
|
||
22A0000
|
heap
|
page read and write
|
||
1E5BCEC8000
|
heap
|
page read and write
|
||
8E1000
|
unkown
|
page execute read
|
||
9E5B000
|
heap
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
320B000
|
heap
|
page read and write
|
||
A2DD000
|
heap
|
page read and write
|
||
A4A5000
|
heap
|
page read and write
|
||
CABE000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
A31E000
|
heap
|
page read and write
|
||
1E5B7813000
|
heap
|
page read and write
|
||
1D10000
|
heap
|
page read and write
|
||
3222000
|
heap
|
page read and write
|
||
E02A000
|
heap
|
page read and write
|
||
72F000
|
heap
|
page read and write
|
||
2DB3000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
31C1000
|
heap
|
page read and write
|
||
A4A2000
|
heap
|
page read and write
|
||
2B4D000
|
heap
|
page read and write
|
||
A2A1000
|
heap
|
page read and write
|
||
E3A97FE000
|
stack
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
D5FB000
|
heap
|
page read and write
|
||
A188000
|
heap
|
page read and write
|
||
A57A000
|
heap
|
page read and write
|
||
1E5BCCF0000
|
trusted library allocation
|
page read and write
|
||
A40E000
|
heap
|
page read and write
|
||
2153000
|
heap
|
page read and write
|
||
72F000
|
heap
|
page read and write
|
||
A71A000
|
heap
|
page read and write
|
||
93D000
|
unkown
|
page write copy
|
||
2170000
|
direct allocation
|
page read and write
|
||
A45B000
|
heap
|
page read and write
|
||
364F000
|
stack
|
page read and write
|
||
A060000
|
heap
|
page read and write
|
||
31CD000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
9E95000
|
heap
|
page read and write
|
||
3354000
|
heap
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
418A000
|
heap
|
page read and write
|
||
DF92000
|
heap
|
page read and write
|
||
22AE000
|
stack
|
page read and write
|
||
215A000
|
heap
|
page read and write
|
||
3565000
|
heap
|
page read and write
|
||
4EC9000
|
direct allocation
|
page read and write
|
||
6B2000
|
heap
|
page read and write
|
||
A47D000
|
heap
|
page read and write
|
||
6BD48000
|
unkown
|
page read and write
|
||
377C000
|
heap
|
page read and write
|
||
9FFA000
|
heap
|
page read and write
|
||
1E5BCE4D000
|
heap
|
page read and write
|
||
1E5B782F000
|
heap
|
page read and write
|
||
A126000
|
heap
|
page read and write
|
||
DF7A000
|
heap
|
page read and write
|
||
DDD0000
|
heap
|
page read and write
|
||
E136000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
72F000
|
heap
|
page read and write
|
||
71A000
|
heap
|
page read and write
|
||
2FDB000
|
stack
|
page read and write
|
||
1E5BCED7000
|
heap
|
page read and write
|
||
3110000
|
direct allocation
|
page read and write
|
||
A5D3000
|
heap
|
page read and write
|
||
3B21000
|
heap
|
page read and write
|
||
649000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
A714000
|
heap
|
page read and write
|
||
A9F6000
|
heap
|
page read and write
|
||
1E5BCEFA000
|
heap
|
page read and write
|
||
A2FE000
|
heap
|
page read and write
|
||
732000
|
heap
|
page read and write
|
||
2BB8000
|
heap
|
page read and write
|
||
E3AA3FE000
|
unkown
|
page readonly
|
||
2B61000
|
heap
|
page read and write
|
||
69B000
|
heap
|
page read and write
|
||
D6B9000
|
heap
|
page read and write
|
||
3359000
|
heap
|
page read and write
|
||
3781000
|
heap
|
page read and write
|
||
DC31000
|
heap
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
1E5B811A000
|
heap
|
page read and write
|
||
A591000
|
heap
|
page read and write
|
||
3225000
|
heap
|
page read and write
|
||
A336000
|
heap
|
page read and write
|
||
A69B000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
A166000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
339D000
|
heap
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
A522000
|
heap
|
page read and write
|
||
4110000
|
heap
|
page read and write
|
||
3216000
|
heap
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
D42F000
|
heap
|
page read and write
|
||
6BB50000
|
unkown
|
page readonly
|
||
1E5B8102000
|
heap
|
page read and write
|
||
51E000
|
heap
|
page read and write
|
||
1B8C000
|
stack
|
page read and write
|
||
A079000
|
heap
|
page read and write
|
||
329D000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
751000
|
heap
|
page read and write
|
||
DF5E000
|
heap
|
page read and write
|
||
A061000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
FEC000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
215E000
|
heap
|
page read and write
|
||
DD4A000
|
heap
|
page read and write
|
||
2160000
|
direct allocation
|
page read and write
|
||
2144000
|
direct allocation
|
page read and write
|
||
71E000
|
heap
|
page read and write
|
||
A151000
|
heap
|
page read and write
|
||
39F5000
|
heap
|
page read and write
|
||
20F4000
|
direct allocation
|
page read and write
|
||
D42B000
|
heap
|
page read and write
|
||
370000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
DCD3000
|
heap
|
page read and write
|
||
31EA000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
A31E000
|
heap
|
page read and write
|
||
3184000
|
heap
|
page read and write
|
||
DCF4000
|
heap
|
page read and write
|
||
3287000
|
heap
|
page read and write
|
||
1E5B7851000
|
heap
|
page read and write
|
||
D878000
|
heap
|
page read and write
|
||
AF7D000
|
heap
|
page read and write
|
||
1BE0000
|
heap
|
page read and write
|
||
A4CC000
|
heap
|
page read and write
|
||
2153000
|
heap
|
page read and write
|
||
A0DB000
|
heap
|
page read and write
|
||
1F04000
|
heap
|
page read and write
|
||
643000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
E3AADFD000
|
stack
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
E3AA37E000
|
stack
|
page read and write
|
||
1E5B7740000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
A672000
|
heap
|
page read and write
|
||
E04C000
|
heap
|
page read and write
|
||
22A0000
|
direct allocation
|
page read and write
|
||
1DFD000
|
stack
|
page read and write
|
||
D6DF000
|
heap
|
page read and write
|
||
8C71000
|
heap
|
page read and write
|
||
4187000
|
heap
|
page read and write
|
||
DD5A000
|
heap
|
page read and write
|
||
355D000
|
heap
|
page read and write
|
||
A4EF000
|
heap
|
page read and write
|
||
78D000
|
stack
|
page read and write
|
||
DD16000
|
heap
|
page read and write
|
||
1B9F000
|
stack
|
page read and write
|
||
3768000
|
heap
|
page read and write
|
||
ADCF000
|
heap
|
page read and write
|
||
A45C000
|
heap
|
page read and write
|
||
2153000
|
heap
|
page read and write
|
||
A65E000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
3286000
|
heap
|
page read and write
|
||
643000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
A3C2000
|
heap
|
page read and write
|
||
BFB6000
|
heap
|
page read and write
|
||
1E5BCD30000
|
trusted library allocation
|
page read and write
|
||
1E5B7891000
|
heap
|
page read and write
|
||
1E5BD090000
|
remote allocation
|
page read and write
|
||
333A000
|
heap
|
page read and write
|
||
B045000
|
heap
|
page read and write
|
||
21A3000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
92C000
|
unkown
|
page readonly
|
||
317F000
|
heap
|
page read and write
|
||
A336000
|
heap
|
page read and write
|
||
3223000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
3202000
|
heap
|
page read and write
|
||
DFF8000
|
heap
|
page read and write
|
||
21A8000
|
heap
|
page read and write
|
||
3206000
|
heap
|
page read and write
|
||
61A000
|
unkown
|
page write copy
|
||
3559000
|
heap
|
page read and write
|
||
312D000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
3115000
|
heap
|
page read and write
|
||
D792000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
319D000
|
heap
|
page read and write
|
||
21A8000
|
heap
|
page read and write
|
||
66D000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
649000
|
heap
|
page read and write
|
||
3293000
|
heap
|
page read and write
|
||
3216000
|
heap
|
page read and write
|
||
A1EC000
|
heap
|
page read and write
|
||
3281000
|
heap
|
page read and write
|
||
3295000
|
heap
|
page read and write
|
||
3182000
|
heap
|
page read and write
|
||
A051000
|
heap
|
page read and write
|
||
355D000
|
heap
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
CDBD000
|
heap
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
643000
|
heap
|
page read and write
|
||
69E000
|
heap
|
page read and write
|
||
3181000
|
heap
|
page read and write
|
||
2159000
|
heap
|
page read and write
|
||
6BD35000
|
unkown
|
page read and write
|
||
2159000
|
heap
|
page read and write
|
||
733000
|
heap
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
D48F000
|
heap
|
page read and write
|
||
A2E8000
|
heap
|
page read and write
|
||
3216000
|
heap
|
page read and write
|
||
64B000
|
heap
|
page read and write
|
||
9C97000
|
heap
|
page read and write
|
||
3810000
|
heap
|
page read and write
|
||
CF45000
|
heap
|
page read and write
|
||
339B000
|
heap
|
page read and write
|
||
3184000
|
heap
|
page read and write
|
||
A5FF000
|
heap
|
page read and write
|
||
64B000
|
heap
|
page read and write
|
||
336A000
|
heap
|
page read and write
|
||
A6D7000
|
heap
|
page read and write
|
||
E3AA77E000
|
stack
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
1D80000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
A33D000
|
heap
|
page read and write
|
||
D545000
|
heap
|
page read and write
|
||
318D000
|
heap
|
page read and write
|
||
E3A9EFE000
|
unkown
|
page readonly
|
||
3244000
|
heap
|
page read and write
|
||
215A000
|
heap
|
page read and write
|
||
21AA000
|
heap
|
page read and write
|
||
649000
|
heap
|
page read and write
|
||
E3AABFE000
|
stack
|
page read and write
|
||
3293000
|
heap
|
page read and write
|
||
D8BA000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
355B000
|
heap
|
page read and write
|
||
1E5BD020000
|
trusted library allocation
|
page read and write
|
||
3185000
|
heap
|
page read and write
|
||
1E5B7FD0000
|
trusted library section
|
page readonly
|
||
91000
|
stack
|
page read and write
|
||
A126000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
335A000
|
heap
|
page read and write
|
||
2E3C000
|
stack
|
page read and write
|
||
1E5BCDC0000
|
trusted library allocation
|
page read and write
|
||
9F5D000
|
heap
|
page read and write
|
||
E114000
|
heap
|
page read and write
|
||
3291000
|
heap
|
page read and write
|
||
3784000
|
heap
|
page read and write
|
||
1E5B7770000
|
trusted library allocation
|
page read and write
|
||
D02C000
|
heap
|
page read and write
|
||
A0B8000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
A493000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
2154000
|
direct allocation
|
page read and write
|
||
A378000
|
heap
|
page read and write
|
||
A1EF000
|
heap
|
page read and write
|
||
211C000
|
direct allocation
|
page read and write
|
||
1E5B7780000
|
trusted library section
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
733000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
1E5B7929000
|
heap
|
page read and write
|
||
2153000
|
heap
|
page read and write
|
||
A69B000
|
heap
|
page read and write
|
||
3158000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
C8E7000
|
heap
|
page read and write
|
||
DBC8000
|
heap
|
page read and write
|
||
3291000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
33A5000
|
heap
|
page read and write
|
||
3566000
|
heap
|
page read and write
|
||
3560000
|
heap
|
page read and write
|
||
1E5BCD10000
|
trusted library allocation
|
page read and write
|
||
1E5B787B000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
3393000
|
heap
|
page read and write
|
||
1DA0000
|
heap
|
page read and write
|
||
5B0000
|
unkown
|
page readonly
|
||
1D0E000
|
stack
|
page read and write
|
||
232E000
|
stack
|
page read and write
|
||
377E000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
31E2000
|
heap
|
page read and write
|
||
338A000
|
heap
|
page read and write
|
||
339D000
|
heap
|
page read and write
|
||
1D90000
|
heap
|
page read and write
|
||
A3C3000
|
heap
|
page read and write
|
||
2114000
|
direct allocation
|
page read and write
|
||
D626000
|
heap
|
page read and write
|
||
64A000
|
heap
|
page read and write
|
||
311D000
|
heap
|
page read and write
|
||
2DBA000
|
heap
|
page read and write
|
||
3373000
|
heap
|
page read and write
|
||
AB91000
|
heap
|
page read and write
|
||
86B000
|
heap
|
page read and write
|
||
649000
|
heap
|
page read and write
|
||
21A3000
|
heap
|
page read and write
|
||
3767000
|
heap
|
page read and write
|
||
31CD000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
21AB000
|
heap
|
page read and write
|
||
321D000
|
heap
|
page read and write
|
||
2153000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
A7A1000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
3560000
|
heap
|
page read and write
|
||
A57A000
|
heap
|
page read and write
|
||
A56E000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
2C5E000
|
heap
|
page read and write
|
||
2B43000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
44B000
|
heap
|
page read and write
|
||
643000
|
heap
|
page read and write
|
||
31AD000
|
heap
|
page read and write
|
||
93D000
|
unkown
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
DF3C000
|
heap
|
page read and write
|
||
3C52000
|
heap
|
page read and write
|
||
DF78000
|
heap
|
page read and write
|
||
2190000
|
direct allocation
|
page read and write
|
||
7FF000
|
stack
|
page read and write
|
||
8E0000
|
unkown
|
page readonly
|
||
3330000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
33A3000
|
heap
|
page read and write
|
||
39FE000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
D5D9000
|
heap
|
page read and write
|
||
3111000
|
heap
|
page read and write
|
||
32A6000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
355C000
|
heap
|
page read and write
|
||
50E000
|
stack
|
page read and write
|
||
3263000
|
heap
|
page read and write
|
||
D333000
|
heap
|
page read and write
|
||
64B000
|
heap
|
page read and write
|
||
734000
|
heap
|
page read and write
|
||
2174000
|
direct allocation
|
page read and write
|
||
3221000
|
heap
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
7A7A000
|
heap
|
page read and write
|
||
69B000
|
heap
|
page read and write
|
||
3223000
|
heap
|
page read and write
|
||
4191000
|
heap
|
page read and write
|
||
E0F2000
|
heap
|
page read and write
|
||
E3A98FE000
|
unkown
|
page readonly
|
||
33A3000
|
heap
|
page read and write
|
||
2164000
|
direct allocation
|
page read and write
|
||
3154000
|
heap
|
page read and write
|
||
111E000
|
heap
|
page read and write
|
||
5063000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4CDE000
|
stack
|
page read and write
|
||
E178000
|
heap
|
page read and write
|
||
A5B5000
|
heap
|
page read and write
|
||
6E71000
|
heap
|
page read and write
|
||
328D000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
3778000
|
heap
|
page read and write
|
||
3761000
|
heap
|
page read and write
|
||
4870000
|
direct allocation
|
page read and write
|
||
3294000
|
heap
|
page read and write
|
||
49F0000
|
heap
|
page read and write
|
||
411000
|
unkown
|
page readonly
|
||
2DAB000
|
heap
|
page read and write
|
||
A07B000
|
heap
|
page read and write
|
||
1E5B78AF000
|
heap
|
page read and write
|
||
3763000
|
heap
|
page read and write
|
||
3557000
|
heap
|
page read and write
|
||
33A8000
|
heap
|
page read and write
|
||
AF53000
|
heap
|
page read and write
|
||
A569000
|
heap
|
page read and write
|
||
D37F000
|
heap
|
page read and write
|
||
21AB000
|
heap
|
page read and write
|
||
3387000
|
heap
|
page read and write
|
||
A588000
|
heap
|
page read and write
|
||
DC000
|
stack
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
3118000
|
heap
|
page read and write
|
||
E06D000
|
heap
|
page read and write
|
||
64A000
|
heap
|
page read and write
|
||
1E5BCF0C000
|
heap
|
page read and write
|
||
1E5BCE62000
|
heap
|
page read and write
|
||
3188000
|
heap
|
page read and write
|
||
DB42000
|
heap
|
page read and write
|
||
D77F000
|
heap
|
page read and write
|
||
DCB6000
|
heap
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
A60A000
|
heap
|
page read and write
|
||
AAED000
|
heap
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
33A8000
|
heap
|
page read and write
|
||
D3B8000
|
heap
|
page read and write
|
||
1E5B78B7000
|
heap
|
page read and write
|
||
A0A4000
|
heap
|
page read and write
|
||
3221000
|
heap
|
page read and write
|
||
A01D000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
A198000
|
heap
|
page read and write
|
||
43B000
|
heap
|
page read and write
|
||
33C8000
|
heap
|
page read and write
|
||
3112000
|
heap
|
page read and write
|
||
A2B6000
|
heap
|
page read and write
|
||
210C000
|
direct allocation
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
5790000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
D31E000
|
heap
|
page read and write
|
||
33AE000
|
heap
|
page read and write
|
||
84F000
|
stack
|
page read and write
|
||
21A3000
|
heap
|
page read and write
|
||
5071000
|
heap
|
page read and write
|
||
3850000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
33A3000
|
heap
|
page read and write
|
||
A378000
|
heap
|
page read and write
|
||
DEB7000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
A12B000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
3396000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
A5DD000
|
heap
|
page read and write
|
||
9AB0000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
A4A2000
|
heap
|
page read and write
|
||
DC94000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
21A3000
|
heap
|
page read and write
|
||
1E5BCCE0000
|
trusted library allocation
|
page read and write
|
||
59B000
|
heap
|
page read and write
|
||
4B40000
|
heap
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
1E5B787E000
|
heap
|
page read and write
|
||
A0B8000
|
heap
|
page read and write
|
||
751000
|
heap
|
page read and write
|
||
46E3000
|
heap
|
page read and write
|
||
DFA2000
|
heap
|
page read and write
|
||
AFF1000
|
heap
|
page read and write
|
||
A5A2000
|
heap
|
page read and write
|
||
6BCD5000
|
unkown
|
page readonly
|
||
4150000
|
heap
|
page read and write
|
||
21AA000
|
heap
|
page read and write
|
||
DD5F000
|
heap
|
page read and write
|
||
417D000
|
heap
|
page read and write
|
||
E06E000
|
heap
|
page read and write
|
||
499000
|
unkown
|
page read and write
|
||
7A8000
|
heap
|
page read and write
|
||
4B50000
|
trusted library allocation
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
2DBA000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
2178000
|
direct allocation
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
A6F8000
|
heap
|
page read and write
|
||
3292000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
DC4C000
|
heap
|
page read and write
|
||
393D000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
D494000
|
heap
|
page read and write
|
||
733000
|
heap
|
page read and write
|
||
2138000
|
direct allocation
|
page read and write
|
||
A26D000
|
heap
|
page read and write
|
||
943000
|
unkown
|
page readonly
|
||
DFCD000
|
heap
|
page read and write
|
||
659000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
A442000
|
heap
|
page read and write
|
||
606000
|
heap
|
page read and write
|
||
2188000
|
direct allocation
|
page read and write
|
||
A0FC000
|
heap
|
page read and write
|
||
2260000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
2158000
|
heap
|
page read and write
|
||
D60A000
|
heap
|
page read and write
|
||
71E000
|
heap
|
page read and write
|
||
331B000
|
heap
|
page read and write
|
||
4191000
|
heap
|
page read and write
|
||
3334000
|
heap
|
page read and write
|
||
5071000
|
heap
|
page read and write
|
||
2C5A000
|
heap
|
page read and write
|
||
A545000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
304B000
|
heap
|
page read and write
|
||
A57E000
|
heap
|
page read and write
|
||
21A8000
|
heap
|
page read and write
|
||
329D000
|
heap
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
DFA2000
|
heap
|
page read and write
|
||
D4EB000
|
heap
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
E3A96FE000
|
unkown
|
page readonly
|
||
39ED000
|
heap
|
page read and write
|
||
3835000
|
heap
|
page read and write
|
||
9F57000
|
heap
|
page read and write
|
||
64B000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
9EA6000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
A3E4000
|
heap
|
page read and write
|
||
2440000
|
heap
|
page read and write
|
||
3763000
|
heap
|
page read and write
|
||
31D9000
|
heap
|
page read and write
|
||
120000
|
heap
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
3295000
|
heap
|
page read and write
|
||
3196000
|
heap
|
page read and write
|
||
A227000
|
heap
|
page read and write
|
||
3293000
|
heap
|
page read and write
|
||
D8DA000
|
heap
|
page read and write
|
||
A097000
|
heap
|
page read and write
|
||
A3AD000
|
heap
|
page read and write
|
||
A5E9000
|
heap
|
page read and write
|
||
3216000
|
heap
|
page read and write
|
||
377C000
|
heap
|
page read and write
|
||
8E1000
|
unkown
|
page execute read
|
||
329D000
|
heap
|
page read and write
|
||
356A000
|
heap
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
A537000
|
heap
|
page read and write
|
||
DCA2000
|
heap
|
page read and write
|
||
A0FF000
|
heap
|
page read and write
|
||
311D000
|
heap
|
page read and write
|
||
A71A000
|
heap
|
page read and write
|
||
317B000
|
heap
|
page read and write
|
||
31D2000
|
heap
|
page read and write
|
||
DFA4000
|
heap
|
page read and write
|
||
2BDF000
|
stack
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
A210000
|
heap
|
page read and write
|
||
A248000
|
heap
|
page read and write
|
||
A2B2000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7BA000
|
heap
|
page read and write
|
||
D5FB000
|
heap
|
page read and write
|
||
2110000
|
direct allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
32E4000
|
heap
|
page read and write
|
||
3571000
|
heap
|
page read and write
|
||
31BD000
|
heap
|
page read and write
|
||
9D91000
|
heap
|
page read and write
|
||
32BD000
|
heap
|
page read and write
|
||
A3D4000
|
heap
|
page read and write
|
||
A4BB000
|
heap
|
page read and write
|
||
313D000
|
heap
|
page read and write
|
||
71A000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
215E000
|
heap
|
page read and write
|
||
D6FD000
|
heap
|
page read and write
|
||
71A000
|
heap
|
page read and write
|
||
A0DA000
|
heap
|
page read and write
|
||
1E5B7896000
|
heap
|
page read and write
|
||
CE5D000
|
heap
|
page read and write
|
||
1E5BCEE2000
|
heap
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
A9C2000
|
heap
|
page read and write
|
||
3293000
|
heap
|
page read and write
|
||
33BB000
|
heap
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
D61D000
|
heap
|
page read and write
|
||
21AE000
|
heap
|
page read and write
|
||
D769000
|
heap
|
page read and write
|
||
9F3D000
|
heap
|
page read and write
|
||
3223000
|
heap
|
page read and write
|
||
6EC000
|
heap
|
page read and write
|
||
1E5BD090000
|
remote allocation
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
3115000
|
heap
|
page read and write
|
||
643000
|
heap
|
page read and write
|
||
9C97000
|
heap
|
page read and write
|
||
3199000
|
heap
|
page read and write
|
||
111A000
|
heap
|
page read and write
|
||
3FE000
|
stack
|
page read and write
|
||
213C000
|
direct allocation
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
3287000
|
heap
|
page read and write
|
||
61A000
|
unkown
|
page read and write
|
||
31EB000
|
heap
|
page read and write
|
||
22B4000
|
heap
|
page read and write
|
||
A9C8000
|
heap
|
page read and write
|
||
3181000
|
heap
|
page read and write
|
||
375E000
|
heap
|
page read and write
|
||
9B59000
|
heap
|
page read and write
|
||
3207000
|
heap
|
page read and write
|
||
A2B2000
|
heap
|
page read and write
|
||
A58C000
|
heap
|
page read and write
|
||
1E5BCCF1000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
3145000
|
heap
|
page read and write
|
||
31DF000
|
heap
|
page read and write
|
||
D77F000
|
heap
|
page read and write
|
||
A4D8000
|
heap
|
page read and write
|
||
356B000
|
heap
|
page read and write
|
||
A5FE000
|
heap
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
E3AA5FE000
|
unkown
|
page readonly
|
||
2380000
|
heap
|
page read and write
|
||
64A000
|
heap
|
page read and write
|
||
6F34000
|
heap
|
page read and write
|
||
DD7C000
|
heap
|
page read and write
|
||
370D000
|
heap
|
page read and write
|
||
D5D9000
|
heap
|
page read and write
|
||
E1AA000
|
heap
|
page read and write
|
There are 1869 hidden memdumps, click here to show them.