IOC Report
oBX1n79NgQ.exe

loading gif

Files

File Path
Type
Category
Malicious
oBX1n79NgQ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\updater.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SystemTemp\Google7068_1700592644\bin\updater.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4180_536941199\125.0.6422.113_chrome_installer.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Program Files (x86)\Google\GoogleUpdater\0b1b1fa9-587b-42ab-9a21-d311142c0a99.tmp
JSON data
dropped
C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\20d7be24-7f19-48ac-bb8d-ec2ede596347.tmp
JSON data
dropped
C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\prefs.json (copy)
JSON data
dropped
C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\uninstall.cmd
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Google\GoogleUpdater\a551b306-09a1-4111-8ae6-4879d84e3582.tmp
JSON data
dropped
C:\Program Files (x86)\Google\GoogleUpdater\e7a85879-b109-406f-9f99-949ca8274942.tmp
JSON data
dropped
C:\Program Files (x86)\Google\GoogleUpdater\f786af1e-3b2e-487d-a4b6-bf2235b87f24.tmp
JSON data
dropped
C:\Program Files (x86)\Google\GoogleUpdater\prefs.json (copy)
JSON data
dropped
C:\Program Files (x86)\Google\GoogleUpdater\prefs.json~RF5a14f9.TMP (copy)
JSON data
dropped
C:\Program Files (x86)\Google\GoogleUpdater\prefs.json~RF5a8c0d.TMP (copy)
JSON data
dropped
C:\Program Files (x86)\Google\GoogleUpdater\prefs.json~RF5aba32.TMP (copy)
JSON data
dropped
C:\Program Files (x86)\Google\GoogleUpdater\updater.log
ASCII text, with very long lines (45447)
modified
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x50444f60, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\USOShared\Logs\System\UpdateSessionOrchestration.f89ee6fd-e514-48d1-a431-e731cf2d05b9.1.etl
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\AN5UOLP8\{8a69d345-d564-463c-aff1-a69d9e530f96}[1].bmp
PC bitmap, Windows 3.x format, 92 x 24 x 24, resolution 2835 x 2835 px/m, cbSize 6678, bits offset 54
modified
C:\Users\user\AppData\Local\Temp\~DFD6B7B8DB9D6FB665.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\Windows\SystemTemp\Google7068_1700592644\bin\uninstall.cmd
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Windows\SystemTemp\Google7068_1700592644\updater.7z
7-zip archive data, version 0.4
dropped
C:\Windows\SystemTemp\Google7068_17454511\UPDATER.PACKED.7Z
7-zip archive data, version 0.4
dropped
C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4180_536941199\_metadata\verified_contents.json
JSON data
dropped
C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4180_536941199\bdefe0a9-9fa1-476d-abba-f730b9c95120.tmp
Unicode text, UTF-8 (with BOM) text, with very long lines (65533), with no line terminators
dropped
C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4180_536941199\manifest.fingerprint
ASCII text, with no line terminators
dropped
C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4180_536941199\manifest.json
JSON data
dropped
C:\Windows\SystemTemp\chrome_url_fetcher_4180_2047592324\-8a69d345-d564-463c-aff1-a69d9e530f96-_125.0.6422.113_all_aogspox4cotu6xggqyym7s5hye.crx3
Google Chrome extension, version 3
dropped
There are 23 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SystemTemp\Google7068_1700592644\bin\updater.exe
"C:\Windows\SystemTemp\Google7068_1700592644\bin\updater.exe" --install=appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={8D0CD419-2DAC-C85B-BCFF-DB2D99044B99}&lang=en&browser=5&usagestats=0&appname=Google%20Chrome&needsadmin=prefers&ap=x64-statsdef_1&installdataindex=empty --enable-logging --vmodule=*/components/winhttp/*=1,*/components/update_client/*=2,*/chrome/updater/*=2
malicious
C:\Windows\SystemTemp\Google7068_1700592644\bin\updater.exe
C:\Windows\SystemTemp\Google7068_1700592644\bin\updater.exe --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=126.0.6462.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x27c,0x280,0x284,0x258,0x288,0x8d965c,0x8d9668,0x8d9674
malicious
C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\updater.exe
"C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\updater.exe" --system --windows-service --service=update-internal
malicious
C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\updater.exe
"C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=126.0.6462.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x288,0x28c,0x290,0x264,0x294,0x114965c,0x1149668,0x1149674
malicious
C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\updater.exe
"C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\updater.exe" --system --windows-service --service=update
malicious
C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\updater.exe
"C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=126.0.6462.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x288,0x28c,0x290,0x264,0x294,0x114965c,0x1149668,0x1149674
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k UnistackSvcGroup
malicious
C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4180_536941199\125.0.6422.113_chrome_installer.exe
"C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4180_536941199\125.0.6422.113_chrome_installer.exe" --verbose-logging --do-not-launch-chrome --channel=stable --installerdata="C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4180_536941199\bdefe0a9-9fa1-476d-abba-f730b9c95120.tmp"
malicious
C:\Users\user\Desktop\oBX1n79NgQ.exe
"C:\Users\user\Desktop\oBX1n79NgQ.exe"
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://html4/loose.dtd
unknown
https://csp.withgoogle.com/csp/clientupdate-aus/1
unknown
https://dev.ditu.live.com/REST/v1/Routes/
unknown
http://dl.google.com:80
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
https://crashpad.chromium.org/bug/new
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
http://.css
unknown
https://crashpad.chromium.org/https://crashpad.chromium.org/bug/new
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
https://www.google.com/dl/release2/chrome/acjptviylg6r2k4fyfeeegku2wya_125.0.6422.113/
unknown
http://support.google.com/installer/%s?product=%s&error=%d
unknown
https://dl.google.com/
unknown
http://.jpg
unknown
http://www.bingmapsportal.com
unknown
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
http://dl.google.com/
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
unknown
https://crashpad.chromium.org/
unknown
https://www.google.com/dl/release2/chrome/acjptviylg6r2k4fyfeeegku2wya_125.0.6422.113/-8a69d345-d564
unknown
https://dl.google.com/release2/chrome/acjptviylg6r2k4fyfeeegku2wya_125.0.6422.113/
unknown
http://dl.google.com:80/release2/chrome/acjptviylg6r2k4fyfeeegku2wya_125.0.6422.113/-8a69d345-d564-4
unknown
http://www.google.com/dl/release2/chrome/acjptviylg6r2k4fyfeeegku2wya_125.0.6422.113/-8a69d345-d564-
unknown
https://dev.ditu.live.com/REST/v1/Transit/Stops/
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
unknown
http://dl.google.com/release2/chrome/acjptviylg6r2k4fyfeeegku2wya_125.0.6422.113/-8a69d345-d564-463c
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
unknown
http://crl.ver)
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
unknown
https://dev.virtualearth.net/mapcontrol/logging.ashx
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
unknown
https://dl.google.com/release2/chrome/acjptviylg6r2k4fyfeeegku2wya_125.0.6422.113/-8a69d345-d564-463
unknown
https://dl.google.com/update2/installers/icons/%7B8a69d345-d564-463c-aff1-a69d9e530f96%7D.bmp?lang=e
unknown
https://dynamic.t
unknown
https://g.live.com/odclientsettings/Prod-C:
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://dl.google.com/update2/installers/icons/
unknown
http://support.google.com/installer/
unknown
https://g.live.com/odclientsettings/ProdV2-C:
unknown
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
unknown
http://www.google.com/dl/release2/chrome/acjptviylg6r2k4fyfeeegku2wya_125.0.6422.113/
unknown
https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
http://dl.google.com/release2/chrome/acjptviylg6r2k4fyfeeegku2wya_125.0.6422.113/
unknown
https://csp.withgoogle.com/csp/clientupdate-aus/1Persistent-AuthWWW-AuthenticateVarySet-CookieGSESer
unknown
https://dev.ditu.live.com/REST/v1/Locations
unknown
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
There are 49 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
142.250.181.227
unknown
United States
2.19.244.127
unknown
European Union
172.217.16.206
unknown
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\Clients\{44fc7fe2-65ce-487c-93f4-edee46eeaaab}
pv
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\Clients\{44fc7fe2-65ce-487c-93f4-edee46eeaaab}
name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientState\{44fc7fe2-65ce-487c-93f4-edee46eeaaab}
pv
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientState\{44fc7fe2-65ce-487c-93f4-edee46eeaaab}
name
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A0050632-BE5D-5130-9940-EAA92018E727}
AppID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{A0050632-BE5D-5130-9940-EAA92018E727}
LocalService
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{A0050632-BE5D-5130-9940-EAA92018E727}
ServiceParameters
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B62C003B-DD12-572A-87D4-6AA073CD56B1}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B62C003B-DD12-572A-87D4-6AA073CD56B1}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B62C003B-DD12-572A-87D4-6AA073CD56B1}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B62C003B-DD12-572A-87D4-6AA073CD56B1}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B62C003B-DD12-572A-87D4-6AA073CD56B1}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B62C003B-DD12-572A-87D4-6AA073CD56B1}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B62C003B-DD12-572A-87D4-6AA073CD56B1}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B62C003B-DD12-572A-87D4-6AA073CD56B1}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{B62C003B-DD12-572A-87D4-6AA073CD56B1}\1.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{B62C003B-DD12-572A-87D4-6AA073CD56B1}\1.0\0\win64
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{B62C003B-DD12-572A-87D4-6AA073CD56B1}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F253E6BF-D9BE-5B1A-9E0D-23FA9FD4D571}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F253E6BF-D9BE-5B1A-9E0D-23FA9FD4D571}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F253E6BF-D9BE-5B1A-9E0D-23FA9FD4D571}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F253E6BF-D9BE-5B1A-9E0D-23FA9FD4D571}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F253E6BF-D9BE-5B1A-9E0D-23FA9FD4D571}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F253E6BF-D9BE-5B1A-9E0D-23FA9FD4D571}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F253E6BF-D9BE-5B1A-9E0D-23FA9FD4D571}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F253E6BF-D9BE-5B1A-9E0D-23FA9FD4D571}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F253E6BF-D9BE-5B1A-9E0D-23FA9FD4D571}\1.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F253E6BF-D9BE-5B1A-9E0D-23FA9FD4D571}\1.0\0\win64
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F253E6BF-D9BE-5B1A-9E0D-23FA9FD4D571}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8018F647-BF07-55BB-82BE-A2D7049F7CE4}
AppID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{8018F647-BF07-55BB-82BE-A2D7049F7CE4}
LocalService
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{8018F647-BF07-55BB-82BE-A2D7049F7CE4}
ServiceParameters
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8A1D4361-2C08-4700-A351-3EAA9CBFF5E4}
AppID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{8A1D4361-2C08-4700-A351-3EAA9CBFF5E4}
LocalService
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{8A1D4361-2C08-4700-A351-3EAA9CBFF5E4}
ServiceParameters
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{534F5323-3569-4F42-919D-1E1CF93E5BF6}
AppID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{534F5323-3569-4F42-919D-1E1CF93E5BF6}
ServiceParameters
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{521FDB42-7130-4806-822A-FC5163FAD983}
AppID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{521FDB42-7130-4806-822A-FC5163FAD983}
LocalService
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{521FDB42-7130-4806-822A-FC5163FAD983}
ServiceParameters
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ABC01078-F197-4B0B-ADBC-CFE684B39C82}
AppID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\GoogleUpdate.Update3WebMachine\CLSID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1588C1A8-27D9-563E-9641-8D20767FB258}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1588C1A8-27D9-563E-9641-8D20767FB258}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1588C1A8-27D9-563E-9641-8D20767FB258}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1588C1A8-27D9-563E-9641-8D20767FB258}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{1588C1A8-27D9-563E-9641-8D20767FB258}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{1588C1A8-27D9-563E-9641-8D20767FB258}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{1588C1A8-27D9-563E-9641-8D20767FB258}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{1588C1A8-27D9-563E-9641-8D20767FB258}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{1588C1A8-27D9-563E-9641-8D20767FB258}\1.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{1588C1A8-27D9-563E-9641-8D20767FB258}\1.0\0\win64
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{1588C1A8-27D9-563E-9641-8D20767FB258}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{ACAB122B-29C0-56A9-8145-AFA2F82A547C}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{ACAB122B-29C0-56A9-8145-AFA2F82A547C}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{ACAB122B-29C0-56A9-8145-AFA2F82A547C}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{ACAB122B-29C0-56A9-8145-AFA2F82A547C}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{ACAB122B-29C0-56A9-8145-AFA2F82A547C}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{ACAB122B-29C0-56A9-8145-AFA2F82A547C}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{ACAB122B-29C0-56A9-8145-AFA2F82A547C}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{ACAB122B-29C0-56A9-8145-AFA2F82A547C}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{ACAB122B-29C0-56A9-8145-AFA2F82A547C}\1.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{ACAB122B-29C0-56A9-8145-AFA2F82A547C}\1.0\0\win64
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{ACAB122B-29C0-56A9-8145-AFA2F82A547C}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{85AE4AE3-8530-516B-8BE4-A456BF2637D3}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{85AE4AE3-8530-516B-8BE4-A456BF2637D3}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{85AE4AE3-8530-516B-8BE4-A456BF2637D3}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{85AE4AE3-8530-516B-8BE4-A456BF2637D3}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{85AE4AE3-8530-516B-8BE4-A456BF2637D3}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{85AE4AE3-8530-516B-8BE4-A456BF2637D3}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{85AE4AE3-8530-516B-8BE4-A456BF2637D3}\1.0\0\win64
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{85AE4AE3-8530-516B-8BE4-A456BF2637D3}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B16B5A0E-3B72-5223-8DF0-9117CD64DE77}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B16B5A0E-3B72-5223-8DF0-9117CD64DE77}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B16B5A0E-3B72-5223-8DF0-9117CD64DE77}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B16B5A0E-3B72-5223-8DF0-9117CD64DE77}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B16B5A0E-3B72-5223-8DF0-9117CD64DE77}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B16B5A0E-3B72-5223-8DF0-9117CD64DE77}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B16B5A0E-3B72-5223-8DF0-9117CD64DE77}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{B16B5A0E-3B72-5223-8DF0-9117CD64DE77}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0486745C-8D9B-5377-A54C-A61FFAA0BBE4}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0486745C-8D9B-5377-A54C-A61FFAA0BBE4}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{0486745C-8D9B-5377-A54C-A61FFAA0BBE4}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{0486745C-8D9B-5377-A54C-A61FFAA0BBE4}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{0486745C-8D9B-5377-A54C-A61FFAA0BBE4}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B7FD5390-D593-5A8B-9AE2-23CE39822FD4}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B7FD5390-D593-5A8B-9AE2-23CE39822FD4}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B7FD5390-D593-5A8B-9AE2-23CE39822FD4}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B7FD5390-D593-5A8B-9AE2-23CE39822FD4}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B7FD5390-D593-5A8B-9AE2-23CE39822FD4}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B7FD5390-D593-5A8B-9AE2-23CE39822FD4}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B7FD5390-D593-5A8B-9AE2-23CE39822FD4}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B7FD5390-D593-5A8B-9AE2-23CE39822FD4}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{B7FD5390-D593-5A8B-9AE2-23CE39822FD4}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{699F07AD-304C-5F71-A2DA-ABD765965B54}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{699F07AD-304C-5F71-A2DA-ABD765965B54}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{699F07AD-304C-5F71-A2DA-ABD765965B54}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{699F07AD-304C-5F71-A2DA-ABD765965B54}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{699F07AD-304C-5F71-A2DA-ABD765965B54}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{699F07AD-304C-5F71-A2DA-ABD765965B54}\1.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{699F07AD-304C-5F71-A2DA-ABD765965B54}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F258BE54-7C5F-44A0-AAE0-730620A31D23}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F258BE54-7C5F-44A0-AAE0-730620A31D23}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F258BE54-7C5F-44A0-AAE0-730620A31D23}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F258BE54-7C5F-44A0-AAE0-730620A31D23}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F258BE54-7C5F-44A0-AAE0-730620A31D23}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F258BE54-7C5F-44A0-AAE0-730620A31D23}\1.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F258BE54-7C5F-44A0-AAE0-730620A31D23}\1.0\0\win64
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F258BE54-7C5F-44A0-AAE0-730620A31D23}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E9CD91E3-A00C-4B9E-BD63-7F34EB815D98}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E9CD91E3-A00C-4B9E-BD63-7F34EB815D98}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E9CD91E3-A00C-4B9E-BD63-7F34EB815D98}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E9CD91E3-A00C-4B9E-BD63-7F34EB815D98}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E9CD91E3-A00C-4B9E-BD63-7F34EB815D98}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E9CD91E3-A00C-4B9E-BD63-7F34EB815D98}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{E9CD91E3-A00C-4B9E-BD63-7F34EB815D98}\1.0\0\win64
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{E9CD91E3-A00C-4B9E-BD63-7F34EB815D98}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5F793925-C903-4E92-9AE3-77CA5EAB1716}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5F793925-C903-4E92-9AE3-77CA5EAB1716}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{5F793925-C903-4E92-9AE3-77CA5EAB1716}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{5F793925-C903-4E92-9AE3-77CA5EAB1716}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{5F793925-C903-4E92-9AE3-77CA5EAB1716}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{5F793925-C903-4E92-9AE3-77CA5EAB1716}\1.0\0\win64
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{5F793925-C903-4E92-9AE3-77CA5EAB1716}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C4622B28-A747-44C7-96AF-319BE5C3B261}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C4622B28-A747-44C7-96AF-319BE5C3B261}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{C4622B28-A747-44C7-96AF-319BE5C3B261}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{C4622B28-A747-44C7-96AF-319BE5C3B261}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{C4622B28-A747-44C7-96AF-319BE5C3B261}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D576ED7F-31DA-4EE1-98CE-1F882FB3047A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D576ED7F-31DA-4EE1-98CE-1F882FB3047A}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D576ED7F-31DA-4EE1-98CE-1F882FB3047A}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{D576ED7F-31DA-4EE1-98CE-1F882FB3047A}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{D576ED7F-31DA-4EE1-98CE-1F882FB3047A}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{D576ED7F-31DA-4EE1-98CE-1F882FB3047A}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{D576ED7F-31DA-4EE1-98CE-1F882FB3047A}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1F1289FD-DD10-4579-81F6-1C59AAF2E1A9}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1F1289FD-DD10-4579-81F6-1C59AAF2E1A9}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{1F1289FD-DD10-4579-81F6-1C59AAF2E1A9}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{1F1289FD-DD10-4579-81F6-1C59AAF2E1A9}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{1F1289FD-DD10-4579-81F6-1C59AAF2E1A9}\1.0\0\win64
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{1F1289FD-DD10-4579-81F6-1C59AAF2E1A9}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B685B009-DBC4-4F24-9542-A162C3793E77}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B685B009-DBC4-4F24-9542-A162C3793E77}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B685B009-DBC4-4F24-9542-A162C3793E77}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B685B009-DBC4-4F24-9542-A162C3793E77}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B685B009-DBC4-4F24-9542-A162C3793E77}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B685B009-DBC4-4F24-9542-A162C3793E77}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{B685B009-DBC4-4F24-9542-A162C3793E77}\1.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{B685B009-DBC4-4F24-9542-A162C3793E77}\1.0\0\win64
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{B685B009-DBC4-4F24-9542-A162C3793E77}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{513BC7DA-6B8D-45F7-90A0-2E9F66CEF962}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{513BC7DA-6B8D-45F7-90A0-2E9F66CEF962}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{513BC7DA-6B8D-45F7-90A0-2E9F66CEF962}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{513BC7DA-6B8D-45F7-90A0-2E9F66CEF962}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{513BC7DA-6B8D-45F7-90A0-2E9F66CEF962}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{513BC7DA-6B8D-45F7-90A0-2E9F66CEF962}\1.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{513BC7DA-6B8D-45F7-90A0-2E9F66CEF962}\1.0\0\win64
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{513BC7DA-6B8D-45F7-90A0-2E9F66CEF962}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F4334319-8210-469B-8262-DD03623FEB5B}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F4334319-8210-469B-8262-DD03623FEB5B}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F4334319-8210-469B-8262-DD03623FEB5B}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F4334319-8210-469B-8262-DD03623FEB5B}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F4334319-8210-469B-8262-DD03623FEB5B}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4DC034A8-4BFC-4D43-9250-914163356BB0}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4DC034A8-4BFC-4D43-9250-914163356BB0}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{4DC034A8-4BFC-4D43-9250-914163356BB0}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{4DC034A8-4BFC-4D43-9250-914163356BB0}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{4DC034A8-4BFC-4D43-9250-914163356BB0}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{4DC034A8-4BFC-4D43-9250-914163356BB0}\1.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{4DC034A8-4BFC-4D43-9250-914163356BB0}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{128C2DA6-2BC0-44C0-B3F6-4EC22E647964}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{128C2DA6-2BC0-44C0-B3F6-4EC22E647964}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{128C2DA6-2BC0-44C0-B3F6-4EC22E647964}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F4FE76BC-62B9-49FC-972F-C81FC3A926DB}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F4FE76BC-62B9-49FC-972F-C81FC3A926DB}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F4FE76BC-62B9-49FC-972F-C81FC3A926DB}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F4FE76BC-62B9-49FC-972F-C81FC3A926DB}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F4FE76BC-62B9-49FC-972F-C81FC3A926DB}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F4FE76BC-62B9-49FC-972F-C81FC3A926DB}\1.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F4FE76BC-62B9-49FC-972F-C81FC3A926DB}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D106AB5F-A70E-400E-A21B-96208C1D8DBB}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D106AB5F-A70E-400E-A21B-96208C1D8DBB}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{D106AB5F-A70E-400E-A21B-96208C1D8DBB}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{D106AB5F-A70E-400E-A21B-96208C1D8DBB}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6430040A-5EBD-4E63-A56F-C71D5990F827}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6430040A-5EBD-4E63-A56F-C71D5990F827}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6430040A-5EBD-4E63-A56F-C71D5990F827}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6430040A-5EBD-4E63-A56F-C71D5990F827}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6430040A-5EBD-4E63-A56F-C71D5990F827}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6430040A-5EBD-4E63-A56F-C71D5990F827}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{6430040A-5EBD-4E63-A56F-C71D5990F827}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DD42475D-6D46-496A-924E-BD5630B4CBBA}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{DD42475D-6D46-496A-924E-BD5630B4CBBA}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{DD42475D-6D46-496A-924E-BD5630B4CBBA}\1.0\0\win64
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{DD42475D-6D46-496A-924E-BD5630B4CBBA}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{18D0F672-18B4-48E6-AD36-6E6BF01DBBC4}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{18D0F672-18B4-48E6-AD36-6E6BF01DBBC4}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{18D0F672-18B4-48E6-AD36-6E6BF01DBBC4}\1.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{18D0F672-18B4-48E6-AD36-6E6BF01DBBC4}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8476CE12-AE1F-4198-805C-BA0F9B783F57}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{8476CE12-AE1F-4198-805C-BA0F9B783F57}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{8476CE12-AE1F-4198-805C-BA0F9B783F57}\1.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{8476CE12-AE1F-4198-805C-BA0F9B783F57}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0CD01D1E-4A1C-489D-93B9-9B6672877C57}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{0CD01D1E-4A1C-489D-93B9-9B6672877C57}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{0CD01D1E-4A1C-489D-93B9-9B6672877C57}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{247954F9-9EDC-4E68-8CC3-150C2B89EADF}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{247954F9-9EDC-4E68-8CC3-150C2B89EADF}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{247954F9-9EDC-4E68-8CC3-150C2B89EADF}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{247954F9-9EDC-4E68-8CC3-150C2B89EADF}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{494B20CF-282E-4BDD-9F5D-B70CB09D351E}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{494B20CF-282E-4BDD-9F5D-B70CB09D351E}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{494B20CF-282E-4BDD-9F5D-B70CB09D351E}\1.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{494B20CF-282E-4BDD-9F5D-B70CB09D351E}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F63F6F8B-ACD5-413C-A44B-0409136D26CB}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F63F6F8B-ACD5-413C-A44B-0409136D26CB}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F63F6F8B-ACD5-413C-A44B-0409136D26CB}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F63F6F8B-ACD5-413C-A44B-0409136D26CB}\1.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F63F6F8B-ACD5-413C-A44B-0409136D26CB}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{34527502-D3DB-4205-A69B-789B27EE0414}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{34527502-D3DB-4205-A69B-789B27EE0414}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{34527502-D3DB-4205-A69B-789B27EE0414}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{05A30352-EB25-45B6-8449-BCA7B0542CE5}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{05A30352-EB25-45B6-8449-BCA7B0542CE5}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{05A30352-EB25-45B6-8449-BCA7B0542CE5}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{27634814-8E41-4C35-8577-980134A96544}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{27634814-8E41-4C35-8577-980134A96544}\1.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{27634814-8E41-4C35-8577-980134A96544}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\Clients\{430FD4D0-B729-4F61-AA34-91526481799D}
pv
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientState\{430FD4D0-B729-4F61-AA34-91526481799D}
pv
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\Clients\{430FD4D0-B729-4F61-AA34-91526481799D}
name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update
UninstallCmdLine
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update
version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{128C2DA6-2BC0-44C0-B3F6-4EC22E647964}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{128C2DA6-2BC0-44C0-B3F6-4EC22E647964}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D106AB5F-A70E-400E-A21B-96208C1D8DBB}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{D106AB5F-A70E-400E-A21B-96208C1D8DBB}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{18D0F672-18B4-48E6-AD36-6E6BF01DBBC4}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8476CE12-AE1F-4198-805C-BA0F9B783F57}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0CD01D1E-4A1C-489D-93B9-9B6672877C57}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{247954F9-9EDC-4E68-8CC3-150C2B89EADF}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{247954F9-9EDC-4E68-8CC3-150C2B89EADF}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{494B20CF-282E-4BDD-9F5D-B70CB09D351E}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F63F6F8B-ACD5-413C-A44B-0409136D26CB}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F63F6F8B-ACD5-413C-A44B-0409136D26CB}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{34527502-D3DB-4205-A69B-789B27EE0414}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{05A30352-EB25-45B6-8449-BCA7B0542CE5}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientState\{8A69D345-D564-463C-AFF1-A69D9E530F96}
ap
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientState\{8A69D345-D564-463C-AFF1-A69D9E530F96}\cohort
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientState\{8A69D345-D564-463C-AFF1-A69D9E530F96}\cohort
name
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\WMI\Security
c688cf83-9945-5ff6-0e1e-1ff1f8a2ec9a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator
StartWorkerOnServiceStart
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
Checking to see if mostack override has changed
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
CleanupUsoLogs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
UsoCrmScan
There are 248 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
716F000
stack
page read and write
949000
heap
page read and write
6E8E000
stack
page read and write
5EC2C000
direct allocation
page read and write
246CC000
direct allocation
page read and write
5ECE4000
direct allocation
page read and write
71C1A7E000
stack
page read and write
71C20FE000
unkown
page readonly
F8C000
unkown
page execute read
5ECAC000
direct allocation
page read and write
24EF0000
direct allocation
page read and write
57C6000
heap
page read and write
5943000
heap
page read and write
24ED5000
direct allocation
page read and write
9D30000
trusted library allocation
page read and write
7566F7E000
unkown
page readonly
7190000
remote allocation
page read and write
522D000
stack
page read and write
23A1C2B0000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
5DE14000
direct allocation
page read and write
431000
unkown
page execute read
D46000
unkown
page execute read
24F34000
direct allocation
page read and write
5EC4C000
direct allocation
page read and write
5F0000
heap
page read and write
23A1C500000
heap
page read and write
8E1000
unkown
page readonly
1DD04A2B000
heap
page read and write
5ED78000
direct allocation
page read and write
1DD04A44000
heap
page read and write
923000
heap
page read and write
5280000
heap
page read and write
5580000
heap
page read and write
23A1C4A8000
heap
page read and write
9D35000
heap
page read and write
24698000
direct allocation
page read and write
227C6A40000
heap
page read and write
23A1C45E000
heap
page read and write
542AC000
direct allocation
page read and write
71C1E7E000
stack
page read and write
542DC000
direct allocation
page read and write
71DD000
stack
page read and write
5ED14000
direct allocation
page read and write
94C000
heap
page read and write
1DD04A4B000
heap
page read and write
4BF0000
heap
page read and write
6EB0000
heap
page read and write
C8E35FE000
unkown
page readonly
583A000
heap
page read and write
84C000
unkown
page readonly
72E000
stack
page read and write
56AE000
stack
page read and write
6F1D000
stack
page read and write
23A16D10000
heap
page read and write
23A18240000
trusted library allocation
page read and write
227C6A78000
heap
page read and write
5F0D1000
direct allocation
page read and write
8D9000
unkown
page read and write
24E98000
direct allocation
page read and write
227C6A91000
heap
page read and write
48001000
direct allocation
page read and write
8EB000
unkown
page readonly
24EE4000
direct allocation
page read and write
75664AB000
stack
page read and write
5F123000
direct allocation
page read and write
227C6A62000
heap
page read and write
23A1C400000
heap
page read and write
1DD04A53000
heap
page read and write
29F2EB60000
trusted library allocation
page read and write
542F4000
direct allocation
page read and write
1DD04A91000
heap
page read and write
1DD049D0000
heap
page read and write
227C6A00000
heap
page read and write
8CC000
unkown
page read and write
60BD000
stack
page read and write
23A1C310000
trusted library allocation
page read and write
1DD04CD0000
heap
page read and write
71C217E000
stack
page read and write
BFD877E000
stack
page read and write
29F2E402000
heap
page read and write
227C6B13000
heap
page read and write
788000
unkown
page readonly
71C2EFE000
unkown
page readonly
1DD04A5A000
heap
page read and write
23A16E5C000
heap
page read and write
542F4000
direct allocation
page read and write
94F000
heap
page read and write
5786C000
direct allocation
page read and write
23A1C4D6000
heap
page read and write
80E3000
heap
page read and write
5ECE4000
direct allocation
page read and write
5EC60000
direct allocation
page read and write
1E7D6C46000
heap
page read and write
5EE04000
direct allocation
page read and write
23A1C4F5000
heap
page read and write
5EC2C000
direct allocation
page read and write
57838000
direct allocation
page read and write
24EAC000
direct allocation
page read and write
24614000
direct allocation
page read and write
5962000
heap
page read and write
2485CF80000
heap
page read and write
23A1D000000
heap
page read and write
24634000
direct allocation
page read and write
5360000
heap
page read and write
5ECF8000
direct allocation
page read and write
6FEE000
stack
page read and write
5425C000
direct allocation
page read and write
1DD04A6B000
heap
page read and write
86E000
stack
page read and write
1139000
unkown
page read and write
24F44000
direct allocation
page read and write
CFC000
stack
page read and write
578D4000
direct allocation
page read and write
6471000
heap
page read and write
1DD04B02000
heap
page read and write
23A1C49F000
heap
page read and write
40C000
stack
page read and write
578C9000
direct allocation
page read and write
5DEE8000
direct allocation
page read and write
1DD04A97000
heap
page read and write
57CE000
stack
page read and write
5CC0000
trusted library allocation
page read and write
60FE000
stack
page read and write
7FF64E77A000
unkown
page readonly
5EC8C000
direct allocation
page read and write
2485D076000
heap
page read and write
5DE44000
direct allocation
page read and write
1DD04A4D000
heap
page read and write
25984FE000
unkown
page readonly
5848000
heap
page read and write
1E7D6C5A000
heap
page read and write
24E0C000
direct allocation
page read and write
5780C000
direct allocation
page read and write
5D36000
heap
page read and write
5239000
heap
page read and write
29F2E448000
heap
page read and write
1DD04A4F000
heap
page read and write
1E7D6C3F000
heap
page read and write
71C0FFE000
unkown
page readonly
1DD04A74000
heap
page read and write
5ED20000
direct allocation
page read and write
8BF000
unkown
page readonly
542C8000
direct allocation
page read and write
23A1C250000
trusted library allocation
page read and write
5F0DE000
direct allocation
page read and write
23A1C332000
trusted library allocation
page read and write
CE4FA7E000
unkown
page readonly
55F5000
heap
page read and write
29F2E502000
heap
page read and write
29F2EC02000
trusted library allocation
page read and write
1DD04A67000
heap
page read and write
1DD04A5B000
heap
page read and write
D50000
unkown
page execute read
71C0EF7000
stack
page read and write
701D000
stack
page read and write
23A1771A000
heap
page read and write
23A1C2D1000
trusted library allocation
page read and write
1DD04A50000
heap
page read and write
542BC000
direct allocation
page read and write
5F0DE000
direct allocation
page read and write
5F16B000
direct allocation
page read and write
1DD04A60000
heap
page read and write
24E38000
direct allocation
page read and write
227C6B00000
heap
page read and write
227C6A24000
heap
page read and write
A12F000
stack
page read and write
54260000
direct allocation
page read and write
7FBD000
stack
page read and write
23A16E2B000
heap
page read and write
23A1C3B0000
trusted library allocation
page read and write
5DEC4000
direct allocation
page read and write
1DD04A35000
heap
page read and write
5F7D000
stack
page read and write
5DFF000
stack
page read and write
CE5037E000
unkown
page readonly
5EC74000
direct allocation
page read and write
24EA8000
direct allocation
page read and write
23A1C240000
trusted library allocation
page read and write
578B8000
direct allocation
page read and write
2598BFE000
unkown
page readonly
29F2E459000
heap
page read and write
24644000
direct allocation
page read and write
8C9000
unkown
page read and write
733D000
stack
page read and write
BFD897C000
stack
page read and write
5F401000
direct allocation
page read and write
743D000
stack
page read and write
527A000
heap
page read and write
8C7000
unkown
page read and write
246EC000
direct allocation
page read and write
23A1C2F0000
trusted library allocation
page read and write
578CC000
direct allocation
page read and write
7FF64AB7A000
unkown
page readonly
6480000
heap
page read and write
5ED1C000
direct allocation
page read and write
5229000
heap
page read and write
6473000
heap
page read and write
71C2E7E000
stack
page read and write
23A16E0B000
heap
page read and write
24E44000
direct allocation
page read and write
542E8000
direct allocation
page read and write
5790000
heap
page read and write
227C6A02000
heap
page read and write
23A17600000
heap
page read and write
8CC000
unkown
page write copy
5849000
heap
page read and write
945000
heap
page read and write
5220000
heap
page read and write
24E88000
direct allocation
page read and write
246C1000
direct allocation
page read and write
23A1C498000
heap
page read and write
5DE6C000
direct allocation
page read and write
71C11FE000
unkown
page readonly
1DD04A51000
heap
page read and write
246F8000
direct allocation
page read and write
529A000
heap
page read and write
756737E000
unkown
page readonly
480D0000
direct allocation
page read and write
5DED1000
direct allocation
page read and write
5262000
heap
page read and write
4EFC000
stack
page read and write
54248000
direct allocation
page read and write
7FF64BF7A000
unkown
page readonly
6B2E000
stack
page read and write
23A17700000
heap
page read and write
29F2E481000
heap
page read and write
D44000
unkown
page execute read
7FF64A17A000
unkown
page readonly
71C16FB000
stack
page read and write
57B3000
heap
page read and write
24F44000
direct allocation
page read and write
227C7080000
trusted library allocation
page read and write
542DC000
direct allocation
page read and write
5740C000
direct allocation
page read and write
7010000
heap
page read and write
5A5F000
stack
page read and write
5F16B000
direct allocation
page read and write
63BF000
stack
page read and write
24E80000
direct allocation
page read and write
6DAD000
stack
page read and write
5A40000
trusted library allocation
page read and write
24ED8000
direct allocation
page read and write
54298000
direct allocation
page read and write
D42000
unkown
page execute read
4806C000
direct allocation
page read and write
24654000
direct allocation
page read and write
5EC98000
direct allocation
page read and write
57CA000
heap
page read and write
582D000
heap
page read and write
D3E000
stack
page read and write
29F2E416000
heap
page read and write
4460C000
direct allocation
page read and write
1137000
unkown
page read and write
4D9F000
stack
page read and write
23A16E6B000
heap
page read and write
5DE50000
direct allocation
page read and write
2485D07F000
heap
page read and write
711F000
stack
page read and write
227C6A4B000
heap
page read and write
96B000
heap
page read and write
5E3E000
stack
page read and write
5DEA8000
direct allocation
page read and write
8D9000
unkown
page read and write
10D8000
unkown
page readonly
7FF64FB7A000
unkown
page readonly
85DE000
stack
page read and write
C8E2C7B000
stack
page read and write
54288000
direct allocation
page read and write
5305000
heap
page read and write
54250000
direct allocation
page read and write
5ED68000
direct allocation
page read and write
BFD887C000
stack
page read and write
23A17EA0000
trusted library section
page readonly
5F0FF000
direct allocation
page read and write
227C6B02000
heap
page read and write
5F2C4000
direct allocation
page read and write
5EE04000
direct allocation
page read and write
52DF000
heap
page read and write
23A16F02000
heap
page read and write
57B3000
heap
page read and write
1149000
unkown
page read and write
71C0A7B000
stack
page read and write
1DD04A3D000
heap
page read and write
29F2E47E000
heap
page read and write
5F744000
direct allocation
page read and write
54238000
direct allocation
page read and write
92E000
heap
page read and write
7566CFE000
stack
page read and write
542BC000
direct allocation
page read and write
57848000
direct allocation
page read and write
1E7D6C24000
heap
page read and write
57878000
direct allocation
page read and write
1E7D7402000
trusted library allocation
page read and write
23A1C620000
trusted library allocation
page read and write
1E7D6BE0000
trusted library allocation
page read and write
1DD04A93000
heap
page read and write
5ECEC000
direct allocation
page read and write
246BE000
direct allocation
page read and write
5ED48000
direct allocation
page read and write
6E4C000
stack
page read and write
2485D052000
heap
page read and write
C8E36FE000
stack
page read and write
1DD04A7B000
heap
page read and write
75671FE000
stack
page read and write
1DD04A13000
heap
page read and write
7566D7E000
unkown
page readonly
C8E32FB000
stack
page read and write
23A1C670000
remote allocation
page read and write
4D2000
unkown
page execute read
2598DFE000
unkown
page readonly
611B000
trusted library allocation
page read and write
6EAC000
stack
page read and write
5948000
heap
page read and write
756707B000
stack
page read and write
480F4000
direct allocation
page read and write
71C17FE000
unkown
page readonly
227C6A64000
heap
page read and write
93D000
heap
page read and write
524F000
heap
page read and write
5836000
heap
page read and write
99BB000
stack
page read and write
5F201000
direct allocation
page read and write
1DD04A75000
heap
page read and write
5EE01000
direct allocation
page read and write
24718000
direct allocation
page read and write
24710000
direct allocation
page read and write
5EC0C000
direct allocation
page read and write
29F2E413000
heap
page read and write
227C68F0000
heap
page read and write
1DD04A00000
heap
page read and write
5EC2C000
direct allocation
page read and write
10C1000
unkown
page readonly
5EC14000
direct allocation
page read and write
7EE7000
stack
page read and write
51C7000
heap
page read and write
1148000
unkown
page read and write
CE5057E000
unkown
page readonly
71C1DFE000
unkown
page readonly
80BD000
stack
page read and write
23A16EA6000
heap
page read and write
2485D013000
heap
page read and write
23A1C442000
heap
page read and write
259877E000
stack
page read and write
6478000
heap
page read and write
50E0000
heap
page read and write
2485D041000
heap
page read and write
7FF65057A000
unkown
page readonly
72DD000
stack
page read and write
1DD04A8C000
heap
page read and write
5EC38000
direct allocation
page read and write
44604000
direct allocation
page read and write
578EC000
direct allocation
page read and write
6010000
heap
page readonly
6160000
heap
page read and write
7620000
heap
page read and write
23A17590000
trusted library section
page read and write
25987FE000
unkown
page readonly
1DD04A8E000
heap
page read and write
23A17713000
heap
page read and write
23A1C343000
trusted library allocation
page read and write
BFE000
stack
page read and write
ADC000
stack
page read and write
10DD000
unkown
page readonly
1DD04AA8000
heap
page read and write
23A1C4FA000
heap
page read and write
2485CFB0000
trusted library allocation
page read and write
5230000
heap
page read and write
71C10FE000
stack
page read and write
542E8000
direct allocation
page read and write
5ED38000
direct allocation
page read and write
525E000
stack
page read and write
23A1C47B000
heap
page read and write
57404000
direct allocation
page read and write
23A1C3A0000
trusted library allocation
page read and write
24688000
direct allocation
page read and write
71C13FE000
unkown
page readonly
5969000
heap
page read and write
1DD04A41000
heap
page read and write
7FF64A178000
unkown
page readonly
5F0ED000
direct allocation
page read and write
4DE0000
heap
page read and write
5EF24000
direct allocation
page read and write
5ECD5000
direct allocation
page read and write
23A16EA0000
heap
page read and write
23A17602000
heap
page read and write
997F000
stack
page read and write
77F000
unkown
page read and write
5A5C000
trusted library allocation
page read and write
1053000
unkown
page execute read
5ECBC000
direct allocation
page read and write
907000
heap
page read and write
960000
heap
page read and write
CE4FF7E000
stack
page read and write
23A16E3F000
heap
page read and write
23A16F28000
heap
page read and write
23A17702000
heap
page read and write
23A16E89000
heap
page read and write
55F0000
heap
page read and write
CE5017D000
stack
page read and write
23A1C40E000
heap
page read and write
770000
unkown
page read and write
6471000
heap
page read and write
1E7D6D02000
heap
page read and write
542FC000
direct allocation
page read and write
7180000
trusted library allocation
page read and write
931000
heap
page read and write
5827000
heap
page read and write
94A000
heap
page read and write
756777E000
unkown
page readonly
29F2E433000
heap
page read and write
246D4000
direct allocation
page read and write
756787B000
stack
page read and write
9F2E000
stack
page read and write
5F0D1000
direct allocation
page read and write
542D0000
direct allocation
page read and write
5ECF8000
direct allocation
page read and write
5F5A3000
direct allocation
page read and write
4D4000
unkown
page execute read
953000
heap
page read and write
10AF000
unkown
page readonly
CE4F6FE000
stack
page read and write
7FF64F17A000
unkown
page readonly
24604000
direct allocation
page read and write
54270000
direct allocation
page read and write
5ECF8000
direct allocation
page read and write
1DD04A7D000
heap
page read and write
5ECEC000
direct allocation
page read and write
23A16E95000
heap
page read and write
CE502FE000
stack
page read and write
227C7215000
heap
page read and write
480E8000
direct allocation
page read and write
5430C000
direct allocation
page read and write
51DF000
heap
page read and write
9E2A000
stack
page read and write
1DD04A5D000
heap
page read and write
1DD04A6C000
heap
page read and write
1E7D6C13000
heap
page read and write
4DF0000
heap
page read and write
CE5047D000
stack
page read and write
2485D128000
heap
page read and write
5313000
heap
page read and write
56CE000
stack
page read and write
7020000
trusted library allocation
page read and write
578E0000
direct allocation
page read and write
259837E000
stack
page read and write
613C000
stack
page read and write
1DD04A6D000
heap
page read and write
943000
heap
page read and write
23A1C514000
heap
page read and write
5DDF000
stack
page read and write
44608000
direct allocation
page read and write
23A1C4CB000
heap
page read and write
24640000
direct allocation
page read and write
CE4FCFE000
stack
page read and write
71BE000
stack
page read and write
542E5000
direct allocation
page read and write
23A1C430000
trusted library allocation
page read and write
7FF64D37A000
unkown
page readonly
4D95000
stack
page read and write
23A1C2D0000
trusted library allocation
page read and write
23A17B40000
trusted library allocation
page read and write
578AC000
direct allocation
page read and write
4E0000
unkown
page execute read
5DE48000
direct allocation
page read and write
5230000
heap
page read and write
1DD04A57000
heap
page read and write
24E7C000
direct allocation
page read and write
1DD04A62000
heap
page read and write
5A40000
trusted library allocation
page read and write
8EE000
stack
page read and write
227C6A81000
heap
page read and write
94D000
heap
page read and write
29F2E400000
heap
page read and write
98C000
stack
page read and write
94A000
heap
page read and write
5EC24000
direct allocation
page read and write
5319000
heap
page read and write
5C9F000
stack
page read and write
5ECF8000
direct allocation
page read and write
756757E000
unkown
page readonly
24601000
direct allocation
page read and write
24E54000
direct allocation
page read and write
5CDE000
stack
page read and write
76E000
unkown
page read and write
24ED0000
direct allocation
page read and write
9F0000
heap
page read and write
246AC000
direct allocation
page read and write
29F2E3D0000
heap
page read and write
4D9C000
stack
page read and write
6470000
heap
page read and write
6494000
heap
page read and write
5B5F000
stack
page read and write
1DD04A65000
heap
page read and write
CFE000
stack
page read and write
88C000
unkown
page readonly
1137000
unkown
page read and write
FB2000
unkown
page execute read
765000
heap
page read and write
227C69F0000
heap
page read and write
6140000
heap
page read and write
1E7D6BD0000
trusted library allocation
page read and write
5EE44000
direct allocation
page read and write
23A1C502000
heap
page read and write
246EC000
direct allocation
page read and write
259827B000
stack
page read and write
57870000
direct allocation
page read and write
5ED24000
direct allocation
page read and write
48078000
direct allocation
page read and write
527D000
heap
page read and write
23A16E00000
heap
page read and write
5DEC0000
direct allocation
page read and write
5941000
heap
page read and write
23A1C50A000
heap
page read and write
5350000
heap
page read and write
CE4F77E000
stack
page readonly
1096000
unkown
page readonly
6EB4000
heap
page read and write
8C7000
unkown
page write copy
71C247E000
stack
page read and write
10FC000
unkown
page readonly
5ED4C000
direct allocation
page read and write
2466C000
direct allocation
page read and write
1DD04A55000
heap
page read and write
23A16F13000
heap
page read and write
554F000
stack
page read and write
731F000
stack
page read and write
1149000
unkown
page read and write
23A1C471000
heap
page read and write
71C19FE000
unkown
page readonly
5EC01000
direct allocation
page read and write
57C9000
heap
page read and write
246B8000
direct allocation
page read and write
23A1771A000
heap
page read and write
5080000
heap
page read and write
7566E7E000
stack
page read and write
23A16CF0000
heap
page read and write
578BC000
direct allocation
page read and write
1133000
unkown
page readonly
1DD04A59000
heap
page read and write
5850000
heap
page read and write
CE4FD7E000
unkown
page readonly
756797E000
unkown
page readonly
5D0000
heap
page read and write
246E4000
direct allocation
page read and write
CE4F0BB000
stack
page read and write
5ECEC000
direct allocation
page read and write
227C6910000
heap
page read and write
6FBF000
stack
page read and write
24714000
direct allocation
page read and write
5F16B000
direct allocation
page read and write
5DED4000
direct allocation
page read and write
24E28000
direct allocation
page read and write
B90000
unkown
page readonly
831E000
stack
page read and write
29F2E44F000
heap
page read and write
756767E000
stack
page read and write
826000
unkown
page readonly
24704000
direct allocation
page read and write
768000
unkown
page readonly
24F0C000
direct allocation
page read and write
54204000
direct allocation
page read and write
4C96000
stack
page read and write
7F6D000
stack
page read and write
4D8F000
stack
page read and write
71C21FE000
unkown
page readonly
1137000
unkown
page read and write
23A1C340000
trusted library allocation
page read and write
24678000
direct allocation
page read and write
930000
heap
page read and write
968000
heap
page read and write
24E01000
direct allocation
page read and write
5F123000
direct allocation
page read and write
10AC000
unkown
page readonly
50408000
direct allocation
page read and write
1DD04A72000
heap
page read and write
50404000
direct allocation
page read and write
24710000
direct allocation
page read and write
5829000
heap
page read and write
25988FE000
stack
page read and write
95B000
heap
page read and write
580000
heap
page read and write
5941000
heap
page read and write
5EC05000
direct allocation
page read and write
2598CFE000
stack
page read and write
6FAE000
stack
page read and write
24628000
direct allocation
page read and write
24F24000
direct allocation
page read and write
5ECEC000
direct allocation
page read and write
FDA000
unkown
page execute read
23A1C427000
heap
page read and write
BFD867C000
stack
page read and write
5DE04000
direct allocation
page read and write
114D000
unkown
page read and write
80E0000
heap
page read and write
5ED5C000
direct allocation
page read and write
1DD04A61000
heap
page read and write
227C6A8B000
heap
page read and write
29F2E437000
heap
page read and write
5090000
heap
page read and write
5F0FF000
direct allocation
page read and write
756717E000
unkown
page readonly
607C000
stack
page read and write
1DD04A3F000
heap
page read and write
1E7D6C00000
heap
page read and write
2485D113000
heap
page read and write
5B9E000
stack
page read and write
5ECD8000
direct allocation
page read and write
2485D08C000
heap
page read and write
227C7200000
heap
page read and write
55B0000
heap
page read and write
1DD04A30000
heap
page read and write
5F5E1000
direct allocation
page read and write
57834000
direct allocation
page read and write
1137000
unkown
page write copy
EED000
unkown
page execute read
51C000
stack
page read and write
4D6000
unkown
page execute read
23A1C410000
heap
page read and write
666D000
stack
page read and write
527D000
heap
page read and write
23A1C2D0000
trusted library allocation
page read and write
5D30000
heap
page read and write
928000
heap
page read and write
23A1C51B000
heap
page read and write
113A000
unkown
page read and write
93B000
heap
page read and write
CE4F97D000
stack
page read and write
57888000
direct allocation
page read and write
5DE78000
direct allocation
page read and write
24E60000
direct allocation
page read and write
2485D102000
heap
page read and write
71C1AFE000
unkown
page readonly
940000
heap
page read and write
71C18FE000
unkown
page readonly
7FF64C97A000
unkown
page readonly
6100000
trusted library allocation
page read and write
5C6B000
stack
page read and write
9C30000
heap
page read and write
23A1C670000
remote allocation
page read and write
AE0000
heap
page read and write
1DD04A4A000
heap
page read and write
5DE94000
direct allocation
page read and write
52F8000
heap
page read and write
1DD04A38000
heap
page read and write
10C4000
unkown
page readonly
CE5027E000
unkown
page readonly
480C0000
direct allocation
page read and write
227C6A7C000
heap
page read and write
1DD04A6E000
heap
page read and write
2485EA02000
trusted library allocation
page read and write
594F000
heap
page read and write
10A7000
unkown
page readonly
24F14000
direct allocation
page read and write
2485D093000
heap
page read and write
246BC000
direct allocation
page read and write
C8E31FE000
unkown
page readonly
5DE5C000
direct allocation
page read and write
5EC7C000
direct allocation
page read and write
5DE70000
direct allocation
page read and write
626F000
stack
page read and write
480C4000
direct allocation
page read and write
23A16EFD000
heap
page read and write
480F8000
direct allocation
page read and write
6020000
heap
page read and write
29F2E3F0000
heap
page read and write
57898000
direct allocation
page read and write
5EC54000
direct allocation
page read and write
8C9000
unkown
page read and write
7FF64A170000
unkown
page readonly
9C40000
heap
page read and write
646E000
stack
page read and write
EDB000
unkown
page execute read
5040C000
direct allocation
page read and write
C8E37FE000
unkown
page readonly
93F000
heap
page read and write
8DD000
unkown
page read and write
5F0C4000
direct allocation
page read and write
1DD04A49000
heap
page read and write
2485D100000
heap
page read and write
480A8000
direct allocation
page read and write
10AA000
unkown
page readonly
5ECF8000
direct allocation
page read and write
7FF64B57A000
unkown
page readonly
5281000
heap
page read and write
48044000
direct allocation
page read and write
5ECEC000
direct allocation
page read and write
1DD04A4C000
heap
page read and write
C8E34FE000
stack
page read and write
542F8000
direct allocation
page read and write
5DE24000
direct allocation
page read and write
50F7000
heap
page read and write
95B000
heap
page read and write
23A17CA1000
trusted library allocation
page read and write
24624000
direct allocation
page read and write
5DE01000
direct allocation
page read and write
6E0E000
stack
page read and write
527E000
stack
page read and write
BFD8B7F000
stack
page read and write
48004000
direct allocation
page read and write
6DB000
unkown
page readonly
55C0000
heap
page read and write
7FF64DD7A000
unkown
page readonly
760000
heap
page read and write
24ED0000
direct allocation
page read and write
5F123000
direct allocation
page read and write
1DD05160000
trusted library allocation
page read and write
5F0D1000
direct allocation
page read and write
8AE000
stack
page read and write
1DD04A83000
heap
page read and write
23A1C670000
remote allocation
page read and write
259847E000
stack
page read and write
1E7D6AC0000
heap
page read and write
CE4FC7E000
unkown
page readonly
50F0000
heap
page read and write
5DEDC000
direct allocation
page read and write
BFD819B000
stack
page read and write
555D000
stack
page read and write
5ECEC000
direct allocation
page read and write
1127000
unkown
page readonly
4B8C000
stack
page read and write
24EFC000
direct allocation
page read and write
5964000
heap
page read and write
7190000
remote allocation
page read and write
1DD04A86000
heap
page read and write
900000
heap
page read and write
2465C000
direct allocation
page read and write
24F28000
direct allocation
page read and write
71C12FC000
stack
page read and write
1E7D6BA0000
heap
page read and write
48024000
direct allocation
page read and write
54228000
direct allocation
page read and write
53D8000
heap
page read and write
C8E30F6000
stack
page read and write
1E7D6C5E000
heap
page read and write
2485CEA0000
heap
page read and write
54201000
direct allocation
page read and write
578B0000
direct allocation
page read and write
5DE34000
direct allocation
page read and write
24E04000
direct allocation
page read and write
5785C000
direct allocation
page read and write
1137000
unkown
page read and write
CE0000
heap
page read and write
607E000
stack
page read and write
54214000
direct allocation
page read and write
1DD04A27000
heap
page read and write
23A1C458000
heap
page read and write
48048000
direct allocation
page read and write
821E000
stack
page read and write
5ECC4000
direct allocation
page read and write
25989FE000
unkown
page readonly
A02F000
stack
page read and write
1DD04A4E000
heap
page read and write
8FD000
stack
page read and write
4805C000
direct allocation
page read and write
23A17480000
trusted library allocation
page read and write
3AD000
stack
page read and write
75672FE000
stack
page read and write
5EC48000
direct allocation
page read and write
566D000
stack
page read and write
430000
unkown
page readonly
66AE000
stack
page read and write
5F0C4000
direct allocation
page read and write
67AF000
stack
page read and write
D40000
unkown
page readonly
23A16E13000
heap
page read and write
5758000
heap
page read and write
7610000
heap
page read and write
5940000
heap
page read and write
57850000
direct allocation
page read and write
23A1C44E000
heap
page read and write
5F0FF000
direct allocation
page read and write
730000
heap
page read and write
542B8000
direct allocation
page read and write
5270000
heap
page read and write
C8E33FE000
unkown
page readonly
5ECB0000
direct allocation
page read and write
841C000
stack
page read and write
6492000
heap
page read and write
23A16EBA000
heap
page read and write
24EC0000
direct allocation
page read and write
5010000
heap
page read and write
24E14000
direct allocation
page read and write
636C000
stack
page read and write
48050000
direct allocation
page read and write
96B000
heap
page read and write
52DC000
heap
page read and write
5ECC8000
direct allocation
page read and write
2485CE80000
heap
page read and write
24E24000
direct allocation
page read and write
5EC28000
direct allocation
page read and write
5ED1C000
direct allocation
page read and write
24ED8000
direct allocation
page read and write
5DE88000
direct allocation
page read and write
EE9000
unkown
page execute read
2485CFD0000
trusted library allocation
page read and write
1E7D6C02000
heap
page read and write
610000
heap
page read and write
54234000
direct allocation
page read and write
4D9B000
stack
page read and write
7FF64A171000
unkown
page execute read
5000000
heap
page read and write
4D0000
unkown
page readonly
CE4FDFD000
stack
page read and write
480D4000
direct allocation
page read and write
71C1F79000
stack
page read and write
76E000
unkown
page write copy
1139000
unkown
page read and write
227C6A3A000
heap
page read and write
BFD8A7F000
stack
page read and write
5225000
heap
page read and write
57804000
direct allocation
page read and write
23A16EB5000
heap
page read and write
5F0ED000
direct allocation
page read and write
5F263000
direct allocation
page read and write
54278000
direct allocation
page read and write
5750000
heap
page read and write
23A1C464000
heap
page read and write
721F000
stack
page read and write
7F2B000
stack
page read and write
23A1C3A0000
trusted library allocation
page read and write
23A16E8E000
heap
page read and write
1DD04A5E000
heap
page read and write
5EDB0000
direct allocation
page read and write
1DD04A58000
heap
page read and write
23A16E72000
heap
page read and write
51F0000
heap
page readonly
2598AFD000
stack
page read and write
51C0000
heap
page read and write
57801000
direct allocation
page read and write
57860000
direct allocation
page read and write
48014000
direct allocation
page read and write
5825000
heap
page read and write
756747E000
stack
page read and write
756727E000
unkown
page readonly
246B8000
direct allocation
page read and write
5F601000
direct allocation
page read and write
227C7202000
heap
page read and write
2485D069000
heap
page read and write
EE1000
unkown
page execute read
23A1C610000
trusted library allocation
page read and write
23A1C41C000
heap
page read and write
23A16DF0000
heap
page read and write
92C000
heap
page read and write
480AC000
direct allocation
page read and write
53B0000
heap
page read and write
5EC70000
direct allocation
page read and write
5ED1C000
direct allocation
page read and write
5200000
heap
page read and write
44618000
direct allocation
page read and write
71C187E000
stack
page read and write
480DC000
direct allocation
page read and write
A130000
heap
page read and write
71C1D7E000
stack
page read and write
5ED04000
direct allocation
page read and write
25983FE000
unkown
page readonly
5760000
heap
page read and write
6490000
heap
page read and write
5EE63000
direct allocation
page read and write
10BF000
unkown
page readonly
227C6A13000
heap
page read and write
706E000
stack
page read and write
54224000
direct allocation
page read and write
71C24FE000
unkown
page readonly
114D000
unkown
page read and write
57824000
direct allocation
page read and write
1DD05202000
trusted library allocation
page read and write
57828000
direct allocation
page read and write
595F000
stack
page read and write
53EE000
heap
page read and write
5F0C4000
direct allocation
page read and write
24670000
direct allocation
page read and write
5A5F000
trusted library allocation
page read and write
7FF64A175000
unkown
page readonly
2485D000000
heap
page read and write
48088000
direct allocation
page read and write
55CE000
stack
page read and write
57D1000
heap
page read and write
5DEAC000
direct allocation
page read and write
1E7D6C51000
heap
page read and write
24F28000
direct allocation
page read and write
5E3E000
stack
page read and write
246F8000
direct allocation
page read and write
1149000
unkown
page read and write
5D30000
heap
page read and write
62BE000
stack
page read and write
987E000
stack
page read and write
AFE000
stack
page read and write
1139000
unkown
page read and write
23A16E90000
heap
page read and write
6F6F000
stack
page read and write
5F748000
direct allocation
page read and write
545C000
stack
page read and write
5F0DE000
direct allocation
page read and write
5282000
heap
page read and write
23A1C4E5000
heap
page read and write
9C31000
heap
page read and write
29F2E6D0000
heap
page read and write
D3E000
stack
page read and write
CE4FE7E000
unkown
page readonly
1DD04A70000
heap
page read and write
521B000
stack
page read and write
112F000
unkown
page readonly
2485D024000
heap
page read and write
9C31000
heap
page read and write
5426C000
direct allocation
page read and write
57408000
direct allocation
page read and write
23A1C600000
trusted library allocation
page read and write
5DEF4000
direct allocation
page read and write
57814000
direct allocation
page read and write
50F6000
heap
page read and write
70BC000
stack
page read and write
48034000
direct allocation
page read and write
5F0ED000
direct allocation
page read and write
1DD049F0000
heap
page read and write
23A17DC0000
trusted library allocation
page read and write
9ABC000
stack
page read and write
48094000
direct allocation
page read and write
5F001000
direct allocation
page read and write
24E6C000
direct allocation
page read and write
5DEF8000
direct allocation
page read and write
112F000
unkown
page readonly
10BC000
unkown
page readonly
48070000
direct allocation
page read and write
7190000
remote allocation
page read and write
5277000
heap
page read and write
2AC000
stack
page read and write
5F3F000
stack
page read and write
24668000
direct allocation
page read and write
56C0000
heap
page read and write
CE4FB7E000
stack
page read and write
852E000
stack
page read and write
6100000
trusted library allocation
page read and write
8C7000
unkown
page read and write
1E7D6AA0000
heap
page read and write
8CC000
unkown
page read and write
6C2F000
stack
page read and write
23A1775A000
heap
page read and write
5CFE000
stack
page read and write
6499000
heap
page read and write
CE5007E000
unkown
page readonly
5CC1000
heap
page read and write
57DF000
heap
page read and write
71C197E000
stack
page read and write
5F2A4000
direct allocation
page read and write
9C38000
heap
page read and write
53D0000
heap
page read and write
CD0000
heap
page readonly
23A17615000
heap
page read and write
6119000
trusted library allocation
page read and write
39F000
stack
page read and write
There are 941 hidden memdumps, click here to show them.