IOC Report
SecuriteInfo.com.Adware.InstallCore.768.3584.23489.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Adware.InstallCore.768.3584.23489.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Config.Msi\4d11be.rbs
data
dropped
C:\Program Files (x86)\AVS4YOU\AVS4YOUHelp.chm (copy)
MS Windows HtmlHelp Data
dropped
C:\Program Files (x86)\AVS4YOU\AVSSoftwareNavigator\AVS4YOUSoftwareNavigator.exe (copy)
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Program Files (x86)\AVS4YOU\AVSSoftwareNavigator\AVS4YOUSoftwareNavigator.sil (copy)
data
dropped
C:\Program Files (x86)\AVS4YOU\AVSSoftwareNavigator\is-CATR2.tmp
data
dropped
C:\Program Files (x86)\AVS4YOU\AVSSoftwareNavigator\is-H0AS6.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\AVS4YOU\AVSSoftwareNavigator\is-VRG54.tmp
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Program Files (x86)\AVS4YOU\AVSSoftwareNavigator\unins000.dat
InnoSetup Log AVS4YOU Software Navigator, version 0x30, 5338 bytes, 103386\user, "C:\Program Files (x86)\AVS4YOU\AVSSoftwareNavigator"
dropped
C:\Program Files (x86)\AVS4YOU\AVSSoftwareNavigator\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\AVS4YOU\AVSUpdateManager\AVSUpdateManager.exe (copy)
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Program Files (x86)\AVS4YOU\AVSUpdateManager\AVSUpdateManager.sil (copy)
data
dropped
C:\Program Files (x86)\AVS4YOU\AVSUpdateManager\AVSUpdateOptions.exe (copy)
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Program Files (x86)\AVS4YOU\AVSUpdateManager\AVSUpdateOptions.sil (copy)
Generic INItialization configuration [CharSets]
dropped
C:\Program Files (x86)\AVS4YOU\AVSUpdateManager\Updater.exe (copy)
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Program Files (x86)\AVS4YOU\AVSUpdateManager\is-1O3D5.tmp
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Program Files (x86)\AVS4YOU\AVSUpdateManager\is-67H5M.tmp
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Program Files (x86)\AVS4YOU\AVSUpdateManager\is-CCVFB.tmp
Generic INItialization configuration [CharSets]
dropped
C:\Program Files (x86)\AVS4YOU\AVSUpdateManager\is-DS07H.tmp
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Program Files (x86)\AVS4YOU\AVSUpdateManager\is-KNK41.tmp
data
dropped
C:\Program Files (x86)\AVS4YOU\AVSUpdateManager\is-PEHBR.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\AVS4YOU\AVSUpdateManager\unins000.dat
InnoSetup Log AVS Update Manager, version 0x30, 4411 bytes, 103386\user, "C:\Program Files (x86)\AVS4YOU\AVSUpdateManager"
dropped
C:\Program Files (x86)\AVS4YOU\AVSUpdateManager\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\AVSYouTubeUploader.exe (copy)
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\AVSYouTubeUploader.sil (copy)
data
dropped
C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\Category.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\Data\About.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252
dropped
C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\Data\is-N6EVC.tmp
Rich Text Format data, version 1, ANSI, code page 1252
dropped
C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\Icons\YouTube.ico (copy)
MS Windows icon resource - 4 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\Icons\is-GVB88.tmp
MS Windows icon resource - 4 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\Registration.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\is-6CUK4.tmp
Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, MSI Installer, Create Time/Date: Mon Jun 21 09:00:00 1999, Number of Pages: 200, Code page: 1252, Title: Installation Database, Subject: Microsoft Visual C++ 2005 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: Microsoft Visual C++ 2005 Redistributable RTL x86 enu; Copyright (C) Microsoft Corporation, All rights reserved., Template: Intel;0, Revision Number: {675C0FCE-58D9-435D-9AD8-ACDCB5808A3A}, Name of Creating Application: Visual Studio Setup Build Engine (BuildMod.DLL), Security: 2, Last Saved Time/Date: Fri Dec 1 22:24:46 2006, Number of Words: 2
dropped
C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\is-7IQCS.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\is-FTKHQ.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\is-H552E.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\is-JPGVB.tmp
Microsoft Cabinet archive data, Windows 2000/XP setup, 252968 bytes, 1 file, at 0x2c +A "FL_msdia71_dll_2_____X86.3643236F_FC70_11D3_A536_0090278A1BB8", ID 4303, number 1, 20 datablocks, 0x1503 compression
dropped
C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\is-S9D5V.tmp
data
dropped
C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\is-U55IL.tmp
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\unins000.dat
InnoSetup Log AVS YouTube Uploader 2.1, version 0x30, 15122 bytes, 103386\user, "C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader"
dropped
C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\vcredis1.cab (copy)
Microsoft Cabinet archive data, Windows 2000/XP setup, 252968 bytes, 1 file, at 0x2c +A "FL_msdia71_dll_2_____X86.3643236F_FC70_11D3_A536_0090278A1BB8", ID 4303, number 1, 20 datablocks, 0x1503 compression
dropped
C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\vcredist.msi (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, MSI Installer, Create Time/Date: Mon Jun 21 09:00:00 1999, Number of Pages: 200, Code page: 1252, Title: Installation Database, Subject: Microsoft Visual C++ 2005 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: Microsoft Visual C++ 2005 Redistributable RTL x86 enu; Copyright (C) Microsoft Corporation, All rights reserved., Template: Intel;0, Revision Number: {675C0FCE-58D9-435D-9AD8-ACDCB5808A3A}, Name of Creating Application: Visual Studio Setup Build Engine (BuildMod.DLL), Security: 2, Last Saved Time/Date: Fri Dec 1 22:24:46 2006, Number of Words: 2
dropped
C:\Program Files (x86)\AVS4YOU\License Agreement.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1251, default language ID 1049
dropped
C:\Program Files (x86)\AVS4YOU\Registration.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\AVS4YOU\Registration.sil (copy)
data
dropped
C:\Program Files (x86)\AVS4YOU\Uninstall.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\AVS4YOU\Uninstall.sil (copy)
Non-ISO extended-ASCII text, with very long lines (862), with CRLF line terminators
dropped
C:\Program Files (x86)\AVS4YOU\is-1BGLU.tmp
Non-ISO extended-ASCII text, with very long lines (862), with CRLF line terminators
dropped
C:\Program Files (x86)\AVS4YOU\is-CN3OV.tmp
Rich Text Format data, version 1, ANSI, code page 1251, default language ID 1049
dropped
C:\Program Files (x86)\AVS4YOU\is-G618K.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\AVS4YOU\is-G84EM.tmp
data
dropped
C:\Program Files (x86)\AVS4YOU\is-JBP6O.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\AVS4YOU\is-R5S93.tmp
MS Windows HtmlHelp Data
dropped
C:\Program Files (x86)\Common Files\AVSMedia\ActiveX\AVSYouTubeUploader.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Common Files\AVSMedia\ActiveX\Repairing.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Common Files\AVSMedia\ActiveX\is-BAU28.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Common Files\AVSMedia\ActiveX\is-OIOKM.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Common Files\AVSMedia\Registration\AVS4YOUSoftwareNavigator.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Common Files\AVSMedia\Registration\AVSUpdateManager.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Common Files\AVSMedia\Registration\is-62FLE.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Common Files\AVSMedia\Registration\is-74BKC.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Common Files\AVSMedia\Registration\is-HAFFP.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Common Files\AVSMedia\Registration\unins000.dat
InnoSetup Log AVS Registration, version 0x30, 4769 bytes, 103386\user, "C:\Program Files (x86)\Common Files\AVSMedia\Registration"
dropped
C:\Program Files (x86)\Common Files\AVSMedia\Registration\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Common Files\Microsoft Shared\VC\msdia80.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AVS4YOU\AVS Update Manager.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Fri May 24 14:38:53 2024, mtime=Fri May 24 14:38:53 2024, atime=Mon Jun 15 16:41:30 2009, length=4413000, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AVS4YOU\AVS4YOU Software Navigator.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Fri May 24 14:38:50 2024, mtime=Fri May 24 14:38:50 2024, atime=Wed Jun 24 14:45:54 2009, length=8524360, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AVS4YOU\Activation.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri May 24 14:38:48 2024, mtime=Fri May 24 14:38:48 2024, atime=Wed Jun 24 12:49:06 2009, length=4291656, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AVS4YOU\Help.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri May 24 14:38:49 2024, mtime=Fri May 24 14:38:49 2024, atime=Mon Apr 13 13:29:52 2009, length=23790, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AVS4YOU\License Agreement.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Fri May 24 14:38:49 2024, mtime=Fri May 24 14:38:49 2024, atime=Mon Apr 13 13:29:52 2009, length=6804, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AVS4YOU\Repair.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri May 24 14:38:48 2024, mtime=Fri May 24 14:38:48 2024, atime=Wed Jun 24 12:45:42 2009, length=3694664, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AVS4YOU\Video\AVS YouTube Uploader.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Fri May 24 14:38:46 2024, mtime=Fri May 24 14:38:47 2024, atime=Thu Jun 25 20:01:28 2009, length=4329032, window=hide
dropped
C:\Users\user\AppData\Local\Temp\MSId1d64.LOG
Unicode text, UTF-16, little-endian text, with very long lines (369), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-39TF8.tmp\_isetup\_RegDLL.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-39TF8.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-39TF8.tmp\_isetup\_shfoldr.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-868GU.tmp\AVSUpdateManager.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-BLQHA.tmp\AVS4YOUSoftwareNavigator.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-C3A8T.tmp\SecuriteInfo.com.Adware.InstallCore.768.3584.23489.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ELOIK.tmp\_isetup\_RegDLL.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ELOIK.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ELOIK.tmp\_isetup\_shfoldr.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ITLAK.tmp\_isetup\_RegDLL.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ITLAK.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ITLAK.tmp\_isetup\_shfoldr.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-LTD3E.tmp\_isetup\_RegDLL.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-LTD3E.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-LTD3E.tmp\_isetup\_shfoldr.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-USLLL.tmp\Registration.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\AVS YouTube Uploader.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Fri May 24 14:38:46 2024, mtime=Fri May 24 14:38:47 2024, atime=Thu Jun 25 20:01:28 2009, length=4329032, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\AVS4YOU\Uninstall.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri May 24 14:38:48 2024, mtime=Fri May 24 14:38:48 2024, atime=Wed Jun 24 12:48:14 2009, length=3929672, window=hide
dropped
C:\Users\user\Desktop\AVS YouTube Uploader.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Fri May 24 14:38:46 2024, mtime=Fri May 24 14:38:47 2024, atime=Thu Jun 25 20:01:28 2009, length=4329032, window=hide
dropped
C:\Users\user\Desktop\AVS4YOU Software Navigator.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Fri May 24 14:38:50 2024, mtime=Fri May 24 14:38:51 2024, atime=Wed Jun 24 14:45:54 2009, length=8524360, window=hide
dropped
C:\Windows\Installer\4d11bc.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, MSI Installer, Create Time/Date: Mon Jun 21 09:00:00 1999, Number of Pages: 200, Code page: 1252, Title: Installation Database, Subject: Microsoft Visual C++ 2005 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: Microsoft Visual C++ 2005 Redistributable RTL x86 enu; Copyright (C) Microsoft Corporation, All rights reserved., Template: Intel;0, Revision Number: {675C0FCE-58D9-435D-9AD8-ACDCB5808A3A}, Name of Creating Application: Visual Studio Setup Build Engine (BuildMod.DLL), Security: 2, Last Saved Time/Date: Fri Dec 1 22:24:46 2006, Number of Words: 2
dropped
C:\Windows\Installer\4d11bf.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, MSI Installer, Create Time/Date: Mon Jun 21 09:00:00 1999, Number of Pages: 200, Code page: 1252, Title: Installation Database, Subject: Microsoft Visual C++ 2005 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: Microsoft Visual C++ 2005 Redistributable RTL x86 enu; Copyright (C) Microsoft Corporation, All rights reserved., Template: Intel;0, Revision Number: {675C0FCE-58D9-435D-9AD8-ACDCB5808A3A}, Name of Creating Application: Visual Studio Setup Build Engine (BuildMod.DLL), Security: 2, Last Saved Time/Date: Fri Dec 1 22:24:46 2006, Number of Words: 2
dropped
C:\Windows\Installer\MSI146C.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI1A39.tmp
data
dropped
C:\Windows\Installer\SourceHash{7299052b-02a4-4627-81f2-1818da5d550d}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\SysWOW64\is-45HP1.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\is-59604.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\is-AOVL1.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\is-QQFVQ.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\msvcp70.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\msvcr70.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\msvcr71.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\msxml3a.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\~DF02658AFC7E161858.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF04CD02BDC5628B37.TMP
data
dropped
C:\Windows\Temp\~DF0763DF59DDFDA92D.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF375BB71BFD39C8D6.TMP
data
dropped
C:\Windows\Temp\~DF406EC259DFDF3DAA.TMP
data
dropped
C:\Windows\Temp\~DF779931752AFCAAEE.TMP
data
dropped
C:\Windows\Temp\~DFA3AEE1216246A3B4.TMP
data
modified
C:\Windows\Temp\~DFB4E45ACA0D1B9C9A.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844476.0\ATL80.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844476.0\x86_Microsoft.VC80.ATL_1fc8b3b9a1e18e3b_8.0.50727.762_x-ww_cbb27474.cat
data
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844476.0\x86_Microsoft.VC80.ATL_1fc8b3b9a1e18e3b_8.0.50727.762_x-ww_cbb27474.manifest
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844507.0\msvcm80.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844507.0\msvcp80.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844507.0\msvcr80.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844507.0\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.762_x-ww_6b128700.cat
data
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844507.0\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.762_x-ww_6b128700.manifest
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (504), with CRLF line terminators
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844585.0\mfc80.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844585.0\mfc80u.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844585.0\mfcm80.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844585.0\mfcm80u.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844585.0\x86_Microsoft.VC80.MFC_1fc8b3b9a1e18e3b_8.0.50727.762_x-ww_3bf8fa05.cat
data
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844585.0\x86_Microsoft.VC80.MFC_1fc8b3b9a1e18e3b_8.0.50727.762_x-ww_3bf8fa05.manifest
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (504), with CRLF line terminators
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844710.0\mfc80CHS.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844710.0\mfc80CHT.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844710.0\mfc80DEU.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844710.0\mfc80ENU.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844710.0\mfc80ESP.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844710.0\mfc80FRA.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844710.0\mfc80ITA.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844710.0\mfc80JPN.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844710.0\mfc80KOR.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844710.0\x86_Microsoft.VC80.MFCLOC_1fc8b3b9a1e18e3b_8.0.50727.762_x-ww_91481303.cat
data
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844710.0\x86_Microsoft.VC80.MFCLOC_1fc8b3b9a1e18e3b_8.0.50727.762_x-ww_91481303.manifest
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844773.0\vcomp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844773.0\x86_Microsoft.VC80.OpenMP_1fc8b3b9a1e18e3b_8.0.50727.762_x-ww_6c18549a.cat
data
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844773.0\x86_Microsoft.VC80.OpenMP_1fc8b3b9a1e18e3b_8.0.50727.762_x-ww_6c18549a.manifest
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844804.0\8.0.50727.762.cat
data
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844804.0\8.0.50727.762.policy
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844804.1\8.0.50727.762.cat
data
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844804.1\8.0.50727.762.policy
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844820.0\8.0.50727.762.cat
data
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844820.0\8.0.50727.762.policy
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844820.1\8.0.50727.762.cat
data
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844820.1\8.0.50727.762.policy
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844835.0\8.0.50727.762.cat
data
dropped
C:\Windows\WinSxS\InstallTemp\20240524113844835.0\8.0.50727.762.policy
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
Chrome Cache Entry: 222
Unicode text, UTF-8 text, with very long lines (24131)
downloaded
Chrome Cache Entry: 223
ASCII text, with very long lines (16399)
downloaded
Chrome Cache Entry: 224
ASCII text, with very long lines (26396)
downloaded
Chrome Cache Entry: 225
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 226
ASCII text
downloaded
Chrome Cache Entry: 227
ASCII text, with very long lines (58495)
downloaded
Chrome Cache Entry: 228
ASCII text, with very long lines (65448)
downloaded
Chrome Cache Entry: 229
ASCII text, with very long lines (14921)
downloaded
Chrome Cache Entry: 230
ASCII text, with very long lines (10852)
downloaded
Chrome Cache Entry: 231
gzip compressed data, was "opa.js", last modified: Tue May 21 16:30:44 2024, from Unix, original size modulo 2^32 136965
downloaded
Chrome Cache Entry: 232
ASCII text, with very long lines (18444)
downloaded
Chrome Cache Entry: 233
ASCII text, with very long lines (29196)
downloaded
Chrome Cache Entry: 234
Unicode text, UTF-8 text, with very long lines (45243)
downloaded
Chrome Cache Entry: 235
ASCII text, with very long lines (5945)
downloaded
Chrome Cache Entry: 236
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 237
PNG image data, 470 x 87, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 238
gzip compressed data, was "va.js", last modified: Mon May 6 09:40:08 2024, from Unix, original size modulo 2^32 244655
downloaded
Chrome Cache Entry: 239
ASCII text, with very long lines (12603)
downloaded
Chrome Cache Entry: 240
Unicode text, UTF-8 text, with very long lines (65439)
downloaded
Chrome Cache Entry: 241
JSON data
dropped
Chrome Cache Entry: 242
ASCII text, with very long lines (15549)
downloaded
Chrome Cache Entry: 243
HTML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 244
gzip compressed data, was "worker.js", last modified: Tue Jul 21 10:14:25 2020, from Unix, original size modulo 2^32 47679
dropped
Chrome Cache Entry: 245
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 246
Unicode text, UTF-8 text, with very long lines (46429), with no line terminators
downloaded
Chrome Cache Entry: 247
ASCII text, with very long lines (4179)
downloaded
Chrome Cache Entry: 248
ASCII text, with very long lines (60577)
downloaded
Chrome Cache Entry: 249
JSON data
dropped
Chrome Cache Entry: 250
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 251
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 252
ASCII text, with very long lines (22144)
downloaded
Chrome Cache Entry: 253
Web Open Font Format (Version 2), TrueType, length 48236, version 1.0
downloaded
Chrome Cache Entry: 254
ASCII text, with very long lines (34035)
downloaded
Chrome Cache Entry: 255
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 256
ASCII text, with very long lines (3240)
downloaded
Chrome Cache Entry: 257
gzip compressed data, was "worker.js", last modified: Tue Jul 21 10:14:25 2020, from Unix, original size modulo 2^32 47679
downloaded
Chrome Cache Entry: 258
ASCII text
downloaded
Chrome Cache Entry: 259
Unicode text, UTF-8 text, with very long lines (25486)
downloaded
Chrome Cache Entry: 260
Unicode text, UTF-8 text, with very long lines (58162)
downloaded
Chrome Cache Entry: 261
ASCII text, with very long lines (2343)
downloaded
Chrome Cache Entry: 262
GIF image data, version 89a, 1 x 1
downloaded
Chrome Cache Entry: 263
Unicode text, UTF-8 text, with very long lines (19927)
downloaded
Chrome Cache Entry: 264
ASCII text
downloaded
Chrome Cache Entry: 265
JSON data
downloaded
Chrome Cache Entry: 266
JSON data
dropped
Chrome Cache Entry: 267
HTML document, ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 268
JSON data
downloaded
Chrome Cache Entry: 269
HTML document, ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 270
JSON data
downloaded
Chrome Cache Entry: 271
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 272
Unicode text, UTF-8 text, with very long lines (62300), with CRLF line terminators
downloaded
Chrome Cache Entry: 273
gzip compressed data, was "track.js", last modified: Mon May 6 09:44:19 2024, from Unix, original size modulo 2^32 15679
downloaded
Chrome Cache Entry: 274
ASCII text, with very long lines (1572)
downloaded
Chrome Cache Entry: 275
PNG image data, 470 x 87, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 276
JSON data
downloaded
Chrome Cache Entry: 277
ASCII text, with very long lines (19661)
downloaded
Chrome Cache Entry: 278
ASCII text
downloaded
Chrome Cache Entry: 279
Web Open Font Format (Version 2), TrueType, length 26736, version 1.0
downloaded
Chrome Cache Entry: 280
ASCII text, with very long lines (15872)
downloaded
Chrome Cache Entry: 281
GIF image data, version 89a, 1 x 1
dropped
Chrome Cache Entry: 282
JSON data
downloaded
There are 205 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Adware.InstallCore.768.3584.23489.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Adware.InstallCore.768.3584.23489.exe"
C:\Users\user\AppData\Local\Temp\is-C3A8T.tmp\SecuriteInfo.com.Adware.InstallCore.768.3584.23489.tmp
"C:\Users\user\AppData\Local\Temp\is-C3A8T.tmp\SecuriteInfo.com.Adware.InstallCore.768.3584.23489.tmp" /SL5="$1044A,10568020,53248,C:\Users\user\Desktop\SecuriteInfo.com.Adware.InstallCore.768.3584.23489.exe"
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\System32\msiexec.exe" /qn /i "C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\vcredist.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 82837F4300B66549CD108A749FF00E18
C:\Windows\SysWOW64\regsvr32.exe
"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Common Files\AVSMedia\ActiveX\AVSYouTubeUploader.dll"
C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\Registration.exe
"C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\Registration.exe" /VERYSILENT /SUPPRESSMSGBOXES /GROUP="AVS4YOU" /LANG=en
C:\Users\user\AppData\Local\Temp\is-USLLL.tmp\Registration.tmp
"C:\Users\user\AppData\Local\Temp\is-USLLL.tmp\Registration.tmp" /SL5="$304A0,5538535,53248,C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\Registration.exe" /VERYSILENT /SUPPRESSMSGBOXES /GROUP="AVS4YOU" /LANG=en
C:\Program Files (x86)\Common Files\AVSMedia\Registration\AVS4YOUSoftwareNavigator.exe
"C:\Program Files (x86)\Common Files\AVSMedia\Registration\AVS4YOUSoftwareNavigator.exe" /VERYSILENT /SUPPRESSMSGBOXES /LANG=en
C:\Users\user\AppData\Local\Temp\is-BLQHA.tmp\AVS4YOUSoftwareNavigator.tmp
"C:\Users\user\AppData\Local\Temp\is-BLQHA.tmp\AVS4YOUSoftwareNavigator.tmp" /SL5="$104D6,1455797,53248,C:\Program Files (x86)\Common Files\AVSMedia\Registration\AVS4YOUSoftwareNavigator.exe" /VERYSILENT /SUPPRESSMSGBOXES /LANG=en
C:\Program Files (x86)\Common Files\AVSMedia\Registration\AVSUpdateManager.exe
"C:\Program Files (x86)\Common Files\AVSMedia\Registration\AVSUpdateManager.exe" /VERYSILENT /SUPPRESSMSGBOXES /LANG=en
C:\Users\user\AppData\Local\Temp\is-868GU.tmp\AVSUpdateManager.tmp
"C:\Users\user\AppData\Local\Temp\is-868GU.tmp\AVSUpdateManager.tmp" /SL5="$A04F2,1689432,53248,C:\Program Files (x86)\Common Files\AVSMedia\Registration\AVSUpdateManager.exe" /VERYSILENT /SUPPRESSMSGBOXES /LANG=en
C:\Windows\SysWOW64\regsvr32.exe
"C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\ATL.dll"
C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\AVSYouTubeUploader.exe
"C:\Program Files (x86)\AVS4YOU\AVSYouTubeUploader\AVSYouTubeUploader.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://www.avs4you.com/Register.aspx?Type=Install&ProgID=72&URL=Register
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 --field-trial-handle=1968,i,9419666226059867181,14086244882520364381,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files (x86)\AVS4YOU\AVSUpdateManager\AVSUpdateManager.exe
C:\PROGRA~2\AVS4YOU\AVSUPD~1\AVSUPD~1.EXE 78
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.avs4you.com/downloads/AVSAudioGrabber.exeq
unknown
http://www.avs4you.com
unknown
http://www.avs4you.com/downloads/AVSAudioMix.exea
unknown
https://www.avs4you.com/4a429f41750768c4912c7a69233f153b0200c016-b04f582e48009a30a2ad.js
18.244.140.117
http://www.avs4you.com/AVS-Audio-Grabber.aspx
unknown
http://ispp.sourceforge.net/4%
unknown
http://schemas.xmlsoap.org/soap/encoding/Nhttp://www.borland.com/namespaces/Types
unknown
http://www.avs4you.com/AVS-Image-Converter.aspxa
unknown
http://www.avs4you.com/downloads/AVSDVDAuthoring.exeI
unknown
http://www.avs4you.com/downloads/AVSAudioGrabber.exey
unknown
http://www.avs4you.com/Downloads/AVSMediaPlayer.exe?utm_medium=Navigator&utm_source=Navigator&utm_co
unknown
http://www.avs4you.com/Downloads/AVSVideoConverter.exe?utm_medium=Navigator&utm_source=Navigator&utm
unknown
http://avs4you.comdefresitavs4you.comavs4you.com/My
unknown
http://www.avs4you.com/AVS-Audio-Editor.aspxa
unknown
http://www.avs4you.com/Downloads/AVSAudioRecorder.exe?utm_medium=Navigator&utm_source=Navigator&utm_
unknown
http://www.avs4you.com/Register.aspx?Type=Install&ProgID=72&URL=Registern.
unknown
http://www.avs4you.com/AVS-Archiver.aspx
unknown
http://www.avs4you.com/Register.aspx
unknown
http://www.avs4you.com/downloads/update/UpdateList.x
unknown
http://www.avs4you.com/downloads/AVSMediaPlayer.exea
unknown
http://ispp.sourceforge.net/Acerca
unknown
http://www.avs4you.com/downloads/AVSMediaPlayer.exe
unknown
http://www.avs4you.com/downloads/AVSVideoConverter6.exe
unknown
https://store.avs4you.com/order/checkout.php?PRODS=604110&QTY=1&CART=1&CARD=2&SHORT_FORM=1&CURRENCY=
unknown
http://avsdop.com/AVSWebService/AVSRequest
unknown
https://developers.google.com/analytics/resources/concepts/gaConceptsTrackingOverview
unknown
http://www.avs4you.com/Register.aspt
unknown
http://www.avs4you.com/downloads/AVSAudioGrabber.exe
unknown
http://www.avs4you.com/AVS-TV-Box.aspx
unknown
https://www.avs4you.com/component---src-pages-index-js-61c1fcfe70144a5f0bfa.js
18.244.140.117
https://www.onlyoffice.com/download-desktop.aspx?utm_source=email&utm_medium=email&utm_campaign=avs-
unknown
http://www.avsdop.com/avswebservice/service.asmxAVS4YOU
unknown
http://www.avs4you.com/support/index.aspx
unknown
https://www.avs4you.com/static/korea-flag-79791aa1b82ec319446a28648f789d47.svg
18.244.140.117
http://www.avsmedia.com/
unknown
http://www.avs4you.com/AVS-Slideshow-Maker.aspxa
unknown
http://www.avs4you.com/Encrypted-DVD.aspxy
unknown
http://reg.avs4you.com/support.aspx?utm_medium=Navigator&utm_source=Navigator&utm_content=Suppor
unknown
http://www.avs4you.com/downloads/AVSDiscCreator.exe
unknown
http://www.avs4you.com/downloads/AVSPhotoEditor.exea
unknown
http://www.avs4you.com/downloads/update/UpdateList.xmlUpdateList.xmlUpdateList.xmlUpdateList.xmlAVS.
unknown
https://www.avs4you.com/ed7f220203bc9be09c14ffd0c19f9a1d0b534e3f-82d027f8e710db6311dc.js
18.244.140.117
http://www.avs4you.com/downloads/update/UpdateList.xml0t
unknown
http://www.avs4you.com/downloads/update/UpdateList.xml
unknown
http://www.avs4you.com/AVS-Media-Player.aspx
unknown
http://www.avs4you.com/fr/Register.aspx?utm_medium=Register&utm_source=72&utm_content=Register
unknown
http://www.avs4you.com/AVS-Video-Editor4.aspx
unknown
https://www.avs4you.com/styles-e9d24b1846c7d6eb9685.js
18.244.140.117
http://www.avs4you.com/downloads/AVSDVDAuthoring.exeA
unknown
http://www.avs4you.com/
unknown
http://www.innosetup.com/
unknown
http://www.avs4you.com/downloads/AVSVideoRemaker.exe
unknown
http://www.avs4you.com2
unknown
http://ispp.sourceforge.net/x(
unknown
http://www.avs4you.com/AVS-Audio-Recorder.aspx
unknown
http://www.avs4you.com/downloads/AVSSystemCleaner.exe
unknown
http://www.avsdop.com/avswebservice/service.asmxAVS4YOUSoftwareNavigatorTSoftwareNavigatorMainFormAV
unknown
http://www.avs4you.com/AVS-Photo-Editor.aspx
unknown
http://www.avs4you.com/downloads/AVSVideotoGo.exea
unknown
http://www.borland.com/namespaces/Typesgdiplum
unknown
http://www.avs4you.com#http://www.avs4you.com/support.aspx6http://www.avs4you.com/SoftwareNavigator/
unknown
http://www.avsdop.com/avswebservice/service.asmx
unknown
http://www.avs4you.com/Register.aspx?Type=Install&ProgID=72&URL=Registerhttp://www.avs4you.com
unknown
http://www.avs4you.com/downloads/AVSMobileUploader.exeY
unknown
http://www.avs4you.com/AVS-Ringtone-Maker.aspxa
unknown
http://www.avs4you.com/AVS-Audio-Mix.aspx
unknown
https://www.avs4you.com/framework-4cf5ecd37f9363b1291b.js
18.244.140.117
http://www.avs4you.com/downloads/AVSAudioEditor.exea
unknown
http://www.avs4you.com/fr/Register.aspxx
unknown
http://www.avs4you.com/SoftwareNavigator/Download.aspx~
unknown
http://www.avs4you.com/downloads/AVSMobileUploader.exeI
unknown
http://www.avs4you.com/AVS-Audio-Converter.aspx
unknown
http://www.avs4you.com/AVS-Audio-Editor.aspx
unknown
http://www.avs4you.com/AVS-System-Cleaner.aspx
unknown
https://www.avs4you.com/register.aspx
unknown
http://www.avs4you.com/downloads/AVSMobileUploader.exeQ
unknown
http://youtube.com/signup
unknown
http://www.avs4you.com/AVS-Video-Editor4.aspxa
unknown
http://www.avs4you.com/Downloads/AVSDiscCreator.exe?utm_medium=Navigator&utm_source=Navigator&utm_co
unknown
https://dev.visualwebsiteoptimizer.com/analysis/4.0/opa-2015714ead7ef389f4c17a73331ce8c0.js
34.96.102.137
https://www.avs4you.com/component---src-pages-register-aspx-js-6f46d8866c51b1dcd83a.js
18.244.140.117
http://www.avs4you.com/AVS-Video-to-Flash.aspx
unknown
http://ispp.sourceforge.net/
unknown
http://www.avs4you.com/de/Register.aspxx
unknown
http://www.avs4you.com:
unknown
http://www.avs4you.com/AVS-Mobile-Uploader.aspxa
unknown
https://dev.visualwebsiteoptimizer.com/7.0/track-02675bafc3b15c3fe9607f49f9c72a3c.js
34.96.102.137
https://www.avs4you.com/page-data/app-data.json
18.244.140.117
http://www.avs4you.com/Register.aspx?Type=Install&ProgID=72&URL=Registercoll
unknown
http://www.avs4you.com/Downloads/AVSSystemInfo.exe?utm_medium=Navigator&utm_source=Navigator&utm_con
unknown
https://www.avs4you.com/app-ec6a9b7fc501dcfa2bce.js
18.244.140.117
http://www.avs4you.com/Downloads/AVSAudioEditor.exe?utm_medium=Navigator&utm_source=Navigator&utm_co
unknown
http://ispp.sourceforge.net/Informazioni
unknown
http://www.borland.com/namespaces/Typesc0da53f
unknown
http://www.avs4you.com/AVS-Video-to-Flash.aspxa
unknown
http://www.avs4you.com/downloads/AVSYouTubeUploader.exe1
unknown
http://www.borland.com/namespaces/Typesc0da53k
unknown
http://schemas.xmlsoap.org/soap/encoding/4)
unknown
http://www.avs4you.com/Downloads/AVSFirewall.exe?utm_medium=Navigator&utm_source=Navigator&utm_conte
unknown
http://www.avs4you.com/downloads/AVSCoverEditor.exe
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dev.visualwebsiteoptimizer.com
34.96.102.137
sab84n7.x.incapdns.net
45.60.14.94
www.google.com
216.58.206.68
analytics.google.com
172.217.23.110
td.doubleclick.net
142.250.186.66
s-part-0039.t-0009.fb-t-msedge.net
13.107.253.67
mdig4.x.incapdns.net
45.60.14.94
www.avs4you.com
18.244.140.117
stats.g.doubleclick.net
74.125.206.156
secure.avangate.com
unknown
s.clarity.ms
unknown
15.164.165.52.in-addr.arpa
unknown
www.clarity.ms
unknown
secure.2checkout.com
unknown
c.clarity.ms
unknown
There are 5 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.96.102.137
dev.visualwebsiteoptimizer.com
United States
13.107.253.67
s-part-0039.t-0009.fb-t-msedge.net
United States
192.168.2.4
unknown
unknown
74.125.206.156
stats.g.doubleclick.net
United States
216.58.206.68
www.google.com
United States
172.217.23.110
analytics.google.com
United States
18.244.140.117
www.avs4you.com
United States
239.255.255.250
unknown
Reserved
45.60.14.94
sab84n7.x.incapdns.net
United States
142.250.186.66
td.doubleclick.net
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Program Files (x86)\Common Files\AVSMedia\ActiveX\AVSYouTubeUploader.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\YouTubeUploader
AppPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\YouTubeUploader
PathToExe
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Uninstall
AVS YouTube Uploader
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU
ESupport
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\YouTubeUploader
CurLang
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\YouTubeUploader
IWeb
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\YouTubeUploader
IDownload
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\YouTubeUploader
IWMA
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\YouTubeUploader
IBuy
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\YouTubeUploader
IProlong
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS YouTube Uploader 2.1_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS YouTube Uploader 2.1_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS YouTube Uploader 2.1_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS YouTube Uploader 2.1_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS YouTube Uploader 2.1_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS YouTube Uploader 2.1_is1
Inno Setup: Selected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS YouTube Uploader 2.1_is1
Inno Setup: Deselected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS YouTube Uploader 2.1_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS YouTube Uploader 2.1_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS YouTube Uploader 2.1_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS YouTube Uploader 2.1_is1
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS YouTube Uploader 2.1_is1
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS YouTube Uploader 2.1_is1
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS YouTube Uploader 2.1_is1
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS YouTube Uploader 2.1_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS YouTube Uploader 2.1_is1
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS YouTube Uploader 2.1_is1
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\4d11be.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\4d11be.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F942F94A19C0F79468FD2B85E5E8677B
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\77EB05CE46035D115AA4000972A8B18B
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\4006F64980E4BACB0EF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1FA18F7974E099CD0AF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DA42BC89BF25F5BD0AF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2A31EAB9FA7E3C6D0AF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6EC3DF47D8A2C9E00AF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6EC3DF47D8A2C9E00BF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E303DF477533C9E00CF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E303DF477533C9E00BF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F803DF473333C9E00CF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F803DF473333C9E00BF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0E03DF47F033C9E00CF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3BDA33871D1CDE340BF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A07C2387B12CEE340CF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A07C2387B12CEE340BF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8B9F0387FA2C0F340CF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F03103879F2C1F340BF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\19CF0387B61C0F340CF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\19CF0387B61C0F340BF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\780705E191800E540AF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2D405812D7AA33B70CF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\780705E191800E540CF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A57605E15BE00E540BF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CE2605E1F4110E540BF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B92605E137110E540BF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2562336682C91B850AF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6F949E36CB3004C50AF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9D6C7B862FD11C450AF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F3D0372D14C348850AF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6B3F9B40546985670AF18C3B9B1A1EE8
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Program Files (x86)\Common Files\Microsoft Shared\VC\msdia80.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1E9E9A540C8BFC34A9AE14B739ECD0DB
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Common Files\Microsoft Shared\VC\
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\8.0\RED\1033
Install
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\8.0\RED\1033
InstallerType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\8.0\RED\1033
SP
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\8.0\RED\1033
SPIndex
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\8.0\RED\1033
SPName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SideBySide\PatchedComponents
{97F81AF1-0E47-DC99-A01F-C8B3B9A1E18E}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SideBySide\PatchedComponents
{98CB24AD-52FB-DB5F-A01F-C8B3B9A1E18E}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SideBySide\PatchedComponents
{9BAE13A2-E7AF-D6C3-A01F-C8B3B9A1E18E}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SideBySide\PatchedComponents
{74FD3CE6-2A8D-0E9C-A01F-C8B3B9A1E18E}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SideBySide\PatchedComponents
{1E507087-0819-45E0-A01F-C8B3B9A1E18E}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SideBySide\PatchedComponents
{66332652-9C28-58B1-A01F-C8B3B9A1E18E}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SideBySide\PatchedComponents
{63E949F6-03BC-5C40-A01F-C8B3B9A1E18E}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SideBySide\PatchedComponents
{68B7C6D9-1DF2-54C1-A01F-C8B3B9A1E18E}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SideBySide\PatchedComponents
{D2730D3F-3C41-5884-A01F-C8B3B9A1E18E}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SideBySide\PatchedComponents
{04B9F3B6-9645-7658-A01F-C8B3B9A1E18E}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\AA5D9C68C00F12943B2F6CA09FE28244
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{7299052b-02a4-4627-81f2-1818da5d550d}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global
Microsoft.VC80.ATL,type="win32",version="8.0.50727.762",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global
Microsoft.VC80.CRT,type="win32",version="8.0.50727.762",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global
Microsoft.VC80.MFC,type="win32",version="8.0.50727.762",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global
Microsoft.VC80.MFCLOC,type="win32",version="8.0.50727.762",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global
Microsoft.VC80.OpenMP,type="win32",version="8.0.50727.762",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global
policy.8.0.Microsoft.VC80.ATL,type="win32-policy",version="8.0.50727.762",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global
policy.8.0.Microsoft.VC80.CRT,type="win32-policy",version="8.0.50727.762",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global
policy.8.0.Microsoft.VC80.MFC,type="win32-policy",version="8.0.50727.762",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global
policy.8.0.Microsoft.VC80.MFCLOC,type="win32-policy",version="8.0.50727.762",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global
policy.8.0.Microsoft.VC80.OpenMP,type="win32-policy",version="8.0.50727.762",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\b25099274a207264182f8181add555d0
VC_Redist
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\Features
VC_Redist
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\b25099274a207264182f8181add555d0
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\Features
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\b25099274a207264182f8181add555d0\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\AA5D9C68C00F12943B2F6CA09FE28244
b25099274a207264182f8181add555d0
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0\SourceList\Media
DiskPrompt
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0\SourceList\Media
2
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0\SourceList\Media
3
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0\SourceList\Media
4
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0\SourceList\Media
5
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0\SourceList\Media
6
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0\SourceList\Media
7
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0\SourceList\Media
8
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0\SourceList\Media
9
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0\SourceList\Media
10
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0\SourceList\Media
11
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\b25099274a207264182f8181add555d0\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{466634C1-9C91-4506-8A2B-0C1F397013C9}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\AVSYouTubeUploader.DLL
AppID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AVSYouTubeUploader.AVSYouTubeUploader.1
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AVSYouTubeUploader.AVSYouTubeUploader.1\CLSID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AVSYouTubeUploader.AVSYouTubeUploader
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AVSYouTubeUploader.AVSYouTubeUploader\CLSID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AVSYouTubeUploader.AVSYouTubeUploader\CurVer
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9DCA3078-ACA9-465E-BA69-4FC477066717}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9DCA3078-ACA9-465E-BA69-4FC477066717}\ProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9DCA3078-ACA9-465E-BA69-4FC477066717}\VersionIndependentProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9DCA3078-ACA9-465E-BA69-4FC477066717}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9DCA3078-ACA9-465E-BA69-4FC477066717}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9DCA3078-ACA9-465E-BA69-4FC477066717}
AppID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9DCA3078-ACA9-465E-BA69-4FC477066717}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AVSYouTubeUploader.YouTubeCategories.1
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AVSYouTubeUploader.YouTubeCategories.1\CLSID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AVSYouTubeUploader.YouTubeCategories
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AVSYouTubeUploader.YouTubeCategories\CLSID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AVSYouTubeUploader.YouTubeCategories\CurVer
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C384F9D3-E424-4aae-9363-6985265F8CF3}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C384F9D3-E424-4aae-9363-6985265F8CF3}\ProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C384F9D3-E424-4aae-9363-6985265F8CF3}\VersionIndependentProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C384F9D3-E424-4aae-9363-6985265F8CF3}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C384F9D3-E424-4aae-9363-6985265F8CF3}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C384F9D3-E424-4aae-9363-6985265F8CF3}
AppID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C384F9D3-E424-4aae-9363-6985265F8CF3}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{466634C1-9C91-4506-8A2B-0C1F397013C9}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{466634C1-9C91-4506-8A2B-0C1F397013C9}\1.0\FLAGS
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{466634C1-9C91-4506-8A2B-0C1F397013C9}\1.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{466634C1-9C91-4506-8A2B-0C1F397013C9}\1.0\HELPDIR
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CAB191BC-ED21-4A29-A98A-9253FB571C34}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CAB191BC-ED21-4A29-A98A-9253FB571C34}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CAB191BC-ED21-4A29-A98A-9253FB571C34}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CAB191BC-ED21-4A29-A98A-9253FB571C34}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{CAB191BC-ED21-4A29-A98A-9253FB571C34}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{CAB191BC-ED21-4A29-A98A-9253FB571C34}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{CAB191BC-ED21-4A29-A98A-9253FB571C34}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{CAB191BC-ED21-4A29-A98A-9253FB571C34}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8A164323-FAEA-4B06-86A5-7FAB66060CD1}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8A164323-FAEA-4B06-86A5-7FAB66060CD1}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8A164323-FAEA-4B06-86A5-7FAB66060CD1}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8A164323-FAEA-4B06-86A5-7FAB66060CD1}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{8A164323-FAEA-4B06-86A5-7FAB66060CD1}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{8A164323-FAEA-4B06-86A5-7FAB66060CD1}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F4DC4410-1BF6-4737-B800-818B55B982D0}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F4DC4410-1BF6-4737-B800-818B55B982D0}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F4DC4410-1BF6-4737-B800-818B55B982D0}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F4DC4410-1BF6-4737-B800-818B55B982D0}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F4DC4410-1BF6-4737-B800-818B55B982D0}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F4DC4410-1BF6-4737-B800-818B55B982D0}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F4DC4410-1BF6-4737-B800-818B55B982D0}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C5E0D460-C961-44F2-B39F-A5B4A946EA66}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C5E0D460-C961-44F2-B39F-A5B4A946EA66}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C5E0D460-C961-44F2-B39F-A5B4A946EA66}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C5E0D460-C961-44F2-B39F-A5B4A946EA66}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{C5E0D460-C961-44F2-B39F-A5B4A946EA66}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{C5E0D460-C961-44F2-B39F-A5B4A946EA66}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{C5E0D460-C961-44F2-B39F-A5B4A946EA66}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{C5E0D460-C961-44F2-B39F-A5B4A946EA66}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Registration
SharedCounter
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Registration
Uninstall
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Registration
PathToExe
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Registration
CurLang
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Registration
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Registration
IBuy
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\UninstallService
PathToExe
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\UninstallService
CurLang
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU
PathToLicence
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU
HelpPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU
HelpType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Registration
SharedCounter
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
AppPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
PathToExe
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
CurLang
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
AVS Video Converter
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
AVS Video Editor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
AVS Video ReMaker
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
AVS DVD Authoring
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
AVS DVD Copy
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
AVS Video Recorder
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
AVS Media Player
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
AVS Video to Flash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
AVS Video to GO
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
AVS Video to iPod
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
AVS Video to PSP
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
AVS Audio Converter
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
AVS Audio Editor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
AVS Ringtone Maker
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
AVS Audio Recorder
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
AVS Music Mix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
AVS Disc Creator
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
AVS Registry Cleaner
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
AVS Firewall
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
AVS System Info
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
IWebMobile
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
IWebAudio
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
IWebVideo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
IWebBurning
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
IWebSystem
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
IBuy
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
IWeb
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
IUsersGuides
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
IOnlineHelp
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Navigator
ISupport
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Uninstall
AVS4YOU Software Navigator
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS4YOU Software Navigator_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS4YOU Software Navigator_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS4YOU Software Navigator_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS4YOU Software Navigator_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS4YOU Software Navigator_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS4YOU Software Navigator_is1
Inno Setup: Selected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS4YOU Software Navigator_is1
Inno Setup: Deselected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS4YOU Software Navigator_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS4YOU Software Navigator_is1
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS4YOU Software Navigator_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS4YOU Software Navigator_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS4YOU Software Navigator_is1
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS4YOU Software Navigator_is1
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS4YOU Software Navigator_is1
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS4YOU Software Navigator_is1
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS4YOU Software Navigator_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS4YOU Software Navigator_is1
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS4YOU Software Navigator_is1
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Update
AppPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Update
PathToExe
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Update
UpdateListURL
HKEY_CURRENT_USER\SOFTWARE\AVS4YOU\Update
SkinPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Uninstall
AVS Update Manager
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Update
CurLang
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\AVS4YOU\Update
InstallLang
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS Update Manager_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS Update Manager_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS Update Manager_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS Update Manager_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS Update Manager_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS Update Manager_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS Update Manager_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS Update Manager_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS Update Manager_is1
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS Update Manager_is1
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS Update Manager_is1
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS Update Manager_is1
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS Update Manager_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS Update Manager_is1
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AVS Update Manager_is1
InstallDate
There are 314 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FC9B000
direct allocation
page read and write
1F74000
direct allocation
page read and write
20AC000
direct allocation
page read and write
6E1000
unkown
page write copy
7FD9E000
direct allocation
page read and write
49BE000
stack
page read and write
21A0000
direct allocation
page read and write
1F8C000
direct allocation
page read and write
9B000
stack
page read and write
1F0000
heap
page read and write
27E0000
heap
page read and write
63B000
heap
page read and write
401000
unkown
page execute read
2249000
direct allocation
page read and write
7FD8C000
direct allocation
page read and write
4A70000
trusted library allocation
page read and write
2325000
heap
page read and write
C7F000
direct allocation
page read and write
7F9CE000
direct allocation
page read and write
500000
heap
page read and write
5B8000
heap
page read and write
4B50000
direct allocation
page read and write
7FDF7000
direct allocation
page read and write
21F0000
direct allocation
page read and write
78F000
stack
page read and write
63B000
heap
page read and write
7FD56000
direct allocation
page read and write
7F7A0000
direct allocation
page read and write
BFF000
direct allocation
page read and write
7FCBA000
direct allocation
page read and write
26D0000
heap
page read and write
51E000
stack
page read and write
26A8000
direct allocation
page read and write
8F000
stack
page read and write
51E000
stack
page read and write
651000
heap
page read and write
23D0000
heap
page read and write
724000
unkown
page read and write
7FCA5000
direct allocation
page read and write
648000
heap
page read and write
5E9000
heap
page read and write
2170000
direct allocation
page read and write
564000
heap
page read and write
40B000
unkown
page read and write
2350000
heap
page read and write
4A2E000
stack
page read and write
978000
heap
page read and write
9B000
stack
page read and write
7FE17000
direct allocation
page read and write
7FCAA000
direct allocation
page read and write
7FE30000
direct allocation
page read and write
23DE000
stack
page read and write
4D20000
heap
page read and write
7FE01000
direct allocation
page read and write
4C2E000
stack
page read and write
40D000
unkown
page write copy
401000
unkown
page execute read
220C000
direct allocation
page read and write
4C0000
heap
page read and write
2634000
direct allocation
page read and write
96000
stack
page read and write
49AE000
stack
page read and write
7FDD1000
direct allocation
page read and write
43E0000
direct allocation
page read and write
509000
heap
page read and write
585000
heap
page read and write
217C000
direct allocation
page read and write
57A000
heap
page read and write
2080000
direct allocation
page read and write
2610000
heap
page read and write
724000
unkown
page readonly
42E0000
direct allocation
page read and write
4A2000
unkown
page readonly
95B000
heap
page read and write
430000
heap
page read and write
7FD76000
direct allocation
page read and write
217C000
direct allocation
page read and write
60B000
heap
page read and write
2360000
heap
page read and write
2350000
direct allocation
page read and write
177000
stack
page read and write
C8E000
direct allocation
page read and write
4345000
direct allocation
page read and write
4410000
direct allocation
page read and write
277E000
stack
page read and write
574000
heap
page read and write
7FDC1000
direct allocation
page read and write
401000
unkown
page execute read
2177000
direct allocation
page read and write
644000
heap
page read and write
2329000
heap
page read and write
2094000
direct allocation
page read and write
20A8000
direct allocation
page read and write
494000
unkown
page write copy
1F0000
heap
page read and write
34AF000
stack
page read and write
4B2F000
stack
page read and write
7FE1F000
direct allocation
page read and write
616000
heap
page read and write
21A0000
direct allocation
page read and write
20B8000
direct allocation
page read and write
411000
unkown
page readonly
589000
heap
page read and write
7FA0C000
direct allocation
page read and write
2170000
direct allocation
page read and write
1F90000
direct allocation
page read and write
7FD66000
direct allocation
page read and write
7FCA0000
direct allocation
page read and write
20A8000
direct allocation
page read and write
20AC000
direct allocation
page read and write
7FD9C000
direct allocation
page read and write
40B000
unkown
page write copy
2238000
direct allocation
page read and write
1F80000
direct allocation
page read and write
585000
heap
page read and write
5F1000
heap
page read and write
7FD81000
direct allocation
page read and write
4E40000
heap
page read and write
618000
heap
page read and write
2170000
direct allocation
page read and write
733000
unkown
page read and write
575000
heap
page read and write
2184000
direct allocation
page read and write
1F70000
direct allocation
page read and write
4E90000
direct allocation
page read and write
96000
stack
page read and write
610000
heap
page read and write
401000
unkown
page execute read
28E0000
heap
page read and write
505000
heap
page read and write
430000
heap
page read and write
D11000
direct allocation
page read and write
3120000
direct allocation
page read and write
8EF000
stack
page read and write
7FDF1000
direct allocation
page read and write
2168000
direct allocation
page read and write
2F8A000
stack
page read and write
51E000
stack
page read and write
574000
heap
page read and write
5FA000
heap
page read and write
400000
unkown
page readonly
411000
unkown
page readonly
491000
unkown
page read and write
33CE000
stack
page read and write
7FE39000
direct allocation
page read and write
7FD00000
direct allocation
page read and write
2160000
direct allocation
page read and write
4A2000
unkown
page readonly
57C000
heap
page read and write
5D9000
heap
page read and write
4A2000
unkown
page readonly
7FC90000
direct allocation
page read and write
2384000
heap
page read and write
460000
heap
page read and write
2234000
direct allocation
page read and write
94C000
heap
page read and write
2FF0000
heap
page read and write
7FE1A000
direct allocation
page read and write
18F000
stack
page read and write
7FA26000
direct allocation
page read and write
441B000
direct allocation
page read and write
7FDC6000
direct allocation
page read and write
7FD30000
direct allocation
page read and write
2094000
direct allocation
page read and write
215C000
direct allocation
page read and write
A8E000
stack
page read and write
8CF000
stack
page read and write
2310000
direct allocation
page read and write
2490000
heap
page read and write
5342000
direct allocation
page read and write
2350000
heap
page read and write
7FD36000
direct allocation
page read and write
52E000
heap
page read and write
7FDFF000
direct allocation
page read and write
21F8000
direct allocation
page read and write
33AE000
stack
page read and write
6EB000
unkown
page read and write
C17000
direct allocation
page read and write
7FCB5000
direct allocation
page read and write
67E000
stack
page read and write
2204000
direct allocation
page read and write
586000
heap
page read and write
957000
heap
page read and write
19B000
stack
page read and write
6B0000
heap
page read and write
59A000
heap
page read and write
4C0000
heap
page read and write
6E3000
unkown
page read and write
2195000
direct allocation
page read and write
7FC40000
direct allocation
page read and write
CE5000
direct allocation
page read and write
7FD05000
direct allocation
page read and write
4D0000
heap
page read and write
91A000
heap
page read and write
5BE000
heap
page read and write
727000
unkown
page read and write
20A4000
direct allocation
page read and write
2190000
direct allocation
page read and write
610000
heap
page read and write
4C6E000
stack
page read and write
718000
unkown
page read and write
2270000
heap
page read and write
7FDCC000
direct allocation
page read and write
67F000
heap
page read and write
420000
heap
page read and write
2091000
direct allocation
page read and write
5B0000
direct allocation
page execute and read and write
7FCB0000
direct allocation
page read and write
5DA000
heap
page read and write
56F000
heap
page read and write
5FF000
heap
page read and write
64B000
heap
page read and write
6FD000
unkown
page read and write
724000
unkown
page readonly
23F0000
heap
page read and write
2250000
direct allocation
page read and write
2650000
direct allocation
page read and write
2180000
direct allocation
page read and write
400000
unkown
page readonly
678000
heap
page read and write
336F000
stack
page read and write
43E7000
direct allocation
page read and write
2158000
direct allocation
page read and write
4A80000
trusted library allocation
page read and write
2264000
direct allocation
page read and write
24C0000
heap
page read and write
7FDA6000
direct allocation
page read and write
4336000
direct allocation
page read and write
5A2000
heap
page read and write
2150000
direct allocation
page read and write
7FDB1000
direct allocation
page read and write
5FA000
heap
page read and write
715000
unkown
page read and write
28BF000
stack
page read and write
327E000
stack
page read and write
216F000
direct allocation
page read and write
98F000
stack
page read and write
7FDEC000
direct allocation
page read and write
19D000
stack
page read and write
7CE000
stack
page read and write
7FE2A000
direct allocation
page read and write
7FE25000
direct allocation
page read and write
7FC70000
direct allocation
page read and write
62D000
heap
page read and write
735000
unkown
page read and write
7FC95000
direct allocation
page read and write
2750000
trusted library allocation
page read and write
955000
heap
page read and write
5CA000
heap
page read and write
500000
heap
page read and write
95F000
heap
page read and write
2249000
direct allocation
page read and write
27E0000
trusted library allocation
page read and write
91E000
heap
page read and write
2130000
direct allocation
page read and write
958000
heap
page read and write
957000
heap
page read and write
8EF000
stack
page read and write
23A4000
heap
page read and write
3250000
heap
page read and write
491000
unkown
page write copy
67F000
heap
page read and write
320E000
stack
page read and write
19D000
stack
page read and write
25E0000
heap
page read and write
5B8000
heap
page read and write
411000
unkown
page readonly
2138000
direct allocation
page read and write
5BE0000
heap
page read and write
22A4000
heap
page read and write
27BF000
stack
page read and write
52A000
heap
page read and write
20B0000
direct allocation
page read and write
30E0000
direct allocation
page read and write
540000
heap
page read and write
20A1000
direct allocation
page read and write
97A000
heap
page read and write
2218000
direct allocation
page read and write
21E9000
heap
page read and write
701000
unkown
page read and write
491000
unkown
page write copy
400000
unkown
page readonly
7FDC3000
direct allocation
page read and write
2150000
heap
page read and write
7FA4E000
direct allocation
page read and write
2220000
direct allocation
page read and write
2168000
direct allocation
page read and write
7FDE1000
direct allocation
page read and write
6B6000
heap
page read and write
701000
unkown
page read and write
401000
unkown
page execute read
7FE07000
direct allocation
page read and write
7FD4E000
direct allocation
page read and write
2160000
direct allocation
page read and write
494000
unkown
page write copy
400000
unkown
page readonly
718000
unkown
page read and write
711000
unkown
page read and write
430D000
direct allocation
page read and write
D20000
heap
page read and write
D30000
heap
page read and write
94F000
stack
page read and write
634000
heap
page read and write
2084000
direct allocation
page read and write
411000
unkown
page readonly
21C0000
heap
page read and write
47A000
heap
page read and write
7FDAC000
direct allocation
page read and write
2091000
direct allocation
page read and write
2188000
direct allocation
page read and write
CDE000
direct allocation
page read and write
70B000
unkown
page read and write
19D000
stack
page read and write
269A000
direct allocation
page read and write
2150000
direct allocation
page read and write
401000
unkown
page execute read
494000
unkown
page write copy
326E000
stack
page read and write
4355000
direct allocation
page read and write
7FCC0000
direct allocation
page read and write
34CF000
stack
page read and write
2098000
direct allocation
page read and write
95E000
heap
page read and write
26A1000
direct allocation
page read and write
4523000
direct allocation
page read and write
223C000
direct allocation
page read and write
49ED000
stack
page read and write
491000
unkown
page read and write
491000
unkown
page write copy
7FDBC000
direct allocation
page read and write
5F0000
heap
page read and write
6F6000
unkown
page read and write
400000
unkown
page readonly
2460000
heap
page read and write
979000
heap
page read and write
9B000
stack
page read and write
238F000
stack
page read and write
94B000
heap
page read and write
670000
heap
page read and write
45BE000
stack
page read and write
7FC1E000
direct allocation
page read and write
6F1000
unkown
page read and write
642000
heap
page read and write
20C0000
direct allocation
page read and write
4C90000
trusted library allocation
page read and write
253F000
stack
page read and write
7FD26000
direct allocation
page read and write
9B000
stack
page read and write
52A000
heap
page read and write
578000
heap
page read and write
4F79000
direct allocation
page read and write
7FD20000
direct allocation
page read and write
57F000
heap
page read and write
7FCD0000
direct allocation
page read and write
651000
heap
page read and write
5CB000
heap
page read and write
401000
unkown
page execute read
C39000
direct allocation
page read and write
741000
unkown
page readonly
40B000
unkown
page write copy
5CB000
heap
page read and write
2230000
direct allocation
page read and write
7FB10000
direct allocation
page read and write
26D0000
heap
page read and write
21B0000
direct allocation
page read and write
C0E000
direct allocation
page read and write
20A0000
direct allocation
page read and write
574000
heap
page read and write
910000
heap
page read and write
2198000
direct allocation
page read and write
7FE1D000
direct allocation
page read and write
5FC000
heap
page read and write
2180000
direct allocation
page read and write
2158000
direct allocation
page read and write
7FC70000
direct allocation
page read and write
5D0000
heap
page read and write
7FC90000
direct allocation
page read and write
40D000
unkown
page write copy
400000
unkown
page readonly
975000
heap
page read and write
20A1000
direct allocation
page read and write
56B000
heap
page read and write
56E000
stack
page read and write
7FCF0000
direct allocation
page read and write
7FE22000
direct allocation
page read and write
4409000
direct allocation
page read and write
5F2000
heap
page read and write
2194000
direct allocation
page read and write
420000
heap
page read and write
2620000
heap
page read and write
570000
heap
page read and write
2180000
direct allocation
page read and write
2613000
heap
page read and write
460000
heap
page read and write
4C10000
trusted library allocation
page read and write
5BE000
heap
page read and write
2230000
direct allocation
page execute and read and write
65E000
stack
page read and write
7FCB0000
direct allocation
page read and write
1F81000
direct allocation
page read and write
2195000
direct allocation
page read and write
C1D000
direct allocation
page read and write
7FD51000
direct allocation
page read and write
2258000
direct allocation
page read and write
46FE000
stack
page read and write
2240000
direct allocation
page read and write
616000
heap
page read and write
8C0000
heap
page read and write
2370000
heap
page read and write
712000
unkown
page read and write
401000
unkown
page execute read
400000
unkown
page readonly
267C000
direct allocation
page read and write
570000
heap
page read and write
7FC70000
direct allocation
page read and write
AE0000
heap
page read and write
59E000
heap
page read and write
400000
unkown
page readonly
23B0000
heap
page read and write
675000
heap
page read and write
1F0000
heap
page read and write
651000
heap
page read and write
2138000
direct allocation
page read and write
491000
unkown
page write copy
676000
heap
page read and write
2150000
direct allocation
page read and write
24DF000
stack
page read and write
401000
unkown
page execute read
5F6000
heap
page read and write
2194000
direct allocation
page read and write
5F6000
heap
page read and write
C07000
direct allocation
page read and write
532D000
direct allocation
page read and write
5BE000
heap
page read and write
224C000
direct allocation
page read and write
30E0000
direct allocation
page read and write
20E0000
heap
page read and write
BE0000
direct allocation
page read and write
21A3000
direct allocation
page read and write
2135000
direct allocation
page read and write
4B50000
direct allocation
page read and write
96000
stack
page read and write
2190000
direct allocation
page read and write
411000
unkown
page readonly
60E000
heap
page read and write
203C000
direct allocation
page read and write
20A0000
direct allocation
page read and write
67F000
heap
page read and write
4A2000
unkown
page readonly
510000
heap
page read and write
2090000
direct allocation
page read and write
54E000
heap
page read and write
47E000
heap
page read and write
401000
unkown
page execute read
40B000
unkown
page read and write
7CF000
stack
page read and write
400000
unkown
page readonly
651000
heap
page read and write
18C000
stack
page read and write
400000
unkown
page readonly
55F000
heap
page read and write
420000
heap
page read and write
3120000
direct allocation
page read and write
73E000
unkown
page read and write
2360000
heap
page read and write
1F84000
direct allocation
page read and write
438E000
direct allocation
page read and write
4C8F000
stack
page read and write
7FD5B000
direct allocation
page read and write
7FC95000
direct allocation
page read and write
2700000
heap
page read and write
64D000
heap
page read and write
4A2000
unkown
page readonly
73A000
unkown
page read and write
20A4000
direct allocation
page read and write
7FC2F000
direct allocation
page read and write
7F9FE000
direct allocation
page read and write
2870000
heap
page read and write
6EE000
unkown
page read and write
218C000
direct allocation
page read and write
20B4000
direct allocation
page read and write
C55000
direct allocation
page read and write
7FE00000
direct allocation
page read and write
9B000
stack
page read and write
430000
heap
page read and write
7FD16000
direct allocation
page read and write
400000
unkown
page readonly
5FE000
heap
page read and write
4C0000
heap
page read and write
216C000
direct allocation
page read and write
22A0000
heap
page read and write
7FCD5000
direct allocation
page read and write
97F000
heap
page read and write
88F000
stack
page read and write
610000
heap
page read and write
2230000
direct allocation
page read and write
4A2000
unkown
page readonly
7FC9A000
direct allocation
page read and write
2463000
heap
page read and write
940000
heap
page read and write
7FDE7000
direct allocation
page read and write
491000
unkown
page read and write
7FCE5000
direct allocation
page read and write
CF3000
direct allocation
page read and write
40B000
unkown
page write copy
2178000
direct allocation
page read and write
2154000
direct allocation
page read and write
BED000
direct allocation
page read and write
24C4000
heap
page read and write
5BDC000
stack
page read and write
21A4000
direct allocation
page read and write
2254000
direct allocation
page read and write
7FA60000
direct allocation
page read and write
21E5000
heap
page read and write
5268000
direct allocation
page read and write
7FCB6000
direct allocation
page read and write
43C8000
direct allocation
page read and write
7FCDB000
direct allocation
page read and write
7FD6B000
direct allocation
page read and write
7FDCE000
direct allocation
page read and write
7FE27000
direct allocation
page read and write
4C0000
heap
page read and write
401000
unkown
page execute read
30E0000
heap
page read and write
491000
unkown
page read and write
2160000
direct allocation
page read and write
40B000
unkown
page read and write
62D000
heap
page read and write
87E000
stack
page read and write
48BE000
stack
page read and write
7FCE0000
direct allocation
page read and write
962000
heap
page read and write
6E5000
unkown
page read and write
520000
heap
page read and write
7D2000
unkown
page readonly
256F000
stack
page read and write
574000
heap
page read and write
21A8000
direct allocation
page read and write
40B000
unkown
page write copy
2168000
direct allocation
page read and write
52E000
heap
page read and write
520000
heap
page read and write
957000
heap
page read and write
571000
heap
page read and write
5D0000
heap
page read and write
48EE000
stack
page read and write
7FCEB000
direct allocation
page read and write
214C000
direct allocation
page read and write
8BF000
stack
page read and write
2144000
direct allocation
page read and write
55E000
stack
page read and write
23A0000
heap
page read and write
19C000
stack
page read and write
7FD4B000
direct allocation
page read and write
27F0000
heap
page read and write
5AE000
heap
page read and write
3200000
heap
page read and write
5CF000
heap
page read and write
4EE000
stack
page read and write
262C000
direct allocation
page read and write
7FCA0000
direct allocation
page read and write
401000
unkown
page execute read
5CE000
heap
page read and write
952000
heap
page read and write
2164000
direct allocation
page read and write
7FD46000
direct allocation
page read and write
C46000
direct allocation
page read and write
4CEE000
stack
page read and write
441F000
direct allocation
page read and write
6EB000
unkown
page read and write
7FE32000
direct allocation
page read and write
400000
unkown
page readonly
4A2000
unkown
page readonly
7FC54000
direct allocation
page read and write
219C000
direct allocation
page read and write
5ADC000
stack
page read and write
3220000
direct allocation
page read and write
C31000
direct allocation
page read and write
62D000
heap
page read and write
2147000
direct allocation
page read and write
2674000
direct allocation
page read and write
4560000
trusted library allocation
page read and write
2160000
heap
page read and write
2320000
heap
page read and write
3340000
heap
page read and write
7FA49000
direct allocation
page read and write
3150000
direct allocation
page read and write
400000
unkown
page readonly
5E6000
heap
page read and write
88F000
stack
page read and write
7F690000
direct allocation
page read and write
2666000
direct allocation
page read and write
40D000
unkown
page write copy
7FD61000
direct allocation
page read and write
494000
unkown
page write copy
64A000
heap
page read and write
7FCC5000
direct allocation
page read and write
2F85000
stack
page read and write
7FD7B000
direct allocation
page read and write
5F6000
heap
page read and write
4501000
direct allocation
page read and write
2300000
direct allocation
page read and write
401000
unkown
page execute read
49FE000
stack
page read and write
7FAE0000
direct allocation
page read and write
5CB000
heap
page read and write
5A9F000
stack
page read and write
2214000
direct allocation
page read and write
56F000
heap
page read and write
217D000
direct allocation
page read and write
955000
heap
page read and write
2194000
direct allocation
page read and write
C68000
direct allocation
page read and write
401000
unkown
page execute read
470000
heap
page read and write
C4E000
direct allocation
page read and write
63F000
heap
page read and write
619000
heap
page read and write
D35000
heap
page read and write
59E000
stack
page read and write
2160000
direct allocation
page read and write
7FDFC000
direct allocation
page read and write
7FE32000
direct allocation
page read and write
98F000
stack
page read and write
401000
unkown
page execute read
23C0000
heap
page read and write
CA4000
direct allocation
page read and write
4E8F000
stack
page read and write
2693000
direct allocation
page read and write
5DE000
heap
page read and write
55E000
stack
page read and write
7FE12000
direct allocation
page read and write
5190000
direct allocation
page read and write
2144000
direct allocation
page read and write
2165000
direct allocation
page read and write
2350000
direct allocation
page read and write
5C8000
heap
page read and write
2260000
heap
page read and write
7FCAB000
direct allocation
page read and write
576000
heap
page read and write
20B0000
direct allocation
page read and write
546000
heap
page read and write
2184000
direct allocation
page read and write
741000
unkown
page readonly
400000
unkown
page readonly
7FDA1000
direct allocation
page read and write
7FDD7000
direct allocation
page read and write
56F000
heap
page read and write
2195000
direct allocation
page read and write
644000
heap
page read and write
7FD70000
direct allocation
page read and write
BEF000
direct allocation
page read and write
4D0000
heap
page read and write
2F4B000
stack
page read and write
986000
heap
page read and write
2130000
direct allocation
page read and write
7FE21000
direct allocation
page read and write
4AE000
stack
page read and write
4B4F000
stack
page read and write
5E9000
heap
page read and write
5B8000
heap
page read and write
28A0000
trusted library allocation
page read and write
55E000
stack
page read and write
261E000
direct allocation
page read and write
337E000
stack
page read and write
7FCFB000
direct allocation
page read and write
7FDF0000
direct allocation
page read and write
2194000
direct allocation
page read and write
4D0000
heap
page read and write
6EB000
unkown
page write copy
401000
unkown
page execute read
216D000
direct allocation
page read and write
7FD3E000
direct allocation
page read and write
7FD86000
direct allocation
page read and write
7FCF5000
direct allocation
page read and write
2810000
trusted library allocation
page read and write
604000
heap
page read and write
209C000
direct allocation
page read and write
4553000
direct allocation
page read and write
CD6000
direct allocation
page read and write
5F0000
heap
page read and write
7EF000
stack
page read and write
42F2000
direct allocation
page read and write
5FA000
heap
page read and write
20BC000
direct allocation
page read and write
18F000
stack
page read and write
400000
unkown
page readonly
29E0000
heap
page read and write
433E000
direct allocation
page read and write
2380000
heap
page read and write
217C000
direct allocation
page read and write
C59000
direct allocation
page read and write
4D0000
heap
page read and write
266D000
direct allocation
page read and write
2168000
direct allocation
page read and write
7D3000
unkown
page readonly
56B000
heap
page read and write
3330000
heap
page read and write
216C000
direct allocation
page read and write
334A000
heap
page read and write
C60000
direct allocation
page read and write
62F000
heap
page read and write
20B8000
direct allocation
page read and write
D3A000
heap
page read and write
84F000
stack
page read and write
215C000
direct allocation
page read and write
2135000
direct allocation
page read and write
454C000
direct allocation
page read and write
3150000
direct allocation
page read and write
21E0000
heap
page read and write
7FD2B000
direct allocation
page read and write
648000
heap
page read and write
2174000
direct allocation
page read and write
4A4E000
stack
page read and write
585000
heap
page read and write
55C000
heap
page read and write
361E000
stack
page read and write
218C000
direct allocation
page read and write
4F7F000
direct allocation
page read and write
3220000
direct allocation
page read and write
5D5000
heap
page read and write
400000
unkown
page readonly
19D000
stack
page read and write
830000
heap
page read and write
7FDB6000
direct allocation
page read and write
7FD80000
direct allocation
page read and write
35D0000
heap
page read and write
7FD0B000
direct allocation
page read and write
265F000
direct allocation
page read and write
18E000
stack
page read and write
221C000
direct allocation
page read and write
21A4000
direct allocation
page read and write
5C0000
heap
page read and write
58A000
heap
page read and write
7FDDD000
direct allocation
page read and write
2658000
direct allocation
page read and write
4A2F000
stack
page read and write
619000
heap
page read and write
46BF000
stack
page read and write
40D000
unkown
page write copy
7FE0C000
direct allocation
page read and write
958000
heap
page read and write
644000
heap
page read and write
70F000
unkown
page read and write
680000
heap
page read and write
653000
heap
page read and write
C22000
direct allocation
page read and write
953000
heap
page read and write
400000
unkown
page readonly
986000
heap
page read and write
2207000
direct allocation
page read and write
2188000
direct allocation
page read and write
589000
heap
page read and write
6E1000
unkown
page read and write
7FE2C000
direct allocation
page read and write
20B4000
direct allocation
page read and write
7FD1B000
direct allocation
page read and write
4A2000
unkown
page readonly
2310000
direct allocation
page read and write
401000
unkown
page execute read
25F0000
direct allocation
page execute and read and write
4328000
direct allocation
page read and write
D18000
direct allocation
page read and write
411000
unkown
page readonly
2230000
direct allocation
page read and write
3AC000
stack
page read and write
958000
heap
page read and write
2090000
direct allocation
page read and write
48AE000
stack
page read and write
21A4000
direct allocation
page read and write
3363000
heap
page read and write
411000
unkown
page readonly
2184000
direct allocation
page read and write
432F000
direct allocation
page read and write
CB9000
direct allocation
page read and write
215F000
stack
page read and write
283E000
stack
page read and write
2094000
direct allocation
page read and write
C9D000
direct allocation
page read and write
549000
heap
page read and write
2190000
direct allocation
page read and write
7FC22000
direct allocation
page read and write
4B8E000
stack
page read and write
2300000
direct allocation
page read and write
5EE000
stack
page read and write
63F000
heap
page read and write
7FA54000
direct allocation
page read and write
2198000
direct allocation
page read and write
7FD91000
direct allocation
page read and write
7FD96000
direct allocation
page read and write
7FD40000
direct allocation
page read and write
7FE1E000
direct allocation
page read and write
D03000
direct allocation
page read and write
7FCCB000
direct allocation
page read and write
5CB000
heap
page read and write
20AE000
stack
page read and write
BDF000
stack
page read and write
4CAE000
stack
page read and write
ACE000
stack
page read and write
21F5000
direct allocation
page read and write
944000
heap
page read and write
7FC90000
direct allocation
page read and write
652000
heap
page read and write
5F6000
heap
page read and write
5E6000
heap
page read and write
400000
unkown
page readonly
5259000
direct allocation
page read and write
36B000
stack
page read and write
7FE1C000
direct allocation
page read and write
62D000
heap
page read and write
2244000
direct allocation
page read and write
95F000
heap
page read and write
850000
heap
page read and write
CAB000
direct allocation
page read and write
1F88000
direct allocation
page read and write
5C7000
heap
page read and write
2120000
direct allocation
page execute and read and write
7FD10000
direct allocation
page read and write
2232000
direct allocation
page read and write
23E0000
direct allocation
page execute and read and write
2195000
direct allocation
page read and write
590000
heap
page read and write
63F000
heap
page read and write
72B000
unkown
page read and write
510000
heap
page read and write
20A8000
direct allocation
page read and write
5F6000
heap
page read and write
CB2000
direct allocation
page read and write
C27000
direct allocation
page read and write
645000
heap
page read and write
2683000
direct allocation
page read and write
411000
unkown
page readonly
C78000
direct allocation
page read and write
7FDDC000
direct allocation
page read and write
40B000
unkown
page read and write
218C000
direct allocation
page read and write
BF8000
direct allocation
page read and write
610000
heap
page read and write
5FA000
heap
page read and write
4407000
direct allocation
page read and write
7FD71000
direct allocation
page read and write
91000
stack
page read and write
4306000
direct allocation
page read and write
930000
heap
page read and write
29EA000
heap
page read and write
4AFF000
stack
page read and write
2188000
direct allocation
page read and write
589000
heap
page read and write
62C000
heap
page read and write
5F6000
heap
page read and write
7FCA5000
direct allocation
page read and write
7FD3B000
direct allocation
page read and write
510000
heap
page read and write
6A0000
direct allocation
page execute and read and write
705000
unkown
page read and write
2210000
direct allocation
page read and write
5FA000
heap
page read and write
1F94000
direct allocation
page read and write
401000
unkown
page execute read
5EC000
heap
page read and write
63A000
heap
page read and write
7FCD0000
direct allocation
page read and write
There are 852 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://www.avs4you.com/register.aspx?Type=Install&ProgID=72&URL=Register
https://www.avs4you.com/register.aspx?Type=Install&ProgID=72&URL=Register
https://www.avs4you.com/register.aspx?Type=Install&ProgID=72&URL=Register
https://td.doubleclick.net/td/ga/rul?tid=G-BWSZ9WEBRH&gacid=1987730708.1716565152&gtm=45je45m0v9102177972z876934661za200zb76934661&dma=0&gcd=13l3l3l3l1&npa=0&pscdl=noapi&aip=1&fledge=1&frm=0&z=1807214805
https://td.doubleclick.net/td/ga/rul?tid=G-FEYVLL88YK&gacid=1987730708.1716565152&gtm=45je45m0v9123194436za200&dma=0&gcd=13l3l3l3l1&npa=0&pscdl=noapi&aip=1&fledge=1&frm=0&z=845811239