IOC Report
chica-pc-shield-1-75-0-1300-en-win.exe

loading gif

Files

File Path
Type
Category
Malicious
chica-pc-shield-1-75-0-1300-en-win.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe (copy)
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\7z.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\danish.lng (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\dutch.lng (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\english.lng (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\finnish.lng (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\french.lng (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\german.lng (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\is-0HFFJ.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\is-3614V.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\is-36Q7V.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\is-5A794.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\is-5RTRO.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\is-DLO1P.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\is-GM6MD.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\is-P4B2K.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\is-S8JRA.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\is-UFVDK.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\italian.lng (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\norwegian.lng (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\spanish.lng (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\Languages\swedish.lng (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\changes.txt (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcspt.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsservice.exe (copy)
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-0DUR6.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-382MP.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-6H2TN.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-6PN99.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-9INTD.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-CI4PM.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-CU77C.tmp
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-DB4G5.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-J2CDD.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-K9CAE.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-KP3IJ.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-L12IJ.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-S0PAI.tmp
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-SJQ69.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-T6R1L.tmp
Rich Text Format data, version 1, ANSI, code page 1252
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\is-UQ1R3.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\license.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\mbam.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\mbamcore.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\mbamext.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\mbamnet.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\mbamtoast.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\ssubtmr6.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\unins000.dat
InnoSetup Log ChicaPC-Shield, version 0x30, 10690 bytes, 467601\user, "C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield"
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\unins000.msg
InnoSetup messages, version 5.5.0, 220 messages (ASCII), &About Setup...
dropped
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\vbalsgrid6.ocx (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\build.conf (copy)
data
dropped
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\config.conf (copy)
data
dropped
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\custom.conf (copy)
data
dropped
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\database.conf (copy)
data
dropped
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\html.conf (copy)
data
dropped
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\is-26J2K.tmp
data
dropped
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\is-41DE0.tmp
data
dropped
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\is-7JP9T.tmp
data
dropped
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\is-9E5DG.tmp
data
dropped
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\is-A47L8.tmp
data
dropped
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\is-AF3S0.tmp
data
dropped
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\is-AJB53.tmp
data
dropped
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\is-NKMPM.tmp
data
dropped
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\is-NN3CS.tmp
data
dropped
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\local.conf
data
dropped
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\manifest.conf (copy)
data
dropped
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\messaging.conf (copy)
data
dropped
C:\ProgramData\ChicaLogic\ChicaPC-Shield\Configuration\news.conf (copy)
data
dropped
C:\ProgramData\ChicaLogic\ChicaPC-Shield\is-Q97HV.tmp
data
dropped
C:\ProgramData\ChicaLogic\ChicaPC-Shield\rules.ref (copy)
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xe5e072a7, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ChicaLogic\ChicaPC-Shield\ChicaPC-Shield Notifications.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Oct 30 14:57:41 2024, mtime=Wed Oct 30 14:57:41 2024, atime=Thu Apr 4 17:51:30 2013, length=788040, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ChicaLogic\ChicaPC-Shield\ChicaPC-Shield.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Oct 30 14:57:41 2024, mtime=Wed Oct 30 14:57:41 2024, atime=Thu Apr 4 17:51:30 2013, length=973448, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ChicaLogic\ChicaPC-Shield\Uninstall ChicaPC-Shield.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Oct 30 14:57:40 2024, mtime=Wed Oct 30 14:57:40 2024, atime=Wed Oct 30 14:57:01 2024, length=712264, window=hide
dropped
C:\Users\Public\Desktop\ChicaPC-Shield.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Oct 30 14:57:41 2024, mtime=Wed Oct 30 14:57:42 2024, atime=Thu Apr 4 17:51:30 2013, length=973448, window=hide
dropped
C:\Users\user\AppData\Local\Temp\is-93AED.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-93AED.tmp\_isetup\_shfoldr.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-93AED.tmp\mbam.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\~DF2964631E0BFA171F.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DF49A45B89983BB0A7.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DF9084460160876095.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\System32\drivers\is-VCK25.tmp
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Windows\system32\drivers\cpcs.sys (copy)
PE32+ executable (native) x86-64, for MS Windows
dropped
There are 82 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\mbamext.dll"
malicious
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe
"C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe" /starttrial
malicious
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe
"C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsgui.exe" /install /silent
malicious
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe
"C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcsscheduler.exe"
malicious
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe
"C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe" /update
malicious
C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe
"C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\cpcs.exe"
malicious
C:\Users\user\Desktop\chica-pc-shield-1-75-0-1300-en-win.exe
"C:\Users\user\Desktop\chica-pc-shield-1-75-0-1300-en-win.exe"
C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp
"C:\Users\user\AppData\Local\Temp\is-LBG9E.tmp\chica-pc-shield-1-75-0-1300-en-win.tmp" /SL5="$20430,8630815,54272,C:\Users\user\Desktop\chica-pc-shield-1-75-0-1300-en-win.exe"
C:\Windows\SysWOW64\regsvr32.exe
"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\ssubtmr6.dll"
C:\Windows\SysWOW64\regsvr32.exe
"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\vbalsgrid6.ocx"
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s "C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\ssubtmr6.dll"
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s "C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\vbalsgrid6.ocx"
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s "C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\ssubtmr6.dll"
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s "C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\vbalsgrid6.ocx"
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s "C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\ssubtmr6.dll"
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s "C:\Program Files (x86)\ChicaLogic\ChicaPC-Shield\vbalsgrid6.ocx"
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://best-pc.co.kr
unknown
http://cdn.static.mal
unknown
http://cdn.static.malwarebytes.org/clie
unknown
http://downloads.malwarebytes.org/mbam-download.phpon
unknown
http://www.aimp.ru
unknown
http://www.chicalogic.com
unknown
http://cdn.static.malwareb
unknown
http://data-cdn.mbamupdates.com/v1/custom/chicalogic/version.chk
65.9.66.84
http://77.78.240.87/ebb.php
unknown
http://xml.org/sax/features/namespace-prefixes
unknown
http://wfef5.mine.nu/config.asp
unknown
http://www.malwarebytes.org
unknown
http://cdn.static.malwarebytes.org/client_resources/1.7/images/StartupLite_64x64.png
unknown
http://www.malwarebytes.oY
unknown
http://xml.org/sax/features/string-interning
unknown
http://www.ntkrnl.comy
unknown
http://www.chicalogic.com/pc-shield-rew
unknown
http://182.237.1.106:333/32.exe
unknown
http://www.GoCasino.com11
unknown
http://www.6071.com/
unknown
http://topagacilaboratuari.com/topagaci.com
unknown
http://link0125baixa2010.fromru.com/arroxa.exe
unknown
http://cha.91mt.com/asp/xg.asp
unknown
http://www.ntkrnl.com
unknown
http://www.go2000.cn.&
unknown
http://www.malwarebytes.org/products/file
unknown
http://www.malwarebytes.or
unknown
http://www.malwarebytes.org/products/mbar
unknown
http://www.zippay.ru/robo-pay.php?lang=
unknown
http://www.abyssmedia.com
unknown
http://www.grandesgans.com/Vista.comr.
unknown
http://cdn.static.malwarebytes.org/client_resources/1.7/images/FileAssassin_64x64.png
unknown
http://www.heaventools.com)
unknown
http://bsalsa.com/
unknown
http://www.appinf.com/features/no-whitespace-in-element-content
unknown
http://www.innosetup.com/
unknown
http://saskentbbq.com/sasmate
unknown
http://www.baidu.com
unknown
http://www.emule-project.net
unknown
http://www.malwarebytes.org/products/fileass
unknown
http://www.contoso.com/PostAccepter.aspxQ5
unknown
http://www.malwarebytes.org/products
unknown
http://www.Parodieront.com
unknown
http://www.malwarebytes.org/products/fileassassin
unknown
http://www.abyssmedia.comz
unknown
http://www.super-ec.cnhttp://wghai.com/echttp://qsyou.com
unknown
http://xdinheirox.rememberit.com.au/
unknown
http://www.abyssmedia.comion
unknown
http://cdn.static.malwareby
unknown
http://www.malwarebytes.org/products/fil
unknown
http://anthneic.blogspot.com/
unknown
http://www.malwarebytes.org/products/
unknown
http://as.starware.com
unknown
http://www.go2000.cn
unknown
http://cdn.static.malwarebytes.org/client_resources/1.7/images/Chameleon_64x64.png
unknown
http://www.niudoudou.com/web/download/
unknown
http://data-cdn.mbamupdates.com/v0/clients/chicalogic/mbam.check.program
65.9.66.84
http://www.qqceo.net
unknown
http://cdn.static.malwa
unknown
http://geral.gratixhost.com.br/publicidade/publicidade.js
unknown
http://cdn.static.malwarebytes.org/client_r
unknown
http://http.proxy.icq.com/hello
unknown
http://wara6.homeftp.org/c
unknown
http://xml.org/sax/features/validation
unknown
http://cdn.static.malwarebytes.org/client_resources/1.7/images/anti_rootkit_64x64.png
unknown
Http://WwW.YlmF.CoM
unknown
http://data-cdn.mbamupdates.com/v1/news/chicalogic/version.chk
65.9.66.84
http://xml.org/sax/properties/lexical-handler
unknown
http://www.appinf.com/features/enable-partial-reads
unknown
http://www.jetswap.comD
unknown
http://link0125baixa2010.fromru.com/arroxa.exeC:
unknown
http://wsy539.myrice.com
unknown
http://www.cookst.com/sentry/api/20110306.exeW
unknown
http://cdn.stat
unknown
http://w.clic
unknown
http://www.chukotka.kz/cache/msn.php?id=0
unknown
http://www.ww-xxooxx-ch.net
unknown
http://redirecionamentosb.com/sw4.packer
unknown
http://www.desksave.de
unknown
http://cdn.static.malwareb-
unknown
http://www.ankord.com/)
unknown
http://redirecionamentosb.com/sw4.pac
unknown
http://xml.org/sax/features/external-parameter-entities
unknown
http://www.malwarebytes.org/products/startuplite
unknown
http://www.malwarebytes.o
unknown
http://data-cdn.mbamupdates.com/v1/config/chicalogic/version.chk
65.9.66.84
http://www.w3.
unknown
http://d1.kuai8.com
unknown
http://www.appinf.com/features/no-whitespace-in-element-contenthttp://xml.org/sax/features/validatio
unknown
http://www.eyuyan.com)
unknown
http://sms911.ru
unknown
http://b.ez173.com/
unknown
http://www.best-pc.co.kr
unknown
http://www.grandesgans.com/Vista.com
unknown
http://www.8es.cn/code/adview_pic.php
unknown
http://www.pdfforge.org/
unknown
http://www.czsoft.go1.icpcn.com/
unknown
http://www.a0?a.co0
unknown
http://c.ez173.com/
unknown
http://www.GoCasino.com
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
data-cdn.mbamupdates.com
65.9.66.84
edge.data-cdn.mbamupdates.com
unknown
hw.data-cdn.mbamupdates.com
unknown
llnw.data-cdn.mbamupdates.com
unknown
stats.mbamupdates.com
unknown

IPs

IP
Domain
Country
Malicious
65.9.66.84
data-cdn.mbamupdates.com
United States
65.9.66.107
unknown
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AllFilesystemObjects\shellex\ContextMenuHandlers\MBAMShlExt
NULL
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\CPCSProtector\Instances
DefaultInstance
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\CPCSProtector\Instances\CPCSProtector Instance
Altitude
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\CPCSProtector\Instances\CPCSProtector Instance
Flags
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
advancedheuristics
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
downloadprogram
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
hidereg
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
detectp2p
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
detectpum
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
detectpup
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
updatewarn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
updatewarndays
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
useproxy
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
useauthentication
HKEY_CURRENT_USER\SOFTWARE\ChicaPC-Shield
alwaysscanfiles
HKEY_CURRENT_USER\SOFTWARE\ChicaPC-Shield
alwaysscanheuristics
HKEY_CURRENT_USER\SOFTWARE\ChicaPC-Shield
alwaysscanmemory
HKEY_CURRENT_USER\SOFTWARE\ChicaPC-Shield
alwaysscanregistry
HKEY_CURRENT_USER\SOFTWARE\ChicaPC-Shield
alwaysscanstartups
HKEY_CURRENT_USER\SOFTWARE\ChicaPC-Shield
autosavelog
HKEY_CURRENT_USER\SOFTWARE\ChicaPC-Shield
openlog
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
contextmenu
HKEY_CURRENT_USER\SOFTWARE\ChicaPC-Shield
defaultscan
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
reportthreats
HKEY_CURRENT_USER\SOFTWARE\ChicaPC-Shield
terminateie
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
startwithwindows
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
startfsdisabled
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
startipdisabled
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
silentipmode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
autoquarantine
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
notifyinstallprogram
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
trialpromptshown
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
autoquarantinenotify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
alwaysscanarchives
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\cpcs.exe
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\cpcs.exe
Path
HKEY_CURRENT_USER\SOFTWARE\ChicaPC-Shield
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
InstallPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
ChicaPC-Shield
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
dbdate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
dbversion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
programversion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
programbuild
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
Inno Setup: Selected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
Inno Setup: Deselected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
Inno Setup: Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
MajorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
MinorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ChicaPC-Shield_is1
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\MBAMShlExt
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MBAMExt.MBAMShlExt.1
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MBAMExt.MBAMShlExt.1\CLSID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MBAMExt.MBAMShlExt
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MBAMExt.MBAMShlExt\CLSID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MBAMExt.MBAMShlExt\CurVer
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{57CE581A-0CB6-4266-9CA0-19364C90A0B3}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{57CE581A-0CB6-4266-9CA0-19364C90A0B3}\ProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{57CE581A-0CB6-4266-9CA0-19364C90A0B3}\VersionIndependentProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{57CE581A-0CB6-4266-9CA0-19364C90A0B3}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{57CE581A-0CB6-4266-9CA0-19364C90A0B3}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{57CE581A-0CB6-4266-9CA0-19364C90A0B3}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{AFF1A83B-6C83-4342-8E68-1648DE06CB65}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{AFF1A83B-6C83-4342-8E68-1648DE06CB65}\1.0\FLAGS
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{AFF1A83B-6C83-4342-8E68-1648DE06CB65}\1.0\0\win64
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{AFF1A83B-6C83-4342-8E68-1648DE06CB65}\1.0\HELPDIR
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{015FAC74-0374-494A-A02D-316D562C0FCE}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{015FAC74-0374-494A-A02D-316D562C0FCE}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{015FAC74-0374-494A-A02D-316D562C0FCE}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{015FAC74-0374-494A-A02D-316D562C0FCE}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{015FAC74-0374-494A-A02D-316D562C0FCE}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{015FAC74-0374-494A-A02D-316D562C0FCE}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{015FAC74-0374-494A-A02D-316D562C0FCE}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{015FAC74-0374-494A-A02D-316D562C0FCE}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{71A2702D-C7D8-11D2-BEF8-525400DFB47A}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{71A2702D-C7D8-11D2-BEF8-525400DFB47A}\1.0\FLAGS
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{71A2702D-C7D8-11D2-BEF8-525400DFB47A}\1.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{71A2702D-C7D8-11D2-BEF8-525400DFB47A}\1.0\HELPDIR
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A27034-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A27034-C7D8-11D2-BEF8-525400DFB47A}\ProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A27034-C7D8-11D2-BEF8-525400DFB47A}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A27034-C7D8-11D2-BEF8-525400DFB47A}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A27034-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A27034-C7D8-11D2-BEF8-525400DFB47A}\VERSION
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.CTimer
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.CTimer\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}\ProxyStubClsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}\ProxyStubClsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A2702F-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A2702F-C7D8-11D2-BEF8-525400DFB47A}\ProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A2702F-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A2702F-C7D8-11D2-BEF8-525400DFB47A}\VERSION
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.ISubclass
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.ISubclass\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}\ProxyStubClsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A27032-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A27032-C7D8-11D2-BEF8-525400DFB47A}\ProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A27032-C7D8-11D2-BEF8-525400DFB47A}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A27032-C7D8-11D2-BEF8-525400DFB47A}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A27032-C7D8-11D2-BEF8-525400DFB47A}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A27032-C7D8-11D2-BEF8-525400DFB47A}\VERSION
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.GSubclass
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.GSubclass\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{DE8CE233-DD83-481D-844C-C07B96589D3A}\1.1
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{DE8CE233-DD83-481D-844C-C07B96589D3A}\1.1\FLAGS
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{DE8CE233-DD83-481D-844C-C07B96589D3A}\1.1\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{DE8CE233-DD83-481D-844C-C07B96589D3A}\1.1\HELPDIR
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{464D3E06-7D5B-416F-A6EE-0FFB1A5E931B}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{464D3E06-7D5B-416F-A6EE-0FFB1A5E931B}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{464D3E06-7D5B-416F-A6EE-0FFB1A5E931B}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{464D3E06-7D5B-416F-A6EE-0FFB1A5E931B}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{464D3E06-7D5B-416F-A6EE-0FFB1A5E931B}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{459A91BC-193F-4A70-959C-BFF69D781142}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{459A91BC-193F-4A70-959C-BFF69D781142}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EDFD7DF-030D-4144-952E-9D7D86691CDB}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EDFD7DF-030D-4144-952E-9D7D86691CDB}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{1EDFD7DF-030D-4144-952E-9D7D86691CDB}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{1EDFD7DF-030D-4144-952E-9D7D86691CDB}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC90EAA6-69B8-4DE4-9A7B-5B2C5B3FEACD}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC90EAA6-69B8-4DE4-9A7B-5B2C5B3FEACD}\ProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC90EAA6-69B8-4DE4-9A7B-5B2C5B3FEACD}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC90EAA6-69B8-4DE4-9A7B-5B2C5B3FEACD}\VERSION
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.IGridCellOwnerDraw
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.IGridCellOwnerDraw\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66718B8E-A382-4FE2-AA7A-926F9D8C4621}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66718B8E-A382-4FE2-AA7A-926F9D8C4621}\ProxyStubClsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66718B8E-A382-4FE2-AA7A-926F9D8C4621}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66718B8E-A382-4FE2-AA7A-926F9D8C4621}\Forward
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{459A91BC-193F-4A70-959C-BFF69D781142}\ProxyStubClsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9BD3A001-42A2-491E-AACA-9512F6CF4CDB}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9BD3A001-42A2-491E-AACA-9512F6CF4CDB}\ProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9BD3A001-42A2-491E-AACA-9512F6CF4CDB}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9BD3A001-42A2-491E-AACA-9512F6CF4CDB}\VERSION
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridCell
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridCell\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E9FB490-7EE2-46E9-B52A-9DE91DD218F4}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E9FB490-7EE2-46E9-B52A-9DE91DD218F4}\ProxyStubClsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E9FB490-7EE2-46E9-B52A-9DE91DD218F4}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E9FB490-7EE2-46E9-B52A-9DE91DD218F4}\Forward
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D2129738-6A78-4BCB-915A-412982CAA23D}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D2129738-6A78-4BCB-915A-412982CAA23D}\ProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D2129738-6A78-4BCB-915A-412982CAA23D}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D2129738-6A78-4BCB-915A-412982CAA23D}\VERSION
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridSortObject
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridSortObject\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BC39A57D-DF2C-45B4-BFFD-7D55E911C1B2}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BC39A57D-DF2C-45B4-BFFD-7D55E911C1B2}\ProxyStubClsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BC39A57D-DF2C-45B4-BFFD-7D55E911C1B2}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BC39A57D-DF2C-45B4-BFFD-7D55E911C1B2}\Forward
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}\ProxyStubClsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5DA1F2B-B2BF-4DFC-BC9A-439133543A67}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5DA1F2B-B2BF-4DFC-BC9A-439133543A67}\ProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5DA1F2B-B2BF-4DFC-BC9A-439133543A67}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5DA1F2B-B2BF-4DFC-BC9A-439133543A67}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5DA1F2B-B2BF-4DFC-BC9A-439133543A67}\Control
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5DA1F2B-B2BF-4DFC-BC9A-439133543A67}\ToolboxBitmap32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5DA1F2B-B2BF-4DFC-BC9A-439133543A67}\MiscStatus
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5DA1F2B-B2BF-4DFC-BC9A-439133543A67}\MiscStatus\1
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5DA1F2B-B2BF-4DFC-BC9A-439133543A67}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5DA1F2B-B2BF-4DFC-BC9A-439133543A67}\VERSION
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.vbalGrid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.vbalGrid\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}\ProxyStubClsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EDFD7DF-030D-4144-952E-9D7D86691CDB}\ProxyStubClsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{459A91BC-193F-4A70-959C-BFF69D781142}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{464D3E06-7D5B-416F-A6EE-0FFB1A5E931B}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EDFD7DF-030D-4144-952E-9D7D86691CDB}
NULL
HKEY_CURRENT_USER\SOFTWARE\ChicaPC-Shield
selectedrives
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
trialended
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
SchedulerQueue
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ChicaPC-Shield
trialpromptshown
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.CTimer
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.CTimer\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.ISubclass
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.ISubclass\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.GSubclass
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.GSubclass\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.IGridCellOwnerDraw
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.IGridCellOwnerDraw\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridCell
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridCell\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridSortObject
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridSortObject\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.vbalGrid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.vbalGrid\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{464D3E06-7D5B-416F-A6EE-0FFB1A5E931B}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{459A91BC-193F-4A70-959C-BFF69D781142}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EDFD7DF-030D-4144-952E-9D7D86691CDB}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{459A91BC-193F-4A70-959C-BFF69D781142}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{464D3E06-7D5B-416F-A6EE-0FFB1A5E931B}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EDFD7DF-030D-4144-952E-9D7D86691CDB}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_USERS.DEFAULT\Software\ChicaPC-Shield
alwaysscanfiles
HKEY_USERS.DEFAULT\Software\ChicaPC-Shield
alwaysscanheuristics
HKEY_USERS.DEFAULT\Software\ChicaPC-Shield
alwaysscanmemory
HKEY_USERS.DEFAULT\Software\ChicaPC-Shield
alwaysscanregistry
HKEY_USERS.DEFAULT\Software\ChicaPC-Shield
alwaysscanstartups
HKEY_USERS.DEFAULT\Software\ChicaPC-Shield
autosavelog
HKEY_USERS.DEFAULT\Software\ChicaPC-Shield
openlog
HKEY_USERS.DEFAULT\Software\ChicaPC-Shield
defaultscan
HKEY_USERS.DEFAULT\Software\ChicaPC-Shield
terminateie
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.CTimer
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.CTimer\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.ISubclass
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.ISubclass\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.GSubclass
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.GSubclass\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.IGridCellOwnerDraw
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.IGridCellOwnerDraw\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridCell
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridCell\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridSortObject
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridSortObject\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.vbalGrid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.vbalGrid\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{464D3E06-7D5B-416F-A6EE-0FFB1A5E931B}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{459A91BC-193F-4A70-959C-BFF69D781142}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EDFD7DF-030D-4144-952E-9D7D86691CDB}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{459A91BC-193F-4A70-959C-BFF69D781142}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{464D3E06-7D5B-416F-A6EE-0FFB1A5E931B}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EDFD7DF-030D-4144-952E-9D7D86691CDB}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.CTimer
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.CTimer\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.ISubclass
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.ISubclass\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.GSubclass
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SSubTimer6.GSubclass\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27033-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27036-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A2702E-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71A27031-C7D8-11D2-BEF8-525400DFB47A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.IGridCellOwnerDraw
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.IGridCellOwnerDraw\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridCell
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridCell\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridSortObject
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.cGridSortObject\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.vbalGrid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\vbAcceleratorSGrid6.vbalGrid\Clsid
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{464D3E06-7D5B-416F-A6EE-0FFB1A5E931B}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{459A91BC-193F-4A70-959C-BFF69D781142}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EDFD7DF-030D-4144-952E-9D7D86691CDB}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{459A91BC-193F-4A70-959C-BFF69D781142}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{464D3E06-7D5B-416F-A6EE-0FFB1A5E931B}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{497B84D4-FB2F-4AB0-A280-8AACFB4B355F}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CCA2E620-B807-451F-BAFD-2057AF9025FE}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EDFD7DF-030D-4144-952E-9D7D86691CDB}
NULL
There are 330 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
8334000
heap
page read and write
malicious
4663000
heap
page read and write
malicious
8271000
heap
page read and write
malicious
847A000
heap
page read and write
malicious
E02A000
heap
page read and write
322E000
heap
page read and write
21AE000
heap
page read and write
716000
heap
page read and write
326B000
heap
page read and write
71A000
heap
page read and write
3553000
heap
page read and write
6F8B1000
unkown
page readonly
648000
heap
page read and write
3217000
heap
page read and write
E3AA87E000
stack
page read and write
313F000
heap
page read and write
A357000
heap
page read and write
3293000
heap
page read and write
A60A000
heap
page read and write
1E5BCE50000
trusted library allocation
page read and write
30EF000
stack
page read and write
65A000
heap
page read and write
31BC000
heap
page read and write
21AE000
heap
page read and write
DDFE000
heap
page read and write
800000
heap
page read and write
7A3000
heap
page read and write
71A000
heap
page read and write
DFE7000
heap
page read and write
21A8000
heap
page read and write
A1C1000
heap
page read and write
215E000
heap
page read and write
707A000
heap
page read and write
356E000
heap
page read and write
150000
heap
page read and write
325F000
heap
page read and write
1E5B782B000
heap
page read and write
64E000
heap
page read and write
4D9F000
stack
page read and write
D450000
heap
page read and write
3225000
heap
page read and write
3771000
heap
page read and write
D10C000
heap
page read and write
3764000
heap
page read and write
DD4A000
heap
page read and write
4D1E000
stack
page read and write
215B000
heap
page read and write
33A1000
heap
page read and write
6BCC3000
unkown
page readonly
2124000
direct allocation
page read and write
E112000
heap
page read and write
A3C000
stack
page read and write
AA4E000
heap
page read and write
A093000
heap
page read and write
7A3000
heap
page read and write
6BD4B000
unkown
page readonly
500000
heap
page read and write
A48C000
heap
page read and write
A1FE000
heap
page read and write
400000
unkown
page readonly
751000
heap
page read and write
E3AACFE000
unkown
page readonly
3565000
heap
page read and write
6E0000
heap
page read and write
716000
heap
page read and write
6B5000
heap
page read and write
1E5BCD30000
trusted library allocation
page read and write
643000
heap
page read and write
1B0000
heap
page read and write
334B000
heap
page read and write
33A1000
heap
page read and write
6DD000
heap
page read and write
DD8C000
heap
page read and write
3114000
heap
page read and write
1E5B7913000
heap
page read and write
734000
heap
page read and write
31C9000
heap
page read and write
75E000
heap
page read and write
31C1000
heap
page read and write
A5C7000
heap
page read and write
DF4E000
heap
page read and write
AF8E000
heap
page read and write
4F10000
heap
page read and write
6BD48000
unkown
page read and write
DFD6000
heap
page read and write
2158000
heap
page read and write
1E5B8000000
heap
page read and write
A55F000
heap
page read and write
64E000
heap
page read and write
64E000
heap
page read and write
2128000
direct allocation
page read and write
46EC000
heap
page read and write
2159000
heap
page read and write
A411000
heap
page read and write
1E5BCCD0000
trusted library allocation
page read and write
417C000
heap
page read and write
D7D0000
heap
page read and write
1E5BCC60000
trusted library allocation
page read and write
3316000
heap
page read and write
D604000
heap
page read and write
DFF8000
heap
page read and write
AB10000
heap
page read and write
751000
heap
page read and write
31D4000
heap
page read and write
33A3000
heap
page read and write
2B90000
heap
page read and write
751000
heap
page read and write
3221000
heap
page read and write
313A000
heap
page read and write
323C000
stack
page read and write
DCC4000
heap
page read and write
64E000
heap
page read and write
4270000
heap
page read and write
3287000
heap
page read and write
607000
unkown
page readonly
33CF000
heap
page read and write
3779000
heap
page read and write
33A2000
heap
page read and write
A4D7000
heap
page read and write
D7AE000
heap
page read and write
2F4F000
stack
page read and write
A3D7000
heap
page read and write
E3A9CFE000
unkown
page readonly
72F000
heap
page read and write
21AE000
heap
page read and write
D80C000
heap
page read and write
2130000
direct allocation
page read and write
21AE000
heap
page read and write
215C000
direct allocation
page read and write
3571000
heap
page read and write
A6BE000
heap
page read and write
943000
unkown
page readonly
72F000
stack
page read and write
A38B000
heap
page read and write
1E5BCE40000
heap
page read and write
376D000
heap
page read and write
42F0000
trusted library allocation
page read and write
499000
unkown
page write copy
21A8000
heap
page read and write
643000
heap
page read and write
648000
heap
page read and write
64E000
heap
page read and write
734000
heap
page read and write
A0FC000
heap
page read and write
DD52000
heap
page read and write
64E000
heap
page read and write
215E000
heap
page read and write
A6F8000
heap
page read and write
43E000
heap
page read and write
21AE000
heap
page read and write
728000
heap
page read and write
3283000
heap
page read and write
18C000
stack
page read and write
7EB000
stack
page read and write
510000
heap
page read and write
E06C000
heap
page read and write
6BB51000
unkown
page execute read
734000
heap
page read and write
643000
heap
page read and write
2EA0000
heap
page read and write
D581000
heap
page read and write
21AB000
heap
page read and write
A30F000
heap
page read and write
2C5F000
stack
page read and write
213C000
direct allocation
page read and write
21A9000
heap
page read and write
64B000
heap
page read and write
A621000
heap
page read and write
1E5BD030000
trusted library allocation
page read and write
21AE000
heap
page read and write
2184000
direct allocation
page read and write
215A000
heap
page read and write
760000
heap
page read and write
3375000
heap
page read and write
1E5BD090000
remote allocation
page read and write
3221000
heap
page read and write
1E5BCE1F000
heap
page read and write
6F850000
unkown
page readonly
3828000
heap
page read and write
21A8000
heap
page read and write
DCE6000
heap
page read and write
D1D1000
heap
page read and write
2153000
heap
page read and write
D472000
heap
page read and write
649000
heap
page read and write
648000
heap
page read and write
33A1000
heap
page read and write
AF8E000
heap
page read and write
1E5BCCF0000
trusted library allocation
page read and write
325A000
heap
page read and write
32C8000
heap
page read and write
D30A000
heap
page read and write
A44A000
heap
page read and write
3224000
heap
page read and write
BF7E000
heap
page read and write
AF0000
heap
page read and write
1E5BCC70000
trusted library allocation
page read and write
E06C000
heap
page read and write
21A3000
heap
page read and write
D427000
heap
page read and write
650000
heap
page read and write
DD9E000
heap
page read and write
1E5BCE2C000
heap
page read and write
E08E000
heap
page read and write
7CD000
stack
page read and write
A673000
heap
page read and write
303A000
heap
page read and write
4160000
trusted library allocation
page read and write
3570000
trusted library allocation
page read and write
215E000
heap
page read and write
A2ED000
heap
page read and write
1E5B8100000
heap
page read and write
46E5000
heap
page read and write
E00A000
heap
page read and write
23F0000
direct allocation
page read and write
4AB000
unkown
page readonly
46ED000
heap
page read and write
3560000
heap
page read and write
33AA000
heap
page read and write
648000
heap
page read and write
500000
heap
page read and write
69B000
heap
page read and write
734000
heap
page read and write
3852000
heap
page read and write
356F000
stack
page read and write
2153000
heap
page read and write
3111000
heap
page read and write
DDD0000
heap
page read and write
21A3000
heap
page read and write
A536000
heap
page read and write
3231000
heap
page read and write
AA48000
heap
page read and write
DFC6000
heap
page read and write
3217000
heap
page read and write
2290000
direct allocation
page read and write
6534000
heap
page read and write
21AE000
heap
page read and write
D814000
heap
page read and write
570000
heap
page read and write
21AE000
heap
page read and write
21A8000
heap
page read and write
649000
heap
page read and write
3291000
heap
page read and write
75E000
heap
page read and write
64E000
heap
page read and write
A336000
heap
page read and write
64E000
heap
page read and write
354D000
heap
page read and write
3653000
heap
page read and write
9F2B000
heap
page read and write
6BD4B000
unkown
page readonly
69C000
heap
page read and write
716000
heap
page read and write
74D000
heap
page read and write
E3A99FC000
stack
page read and write
75E000
heap
page read and write
46EB000
heap
page read and write
DD8C000
heap
page read and write
4188000
heap
page read and write
46E7000
heap
page read and write
4E70000
trusted library allocation
page read and write
A5DD000
heap
page read and write
215E000
heap
page read and write
64A000
heap
page read and write
3286000
heap
page read and write
31F5000
heap
page read and write
33A1000
heap
page read and write
E3AA0FE000
unkown
page readonly
B056000
heap
page read and write
9E70000
heap
page read and write
A1CD000
heap
page read and write
31D9000
heap
page read and write
CFD9000
heap
page read and write
7871000
heap
page read and write
A511000
heap
page read and write
3332000
heap
page read and write
DDBA000
heap
page read and write
AF74000
heap
page read and write
A5DD000
heap
page read and write
A4CC000
heap
page read and write
2D90000
heap
page read and write
AC8D000
heap
page read and write
3175000
heap
page read and write
DE34000
heap
page read and write
1E5BCD63000
trusted library allocation
page read and write
3577000
heap
page read and write
64E000
heap
page read and write
DFC4000
heap
page read and write
4230000
trusted library allocation
page read and write
E3AA17E000
stack
page read and write
A08B000
heap
page read and write
3291000
heap
page read and write
1E5BCEEC000
heap
page read and write
58A000
heap
page read and write
1E5B8C60000
trusted library allocation
page read and write
30A0000
heap
page read and write
3770000
heap
page read and write
5070000
heap
page read and write
748000
heap
page read and write
311D000
heap
page read and write
21A3000
heap
page read and write
3126000
heap
page read and write
648000
heap
page read and write
64E000
heap
page read and write
2158000
heap
page read and write
2150000
direct allocation
page read and write
E3AAAFE000
unkown
page readonly
A5C7000
heap
page read and write
46F1000
heap
page read and write
400000
unkown
page readonly
DEF8000
heap
page read and write
31EF000
heap
page read and write
3853000
heap
page read and write
DFC4000
heap
page read and write
3D26000
heap
page read and write
2153000
heap
page read and write
A220000
heap
page read and write
6BB50000
unkown
page readonly
A709000
heap
page read and write
A070000
heap
page read and write
8E0000
unkown
page readonly
3225000
heap
page read and write
215E000
heap
page read and write
9EB1000
heap
page read and write
4DB0000
heap
page read and write
3298000
heap
page read and write
80E000
stack
page read and write
2FFE000
stack
page read and write
1E5B788F000
heap
page read and write
2158000
heap
page read and write
64E000
heap
page read and write
6BD3A000
unkown
page write copy
21AB000
heap
page read and write
1EA5000
heap
page read and write
336F000
heap
page read and write
328D000
heap
page read and write
88A000
heap
page read and write
3114000
heap
page read and write
3391000
heap
page read and write
A514000
heap
page read and write
32D1000
heap
page read and write
4760000
heap
page read and write
A54E000
heap
page read and write
620000
unkown
page readonly
313A000
heap
page read and write
4220000
heap
page read and write
A55F000
heap
page read and write
64A000
heap
page read and write
215B000
heap
page read and write
A248000
heap
page read and write
A39A000
heap
page read and write
1E5BCD20000
trusted library allocation
page read and write
3AD7000
heap
page read and write
3846000
heap
page read and write
DC0A000
heap
page read and write
3291000
heap
page read and write
DF80000
heap
page read and write
A166000
heap
page read and write
A5A2000
heap
page read and write
AE0000
heap
page read and write
33A1000
heap
page read and write
23F0000
direct allocation
page read and write
A259000
heap
page read and write
64E000
heap
page read and write
2159000
heap
page read and write
3762000
heap
page read and write
DC61000
heap
page read and write
CDB6000
heap
page read and write
21AE000
heap
page read and write
376C000
heap
page read and write
A5C7000
heap
page read and write
3349000
heap
page read and write
33D4000
heap
page read and write
2158000
heap
page read and write
31E0000
trusted library allocation
page read and write
1E5B7902000
heap
page read and write
321D000
heap
page read and write
A294000
heap
page read and write
9734000
heap
page read and write
D757000
heap
page read and write
6BCC3000
unkown
page readonly
31B5000
heap
page read and write
32FB000
heap
page read and write
3000000
heap
page read and write
21A9000
heap
page read and write
64E000
heap
page read and write
2158000
heap
page read and write
328D000
heap
page read and write
3851000
heap
page read and write
DF82000
heap
page read and write
D4B1000
heap
page read and write
5A0000
heap
page read and write
311D000
heap
page read and write
3396000
heap
page read and write
3760000
heap
page read and write
E3AA27E000
stack
page read and write
2250000
heap
page read and write
321D000
heap
page read and write
DC6E000
heap
page read and write
21A3000
heap
page read and write
D1A2000
heap
page read and write
40D000
unkown
page write copy
64E000
heap
page read and write
3223000
heap
page read and write
46DD000
heap
page read and write
2178000
direct allocation
page read and write
D61D000
heap
page read and write
A8F9000
heap
page read and write
3040000
heap
page read and write
D799000
heap
page read and write
3217000
heap
page read and write
9F11000
heap
page read and write
716000
heap
page read and write
860000
heap
page read and write
A852000
heap
page read and write
31B8000
heap
page read and write
4190000
heap
page read and write
714000
heap
page read and write
64B000
heap
page read and write
21AE000
heap
page read and write
A11D000
heap
page read and write
31D6000
heap
page read and write
40B000
unkown
page write copy
98F000
stack
page read and write
1E5B8391000
trusted library allocation
page read and write
A69D000
heap
page read and write
21A9000
heap
page read and write
1E5B7800000
heap
page read and write
A62F000
heap
page read and write
100B000
stack
page read and write
1FE000
stack
page read and write
649000
heap
page read and write
D4D3000
heap
page read and write
A3D4000
heap
page read and write
A1CB000
heap
page read and write
A01C000
heap
page read and write
A220000
heap
page read and write
4E60000
heap
page read and write
D28B000
heap
page read and write
714000
heap
page read and write
A217000
heap
page read and write
D6EC000
heap
page read and write
DDAE000
heap
page read and write
74D000
heap
page read and write
E0F3000
heap
page read and write
44A000
heap
page read and write
717000
heap
page read and write
296E000
stack
page read and write
1E5BCE40000
trusted library allocation
page read and write
987A000
heap
page read and write
33A3000
heap
page read and write
A4CC000
heap
page read and write
A5B5000
heap
page read and write
E01A000
heap
page read and write
3760000
heap
page read and write
324E000
heap
page read and write
1E5BCE55000
heap
page read and write
215A000
heap
page read and write
BC000
stack
page read and write
2187000
direct allocation
page read and write
3185000
heap
page read and write
DBA6000
heap
page read and write
3396000
heap
page read and write
21AE000
heap
page read and write
9B000
stack
page read and write
21AE000
heap
page read and write
356A000
heap
page read and write
2120000
direct allocation
page read and write
19D000
stack
page read and write
3777000
heap
page read and write
6BB51000
unkown
page execute read
A57A000
heap
page read and write
3C63000
heap
page read and write
3362000
heap
page read and write
316F000
heap
page read and write
339D000
heap
page read and write
D7F2000
heap
page read and write
DFC4000
heap
page read and write
21AE000
heap
page read and write
A514000
heap
page read and write
3560000
heap
page read and write
A5B8000
heap
page read and write
4184000
heap
page read and write
D6AC000
heap
page read and write
3290000
heap
page read and write
A04E000
heap
page read and write
1E5BCF02000
heap
page read and write
2F7C000
stack
page read and write
40B000
unkown
page read and write
3030000
heap
page read and write
A06B000
heap
page read and write
A086000
heap
page read and write
2168000
direct allocation
page read and write
32EF000
heap
page read and write
2B4E000
heap
page read and write
3148000
heap
page read and write
2BBD000
heap
page read and write
21AE000
heap
page read and write
319B000
heap
page read and write
335E000
heap
page read and write
E3A9AFE000
unkown
page readonly
2290000
direct allocation
page read and write
A073000
heap
page read and write
E114000
heap
page read and write
3140000
heap
page read and write
E0F1000
heap
page read and write
215E000
heap
page read and write
420000
heap
page read and write
31B4000
heap
page read and write
46D4000
heap
page read and write
2C6D000
heap
page read and write
A0A4000
heap
page read and write
3151000
heap
page read and write
87B000
heap
page read and write
2BB3000
heap
page read and write
215E000
heap
page read and write
32C5000
heap
page read and write
1E5BCDC0000
trusted library allocation
page read and write
31EF000
heap
page read and write
DCE6000
heap
page read and write
21A9000
heap
page read and write
1E5BCE00000
heap
page read and write
A701000
heap
page read and write
2178000
direct allocation
page read and write
99D6000
heap
page read and write
88F000
stack
page read and write
A3C0000
heap
page read and write
3196000
heap
page read and write
DDAE000
heap
page read and write
DCE0000
heap
page read and write
2159000
heap
page read and write
A09F000
heap
page read and write
DFB4000
heap
page read and write
215A000
heap
page read and write
E3AB4FE000
unkown
page readonly
3223000
heap
page read and write
D76B000
heap
page read and write
A073000
heap
page read and write
33AA000
heap
page read and write
A101000
heap
page read and write
21A8000
heap
page read and write
AC81000
heap
page read and write
46D7000
heap
page read and write
E3AAEFE000
unkown
page readonly
3111000
heap
page read and write
1E5B8015000
heap
page read and write
D77F000
heap
page read and write
E3A9BF9000
stack
page read and write
5B0000
unkown
page readonly
1E5BCD20000
trusted library allocation
page read and write
1DB0000
heap
page read and write
217C000
direct allocation
page read and write
46F2000
heap
page read and write
D6DB000
heap
page read and write
31FB000
heap
page read and write
1E5B7FA0000
trusted library section
page readonly
21D8000
direct allocation
page read and write
6BCD5000
unkown
page readonly
6E9000
heap
page read and write
640000
heap
page read and write
74B000
heap
page read and write
71A000
heap
page read and write
A094000
heap
page read and write
2F3B000
stack
page read and write
3397000
heap
page read and write
AA6F000
heap
page read and write
1EA0000
heap
page read and write
64A000
heap
page read and write
3291000
heap
page read and write
64B000
heap
page read and write
2158000
heap
page read and write
D66D000
heap
page read and write
A070000
heap
page read and write
9BA5000
heap
page read and write
3564000
heap
page read and write
32D4000
heap
page read and write
751000
heap
page read and write
D46E000
heap
page read and write
4D5E000
stack
page read and write
2B48000
heap
page read and write
DE13000
heap
page read and write
401000
unkown
page execute read
1E5B7879000
heap
page read and write
21AE000
heap
page read and write
6E0000
heap
page read and write
1E5B7FB0000
trusted library section
page readonly
E3A95F7000
stack
page read and write
A482000
heap
page read and write
A53D000
heap
page read and write
311D000
heap
page read and write
22D0000
heap
page read and write
21A9000
heap
page read and write
215E000
heap
page read and write
734000
heap
page read and write
74D000
heap
page read and write
21AE000
heap
page read and write
32DD000
heap
page read and write
643000
heap
page read and write
32B4000
heap
page read and write
21A8000
heap
page read and write
DDD0000
heap
page read and write
A3B1000
heap
page read and write
A0AE000
heap
page read and write
565000
heap
page read and write
22D5000
heap
page read and write
648000
heap
page read and write
2158000
direct allocation
page read and write
D614000
heap
page read and write
E0B1000
heap
page read and write
3239000
heap
page read and write
AAA1000
heap
page read and write
33A5000
heap
page read and write
354D000
heap
page read and write
22B0000
heap
page read and write
31F3000
heap
page read and write
3133000
heap
page read and write
9D87000
heap
page read and write
D596000
heap
page read and write
21AA000
heap
page read and write
64A000
heap
page read and write
1E5BE000000
heap
page read and write
607000
unkown
page readonly
A1ED000
heap
page read and write
E3AA6FE000
unkown
page readonly
893000
heap
page read and write
21AE000
heap
page read and write
A640000
heap
page read and write
3776000
heap
page read and write
32EE000
stack
page read and write
355F000
heap
page read and write
21A9000
heap
page read and write
72F000
heap
page read and write
215E000
heap
page read and write
CFA5000
heap
page read and write
D5B7000
heap
page read and write
355F000
heap
page read and write
A55D000
heap
page read and write
1E5B78A1000
heap
page read and write
A2A1000
heap
page read and write
2C9E000
stack
page read and write
65E000
heap
page read and write
3C13000
heap
page read and write
21AE000
heap
page read and write
648000
heap
page read and write
6BD42000
unkown
page read and write
3110000
direct allocation
page read and write
730000
heap
page read and write
1E5B8640000
trusted library allocation
page read and write
400000
unkown
page readonly
D200000
heap
page read and write
A493000
heap
page read and write
A364000
heap
page read and write
215E000
heap
page read and write
D648000
heap
page read and write
46D0000
heap
page read and write
5AB000
stack
page read and write
3BA3000
heap
page read and write
21AB000
heap
page read and write
1E5BCD60000
trusted library allocation
page read and write
31A4000
heap
page read and write
71A000
heap
page read and write
D31E000
heap
page read and write
1E20000
heap
page read and write
2BFB000
stack
page read and write
32F0000
heap
page read and write
2159000
heap
page read and write
3326000
heap
page read and write
3565000
heap
page read and write
46E000
unkown
page readonly
64B000
heap
page read and write
A5ED000
heap
page read and write
2F80000
heap
page read and write
401000
unkown
page execute read
215E000
heap
page read and write
9F2B000
heap
page read and write
2CB0000
heap
page read and write
32A9000
heap
page read and write
3223000
heap
page read and write
1E5B811B000
heap
page read and write
A08E000
heap
page read and write
A554000
heap
page read and write
355F000
heap
page read and write
2158000
heap
page read and write
2FF0000
heap
page read and write
3579000
heap
page read and write
33FC000
heap
page read and write
2158000
heap
page read and write
5B1000
unkown
page execute read
49C000
stack
page read and write
E3AA2FE000
unkown
page readonly
A445000
heap
page read and write
A69B000
heap
page read and write
648000
heap
page read and write
2138000
direct allocation
page read and write
A36D000
heap
page read and write
A5A4000
heap
page read and write
E3A927B000
stack
page read and write
64E000
stack
page read and write
17E000
stack
page read and write
21A8000
heap
page read and write
1CC0000
heap
page read and write
10F0000
heap
page read and write
6D5000
heap
page read and write
A3FF000
heap
page read and write
3286000
heap
page read and write
B046000
heap
page read and write
D77F000
heap
page read and write
DD58000
heap
page read and write
733000
heap
page read and write
DDDC000
heap
page read and write
215E000
heap
page read and write
3265000
heap
page read and write
DC90000
heap
page read and write
1E5BCEF4000
heap
page read and write
6ED000
heap
page read and write
DEC8000
heap
page read and write
A4FB000
heap
page read and write
1E5BCDD0000
trusted library allocation
page read and write
4176000
heap
page read and write
A4B5000
heap
page read and write
2B8E000
stack
page read and write
46E000
unkown
page readonly
D66A000
heap
page read and write
130000
heap
page read and write
DDAE000
heap
page read and write
C15000
heap
page read and write
A43A000
heap
page read and write
A7B3000
heap
page read and write
2158000
heap
page read and write
328D000
heap
page read and write
E3AA1FE000
unkown
page readonly
21AE000
heap
page read and write
600000
heap
page read and write
3213000
heap
page read and write
323D000
heap
page read and write
49D000
unkown
page write copy
64E000
heap
page read and write
3293000
heap
page read and write
215E000
heap
page read and write
A14E000
heap
page read and write
46E000
unkown
page readonly
A13D000
heap
page read and write
3246000
heap
page read and write
1E5BCE8E000
heap
page read and write
443000
heap
page read and write
339D000
heap
page read and write
64E000
heap
page read and write
305A000
heap
page read and write
A13A000
heap
page read and write
A6E0000
heap
page read and write
2153000
heap
page read and write
A5CC000
heap
page read and write
2FE0000
heap
page read and write
4864000
heap
page read and write
1E5B7FE0000
trusted library section
page readonly
3249000
heap
page read and write
33A8000
heap
page read and write
CEB6000
heap
page read and write
3242000
heap
page read and write
3E2F000
stack
page read and write
3252000
heap
page read and write
A9C3000
heap
page read and write
CDDF000
heap
page read and write
712000
heap
page read and write
2158000
heap
page read and write
62E000
stack
page read and write
215A000
heap
page read and write
680000
direct allocation
page execute and read and write
32FF000
heap
page read and write
A126000
heap
page read and write
354D000
heap
page read and write
49B000
unkown
page read and write
31DE000
heap
page read and write
A546000
heap
page read and write
334D000
heap
page read and write
3556000
heap
page read and write
21AE000
heap
page read and write
21AE000
heap
page read and write
D384000
heap
page read and write
21AA000
heap
page read and write
3670000
heap
page read and write
734000
heap
page read and write
1E5B78B3000
heap
page read and write
648000
heap
page read and write
649000
heap
page read and write
3281000
heap
page read and write
400000
unkown
page readonly
7934000
heap
page read and write
A1DD000
heap
page read and write
4F26000
direct allocation
page read and write
3192000
heap
page read and write
AA81000
heap
page read and write
D836000
heap
page read and write
33A3000
heap
page read and write
3B27000
heap
page read and write
DF70000
heap
page read and write
DD8C000
heap
page read and write
A6D4000
heap
page read and write
215E000
heap
page read and write
9F47000
heap
page read and write
21A9000
heap
page read and write
A4F0000
heap
page read and write
9F2D000
heap
page read and write
E3AA9FE000
unkown
page readonly
21A3000
heap
page read and write
9FFA000
heap
page read and write
4E00000
heap
page read and write
647000
heap
page read and write
A0AE000
heap
page read and write
9E87000
heap
page read and write
DCF8000
heap
page read and write
6F8C6000
unkown
page read and write
DF80000
heap
page read and write
215E000
heap
page read and write
64E000
heap
page read and write
3292000
heap
page read and write
5F0000
heap
page read and write
215E000
heap
page read and write
3560000
heap
page read and write
3110000
heap
page read and write
A51B000
heap
page read and write
215E000
heap
page read and write
21AA000
heap
page read and write
C10000
heap
page read and write
21A8000
heap
page read and write
2BE0000
heap
page read and write
308E000
stack
page read and write
6471000
heap
page read and write
750000
heap
page read and write
A4A9000
heap
page read and write
6F851000
unkown
page execute read
DC72000
heap
page read and write
A378000
heap
page read and write
A514000
heap
page read and write
4880000
trusted library allocation
page read and write
2790000
trusted library allocation
page read and write
D151000
heap
page read and write
C828000
heap
page read and write
2DAE000
heap
page read and write
3164000
heap
page read and write
4170000
heap
page read and write
64E000
heap
page read and write
3571000
heap
page read and write
3283000
heap
page read and write
21AE000
heap
page read and write
515000
heap
page read and write
30F0000
heap
page read and write
607000
heap
page read and write
215A000
heap
page read and write
3295000
heap
page read and write
21A9000
heap
page read and write
A2B2000
heap
page read and write
400000
unkown
page readonly
DE20000
heap
page read and write
A37E000
heap
page read and write
3129000
heap
page read and write
21A8000
heap
page read and write
3556000
heap
page read and write
21A9000
heap
page read and write
3E64000
heap
page read and write
A418000
heap
page read and write
A5DD000
heap
page read and write
A3F6000
heap
page read and write
75E000
heap
page read and write
4190000
heap
page read and write
21A8000
heap
page read and write
A5F000
stack
page read and write
A5CA000
heap
page read and write
2159000
heap
page read and write
311A000
heap
page read and write
72F000
heap
page read and write
1E5B7874000
heap
page read and write
64E000
heap
page read and write
64E000
heap
page read and write
A546000
heap
page read and write
A343000
heap
page read and write
2118000
direct allocation
page read and write
3295000
heap
page read and write
AAED000
heap
page read and write
3397000
heap
page read and write
9671000
heap
page read and write
329E000
heap
page read and write
E3AA67E000
stack
page read and write
42E0000
heap
page read and write
6BD3A000
unkown
page write copy
DEF9000
heap
page read and write
3687000
heap
page read and write
215E000
heap
page read and write
3222000
heap
page read and write
4E63000
direct allocation
page read and write
215E000
heap
page read and write
215E000
heap
page read and write
140000
heap
page read and write
1E5B7900000
heap
page read and write
3291000
heap
page read and write
7A3000
heap
page read and write
32D8000
heap
page read and write
3561000
heap
page read and write
411000
unkown
page readonly
6F8B1000
unkown
page readonly
6AD000
heap
page read and write
320D000
heap
page read and write
21AA000
heap
page read and write
92C000
unkown
page readonly
2159000
heap
page read and write
10F5000
heap
page read and write
A0D6000
heap
page read and write
8D34000
heap
page read and write
5AA000
heap
page read and write
315D000
heap
page read and write
3397000
heap
page read and write
314C000
heap
page read and write
438C000
stack
page read and write
3780000
heap
page read and write
7A8000
heap
page read and write
ABEA000
heap
page read and write
2158000
heap
page read and write
DB21000
heap
page read and write
329D000
heap
page read and write
D3A5000
heap
page read and write
DF2C000
heap
page read and write
2B51000
heap
page read and write
3556000
heap
page read and write
2158000
heap
page read and write
215E000
heap
page read and write
3851000
heap
page read and write
3560000
heap
page read and write
6EB000
heap
page read and write
A5E2000
heap
page read and write
9E93000
heap
page read and write
A90000
heap
page read and write
3221000
heap
page read and write
DD99000
heap
page read and write
355E000
heap
page read and write
2158000
heap
page read and write
2158000
heap
page read and write
3341000
heap
page read and write
215E000
heap
page read and write
21AE000
heap
page read and write
21AE000
heap
page read and write
215B000
heap
page read and write
21A8000
direct allocation
page read and write
A491000
heap
page read and write
A424000
heap
page read and write
620000
unkown
page readonly
E3A9FFB000
stack
page read and write
D107000
heap
page read and write
21AE000
heap
page read and write
216C000
direct allocation
page read and write
1110000
heap
page read and write
64E000
heap
page read and write
4120000
heap
page read and write
56C0000
heap
page read and write
333D000
heap
page read and write
39E9000
heap
page read and write
215E000
heap
page read and write
667A000
heap
page read and write
DF4E000
heap
page read and write
9EB7000
heap
page read and write
6F8CC000
unkown
page readonly
A0B8000
heap
page read and write
DE64000
heap
page read and write
215B000
heap
page read and write
A1E000
stack
page read and write
2D9A000
heap
page read and write
401000
unkown
page execute read
A6CE000
heap
page read and write
3838000
heap
page read and write
31C8000
heap
page read and write
21AA000
heap
page read and write
215E000
heap
page read and write
418C000
heap
page read and write
A2FE000
heap
page read and write
4179000
heap
page read and write
75E000
heap
page read and write
342F000
stack
page read and write
D78D000
heap
page read and write
3565000
heap
page read and write
2180000
direct allocation
page read and write
860000
heap
page read and write
560000
heap
page read and write
D075000
heap
page read and write
6BD42000
unkown
page read and write
6F8CC000
unkown
page readonly
E3AA57E000
stack
page read and write
339D000
heap
page read and write
580000
heap
page read and write
E02B000
heap
page read and write
33E0000
heap
page read and write
331D000
heap
page read and write
DEEA000
heap
page read and write
3352000
heap
page read and write
D5B7000
heap
page read and write
31D4000
heap
page read and write
A3B000
stack
page read and write
720000
heap
page read and write
E3AB47E000
stack
page read and write
2158000
heap
page read and write
3181000
heap
page read and write
21A9000
heap
page read and write
A210000
heap
page read and write
5170000
heap
page read and write
7A8000
heap
page read and write
A568000
heap
page read and write
649000
heap
page read and write
64E000
heap
page read and write
D6FD000
heap
page read and write
31A6000
heap
page read and write
3391000
heap
page read and write
327C000
heap
page read and write
A4E9000
heap
page read and write
A5B4000
heap
page read and write
3815000
heap
page read and write
1E5B8C41000
trusted library allocation
page read and write
64E000
heap
page read and write
337B000
heap
page read and write
2157000
heap
page read and write
1E0000
heap
page read and write
4AB000
unkown
page readonly
A6E7000
heap
page read and write
4A00000
trusted library allocation
page read and write
A14E000
heap
page read and write
3280000
heap
page read and write
215E000
heap
page read and write
2178000
direct allocation
page read and write
2153000
heap
page read and write
354F000
heap
page read and write
20F0000
direct allocation
page read and write
730000
heap
page read and write
21A7000
heap
page read and write
3216000
heap
page read and write
318D000
heap
page read and write
380000
heap
page read and write
3396000
heap
page read and write
6BD35000
unkown
page read and write
8E7A000
heap
page read and write
32EC000
heap
page read and write
4870000
heap
page read and write
86A000
heap
page read and write
215E000
heap
page read and write
312B000
heap
page read and write
2159000
heap
page read and write
329D000
heap
page read and write
A09C000
heap
page read and write
64B000
heap
page read and write
22D9000
heap
page read and write
21AB000
heap
page read and write
A4A5000
heap
page read and write
A84B000
heap
page read and write
E06C000
heap
page read and write
21AA000
heap
page read and write
1C0000
heap
page read and write
3286000
heap
page read and write
A3D4000
heap
page read and write
A0B3000
heap
page read and write
21A8000
heap
page read and write
346E000
stack
page read and write
1E5B7F90000
trusted library section
page readonly
640000
heap
page read and write
6F851000
unkown
page execute read
3169000
heap
page read and write
64E000
heap
page read and write
318D000
heap
page read and write
734000
heap
page read and write
64E000
heap
page read and write
1E5B8002000
heap
page read and write
3555000
heap
page read and write
E01A000
heap
page read and write
2108000
direct allocation
page read and write
A176000
heap
page read and write
D5C2000
heap
page read and write
A5A6000
heap
page read and write
2F0E000
stack
page read and write
746000
heap
page read and write
45B000
stack
page read and write
215B000
heap
page read and write
321D000
heap
page read and write
3294000
heap
page read and write
A5B5000
heap
page read and write
21AE000
heap
page read and write
E08E000
heap
page read and write
A533000
heap
page read and write
31E5000
heap
page read and write
3848000
heap
page read and write
DFE8000
heap
page read and write
A26D000
heap
page read and write
6F8C6000
unkown
page read and write
DF76000
heap
page read and write
32F5000
heap
page read and write
32CC000
heap
page read and write
9FD9000
heap
page read and write
356E000
heap
page read and write
A4A2000
heap
page read and write
A0DB000
heap
page read and write
3570000
heap
page read and write
30C000
stack
page read and write
AC24000
heap
page read and write
734000
heap
page read and write
D4B6000
heap
page read and write
4D0F000
stack
page read and write
375D000
heap
page read and write
418A000
heap
page read and write
1E5B783F000
heap
page read and write
2CB000
stack
page read and write
A5DD000
heap
page read and write
643000
heap
page read and write
354E000
heap
page read and write
21A8000
heap
page read and write
33A3000
heap
page read and write
3393000
heap
page read and write
A7C000
stack
page read and write
DB64000
heap
page read and write
A166000
heap
page read and write
D4FA000
heap
page read and write
751000
heap
page read and write
649000
heap
page read and write
215A000
heap
page read and write
A8FF000
heap
page read and write
21A8000
heap
page read and write
1E5BCF0A000
heap
page read and write
4E5C000
direct allocation
page read and write
5A3000
heap
page read and write
21AE000
heap
page read and write
64E000
heap
page read and write
1F0000
heap
page read and write
9FB5000
heap
page read and write
1E5BD040000
trusted library allocation
page read and write
215E000
heap
page read and write
5B1000
unkown
page execute read
3A19000
heap
page read and write
E3A9DFB000
stack
page read and write
A086000
heap
page read and write
748000
heap
page read and write
32A0000
heap
page read and write
A43B000
heap
page read and write
648000
heap
page read and write
650000
heap
page read and write
21AE000
heap
page read and write
2140000
direct allocation
page read and write
E06C000
heap
page read and write
1E5B8820000
trusted library allocation
page read and write
728000
heap
page read and write
1E5BCEFD000
heap
page read and write
21A3000
heap
page read and write
AFC9000
heap
page read and write
DFD6000
heap
page read and write
DF1A000
heap
page read and write
E3AA97E000
stack
page read and write
746000
heap
page read and write
33A5000
heap
page read and write
4F20000
trusted library allocation
page read and write
3591000
heap
page read and write
215B000
heap
page read and write
7AE000
stack
page read and write
21AE000
heap
page read and write
318D000
heap
page read and write
DE42000
heap
page read and write
322D000
heap
page read and write
64A000
heap
page read and write
3565000
heap
page read and write
2159000
heap
page read and write
A2B2000
heap
page read and write
3312000
heap
page read and write
A164000
heap
page read and write
A573000
heap
page read and write
1E5BCEBF000
heap
page read and write
DD08000
heap
page read and write
A56E000
heap
page read and write
B002000
heap
page read and write
1E5BCF04000
heap
page read and write
1E5B7710000
heap
page read and write
42A000
heap
page read and write
3211000
heap
page read and write
5AA000
heap
page read and write
64E000
heap
page read and write
59E000
heap
page read and write
3277000
heap
page read and write
DE86000
heap
page read and write
1E5B8113000
heap
page read and write
3291000
heap
page read and write
D206000
heap
page read and write
2137000
direct allocation
page read and write
A536000
heap
page read and write
D206000
heap
page read and write
33BA000
heap
page read and write
64E000
heap
page read and write
1EEA000
heap
page read and write
318D000
heap
page read and write
A2FE000
heap
page read and write
D31A000
heap
page read and write
64E000
heap
page read and write
E3AA7FE000
unkown
page readonly
6DF000
heap
page read and write
A37C000
heap
page read and write
E008000
heap
page read and write
326E000
stack
page read and write
AD34000
heap
page read and write
21AE000
heap
page read and write
662000
heap
page read and write
A5B4000
heap
page read and write
A4A7000
heap
page read and write
1EE0000
heap
page read and write
21A4000
direct allocation
page read and write
D328000
heap
page read and write
B1E000
stack
page read and write
3130000
heap
page read and write
6F850000
unkown
page readonly
A086000
heap
page read and write
DD58000
heap
page read and write
31B2000
heap
page read and write
64E000
heap
page read and write
751000
heap
page read and write
3932000
heap
page read and write
33D4000
heap
page read and write
AE0000
heap
page read and write
A595000
heap
page read and write
A094000
heap
page read and write
215E000
heap
page read and write
A293000
heap
page read and write
3295000
heap
page read and write
510000
heap
page read and write
32E9000
heap
page read and write
354D000
heap
page read and write
21A0000
direct allocation
page read and write
39F0000
heap
page read and write
A14E000
heap
page read and write
A155000
heap
page read and write
377F000
heap
page read and write
2100000
direct allocation
page read and write
22FC000
heap
page read and write
A8F2000
heap
page read and write
A626000
heap
page read and write
1E5B7FC0000
trusted library section
page readonly
9BC0000
heap
page read and write
1E5B7730000
heap
page read and write
49A000
unkown
page write copy
3356000
heap
page read and write
A321000
heap
page read and write
DD08000
heap
page read and write
3211000
heap
page read and write
1E5BCD34000
trusted library allocation
page read and write
22A0000
heap
page read and write
1E5BCEC8000
heap
page read and write
8E1000
unkown
page execute read
9E5B000
heap
page read and write
1A0000
heap
page read and write
320B000
heap
page read and write
A2DD000
heap
page read and write
A4A5000
heap
page read and write
CABE000
heap
page read and write
215E000
heap
page read and write
A31E000
heap
page read and write
1E5B7813000
heap
page read and write
1D10000
heap
page read and write
3222000
heap
page read and write
E02A000
heap
page read and write
72F000
heap
page read and write
2DB3000
heap
page read and write
400000
unkown
page readonly
31C1000
heap
page read and write
A4A2000
heap
page read and write
2B4D000
heap
page read and write
A2A1000
heap
page read and write
E3A97FE000
stack
page read and write
650000
heap
page read and write
D5FB000
heap
page read and write
A188000
heap
page read and write
A57A000
heap
page read and write
1E5BCCF0000
trusted library allocation
page read and write
A40E000
heap
page read and write
2153000
heap
page read and write
72F000
heap
page read and write
A71A000
heap
page read and write
93D000
unkown
page write copy
2170000
direct allocation
page read and write
A45B000
heap
page read and write
364F000
stack
page read and write
A060000
heap
page read and write
31CD000
heap
page read and write
3110000
heap
page read and write
51E000
heap
page read and write
9E95000
heap
page read and write
3354000
heap
page read and write
650000
heap
page read and write
418A000
heap
page read and write
DF92000
heap
page read and write
22AE000
stack
page read and write
215A000
heap
page read and write
3565000
heap
page read and write
4EC9000
direct allocation
page read and write
6B2000
heap
page read and write
A47D000
heap
page read and write
6BD48000
unkown
page read and write
377C000
heap
page read and write
9FFA000
heap
page read and write
1E5BCE4D000
heap
page read and write
1E5B782F000
heap
page read and write
A126000
heap
page read and write
DF7A000
heap
page read and write
DDD0000
heap
page read and write
E136000
heap
page read and write
AA0000
heap
page read and write
648000
heap
page read and write
730000
heap
page read and write
215E000
heap
page read and write
72F000
heap
page read and write
71A000
heap
page read and write
2FDB000
stack
page read and write
1E5BCED7000
heap
page read and write
3110000
direct allocation
page read and write
A5D3000
heap
page read and write
3B21000
heap
page read and write
649000
heap
page read and write
51E000
heap
page read and write
A714000
heap
page read and write
A9F6000
heap
page read and write
1E5BCEFA000
heap
page read and write
A2FE000
heap
page read and write
732000
heap
page read and write
2BB8000
heap
page read and write
E3AA3FE000
unkown
page readonly
2B61000
heap
page read and write
69B000
heap
page read and write
D6B9000
heap
page read and write
3359000
heap
page read and write
3781000
heap
page read and write
DC31000
heap
page read and write
420000
heap
page read and write
1E5B811A000
heap
page read and write
A591000
heap
page read and write
3225000
heap
page read and write
A336000
heap
page read and write
A69B000
heap
page read and write
21AE000
heap
page read and write
A166000
heap
page read and write
215E000
heap
page read and write
3270000
heap
page read and write
339D000
heap
page read and write
2F70000
heap
page read and write
64E000
heap
page read and write
A522000
heap
page read and write
4110000
heap
page read and write
3216000
heap
page read and write
31B0000
heap
page read and write
D42F000
heap
page read and write
6BB50000
unkown
page readonly
1E5B8102000
heap
page read and write
51E000
heap
page read and write
1B8C000
stack
page read and write
A079000
heap
page read and write
329D000
heap
page read and write
64E000
heap
page read and write
751000
heap
page read and write
DF5E000
heap
page read and write
A061000
heap
page read and write
9B000
stack
page read and write
FEC000
stack
page read and write
401000
unkown
page execute read
215E000
heap
page read and write
DD4A000
heap
page read and write
2160000
direct allocation
page read and write
2144000
direct allocation
page read and write
71E000
heap
page read and write
A151000
heap
page read and write
39F5000
heap
page read and write
20F4000
direct allocation
page read and write
D42B000
heap
page read and write
370000
heap
page read and write
21AE000
heap
page read and write
DCD3000
heap
page read and write
31EA000
heap
page read and write
21AE000
heap
page read and write
A31E000
heap
page read and write
3184000
heap
page read and write
DCF4000
heap
page read and write
3287000
heap
page read and write
1E5B7851000
heap
page read and write
D878000
heap
page read and write
AF7D000
heap
page read and write
1BE0000
heap
page read and write
A4CC000
heap
page read and write
2153000
heap
page read and write
A0DB000
heap
page read and write
1F04000
heap
page read and write
643000
heap
page read and write
215E000
heap
page read and write
E3AADFD000
stack
page read and write
64E000
heap
page read and write
E3AA37E000
stack
page read and write
1E5B7740000
heap
page read and write
64E000
heap
page read and write
64E000
heap
page read and write
A672000
heap
page read and write
E04C000
heap
page read and write
22A0000
direct allocation
page read and write
1DFD000
stack
page read and write
D6DF000
heap
page read and write
8C71000
heap
page read and write
4187000
heap
page read and write
DD5A000
heap
page read and write
355D000
heap
page read and write
A4EF000
heap
page read and write
78D000
stack
page read and write
DD16000
heap
page read and write
1B9F000
stack
page read and write
3768000
heap
page read and write
ADCF000
heap
page read and write
A45C000
heap
page read and write
2153000
heap
page read and write
A65E000
heap
page read and write
215E000
heap
page read and write
3286000
heap
page read and write
643000
heap
page read and write
215E000
heap
page read and write
A3C2000
heap
page read and write
BFB6000
heap
page read and write
1E5BCD30000
trusted library allocation
page read and write
1E5B7891000
heap
page read and write
1E5BD090000
remote allocation
page read and write
333A000
heap
page read and write
B045000
heap
page read and write
21A3000
heap
page read and write
860000
heap
page read and write
92C000
unkown
page readonly
317F000
heap
page read and write
A336000
heap
page read and write
3223000
heap
page read and write
830000
heap
page read and write
3202000
heap
page read and write
DFF8000
heap
page read and write
21A8000
heap
page read and write
3206000
heap
page read and write
61A000
unkown
page write copy
3559000
heap
page read and write
312D000
heap
page read and write
21AE000
heap
page read and write
3115000
heap
page read and write
D792000
heap
page read and write
215E000
heap
page read and write
319D000
heap
page read and write
21A8000
heap
page read and write
66D000
heap
page read and write
21AE000
heap
page read and write
649000
heap
page read and write
3293000
heap
page read and write
3216000
heap
page read and write
A1EC000
heap
page read and write
3281000
heap
page read and write
3295000
heap
page read and write
3182000
heap
page read and write
A051000
heap
page read and write
355D000
heap
page read and write
4F0000
heap
page read and write
CDBD000
heap
page read and write
648000
heap
page read and write
643000
heap
page read and write
69E000
heap
page read and write
3181000
heap
page read and write
2159000
heap
page read and write
6BD35000
unkown
page read and write
2159000
heap
page read and write
733000
heap
page read and write
69C000
heap
page read and write
D48F000
heap
page read and write
A2E8000
heap
page read and write
3216000
heap
page read and write
64B000
heap
page read and write
9C97000
heap
page read and write
3810000
heap
page read and write
CF45000
heap
page read and write
339B000
heap
page read and write
3184000
heap
page read and write
A5FF000
heap
page read and write
64B000
heap
page read and write
336A000
heap
page read and write
A6D7000
heap
page read and write
E3AA77E000
stack
page read and write
2CFF000
stack
page read and write
1D80000
heap
page read and write
64E000
heap
page read and write
A33D000
heap
page read and write
D545000
heap
page read and write
318D000
heap
page read and write
E3A9EFE000
unkown
page readonly
3244000
heap
page read and write
215A000
heap
page read and write
21AA000
heap
page read and write
649000
heap
page read and write
E3AABFE000
stack
page read and write
3293000
heap
page read and write
D8BA000
heap
page read and write
215E000
heap
page read and write
355B000
heap
page read and write
1E5BD020000
trusted library allocation
page read and write
3185000
heap
page read and write
1E5B7FD0000
trusted library section
page readonly
91000
stack
page read and write
A126000
heap
page read and write
215E000
heap
page read and write
335A000
heap
page read and write
2E3C000
stack
page read and write
1E5BCDC0000
trusted library allocation
page read and write
9F5D000
heap
page read and write
E114000
heap
page read and write
3291000
heap
page read and write
3784000
heap
page read and write
1E5B7770000
trusted library allocation
page read and write
D02C000
heap
page read and write
A0B8000
heap
page read and write
215E000
heap
page read and write
A493000
heap
page read and write
64E000
heap
page read and write
2154000
direct allocation
page read and write
A378000
heap
page read and write
A1EF000
heap
page read and write
211C000
direct allocation
page read and write
1E5B7780000
trusted library section
page read and write
64E000
heap
page read and write
733000
heap
page read and write
21AE000
heap
page read and write
1E5B7929000
heap
page read and write
2153000
heap
page read and write
A69B000
heap
page read and write
3158000
heap
page read and write
215E000
heap
page read and write
C8E7000
heap
page read and write
DBC8000
heap
page read and write
3291000
heap
page read and write
215E000
heap
page read and write
33A5000
heap
page read and write
3566000
heap
page read and write
3560000
heap
page read and write
1E5BCD10000
trusted library allocation
page read and write
1E5B787B000
heap
page read and write
64E000
heap
page read and write
3393000
heap
page read and write
1DA0000
heap
page read and write
5B0000
unkown
page readonly
1D0E000
stack
page read and write
232E000
stack
page read and write
377E000
heap
page read and write
215E000
heap
page read and write
31E2000
heap
page read and write
338A000
heap
page read and write
339D000
heap
page read and write
1D90000
heap
page read and write
A3C3000
heap
page read and write
2114000
direct allocation
page read and write
D626000
heap
page read and write
64A000
heap
page read and write
311D000
heap
page read and write
2DBA000
heap
page read and write
3373000
heap
page read and write
AB91000
heap
page read and write
86B000
heap
page read and write
649000
heap
page read and write
21A3000
heap
page read and write
3767000
heap
page read and write
31CD000
heap
page read and write
21AE000
heap
page read and write
21AB000
heap
page read and write
321D000
heap
page read and write
2153000
heap
page read and write
21AE000
heap
page read and write
21AE000
heap
page read and write
A7A1000
heap
page read and write
21AE000
heap
page read and write
3560000
heap
page read and write
A57A000
heap
page read and write
A56E000
heap
page read and write
21AE000
heap
page read and write
2C5E000
heap
page read and write
2B43000
heap
page read and write
64E000
heap
page read and write
44B000
heap
page read and write
643000
heap
page read and write
31AD000
heap
page read and write
93D000
unkown
page read and write
64E000
heap
page read and write
DF3C000
heap
page read and write
3C52000
heap
page read and write
DF78000
heap
page read and write
2190000
direct allocation
page read and write
7FF000
stack
page read and write
8E0000
unkown
page readonly
3330000
heap
page read and write
215E000
heap
page read and write
33A3000
heap
page read and write
39FE000
heap
page read and write
3213000
heap
page read and write
64E000
heap
page read and write
64E000
heap
page read and write
21AE000
heap
page read and write
D5D9000
heap
page read and write
3111000
heap
page read and write
32A6000
heap
page read and write
215E000
heap
page read and write
64E000
heap
page read and write
355C000
heap
page read and write
50E000
stack
page read and write
3263000
heap
page read and write
D333000
heap
page read and write
64B000
heap
page read and write
734000
heap
page read and write
2174000
direct allocation
page read and write
3221000
heap
page read and write
648000
heap
page read and write
730000
heap
page read and write
7A7A000
heap
page read and write
69B000
heap
page read and write
3223000
heap
page read and write
4191000
heap
page read and write
E0F2000
heap
page read and write
E3A98FE000
unkown
page readonly
33A3000
heap
page read and write
2164000
direct allocation
page read and write
3154000
heap
page read and write
111E000
heap
page read and write
5063000
heap
page read and write
401000
unkown
page execute read
4CDE000
stack
page read and write
E178000
heap
page read and write
A5B5000
heap
page read and write
6E71000
heap
page read and write
328D000
heap
page read and write
21AE000
heap
page read and write
3778000
heap
page read and write
3761000
heap
page read and write
4870000
direct allocation
page read and write
3294000
heap
page read and write
49F0000
heap
page read and write
411000
unkown
page readonly
2DAB000
heap
page read and write
A07B000
heap
page read and write
1E5B78AF000
heap
page read and write
3763000
heap
page read and write
3557000
heap
page read and write
33A8000
heap
page read and write
AF53000
heap
page read and write
A569000
heap
page read and write
D37F000
heap
page read and write
21AB000
heap
page read and write
3387000
heap
page read and write
A588000
heap
page read and write
DC000
stack
page read and write
21AE000
heap
page read and write
3118000
heap
page read and write
E06D000
heap
page read and write
64A000
heap
page read and write
1E5BCF0C000
heap
page read and write
1E5BCE62000
heap
page read and write
3188000
heap
page read and write
DB42000
heap
page read and write
D77F000
heap
page read and write
DCB6000
heap
page read and write
648000
heap
page read and write
A60A000
heap
page read and write
AAED000
heap
page read and write
648000
heap
page read and write
33A8000
heap
page read and write
D3B8000
heap
page read and write
1E5B78B7000
heap
page read and write
A0A4000
heap
page read and write
3221000
heap
page read and write
A01D000
heap
page read and write
690000
heap
page read and write
401000
unkown
page execute read
A198000
heap
page read and write
43B000
heap
page read and write
33C8000
heap
page read and write
3112000
heap
page read and write
A2B6000
heap
page read and write
210C000
direct allocation
page read and write
21AE000
heap
page read and write
5790000
heap
page read and write
401000
unkown
page execute read
D31E000
heap
page read and write
33AE000
heap
page read and write
84F000
stack
page read and write
21A3000
heap
page read and write
5071000
heap
page read and write
3850000
heap
page read and write
21AE000
heap
page read and write
33A3000
heap
page read and write
A378000
heap
page read and write
DEB7000
heap
page read and write
215E000
heap
page read and write
215E000
heap
page read and write
A12B000
heap
page read and write
64E000
heap
page read and write
3396000
heap
page read and write
64E000
heap
page read and write
A5DD000
heap
page read and write
9AB0000
heap
page read and write
31C4000
heap
page read and write
215E000
heap
page read and write
A4A2000
heap
page read and write
DC94000
heap
page read and write
64E000
heap
page read and write
21A3000
heap
page read and write
1E5BCCE0000
trusted library allocation
page read and write
59B000
heap
page read and write
4B40000
heap
page read and write
32C0000
heap
page read and write
21AE000
heap
page read and write
1E5B787E000
heap
page read and write
A0B8000
heap
page read and write
751000
heap
page read and write
46E3000
heap
page read and write
DFA2000
heap
page read and write
AFF1000
heap
page read and write
A5A2000
heap
page read and write
6BCD5000
unkown
page readonly
4150000
heap
page read and write
21AA000
heap
page read and write
DD5F000
heap
page read and write
417D000
heap
page read and write
E06E000
heap
page read and write
499000
unkown
page read and write
7A8000
heap
page read and write
4B50000
trusted library allocation
page read and write
33D1000
heap
page read and write
2DBA000
heap
page read and write
215E000
heap
page read and write
2178000
direct allocation
page read and write
648000
heap
page read and write
A6F8000
heap
page read and write
3292000
heap
page read and write
215E000
heap
page read and write
DC4C000
heap
page read and write
393D000
heap
page read and write
530000
heap
page read and write
D494000
heap
page read and write
733000
heap
page read and write
2138000
direct allocation
page read and write
A26D000
heap
page read and write
943000
unkown
page readonly
DFCD000
heap
page read and write
659000
heap
page read and write
64E000
heap
page read and write
A442000
heap
page read and write
606000
heap
page read and write
2188000
direct allocation
page read and write
A0FC000
heap
page read and write
2260000
heap
page read and write
21AE000
heap
page read and write
7B0000
heap
page read and write
2158000
heap
page read and write
D60A000
heap
page read and write
71E000
heap
page read and write
331B000
heap
page read and write
4191000
heap
page read and write
3334000
heap
page read and write
5071000
heap
page read and write
2C5A000
heap
page read and write
A545000
heap
page read and write
21AE000
heap
page read and write
304B000
heap
page read and write
A57E000
heap
page read and write
21A8000
heap
page read and write
329D000
heap
page read and write
3134000
heap
page read and write
DFA2000
heap
page read and write
D4EB000
heap
page read and write
2FC0000
heap
page read and write
304F000
stack
page read and write
E3A96FE000
unkown
page readonly
39ED000
heap
page read and write
3835000
heap
page read and write
9F57000
heap
page read and write
64B000
heap
page read and write
64E000
heap
page read and write
9EA6000
heap
page read and write
215E000
heap
page read and write
21AE000
heap
page read and write
A3E4000
heap
page read and write
2440000
heap
page read and write
3763000
heap
page read and write
31D9000
heap
page read and write
120000
heap
page read and write
4C0000
heap
page read and write
3295000
heap
page read and write
3196000
heap
page read and write
A227000
heap
page read and write
3293000
heap
page read and write
D8DA000
heap
page read and write
A097000
heap
page read and write
A3AD000
heap
page read and write
A5E9000
heap
page read and write
3216000
heap
page read and write
377C000
heap
page read and write
8E1000
unkown
page execute read
329D000
heap
page read and write
356A000
heap
page read and write
716000
heap
page read and write
A537000
heap
page read and write
DCA2000
heap
page read and write
A0FF000
heap
page read and write
311D000
heap
page read and write
A71A000
heap
page read and write
317B000
heap
page read and write
31D2000
heap
page read and write
DFA4000
heap
page read and write
2BDF000
stack
page read and write
64E000
heap
page read and write
A210000
heap
page read and write
A248000
heap
page read and write
A2B2000
heap
page read and write
400000
unkown
page readonly
7BA000
heap
page read and write
D5FB000
heap
page read and write
2110000
direct allocation
page read and write
75E000
heap
page read and write
32E4000
heap
page read and write
3571000
heap
page read and write
31BD000
heap
page read and write
9D91000
heap
page read and write
32BD000
heap
page read and write
A3D4000
heap
page read and write
A4BB000
heap
page read and write
313D000
heap
page read and write
71A000
heap
page read and write
64E000
heap
page read and write
215E000
heap
page read and write
D6FD000
heap
page read and write
71A000
heap
page read and write
A0DA000
heap
page read and write
1E5B7896000
heap
page read and write
CE5D000
heap
page read and write
1E5BCEE2000
heap
page read and write
3380000
heap
page read and write
A9C2000
heap
page read and write
3293000
heap
page read and write
33BB000
heap
page read and write
4CCE000
stack
page read and write
D61D000
heap
page read and write
21AE000
heap
page read and write
D769000
heap
page read and write
9F3D000
heap
page read and write
3223000
heap
page read and write
6EC000
heap
page read and write
1E5BD090000
remote allocation
page read and write
2D20000
heap
page read and write
3115000
heap
page read and write
643000
heap
page read and write
9C97000
heap
page read and write
3199000
heap
page read and write
111A000
heap
page read and write
3FE000
stack
page read and write
213C000
direct allocation
page read and write
3320000
heap
page read and write
3287000
heap
page read and write
61A000
unkown
page read and write
31EB000
heap
page read and write
22B4000
heap
page read and write
A9C8000
heap
page read and write
3181000
heap
page read and write
375E000
heap
page read and write
9B59000
heap
page read and write
3207000
heap
page read and write
A2B2000
heap
page read and write
A58C000
heap
page read and write
1E5BCCF1000
trusted library allocation
page read and write
5EE000
stack
page read and write
3145000
heap
page read and write
31DF000
heap
page read and write
D77F000
heap
page read and write
A4D8000
heap
page read and write
356B000
heap
page read and write
A5FE000
heap
page read and write
716000
heap
page read and write
E3AA5FE000
unkown
page readonly
2380000
heap
page read and write
64A000
heap
page read and write
6F34000
heap
page read and write
DD7C000
heap
page read and write
370D000
heap
page read and write
D5D9000
heap
page read and write
E1AA000
heap
page read and write
There are 1869 hidden memdumps, click here to show them.