IOC Report
Modrinth.exe

loading gif

Files

File Path
Type
Category
Malicious
Modrinth.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Internet Explorer\SIGNUP\DVoCIYUveQTPKsllMirxd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\MSECache\OfficeKMS\win7\DVoCIYUveQTPKsllMirxd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Windows Multimedia Platform\wininit.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Modrinth App\Modrinth App.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Program Files\Reference Assemblies\Microsoft\Framework\DVoCIYUveQTPKsllMirxd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Photo Viewer\en-GB\System.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Default\DVoCIYUveQTPKsllMirxd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Default\SearchApp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Modrinth.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Vss\Writers\Application\RuntimeBroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\en-US\csrss.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\intosessionperfcrtSvc\Componentwebfont.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\intosessionperfcrtSvc\DVoCIYUveQTPKsllMirxd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\intosessionperfcrtSvc\RuntimeBroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Config.Msi\6ed635.rbs
data
modified
C:\Program Files (x86)\Internet Explorer\SIGNUP\510335ec8a3ea2
ASCII text, with very long lines (633), with no line terminators
dropped
C:\Program Files (x86)\MSECache\OfficeKMS\win7\510335ec8a3ea2
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\Windows Multimedia Platform\56085415360792
ASCII text, with very long lines (445), with no line terminators
dropped
C:\Program Files\Modrinth App\Uninstall Modrinth App.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command line arguments, Archive, ctime=Sat Dec 7 08:09:44 2019, mtime=Thu Jul 4 18:56:58 2024, atime=Sat Dec 7 08:09:44 2019, length=69632, window=hide
dropped
C:\Program Files\Reference Assemblies\Microsoft\Framework\510335ec8a3ea2
ASCII text, with very long lines (649), with no line terminators
dropped
C:\Program Files\Windows Photo Viewer\en-GB\27d1bcfc3c54e0
ASCII text, with very long lines (463), with no line terminators
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Modrinth App\Modrinth App.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Tue Apr 23 18:26:12 2024, mtime=Thu Jul 4 18:57:09 2024, atime=Tue Apr 23 18:26:12 2024, length=10292856, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Modrinth App\Modrinth App.lnk~RF6edb84.TMP (copy)
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Tue Apr 23 18:26:12 2024, mtime=Thu Jul 4 18:57:09 2024, atime=Tue Apr 23 18:26:12 2024, length=10292856, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Modrinth App\~odrinth App.tmp
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Tue Apr 23 18:26:12 2024, mtime=Thu Jul 4 18:57:09 2024, atime=Tue Apr 23 18:26:12 2024, length=10292856, window=hide
dropped
C:\Users\Default\38384e6a620884
ASCII text, with very long lines (851), with no line terminators
dropped
C:\Users\Default\510335ec8a3ea2
ASCII text, with no line terminators
dropped
C:\Users\Public\Desktop\Modrinth App.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Tue Apr 23 18:26:12 2024, mtime=Thu Jul 4 18:57:10 2024, atime=Tue Apr 23 18:26:12 2024, length=10292856, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Componentwebfont.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\DVoCIYUveQTPKsllMirxd.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\MSIC694.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIEB83.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Modrinth App_0.7.1_x64_en-US.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Modrinth App, Author: modrinth, Keywords: Installer, Comments: This installer database contains the logic and data required to install Modrinth App., Template: x64;0, Revision Number: {C760B5F9-74CA-4082-83C4-12F6B36A93BB}, Create Time/Date: Tue Apr 23 23:26:10 2024, Last Saved Time/Date: Tue Apr 23 23:26:10 2024, Number of Pages: 450, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\6ed634.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Modrinth App, Author: modrinth, Keywords: Installer, Comments: This installer database contains the logic and data required to install Modrinth App., Template: x64;0, Revision Number: {C760B5F9-74CA-4082-83C4-12F6B36A93BB}, Create Time/Date: Tue Apr 23 23:26:10 2024, Last Saved Time/Date: Tue Apr 23 23:26:10 2024, Number of Pages: 450, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\6ed636.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Modrinth App, Author: modrinth, Keywords: Installer, Comments: This installer database contains the logic and data required to install Modrinth App., Template: x64;0, Revision Number: {C760B5F9-74CA-4082-83C4-12F6B36A93BB}, Create Time/Date: Tue Apr 23 23:26:10 2024, Last Saved Time/Date: Tue Apr 23 23:26:10 2024, Number of Pages: 450, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\MSID819.tmp
data
dropped
C:\Windows\Installer\SourceHash{67E35770-3BE7-49CB-BE18-C8626CE846EE}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\{67E35770-3BE7-49CB-BE18-C8626CE846EE}\ProductIcon
MS Windows icon resource - 6 icons, 32x32 with PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\~DF090D7A4F00EC6562.TMP
data
dropped
C:\Windows\Temp\~DF0945CB95462FFABB.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF198724A824B669DB.TMP
data
dropped
C:\Windows\Temp\~DF1D3096E52845E44B.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF25C075B902BE1BC1.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF4A714EFFCA52E6A2.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF58F9FD53BE13BF02.TMP
data
dropped
C:\Windows\Temp\~DFB20AD4B3D17979AE.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFC48FD5848745477D.TMP
data
dropped
C:\Windows\Temp\~DFCD19227ECC0281B0.TMP
data
dropped
C:\Windows\Temp\~DFFF422DE5C7B7B6A8.TMP
data
dropped
C:\Windows\Temp\~DFFFAD356C80279C1B.TMP
data
dropped
C:\Windows\Vss\Writers\Application\9e8d7a4ca61bd9
ASCII text, with very long lines (954), with no line terminators
dropped
C:\Windows\en-US\886983d96e3d3e
ASCII text, with very long lines (664), with no line terminators
dropped
C:\intosessionperfcrtSvc\510335ec8a3ea2
ASCII text, with no line terminators
dropped
C:\intosessionperfcrtSvc\9e8d7a4ca61bd9
ASCII text, with very long lines (884), with no line terminators
dropped
C:\intosessionperfcrtSvc\QvJVxLMgIdUXKZXo3vjvMJd9h.bat
ASCII text, with no line terminators
dropped
C:\intosessionperfcrtSvc\x6qhfc.vbe
data
dropped
There are 48 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Modrinth.exe
"C:\Users\user\Desktop\Modrinth.exe"
malicious
C:\Users\user\AppData\Local\Temp\Modrinth.exe
"C:\Users\user\AppData\Local\Temp\Modrinth.exe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\intosessionperfcrtSvc\x6qhfc.vbe"
malicious
C:\intosessionperfcrtSvc\Componentwebfont.exe
"C:\intosessionperfcrtSvc\Componentwebfont.exe"
malicious
C:\intosessionperfcrtSvc\DVoCIYUveQTPKsllMirxd.exe
C:\intosessionperfcrtSvc\DVoCIYUveQTPKsllMirxd.exe
malicious
C:\intosessionperfcrtSvc\DVoCIYUveQTPKsllMirxd.exe
C:\intosessionperfcrtSvc\DVoCIYUveQTPKsllMirxd.exe
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\Modrinth App_0.7.1_x64_en-US.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\intosessionperfcrtSvc\QvJVxLMgIdUXKZXo3vjvMJd9h.bat" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding E9350FF13617C2EDECFDC599F293255F C
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://cz36357.tw1.ru/@=cDMmNzNiFGO
malicious
http://html4/loose.dtd
unknown
https://discord.com
unknown
https://asset.localhost;
unknown
https://resources.download.minecraft.net/
unknown
https://cdn-raw.modrinth.com/fonts/inter/;
unknown
https://tauri.app/docs/api/config#tauri.allowlist)
unknown
https://github.com/rust-windowing/tao
unknown
https://libraries.minecraft.net/(
unknown
https://modrinth.com
unknown
https://api.minecraftservices.com/entitlements/license?requestId=
unknown
https://api.mclo.gs;
unknown
https://cdn.modrle_relative_pathprofile_relative
unknown
https://docs.rs/tauri/1/tauri/scope/struct.IpcScope.html#method.configure_remote_access
unknown
https://docs.rs/getrandom#nodejs-es-module-supportC:
unknown
https://sisu.xboxlive.com/authorize/authorizet=M
unknown
https://meta.modrinth.com
unknown
https://xsts.auth.xboxlive.com/xsts/authorize/xsts/authorizerp://api.minecraftservices.com/
unknown
http://.css
unknown
https://launcher-files.modrinth.com/detect.txtcheck_internettimeout
unknown
https://api.azul.com/metadata/v1/zulu/packages?arch=&java_version=&os=&archive_type=zip&javafx_bundl
unknown
https://sisu.xboxlive.com/authenticate/authenticatecode_challenge_methodX-SessionId
unknown
https://www.youtube-nocookie.com
unknown
https://api.modrinth.com/v2/
unknown
https://www.youtube.com
unknown
https://api.minecraftservices.com/launcher/loginXBL3.0
unknown
https://api.modrinth.com/analytics/playtimeTried
unknown
https://sisu.xboxlive.com/authorize/authorizet=
unknown
https://tauri.app/docs/api/config#tauri.allowlist)PlatformOsTypeTempdirLocaleGetAppVersionGetAppName
unknown
http://auth.xboxlive.com
unknown
http://wixtoolset.org
unknown
https://device.auth.xboxlive.com/device/authenticate/device/authenticateProofOfPossession
unknown
https://device.auth.xboxlive.com/device/authenticate/device/authenticateProofOfPossession5q
unknown
https://github.com/tauri-apps/tauri/issues/2549#issuecomment-1250036908
unknown
https://piston-meta.mojang.com/mc/game/version_manifest_v2.json
unknown
https://github.com/tauri-apps/tauri/issues/8306)
unknown
https://meta.modrinth.comx
unknown
https://api.minecraftservices.com/minecraft/profile
unknown
https://tauri.app/v1/api/config/#securityconfig.dangerousremotedomainipcaccess
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://.jpg
unknown
http://localhost:1420/../dist/assets/index-WeuSTy9x.css
unknown
https://launcher-files.modrinth.com/updates.jsondefault-src
unknown
There are 33 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
chrome.cloudflare-dns.com
162.159.61.3
cdn.modrinth.com
104.18.22.35
cdn-raw.modrinth.com
104.18.23.35

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msi\OpenWithProgids
Msi.Package
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@C:\Windows\System32\msimsg.dll,-36
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@C:\Windows\System32\msimsg.dll,-37
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@C:\Windows\System32\msimsg.dll,-38
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{8D80504A-0826-40C5-97E1-EBC68F953792} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\msiexec.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\msiexec.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6ed635.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6ed635.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FF8D73E2EDCEE955E8B0475207857DB8
07753E767EB3BC94EB818C26C68E64EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F09FD58A4AF5D035B9AF3C83702CA955
07753E767EB3BC94EB818C26C68E64EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B5E1BBF8CCAC7445FB38157CD3B6C4C3
07753E767EB3BC94EB818C26C68E64EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5A5DBDBAD66DD6E5FAE6BC2B9DB28158
07753E767EB3BC94EB818C26C68E64EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8261A1D79F60F685AADC5E1ABA5E0982
07753E767EB3BC94EB818C26C68E64EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7B1170220E0EA9D5B9CC18B00137FE0E
07753E767EB3BC94EB818C26C68E64EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files\Modrinth App\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Windows\Installer\{67E35770-3BE7-49CB-BE18-C8626CE846EE}\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Modrinth App\
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\theseus.mrpack.Document\shell\open
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\theseus.mrpack.Document\shell\open\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.mrpack
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.mrpack
Content Type
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\theseus.mrpack.Document
NULL
HKEY_CURRENT_USER\SOFTWARE\modrinth\Modrinth App
Desktop Shortcut
HKEY_CURRENT_USER\SOFTWARE\modrinth\Modrinth App
InstallDir
HKEY_CURRENT_USER\SOFTWARE\modrinth\Modrinth App
Uninstaller Shortcut
HKEY_CURRENT_USER\SOFTWARE\modrinth\Modrinth App
Start Menu Shortcut
HKEY_LOCAL_MACHINE\SOFTWARE\modrinth\theseus\Capabilities
ApplicationDescription
HKEY_LOCAL_MACHINE\SOFTWARE\modrinth\theseus\Capabilities
ApplicationIcon
HKEY_LOCAL_MACHINE\SOFTWARE\modrinth\theseus\Capabilities
ApplicationName
HKEY_LOCAL_MACHINE\SOFTWARE\modrinth\theseus\Capabilities\DefaultIcon
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\modrinth\theseus\Capabilities\FileAssociations
.mrpack
HKEY_LOCAL_MACHINE\SOFTWARE\modrinth\theseus\Capabilities\MIMEAssociations
application/mrpack
HKEY_LOCAL_MACHINE\SOFTWARE\modrinth\theseus\Capabilities\shell\Open\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\RegisteredApplications
theseus
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\theseus.mrpack.Document
MRPACK File
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.mrpack\OpenWithList\theseus
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.mrpack\OpenWithProgids
theseus.mrpack.Document
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\mrpack\SupportedTypes
.mrpack
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\mrpack\shell\open
FriendlyAppName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\13CC58B29F9FD325381898EFA5ED7FD8
07753E767EB3BC94EB818C26C68E64EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{67E35770-3BE7-49CB-BE18-C8626CE846EE}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\07753E767EB3BC94EB818C26C68E64EE
ShortcutsFeature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\Features
ShortcutsFeature
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\07753E767EB3BC94EB818C26C68E64EE
MainProgram
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\Features
MainProgram
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\07753E767EB3BC94EB818C26C68E64EE
Environment
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\Features
Environment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\07753E767EB3BC94EB818C26C68E64EE
External
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\Features
External
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\07753E767EB3BC94EB818C26C68E64EE\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE
ProductIcon
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\13CC58B29F9FD325381898EFA5ED7FD8
07753E767EB3BC94EB818C26C68E64EE
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\07753E767EB3BC94EB818C26C68E64EE\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_CURRENT_USER\SOFTWARE\b8bbcb55f0102d902a5d3103b592d27a0e491cb8
63ab3853af89a43bbf93aaae815c43b041bb349d
There are 117 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
326E000
trusted library allocation
page read and write
malicious
3231000
trusted library allocation
page read and write
malicious
1336F000
trusted library allocation
page read and write
malicious
2FD1000
trusted library allocation
page read and write
malicious
3361000
trusted library allocation
page read and write
malicious
381D000
trusted library allocation
page read and write
malicious
1330000
trusted library allocation
page read and write
167E000
stack
page read and write
320E000
stack
page read and write
2F0D000
heap
page read and write
2F11000
heap
page read and write
7FF848A36000
trusted library allocation
page read and write
3057000
heap
page read and write
1C446000
heap
page read and write
2F41000
heap
page read and write
1C5B3000
heap
page read and write
EBE000
heap
page read and write
7FF848BA0000
trusted library allocation
page read and write
1C4EF000
heap
page read and write
2F19000
heap
page read and write
1B55D000
stack
page read and write
1BF9E000
stack
page read and write
F70000
heap
page read and write
2F90000
heap
page read and write
111F000
stack
page read and write
1206000
heap
page read and write
1C518000
heap
page read and write
2FE5000
heap
page read and write
2F43000
heap
page read and write
337F000
stack
page read and write
1BEC3000
stack
page read and write
1C272000
heap
page read and write
1C245000
heap
page read and write
2BA0000
heap
page read and write
2F5E000
heap
page read and write
29E000
unkown
page write copy
369C000
trusted library allocation
page read and write
2F16000
heap
page read and write
7FF848A46000
trusted library allocation
page execute and read and write
1B8ED000
stack
page read and write
12A7000
heap
page read and write
7FF42DE40000
trusted library allocation
page execute and read and write
4EC4000
heap
page read and write
1B390000
trusted library allocation
page read and write
7FF848B61000
trusted library allocation
page read and write
1F0000
heap
page read and write
18F0000
trusted library section
page read and write
2ED8000
heap
page read and write
37B7000
trusted library allocation
page read and write
13DD000
heap
page read and write
F50000
heap
page read and write
1BD2F000
stack
page read and write
7FF84897D000
trusted library allocation
page execute and read and write
7FF848962000
trusted library allocation
page read and write
BFE000
stack
page read and write
2F2E000
heap
page read and write
58DF000
stack
page read and write
18BE000
stack
page read and write
2BB0000
heap
page read and write
1C5A2000
heap
page read and write
1C193000
stack
page read and write
1BCCE000
stack
page read and write
EBC000
unkown
page readonly
7FF848A16000
trusted library allocation
page read and write
57DE000
stack
page read and write
7FF848954000
trusted library allocation
page read and write
2EA0000
heap
page read and write
327E000
stack
page read and write
C3E000
stack
page read and write
2F98000
heap
page read and write
1BF6E000
stack
page read and write
3057000
heap
page read and write
1C7E9000
heap
page read and write
13D1000
heap
page read and write
1241000
heap
page read and write
120C000
heap
page read and write
2F1C000
heap
page read and write
1520000
heap
page read and write
F66000
stack
page read and write
759F000
stack
page read and write
1C7A8000
heap
page read and write
7FF848963000
trusted library allocation
page execute and read and write
1C794000
heap
page read and write
1BA80000
heap
page execute and read and write
561E000
stack
page read and write
31B0000
trusted library allocation
page read and write
591C000
stack
page read and write
2AA3000
heap
page read and write
141C000
heap
page read and write
E2E000
heap
page read and write
2FC8000
heap
page read and write
54FB000
stack
page read and write
1CFBE000
stack
page read and write
7FF848B50000
trusted library allocation
page read and write
12F6000
stack
page read and write
2F5C000
heap
page read and write
163F000
stack
page read and write
122B000
heap
page read and write
1C79D000
heap
page read and write
AB8000
unkown
page readonly
1C1C8000
heap
page read and write
2FC5000
heap
page read and write
1C73F000
heap
page read and write
293000
unkown
page readonly
2FBE000
heap
page read and write
1C298000
heap
page read and write
1C52B000
heap
page read and write
1C22E000
heap
page read and write
38EC000
stack
page read and write
1B99F000
stack
page read and write
19B000
stack
page read and write
1C5C5000
heap
page read and write
335F000
stack
page read and write
1900000
trusted library section
page read and write
7FF848BB0000
trusted library allocation
page read and write
1C5CC000
heap
page read and write
7FF848A10000
trusted library allocation
page read and write
1C732000
heap
page read and write
2F1B000
heap
page read and write
7FF848B00000
trusted library allocation
page read and write
2C8000
unkown
page readonly
2FBF000
heap
page read and write
2F1C000
heap
page read and write
1BD63000
stack
page read and write
29E000
unkown
page read and write
7FF848A3C000
trusted library allocation
page execute and read and write
7FF848A00000
trusted library allocation
page read and write
301E000
heap
page read and write
1790000
trusted library allocation
page read and write
7FF848B30000
trusted library allocation
page read and write
37AF000
stack
page read and write
7FF848A1C000
trusted library allocation
page execute and read and write
2D70000
heap
page read and write
29FB000
stack
page read and write
7FF84896C000
trusted library allocation
page read and write
2A3D000
heap
page read and write
2E60000
heap
page read and write
7FF8489DC000
trusted library allocation
page execute and read and write
769C000
stack
page read and write
2BEB000
heap
page read and write
260000
unkown
page readonly
7FF848AFC000
trusted library allocation
page read and write
7FF848B10000
trusted library allocation
page read and write
2D31000
stack
page read and write
328F000
stack
page read and write
304F000
heap
page read and write
7FF8489AD000
trusted library allocation
page execute and read and write
366F000
stack
page read and write
1BC6E000
stack
page read and write
2F30000
heap
page read and write
7FF848B3B000
trusted library allocation
page read and write
739E000
stack
page read and write
16C0000
trusted library section
page read and write
7FF848B80000
trusted library allocation
page read and write
1C488000
heap
page read and write
1C44E000
heap
page read and write
126B000
heap
page read and write
7FF84898D000
trusted library allocation
page execute and read and write
2D39000
stack
page read and write
3679000
trusted library allocation
page read and write
2E06000
heap
page read and write
1C094000
stack
page read and write
3057000
heap
page read and write
52E9000
heap
page read and write
1C1E5000
heap
page read and write
1C3DD000
stack
page read and write
2F0C000
heap
page read and write
2EAE000
stack
page read and write
7FF848AFA000
trusted library allocation
page read and write
1358000
heap
page read and write
7FF848A66000
trusted library allocation
page execute and read and write
2F5E000
heap
page read and write
532E000
heap
page read and write
7FF8489AC000
trusted library allocation
page execute and read and write
2F20000
heap
page read and write
1350000
heap
page read and write
51D8000
heap
page read and write
1C25F000
heap
page read and write
1BB6F000
stack
page read and write
4EC0000
heap
page read and write
18D5000
heap
page read and write
2F1E000
heap
page read and write
FE0000
trusted library allocation
page read and write
352F000
stack
page read and write
3190000
heap
page execute and read and write
2ED000
unkown
page readonly
5091000
trusted library allocation
page read and write
FC0000
heap
page read and write
50A0000
heap
page read and write
54EE000
stack
page read and write
32DC000
trusted library allocation
page read and write
7FF848A70000
trusted library allocation
page execute and read and write
2D16000
stack
page read and write
2E59000
heap
page read and write
5250000
heap
page read and write
2FCC000
heap
page read and write
7FF84897B000
trusted library allocation
page execute and read and write
2DFE000
stack
page read and write
1C216000
heap
page read and write
2DAE000
stack
page read and write
2F4E000
heap
page read and write
7FF848B1B000
trusted library allocation
page read and write
7FF848A20000
trusted library allocation
page execute and read and write
3632000
trusted library allocation
page read and write
1C433000
heap
page read and write
7FF848B60000
trusted library allocation
page read and write
7FF848952000
trusted library allocation
page read and write
13238000
trusted library allocation
page read and write
2D10000
stack
page read and write
1C460000
heap
page read and write
123F000
heap
page read and write
7FF84896D000
trusted library allocation
page execute and read and write
7FF848B40000
trusted library allocation
page read and write
2F31000
heap
page read and write
2E50000
heap
page readonly
343B000
heap
page read and write
1C778000
heap
page read and write
540F000
heap
page read and write
1C504000
heap
page read and write
2FC8000
heap
page read and write
1286000
heap
page read and write
1C7D8000
heap
page read and write
3050000
heap
page read and write
173F000
stack
page read and write
1BDCE000
stack
page read and write
D7E000
stack
page read and write
37EC000
stack
page read and write
474000
unkown
page readonly
1C4A3000
heap
page read and write
3050000
heap
page read and write
2F50000
heap
page read and write
3050000
heap
page read and write
3057000
heap
page read and write
1D0BB000
stack
page read and write
356E000
stack
page read and write
1280000
heap
page read and write
13049000
trusted library allocation
page read and write
3659000
trusted library allocation
page read and write
2FF6000
heap
page read and write
1425000
heap
page read and write
408000
unkown
page readonly
7FF848B30000
trusted library allocation
page read and write
14D0000
heap
page read and write
1760000
heap
page read and write
562E000
stack
page read and write
1C468000
heap
page read and write
13844000
trusted library allocation
page read and write
2F5C000
heap
page read and write
2F13000
heap
page read and write
2F2E000
heap
page read and write
400000
unkown
page readonly
4FEE000
stack
page read and write
2F14000
heap
page read and write
1C259000
heap
page read and write
1C5CF000
heap
page read and write
2F5C000
heap
page read and write
53ED000
stack
page read and write
7FF848BC0000
trusted library allocation
page execute and read and write
7FF84898B000
trusted library allocation
page execute and read and write
1C5A9000
heap
page read and write
38F2000
heap
page read and write
E4F000
heap
page read and write
138B000
heap
page read and write
2D06000
stack
page read and write
1C20C000
heap
page read and write
141E000
heap
page read and write
1580000
heap
page read and write
7FF8489AB000
trusted library allocation
page execute and read and write
2F24000
heap
page read and write
FA0000
heap
page read and write
2FE5000
heap
page read and write
7FF848B2C000
trusted library allocation
page read and write
1323D000
trusted library allocation
page read and write
7FF848970000
trusted library allocation
page read and write
513E000
stack
page read and write
405000
unkown
page write copy
C70000
heap
page read and write
3430000
heap
page read and write
2F85000
heap
page read and write
2F4E000
heap
page read and write
2A7F000
heap
page read and write
2DB0000
heap
page read and write
2F39000
heap
page read and write
34C7000
trusted library allocation
page read and write
2C36000
stack
page read and write
7FF848A40000
trusted library allocation
page execute and read and write
1C551000
heap
page read and write
2B80000
heap
page read and write
7FF848974000
trusted library allocation
page read and write
3250000
heap
page read and write
12FD3000
trusted library allocation
page read and write
318E000
stack
page read and write
12FDD000
trusted library allocation
page read and write
1336D000
trusted library allocation
page read and write
1C401000
heap
page read and write
7FF84897C000
trusted library allocation
page read and write
310E000
stack
page read and write
1C1D2000
heap
page read and write
304E000
heap
page read and write
305E000
heap
page read and write
16E4000
heap
page read and write
13241000
trusted library allocation
page read and write
D90000
unkown
page readonly
69E5000
heap
page read and write
138D000
heap
page read and write
7FF84897D000
trusted library allocation
page execute and read and write
2F2D000
heap
page read and write
1570000
heap
page execute and read and write
2F15000
heap
page read and write
E20000
heap
page read and write
3050000
heap
page read and write
7FF848A0C000
trusted library allocation
page execute and read and write
2F4E000
heap
page read and write
40C000
unkown
page readonly
7FF84898D000
trusted library allocation
page execute and read and write
1C5DB000
heap
page read and write
305E000
heap
page read and write
1C426000
heap
page read and write
7FF848984000
trusted library allocation
page read and write
2E00000
heap
page read and write
1C3E0000
heap
page read and write
7FF848B00000
trusted library allocation
page read and write
7FF848B40000
trusted library allocation
page read and write
305E000
heap
page read and write
E2A000
heap
page read and write
1C0CE000
stack
page read and write
7FF848963000
trusted library allocation
page read and write
1CEBD000
stack
page read and write
3050000
heap
page read and write
7FF848B1B000
trusted library allocation
page read and write
1C7FD000
heap
page read and write
EB6000
heap
page read and write
51D0000
trusted library allocation
page read and write
D90000
unkown
page readonly
431000
unkown
page readonly
3220000
heap
page read and write
7FF848A80000
trusted library allocation
page execute and read and write
7FF848B50000
trusted library allocation
page read and write
499000
unkown
page readonly
2EF0000
heap
page read and write
7FF848973000
trusted library allocation
page read and write
1CC1E000
stack
page read and write
2F17000
heap
page read and write
34F4000
trusted library allocation
page read and write
9B000
stack
page read and write
569C000
stack
page read and write
5352000
heap
page read and write
2F36000
heap
page read and write
7FF848B20000
trusted library allocation
page read and write
305E000
heap
page read and write
1C06E000
stack
page read and write
13B8000
heap
page read and write
7FF848B90000
trusted library allocation
page execute and read and write
D92000
unkown
page readonly
7FF848B0C000
trusted library allocation
page read and write
2ED000
unkown
page readonly
13D5000
heap
page read and write
3701000
trusted library allocation
page read and write
1BD30000
heap
page execute and read and write
18D0000
heap
page read and write
1C753000
heap
page read and write
3437000
heap
page read and write
2F24000
heap
page read and write
565E000
stack
page read and write
305E000
heap
page read and write
342E000
stack
page read and write
260000
unkown
page readonly
17EE000
stack
page read and write
F40000
heap
page read and write
1C233000
heap
page read and write
2F1F000
heap
page read and write
1C7F5000
heap
page read and write
2C1000
unkown
page read and write
7FF848980000
trusted library allocation
page read and write
2F2E000
stack
page read and write
2C3000
unkown
page readonly
13F8000
heap
page read and write
12CF000
heap
page read and write
2F38000
heap
page read and write
52EC000
heap
page read and write
261000
unkown
page execute read
404000
unkown
page read and write
7FF848A06000
trusted library allocation
page read and write
EB8000
heap
page read and write
2FCD000
heap
page read and write
51E0000
heap
page read and write
2CFC000
stack
page read and write
1990000
heap
page execute and read and write
2C8000
unkown
page readonly
3751000
trusted library allocation
page read and write
2FC0000
heap
page execute and read and write
304F000
heap
page read and write
7FF848AF3000
trusted library allocation
page read and write
1C224000
heap
page read and write
1C201000
heap
page read and write
7FF848993000
trusted library allocation
page read and write
73A0000
heap
page read and write
1920000
trusted library section
page read and write
5A1D000
stack
page read and write
1BFCE000
stack
page read and write
50AA000
trusted library allocation
page read and write
2FF7000
heap
page read and write
1C248000
heap
page read and write
401000
unkown
page execute read
1560000
heap
page read and write
1B6AD000
stack
page read and write
2E65000
heap
page read and write
1C276000
heap
page read and write
7FF848B67000
trusted library allocation
page read and write
F90000
heap
page read and write
319F000
stack
page read and write
2FBA000
heap
page read and write
2FF9000
heap
page read and write
13F3000
heap
page read and write
1C1CE000
stack
page read and write
1BAC0000
heap
page read and write
2A4000
unkown
page read and write
1B260000
trusted library allocation
page read and write
1740000
heap
page read and write
7FF84899D000
trusted library allocation
page execute and read and write
188F000
stack
page read and write
3802000
trusted library allocation
page read and write
2FF9000
heap
page read and write
52EA000
heap
page read and write
1C774000
heap
page read and write
304E000
heap
page read and write
7FF848953000
trusted library allocation
page execute and read and write
304F000
heap
page read and write
136B000
heap
page read and write
1C7B1000
heap
page read and write
1C1ED000
heap
page read and write
1310000
heap
page read and write
7FF848950000
trusted library allocation
page read and write
3825000
trusted library allocation
page read and write
2F4E000
heap
page read and write
14F0000
heap
page read and write
19B4000
heap
page read and write
EC0000
unkown
page readonly
354C000
trusted library allocation
page read and write
1C1E8000
heap
page read and write
1C720000
heap
page read and write
13B6000
heap
page read and write
7FF848B10000
trusted library allocation
page read and write
12FE1000
trusted library allocation
page read and write
101F000
stack
page read and write
7FF848A10000
trusted library allocation
page execute and read and write
18EE000
stack
page read and write
55DD000
stack
page read and write
2F18000
heap
page read and write
13F1000
heap
page read and write
4E8E000
stack
page read and write
69A3000
heap
page read and write
2F5E000
heap
page read and write
531C000
stack
page read and write
1C3F2000
heap
page read and write
2F4E000
stack
page read and write
1520000
trusted library allocation
page read and write
35D9000
trusted library allocation
page read and write
16E0000
heap
page read and write
2C2000
unkown
page readonly
13231000
trusted library allocation
page read and write
51D0000
heap
page read and write
1300000
trusted library allocation
page read and write
2F19000
heap
page read and write
7FF84899C000
trusted library allocation
page read and write
2F5E000
heap
page read and write
12FD1000
trusted library allocation
page read and write
7FF848960000
trusted library allocation
page read and write
1C289000
heap
page read and write
33FE000
trusted library allocation
page read and write
3230000
heap
page read and write
1C1A0000
heap
page read and write
69A0000
trusted library allocation
page read and write
13233000
trusted library allocation
page read and write
523F000
stack
page read and write
293000
unkown
page readonly
2EF1000
heap
page read and write
12FD8000
trusted library allocation
page read and write
7FF848982000
trusted library allocation
page read and write
3DDF000
heap
page read and write
50EF000
stack
page read and write
2F23000
heap
page read and write
7FF848B70000
trusted library allocation
page read and write
1C725000
heap
page read and write
1C419000
heap
page read and write
1BD90000
heap
page read and write
6A09000
heap
page read and write
1BBCE000
stack
page read and write
DBE000
stack
page read and write
E80000
heap
page read and write
4F80000
heap
page read and write
FC5000
heap
page read and write
3057000
heap
page read and write
2D27000
stack
page read and write
17B0000
trusted library allocation
page read and write
1C75D000
heap
page read and write
301F000
trusted library allocation
page read and write
2C2000
unkown
page write copy
2EEE000
stack
page read and write
7FF848B20000
trusted library allocation
page read and write
7FF848A30000
trusted library allocation
page read and write
7FF848984000
trusted library allocation
page read and write
2F1F000
heap
page read and write
1C4D4000
heap
page read and write
13368000
trusted library allocation
page read and write
7FF848AF0000
trusted library allocation
page read and write
1BA60000
heap
page read and write
1C7C5000
heap
page read and write
3829000
trusted library allocation
page read and write
552E000
stack
page read and write
1330000
heap
page read and write
7FF848B13000
trusted library allocation
page read and write
2F2F000
heap
page read and write
7FF848B20000
trusted library allocation
page read and write
1C51A000
heap
page read and write
2F22000
heap
page read and write
1540000
trusted library allocation
page read and write
2D60000
heap
page read and write
1375000
heap
page read and write
7FF848983000
trusted library allocation
page execute and read and write
2ED0000
heap
page read and write
7FF848B30000
trusted library allocation
page read and write
12F6000
stack
page read and write
2FC8000
heap
page read and write
305E000
heap
page read and write
1585000
heap
page read and write
2E50000
heap
page read and write
7FF848980000
trusted library allocation
page read and write
2F1F000
heap
page read and write
1C4B3000
heap
page read and write
7FF848B40000
trusted library allocation
page read and write
7FF8489BC000
trusted library allocation
page execute and read and write
16BE000
stack
page read and write
329F000
stack
page read and write
13B0000
heap
page read and write
2F5C000
heap
page read and write
2EF0000
heap
page read and write
7FF848A36000
trusted library allocation
page execute and read and write
132A9000
trusted library allocation
page read and write
1C57D000
heap
page read and write
C75000
heap
page read and write
2F11000
heap
page read and write
1C29E000
heap
page read and write
7FF848964000
trusted library allocation
page read and write
1C557000
heap
page read and write
7FF848B43000
trusted library allocation
page read and write
1C591000
heap
page read and write
1335000
heap
page read and write
1BE9E000
stack
page read and write
2D23000
stack
page read and write
3057000
heap
page read and write
7FF8489A0000
trusted library allocation
page read and write
261000
unkown
page execute read
1B000000
trusted library allocation
page read and write
2F2A000
heap
page read and write
729E000
stack
page read and write
7FF84895D000
trusted library allocation
page execute and read and write
7FF84896D000
trusted library allocation
page execute and read and write
36AE000
stack
page read and write
DC0000
heap
page read and write
1C287000
heap
page read and write
2CFB000
stack
page read and write
1BE6E000
stack
page read and write
1200000
heap
page read and write
3050000
heap
page read and write
1270000
heap
page read and write
2FF7000
heap
page read and write
1C442000
heap
page read and write
FD0000
heap
page read and write
19B0000
heap
page read and write
14CF000
stack
page read and write
2F44000
heap
page read and write
2F40000
trusted library allocation
page read and write
2F36000
heap
page read and write
7FF848AA0000
trusted library allocation
page execute and read and write
BB0000
heap
page read and write
5720000
heap
page read and write
13F5000
heap
page read and write
7FF8489A4000
trusted library allocation
page read and write
7FF848B23000
trusted library allocation
page read and write
1C1FC000
heap
page read and write
2D29000
stack
page read and write
13361000
trusted library allocation
page read and write
359D000
trusted library allocation
page read and write
7FF848B4D000
trusted library allocation
page read and write
There are 575 hidden memdumps, click here to show them.