IOC Report
NB4EASbynx.msi

loading gif

Files

File Path
Type
Category
Malicious
NB4EASbynx.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {94DF14AB-36C1-4886-A54A-687987508C4D}, Number of Words: 2, Subject: UpdateMSwindows, Author: UpdateMSwindows, Name of Creating Application: UpdateMSwindows, Template: ;1033, Comments: This installer database contains the logic and data required to install UpdateMSwindows., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Tue Jul 23 16:58:05 2024, Last Saved Time/Date: Tue Jul 23 16:58:05 2024, Last Printed: Tue Jul 23 16:58:05 2024, Number of Pages: 450
initial sample
malicious
C:\Users\user\AppData\Local\Temp\558563\Dicks.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\MSI53B9.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Desktop\SymposiumTaiwan.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Config.Msi\68e8f0.rbs
data
modified
C:\Users\user\AppData\Local\Temp\558563\k
data
dropped
C:\Users\user\AppData\Local\Temp\Analysts
data
dropped
C:\Users\user\AppData\Local\Temp\Assumed
data
dropped
C:\Users\user\AppData\Local\Temp\Basketball
data
dropped
C:\Users\user\AppData\Local\Temp\Beverages
data
dropped
C:\Users\user\AppData\Local\Temp\Cheque
MPEG ADTS, AAC, v4 LTP, stereo + center
dropped
C:\Users\user\AppData\Local\Temp\Displaying
data
dropped
C:\Users\user\AppData\Local\Temp\Emotions
data
dropped
C:\Users\user\AppData\Local\Temp\Explaining
data
dropped
C:\Users\user\AppData\Local\Temp\Feeling
data
dropped
C:\Users\user\AppData\Local\Temp\Fm
data
dropped
C:\Users\user\AppData\Local\Temp\Grain
data
dropped
C:\Users\user\AppData\Local\Temp\Hero
data
dropped
C:\Users\user\AppData\Local\Temp\Immigrants
data
dropped
C:\Users\user\AppData\Local\Temp\Kelly
data
dropped
C:\Users\user\AppData\Local\Temp\Louisiana
data
dropped
C:\Users\user\AppData\Local\Temp\MSI4F6E.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI5124.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI523E.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI527E.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI52AE.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI537A.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIC706.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Manage
data
dropped
C:\Users\user\AppData\Local\Temp\Notify
data
dropped
C:\Users\user\AppData\Local\Temp\Oak
data
dropped
C:\Users\user\AppData\Local\Temp\Open
ASCII text, with very long lines (1084), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Open.cmd
ASCII text, with very long lines (1084), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Paintball
data
dropped
C:\Users\user\AppData\Local\Temp\Productivity
data
dropped
C:\Users\user\AppData\Local\Temp\Qualifications
data
dropped
C:\Users\user\AppData\Local\Temp\Ring
data
dropped
C:\Users\user\AppData\Local\Temp\Spa
data
dropped
C:\Users\user\AppData\Local\Temp\Transexual
data
dropped
C:\Users\user\AppData\Local\Temp\Twin
data
dropped
C:\Users\user\AppData\Local\Temp\Upc
data
dropped
C:\Users\user\AppData\Local\Temp\Utility
data
dropped
C:\Users\user\AppData\Local\Temp\Version
data
dropped
C:\Users\user\AppData\Local\Temp\Webpage
data
dropped
C:\Users\user\AppData\Local\Temp\Width
data
dropped
C:\Users\user\AppData\Local\Temp\Wt
data
dropped
C:\Users\user\AppData\Local\Temp\Yearly
data
dropped
C:\Windows\Installer\68e8ef.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {94DF14AB-36C1-4886-A54A-687987508C4D}, Number of Words: 2, Subject: UpdateMSwindows, Author: UpdateMSwindows, Name of Creating Application: UpdateMSwindows, Template: ;1033, Comments: This installer database contains the logic and data required to install UpdateMSwindows., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Tue Jul 23 16:58:05 2024, Last Saved Time/Date: Tue Jul 23 16:58:05 2024, Last Printed: Tue Jul 23 16:58:05 2024, Number of Pages: 450
dropped
C:\Windows\Installer\68e8f1.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {94DF14AB-36C1-4886-A54A-687987508C4D}, Number of Words: 2, Subject: UpdateMSwindows, Author: UpdateMSwindows, Name of Creating Application: UpdateMSwindows, Template: ;1033, Comments: This installer database contains the logic and data required to install UpdateMSwindows., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Tue Jul 23 16:58:05 2024, Last Saved Time/Date: Tue Jul 23 16:58:05 2024, Last Printed: Tue Jul 23 16:58:05 2024, Number of Pages: 450
dropped
C:\Windows\Installer\MSIEA27.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIEA95.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIEAB6.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIEB24.tmp
data
dropped
C:\Windows\Installer\SourceHash{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\~DF0134FB345E482C7A.TMP
data
dropped
C:\Windows\Temp\~DF23FAA980D14CD732.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF2A7C783D5DE4B7FD.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF3FECA6A770E2A6D3.TMP
data
dropped
C:\Windows\Temp\~DF60147ABB188BCB9C.TMP
data
dropped
C:\Windows\Temp\~DF79247D6107B4D357.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF8ACC052D60164BF1.TMP
data
dropped
C:\Windows\Temp\~DFA44E230E9286797A.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFAC706A84CEB26BA8.TMP
data
dropped
C:\Windows\Temp\~DFC9703DE7EF69207B.TMP
data
dropped
C:\Windows\Temp\~DFE14BFCAB93EAE800.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFE70856C2C128635C.TMP
data
dropped
There are 58 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\Temp\MSI53B9.tmp
"C:\Users\user\AppData\Local\Temp\MSI53B9.tmp" -pqwerty2023 -s1
malicious
C:\Users\user\Desktop\SymposiumTaiwan.exe
"C:\Users\user\Desktop\SymposiumTaiwan.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k copy Open Open.cmd & Open.cmd & exit
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa.exe opssvc.exe"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 558563
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "cbsinchhavefcc" Basketball
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b Upc + Beverages + Hero + Displaying + Version + Fm + Emotions 558563\k
malicious
C:\Users\user\AppData\Local\Temp\558563\Dicks.pif
558563\Dicks.pif 558563\k
malicious
C:\Users\user\AppData\Local\Temp\558563\Dicks.pif
C:\Users\user\AppData\Local\Temp\558563\Dicks.pif
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\NB4EASbynx.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 4C0B4EE6A62E23CFF044B1F01FFADBEC C
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\timeout.exe
timeout 5
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 6E4C0896962209942EF6224878A6EC23
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
lariatedzugspd.shop
malicious
callosallsaospz.shop
malicious
liernessfornicsa.shop
malicious
shepherdlyopzc.shop
malicious
warrantelespsz.shop
malicious
upknittsoappz.shop
malicious
outpointsozp.shop
malicious
unseaffarignsk.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://warrantelespsz.shop:443/api
unknown
https://duckduckgo.com/ac/?q=
unknown
https://warrantelespsz.shop:443/api0-
unknown
https://warrantelespsz.shop/
unknown
https://warrantelespsz.shop/apiOR
unknown
https://warrantelespsz.shop/N
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://warrantelespsz.shop:443/apiMicrosoft
unknown
https://www.autoitscript.com/autoit3/
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://warrantelespsz.sho8
unknown
https://warrantelespsz.shop/fe
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://warrantelespsz.shop/api7N/
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://www.mozilla.or
unknown
https://warrantelespsz.shop/apiBNz
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://warrantelespsz.shop/api
188.114.96.3
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://warrantelespsz.shop/ob
unknown
https://warrantelespsz.shop/pim
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://warrantelespsz.shop/pid
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://warrantelespsz.shop/pi
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://warrantelespsz.shop/ta
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
There are 41 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
warrantelespsz.shop
188.114.96.3
malicious
fDwYocEDWIyxswuSuKqfrffGAPh.fDwYocEDWIyxswuSuKqfrffGAPh
unknown

IPs

IP
Domain
Country
Malicious
188.114.96.3
warrantelespsz.shop
European Union
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\68e8f0.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\68e8f0.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\4F9CC0FE1242C1C40BA82079002B1BC1
3394517F7BAF31F40AC82019BDE5D550
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\52B4DD7E97EB05B479074BEF603942A9
3394517F7BAF31F40AC82019BDE5D550
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\UpdateMSwindows\UpdateMSwindows\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\UpdateMSwindows\
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\UpdateMSwindows\UpdateMSwindows
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\UpdateMSwindows\UpdateMSwindows
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\C9755B9D4E0603F4F8B82CC013446D90
3394517F7BAF31F40AC82019BDE5D550
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F7154933-FAB7-4F13-A08C-0291DB5E5D05}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\3394517F7BAF31F40AC82019BDE5D550
MainFeature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\Features
MainFeature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\3394517F7BAF31F40AC82019BDE5D550\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\C9755B9D4E0603F4F8B82CC013446D90
3394517F7BAF31F40AC82019BDE5D550
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\3394517F7BAF31F40AC82019BDE5D550\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
There are 72 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
43FC000
trusted library allocation
page read and write
malicious
108E000
stack
page read and write
34B8000
trusted library allocation
page read and write
343E000
stack
page read and write
3683000
trusted library allocation
page read and write
2352000
heap
page read and write
F0000
unkown
page read and write
34C8000
trusted library allocation
page read and write
11F5000
heap
page read and write
11CF000
heap
page read and write
11C1000
heap
page read and write
1848000
heap
page read and write
44E5000
trusted library allocation
page read and write
11F5000
heap
page read and write
442C000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
91FF000
stack
page read and write
20D0000
heap
page read and write
18A9000
heap
page read and write
3462000
trusted library allocation
page read and write
2326000
heap
page read and write
3533000
trusted library allocation
page read and write
17BE000
heap
page read and write
3458000
trusted library allocation
page read and write
434000
unkown
page read and write
3441000
trusted library allocation
page read and write
FFB000
heap
page read and write
35D3000
heap
page read and write
1923000
heap
page read and write
401000
unkown
page execute read
3411000
trusted library allocation
page read and write
5EE000
heap
page read and write
1140000
heap
page read and write
76A2000
heap
page read and write
3750000
heap
page read and write
3644000
trusted library allocation
page read and write
1504000
heap
page read and write
7DFF000
stack
page read and write
7220000
trusted library allocation
page read and write
3411000
trusted library allocation
page read and write
19C0000
heap
page read and write
3435000
trusted library allocation
page read and write
17C6000
heap
page read and write
731D000
trusted library allocation
page read and write
22FA000
heap
page read and write
3120000
heap
page read and write
11BE000
heap
page read and write
17AD000
heap
page read and write
3485000
trusted library allocation
page read and write
F45000
heap
page read and write
11E1000
heap
page read and write
11BA000
heap
page read and write
48AF000
stack
page read and write
3413000
trusted library allocation
page read and write
35AD000
heap
page read and write
890000
heap
page read and write
476E000
stack
page read and write
35BB000
trusted library allocation
page read and write
1505000
heap
page read and write
3CC1000
trusted library allocation
page read and write
186F000
heap
page read and write
510000
heap
page read and write
182F000
heap
page read and write
34C8000
trusted library allocation
page read and write
187D000
heap
page read and write
343A000
trusted library allocation
page read and write
ED4000
stack
page read and write
18D9000
heap
page read and write
174E000
heap
page read and write
4588000
trusted library allocation
page read and write
11C3000
heap
page read and write
11C6000
heap
page read and write
292B000
heap
page read and write
235A000
heap
page read and write
883E000
stack
page read and write
D30000
heap
page read and write
2DBE000
stack
page read and write
1504000
heap
page read and write
198D000
heap
page read and write
F9000
unkown
page readonly
2382000
heap
page read and write
8F7F000
stack
page read and write
870000
unkown
page readonly
11F5000
heap
page read and write
11E5000
heap
page read and write
11C6000
heap
page read and write
11DB000
heap
page read and write
19A000
stack
page read and write
FF3000
heap
page read and write
11DD000
heap
page read and write
933F000
stack
page read and write
1504000
heap
page read and write
4455000
trusted library allocation
page read and write
947F000
stack
page read and write
1707000
heap
page read and write
3458000
trusted library allocation
page read and write
19C0000
heap
page read and write
4251000
trusted library allocation
page read and write
19DA000
heap
page read and write
F61000
heap
page read and write
11F5000
heap
page read and write
33FE000
stack
page read and write
34C8000
trusted library allocation
page read and write
EFA000
stack
page read and write
F95000
heap
page read and write
3493000
trusted library allocation
page read and write
1794000
heap
page read and write
3514000
trusted library allocation
page read and write
17C3000
heap
page read and write
22C1000
heap
page read and write
8AA000
unkown
page write copy
32B0000
heap
page read and write
341D000
trusted library allocation
page read and write
3B50000
trusted library allocation
page read and write
4450000
trusted library allocation
page read and write
344B000
trusted library allocation
page read and write
7CBF000
stack
page read and write
7671000
heap
page read and write
11F5000
heap
page read and write
18D8000
heap
page read and write
17BF000
heap
page read and write
16C0000
heap
page read and write
1843000
heap
page read and write
55DE000
stack
page read and write
1955000
heap
page read and write
8CFF000
stack
page read and write
3482000
trusted library allocation
page read and write
1952000
heap
page read and write
549E000
stack
page read and write
2C7C000
stack
page read and write
22E7000
heap
page read and write
1173000
heap
page read and write
1504000
heap
page read and write
11F5000
heap
page read and write
3611000
trusted library allocation
page read and write
19EB000
heap
page read and write
3476000
trusted library allocation
page read and write
11E5000
heap
page read and write
130E000
stack
page read and write
22FA000
heap
page read and write
16A0000
heap
page read and write
11F5000
heap
page read and write
176E000
heap
page read and write
1928000
heap
page read and write
EF2000
stack
page read and write
3541000
heap
page read and write
17A1000
heap
page read and write
3FA0000
heap
page read and write
3483000
trusted library allocation
page read and write
47EE000
stack
page read and write
4251000
trusted library allocation
page read and write
FFC000
heap
page read and write
847E000
stack
page read and write
833E000
stack
page read and write
11E2000
heap
page read and write
871000
unkown
page execute read
174E000
heap
page read and write
11CA000
heap
page read and write
3456000
trusted library allocation
page read and write
580000
heap
page read and write
571F000
stack
page read and write
1984000
heap
page read and write
35A4000
heap
page read and write
1505000
heap
page read and write
3412000
trusted library allocation
page read and write
33B6000
heap
page read and write
2375000
heap
page read and write
973E000
stack
page read and write
44EE000
trusted library allocation
page read and write
539D000
stack
page read and write
180A000
heap
page read and write
8AA000
unkown
page read and write
4453000
trusted library allocation
page read and write
1159000
heap
page read and write
1504000
heap
page read and write
FB3000
heap
page read and write
1504000
heap
page read and write
330E000
stack
page read and write
1828000
heap
page read and write
1A9B000
heap
page read and write
3428000
trusted library allocation
page read and write
1504000
heap
page read and write
46B000
unkown
page read and write
44EB000
trusted library allocation
page read and write
4910000
heap
page read and write
FF9000
heap
page read and write
34E0000
heap
page read and write
170D000
heap
page read and write
7160000
trusted library allocation
page read and write
17EB000
heap
page read and write
4308000
trusted library allocation
page read and write
EB0000
remote allocation
page execute and read and write
720000
heap
page read and write
2352000
heap
page read and write
1010000
heap
page read and write
1714000
heap
page read and write
11BF000
heap
page read and write
3472000
trusted library allocation
page read and write
8CC000
unkown
page readonly
1716000
heap
page read and write
48C0000
heap
page read and write
11E5000
heap
page read and write
34C4000
trusted library allocation
page read and write
16C3000
heap
page read and write
344B000
trusted library allocation
page read and write
4308000
trusted library allocation
page read and write
1877000
heap
page read and write
870000
unkown
page readonly
1504000
heap
page read and write
4520000
trusted library allocation
page read and write
F69000
heap
page read and write
61F000
heap
page read and write
16D4000
heap
page read and write
3260000
heap
page read and write
1504000
heap
page read and write
42D8000
trusted library allocation
page read and write
4251000
trusted library allocation
page read and write
4450000
trusted library allocation
page read and write
619000
heap
page read and write
445B000
trusted library allocation
page read and write
3429000
trusted library allocation
page read and write
3FA1000
heap
page read and write
E3A000
stack
page read and write
429B000
trusted library allocation
page read and write
4451000
trusted library allocation
page read and write
11C4000
heap
page read and write
7236000
trusted library allocation
page read and write
F4E000
heap
page read and write
1A9B000
heap
page read and write
3C54000
heap
page read and write
C0000
unkown
page readonly
2307000
heap
page read and write
1504000
heap
page read and write
FE5000
heap
page read and write
F75000
heap
page read and write
1504000
heap
page read and write
3456000
trusted library allocation
page read and write
5E0000
heap
page read and write
100E000
stack
page read and write
624000
heap
page read and write
4454000
trusted library allocation
page read and write
F48000
heap
page read and write
67C000
stack
page read and write
661000
heap
page read and write
30E4000
heap
page read and write
18D8000
heap
page read and write
11F5000
heap
page read and write
34C8000
trusted library allocation
page read and write
190F000
heap
page read and write
937E000
stack
page read and write
3468000
trusted library allocation
page read and write
2382000
heap
page read and write
F58000
heap
page read and write
2315000
heap
page read and write
341D000
trusted library allocation
page read and write
44EB000
trusted library allocation
page read and write
FF9000
heap
page read and write
1899000
heap
page read and write
3629000
trusted library allocation
page read and write
452A000
trusted library allocation
page read and write
4250000
trusted library allocation
page read and write
11CB000
heap
page read and write
1500000
heap
page read and write
31000
unkown
page execute read
342F000
trusted library allocation
page read and write
34B3000
trusted library allocation
page read and write
1504000
heap
page read and write
1504000
heap
page read and write
2E7E000
stack
page read and write
3458000
trusted library allocation
page read and write
4454000
trusted library allocation
page read and write
343F000
trusted library allocation
page read and write
11F5000
heap
page read and write
28E0000
heap
page read and write
2375000
heap
page read and write
11CA000
heap
page read and write
4450000
trusted library allocation
page read and write
575C000
stack
page read and write
997F000
stack
page read and write
19DA000
heap
page read and write
11E5000
heap
page read and write
807F000
stack
page read and write
371F000
stack
page read and write
342F000
trusted library allocation
page read and write
44F3000
trusted library allocation
page read and write
2382000
heap
page read and write
2352000
heap
page read and write
46DE000
trusted library allocation
page read and write
191A000
heap
page read and write
3432000
trusted library allocation
page read and write
27DF000
stack
page read and write
451B000
trusted library allocation
page read and write
1715000
heap
page read and write
F0000
unkown
page write copy
FF9000
heap
page read and write
4A2F000
heap
page read and write
2DFF000
stack
page read and write
FF3000
heap
page read and write
9C3E000
stack
page read and write
11BF000
heap
page read and write
11DD000
heap
page read and write
11F5000
heap
page read and write
EB9000
stack
page read and write
11F5000
heap
page read and write
2A6F000
stack
page read and write
11F5000
heap
page read and write
347F000
stack
page read and write
1504000
heap
page read and write
1504000
heap
page read and write
11C6000
heap
page read and write
7161000
trusted library allocation
page read and write
A3B000
stack
page read and write
11BD000
heap
page read and write
18DA000
heap
page read and write
EE1000
stack
page read and write
11F5000
heap
page read and write
31BE000
stack
page read and write
8A7F000
stack
page read and write
1504000
heap
page read and write
343C000
trusted library allocation
page read and write
4451000
trusted library allocation
page read and write
2DCD000
stack
page read and write
1504000
heap
page read and write
11DD000
heap
page read and write
30000
unkown
page readonly
2C6A000
trusted library allocation
page read and write
1504000
heap
page read and write
3451000
trusted library allocation
page read and write
11DD000
heap
page read and write
17DD000
heap
page read and write
FB3000
heap
page read and write
F74000
heap
page read and write
4519000
trusted library allocation
page read and write
1164000
heap
page read and write
18D8000
heap
page read and write
3473000
trusted library allocation
page read and write
7E3E000
stack
page read and write
44F3000
trusted library allocation
page read and write
184B000
heap
page read and write
459F000
trusted library allocation
page read and write
3CB0000
heap
page read and write
1A7A000
heap
page read and write
22FE000
heap
page read and write
35D4000
heap
page read and write
43FB000
trusted library allocation
page read and write
F5A000
heap
page read and write
3411000
trusted library allocation
page read and write
43E7000
trusted library allocation
page read and write
176C000
heap
page read and write
351A000
trusted library allocation
page read and write
11DD000
heap
page read and write
F5A000
heap
page read and write
386E000
stack
page read and write
11C5000
heap
page read and write
3580000
heap
page read and write
346E000
trusted library allocation
page read and write
11C3000
heap
page read and write
2DD0000
remote allocation
page read and write
342F000
trusted library allocation
page read and write
11CD000
heap
page read and write
11F5000
heap
page read and write
34DE000
stack
page read and write
4458000
trusted library allocation
page read and write
ED0000
stack
page read and write
1145000
heap
page read and write
182F000
heap
page read and write
400000
unkown
page readonly
776000
heap
page read and write
7161000
trusted library allocation
page read and write
3469000
trusted library allocation
page read and write
1748000
heap
page read and write
95FE000
stack
page read and write
E60000
remote allocation
page execute and read and write
182F000
heap
page read and write
1889000
heap
page read and write
33C0000
heap
page read and write
76A1000
heap
page read and write
40C000
unkown
page write copy
19B4000
heap
page read and write
11D0000
heap
page read and write
213E000
stack
page read and write
17CF000
heap
page read and write
11DD000
heap
page read and write
1727000
heap
page read and write
17FF000
heap
page read and write
8FBE000
stack
page read and write
342C000
trusted library allocation
page read and write
190D000
heap
page read and write
109E000
stack
page read and write
344B000
trusted library allocation
page read and write
3453000
trusted library allocation
page read and write
44FD000
trusted library allocation
page read and write
34B7000
trusted library allocation
page read and write
87FF000
stack
page read and write
11DB000
heap
page read and write
4454000
trusted library allocation
page read and write
34E1000
heap
page read and write
16C3000
heap
page read and write
11DB000
heap
page read and write
1110000
heap
page read and write
793F000
stack
page read and write
3411000
trusted library allocation
page read and write
1504000
heap
page read and write
11C8000
heap
page read and write
11F5000
heap
page read and write
3441000
trusted library allocation
page read and write
18DC000
heap
page read and write
11F5000
heap
page read and write
337E000
stack
page read and write
175C000
heap
page read and write
3290000
heap
page read and write
1A0E000
heap
page read and write
343F000
trusted library allocation
page read and write
4458000
trusted library allocation
page read and write
17AE000
heap
page read and write
4A96000
trusted library allocation
page read and write
3B50000
direct allocation
page execute and read and write
1504000
heap
page read and write
11C9000
heap
page read and write
9BFF000
stack
page read and write
3618000
trusted library allocation
page read and write
4A9C000
trusted library allocation
page read and write
7190000
trusted library allocation
page read and write
7D5F000
stack
page read and write
1778000
heap
page read and write
1504000
heap
page read and write
EC6000
stack
page read and write
11E1000
heap
page read and write
1159000
heap
page read and write
11C8000
heap
page read and write
2DD0000
remote allocation
page read and write
7A3F000
stack
page read and write
30000
unkown
page readonly
1046000
heap
page read and write
2CC0000
heap
page read and write
35D4000
heap
page read and write
11C3000
heap
page read and write
3422000
trusted library allocation
page read and write
3FA1000
heap
page read and write
2340000
heap
page read and write
196B000
heap
page read and write
3459000
trusted library allocation
page read and write
11C8000
heap
page read and write
2307000
heap
page read and write
17DA000
heap
page read and write
3429000
trusted library allocation
page read and write
7161000
trusted library allocation
page read and write
2445000
heap
page read and write
1504000
heap
page read and write
379E000
stack
page read and write
375E000
stack
page read and write
11E5000
heap
page read and write
8E7E000
stack
page read and write
34E6000
heap
page read and write
16D5000
heap
page read and write
2BB5000
trusted library allocation
page read and write
342A000
trusted library allocation
page read and write
9D3F000
stack
page read and write
632000
heap
page read and write
3487000
trusted library allocation
page read and write
328E000
stack
page read and write
8BBF000
stack
page read and write
4283000
trusted library allocation
page read and write
344D000
trusted library allocation
page read and write
7161000
trusted library allocation
page read and write
1714000
heap
page read and write
3433000
trusted library allocation
page read and write
189B000
heap
page read and write
2C8C000
stack
page read and write
1504000
heap
page read and write
229F000
stack
page read and write
1984000
heap
page read and write
1706000
heap
page read and write
3417000
trusted library allocation
page read and write
843F000
stack
page read and write
F20000
heap
page read and write
1504000
heap
page read and write
186F000
heap
page read and write
11DD000
heap
page read and write
4457000
trusted library allocation
page read and write
3471000
trusted library allocation
page read and write
345B000
trusted library allocation
page read and write
76D2000
heap
page read and write
1974000
heap
page read and write
4455000
trusted library allocation
page read and write
22A1000
heap
page read and write
7564000
trusted library allocation
page read and write
197B000
heap
page read and write
349F000
trusted library allocation
page read and write
35D4000
heap
page read and write
3D58000
trusted library allocation
page read and write
893F000
stack
page read and write
22CB000
heap
page read and write
32BF000
stack
page read and write
1899000
heap
page read and write
19A8000
heap
page read and write
1145000
heap
page read and write
3A66000
heap
page read and write
11F5000
heap
page read and write
178D000
heap
page read and write
409000
unkown
page readonly
1830000
heap
page read and write
1504000
heap
page read and write
11CF000
heap
page read and write
11E7000
heap
page read and write
176C000
heap
page read and write
10CE000
stack
page read and write
4514000
trusted library allocation
page read and write
987E000
stack
page read and write
1470000
heap
page read and write
80BE000
stack
page read and write
346A000
trusted library allocation
page read and write
17FD000
heap
page read and write
172F000
heap
page read and write
44FA000
trusted library allocation
page read and write
22C8000
heap
page read and write
D80000
heap
page read and write
FE8000
heap
page read and write
11F5000
heap
page read and write
923E000
stack
page read and write
7641000
heap
page read and write
81BF000
stack
page read and write
1933000
heap
page read and write
170D000
heap
page read and write
2376000
heap
page read and write
11F5000
heap
page read and write
983F000
stack
page read and write
113E000
heap
page read and write
1504000
heap
page read and write
22E4000
heap
page read and write
11DB000
heap
page read and write
1504000
heap
page read and write
90BF000
stack
page read and write
17BE000
heap
page read and write
520000
heap
page read and write
343F000
trusted library allocation
page read and write
1923000
heap
page read and write
1118000
heap
page read and write
FF3000
heap
page read and write
198E000
heap
page read and write
F71000
heap
page read and write
3572000
heap
page read and write
2911000
heap
page read and write
FF3000
heap
page read and write
2F38000
heap
page read and write
11C3000
heap
page read and write
857F000
stack
page read and write
3467000
trusted library allocation
page read and write
E6000
unkown
page readonly
11DD000
heap
page read and write
2A4E000
stack
page read and write
3447000
trusted library allocation
page read and write
445F000
trusted library allocation
page read and write
1839000
heap
page read and write
724D000
trusted library allocation
page read and write
2326000
heap
page read and write
194B000
heap
page read and write
585C000
stack
page read and write
1942000
heap
page read and write
9E7F000
stack
page read and write
44E6000
trusted library allocation
page read and write
11CA000
heap
page read and write
8E3F000
stack
page read and write
11C3000
heap
page read and write
F9000
unkown
page readonly
345F000
trusted library allocation
page read and write
4366000
trusted library allocation
page read and write
22B8000
heap
page read and write
208E000
stack
page read and write
C0000
unkown
page readonly
1504000
heap
page read and write
2307000
heap
page read and write
238D000
heap
page read and write
34B8000
trusted library allocation
page read and write
1504000
heap
page read and write
12AE000
stack
page read and write
3448000
trusted library allocation
page read and write
FAF000
heap
page read and write
1716000
heap
page read and write
11E0000
heap
page read and write
293C000
heap
page read and write
170F000
heap
page read and write
1A0D000
heap
page read and write
F77000
heap
page read and write
4307000
trusted library allocation
page read and write
11DD000
heap
page read and write
11CF000
heap
page read and write
3380000
heap
page read and write
3CC8000
trusted library allocation
page read and write
1952000
heap
page read and write
3422000
trusted library allocation
page read and write
34E6000
heap
page read and write
F72000
heap
page read and write
445C000
trusted library allocation
page read and write
8CA000
unkown
page read and write
7A7E000
stack
page read and write
341E000
trusted library allocation
page read and write
11F5000
heap
page read and write
11DB000
heap
page read and write
3439000
trusted library allocation
page read and write
17BE000
heap
page read and write
11DD000
heap
page read and write
41CA000
trusted library allocation
page read and write
1173000
heap
page read and write
FAF000
heap
page read and write
369F000
stack
page read and write
341D000
trusted library allocation
page read and write
11F5000
heap
page read and write
88E000
stack
page read and write
342F000
trusted library allocation
page read and write
3421000
trusted library allocation
page read and write
244A000
heap
page read and write
1899000
heap
page read and write
11F5000
heap
page read and write
CCA000
stack
page read and write
BF0000
heap
page read and write
1504000
heap
page read and write
EE7000
stack
page read and write
1040000
heap
page read and write
1709000
heap
page read and write
43C1000
trusted library allocation
page read and write
11ED000
heap
page read and write
1870000
heap
page read and write
19B9000
heap
page read and write
F9C000
heap
page read and write
18D8000
heap
page read and write
354B000
trusted library allocation
page read and write
1504000
heap
page read and write
11ED000
heap
page read and write
17BD000
heap
page read and write
3465000
trusted library allocation
page read and write
409000
unkown
page readonly
94BE000
stack
page read and write
45AF000
trusted library allocation
page read and write
72F3000
trusted library allocation
page read and write
1854000
heap
page read and write
3447000
trusted library allocation
page read and write
76E000
stack
page read and write
4391000
trusted library allocation
page read and write
11F5000
heap
page read and write
1504000
heap
page read and write
4366000
trusted library allocation
page read and write
16C5000
heap
page read and write
16D5000
heap
page read and write
346A000
trusted library allocation
page read and write
1504000
heap
page read and write
239E000
heap
page read and write
33BE000
stack
page read and write
1A9B000
heap
page read and write
FE5000
heap
page read and write
174E000
heap
page read and write
7230000
heap
page read and write
11DB000
heap
page read and write
31000
unkown
page execute read
BE0000
heap
page read and write
FF9000
heap
page read and write
1904000
heap
page read and write
3413000
trusted library allocation
page read and write
2C78000
trusted library allocation
page read and write
182F000
heap
page read and write
1504000
heap
page read and write
22BC000
heap
page read and write
34B8000
trusted library allocation
page read and write
1952000
heap
page read and write
4456000
trusted library allocation
page read and write
197C000
heap
page read and write
231C000
heap
page read and write
361E000
stack
page read and write
11C1000
heap
page read and write
F4000
unkown
page write copy
451D000
trusted library allocation
page read and write
1164000
heap
page read and write
35E3000
trusted library allocation
page read and write
1A59000
heap
page read and write
7161000
trusted library allocation
page read and write
F4F000
heap
page read and write
3C50000
heap
page read and write
76D2000
heap
page read and write
2E20000
heap
page read and write
1173000
heap
page read and write
C0000
unkown
page readonly
7F7E000
stack
page read and write
34AB000
trusted library allocation
page read and write
11E5000
heap
page read and write
4367000
trusted library allocation
page read and write
198D000
heap
page read and write
F5A000
heap
page read and write
186F000
heap
page read and write
11F5000
heap
page read and write
4509000
trusted library allocation
page read and write
4458000
trusted library allocation
page read and write
1145000
heap
page read and write
76D2000
heap
page read and write
2190000
heap
page read and write
110D000
stack
page read and write
1886000
heap
page read and write
3777000
heap
page read and write
11F5000
heap
page read and write
48E0000
heap
page read and write
7565000
trusted library allocation
page read and write
47AF000
stack
page read and write
173F000
heap
page read and write
3433000
trusted library allocation
page read and write
7F3F000
stack
page read and write
2AAE000
stack
page read and write
1504000
heap
page read and write
3447000
trusted library allocation
page read and write
445A000
trusted library allocation
page read and write
11D0000
heap
page read and write
34C8000
trusted library allocation
page read and write
2352000
heap
page read and write
174E000
heap
page read and write
450C000
trusted library allocation
page read and write
199A000
heap
page read and write
347F000
trusted library allocation
page read and write
19B4000
heap
page read and write
3FA1000
heap
page read and write
2FBC000
stack
page read and write
561E000
stack
page read and write
3BB0000
trusted library allocation
page read and write
450F000
trusted library allocation
page read and write
F0000
unkown
page write copy
7252000
trusted library allocation
page read and write
FE5000
heap
page read and write
F0000
unkown
page write copy
179D000
heap
page read and write
4451000
trusted library allocation
page read and write
1784000
heap
page read and write
62E000
heap
page read and write
FE8000
heap
page read and write
2B4F000
stack
page read and write
1173000
heap
page read and write
11C3000
heap
page read and write
F9000
unkown
page readonly
4289000
trusted library allocation
page read and write
445C000
trusted library allocation
page read and write
4391000
trusted library allocation
page read and write
11E5000
heap
page read and write
450B000
trusted library allocation
page read and write
197D000
heap
page read and write
427D000
trusted library allocation
page read and write
31000
unkown
page execute read
65A000
heap
page read and write
4A20000
trusted library allocation
page read and write
4366000
trusted library allocation
page read and write
6BC000
stack
page read and write
1809000
heap
page read and write
20F0000
heap
page read and write
420000
unkown
page read and write
3B50000
trusted library allocation
page read and write
34C8000
trusted library allocation
page read and write
11E6000
heap
page read and write
1504000
heap
page read and write
1504000
heap
page read and write
7BBE000
stack
page read and write
1877000
heap
page read and write
35F3000
trusted library allocation
page read and write
4251000
trusted library allocation
page read and write
182F000
heap
page read and write
11C3000
heap
page read and write
7161000
trusted library allocation
page read and write
4281000
trusted library allocation
page read and write
86BF000
stack
page read and write
3416000
trusted library allocation
page read and write
11F5000
heap
page read and write
22C0000
heap
page read and write
9B000
stack
page read and write
C0000
unkown
page readonly
1718000
heap
page read and write
43E7000
trusted library allocation
page read and write
341D000
trusted library allocation
page read and write
18CF000
heap
page read and write
11E6000
heap
page read and write
4A4E000
stack
page read and write
F5A000
heap
page read and write
3441000
trusted library allocation
page read and write
40C000
unkown
page read and write
30E0000
heap
page read and write
3478000
trusted library allocation
page read and write
371F000
stack
page read and write
22A0000
heap
page read and write
176B000
heap
page read and write
11DB000
heap
page read and write
1705000
heap
page read and write
11F5000
heap
page read and write
3770000
heap
page read and write
1504000
heap
page read and write
186F000
heap
page read and write
44FA000
trusted library allocation
page read and write
30000
unkown
page readonly
7161000
trusted library allocation
page read and write
147B000
heap
page read and write
3541000
heap
page read and write
28F8000
heap
page read and write
11F5000
heap
page read and write
342A000
trusted library allocation
page read and write
113D000
heap
page read and write
43FC000
trusted library allocation
page read and write
42EC000
trusted library allocation
page read and write
3542000
heap
page read and write
1504000
heap
page read and write
28F0000
heap
page read and write
1987000
heap
page read and write
11F5000
heap
page read and write
3631000
trusted library allocation
page read and write
34C8000
trusted library allocation
page read and write
170D000
heap
page read and write
F61000
heap
page read and write
11D0000
heap
page read and write
1713000
heap
page read and write
4251000
trusted library allocation
page read and write
71C1000
trusted library allocation
page read and write
174D000
heap
page read and write
4457000
trusted library allocation
page read and write
18BC000
heap
page read and write
3573000
heap
page read and write
190F000
heap
page read and write
E6000
unkown
page readonly
B76000
stack
page read and write
1159000
heap
page read and write
3461000
trusted library allocation
page read and write
4444000
trusted library allocation
page read and write
11E6000
heap
page read and write
1164000
heap
page read and write
3568000
heap
page read and write
11F5000
heap
page read and write
1899000
heap
page read and write
341A000
trusted library allocation
page read and write
34C8000
trusted library allocation
page read and write
3415000
trusted library allocation
page read and write
95BF000
stack
page read and write
9ABF000
stack
page read and write
4448000
trusted library allocation
page read and write
1904000
heap
page read and write
FFC000
heap
page read and write
FE5000
heap
page read and write
22C8000
heap
page read and write
11F5000
heap
page read and write
116F000
heap
page read and write
7640000
heap
page read and write
4459000
trusted library allocation
page read and write
FA1000
heap
page read and write
90FE000
stack
page read and write
1504000
heap
page read and write
13FC000
stack
page read and write
81FE000
stack
page read and write
2FFC000
stack
page read and write
198D000
heap
page read and write
1A36000
heap
page read and write
22A0000
heap
page read and write
F9C000
heap
page read and write
342F000
trusted library allocation
page read and write
26DE000
stack
page read and write
105E000
stack
page read and write
FA1000
heap
page read and write
3649000
trusted library allocation
page read and write
2DD0000
remote allocation
page read and write
4504000
trusted library allocation
page read and write
F57000
heap
page read and write
34C8000
trusted library allocation
page read and write
400000
unkown
page readonly
17D7000
heap
page read and write
2382000
heap
page read and write
196A000
heap
page read and write
E6000
unkown
page readonly
4357000
trusted library allocation
page read and write
44F0000
trusted library allocation
page read and write
19A5000
heap
page read and write
31000
unkown
page execute read
341E000
trusted library allocation
page read and write
19A9000
heap
page read and write
F62000
heap
page read and write
3433000
trusted library allocation
page read and write
9D7E000
stack
page read and write
18DD000
heap
page read and write
3230000
heap
page read and write
11C8000
heap
page read and write
233E000
heap
page read and write
17B6000
heap
page read and write
351F000
stack
page read and write
341A000
trusted library allocation
page read and write
11DD000
heap
page read and write
FF9000
heap
page read and write
28E7000
heap
page read and write
445D000
trusted library allocation
page read and write
11E5000
heap
page read and write
1504000
heap
page read and write
2363000
heap
page read and write
2E00000
heap
page read and write
341A000
trusted library allocation
page read and write
636000
heap
page read and write
19C0000
heap
page read and write
5CE000
stack
page read and write
4453000
trusted library allocation
page read and write
4506000
trusted library allocation
page read and write
3412000
trusted library allocation
page read and write
8A0000
unkown
page readonly
35A3000
heap
page read and write
19B8000
heap
page read and write
450E000
trusted library allocation
page read and write
1984000
heap
page read and write
11F5000
heap
page read and write
56E000
stack
page read and write
197B000
heap
page read and write
770000
heap
page read and write
30D0000
heap
page read and write
11B7000
heap
page read and write
179D000
heap
page read and write
3442000
trusted library allocation
page read and write
10D0000
heap
page read and write
4455000
trusted library allocation
page read and write
1911000
heap
page read and write
445B000
trusted library allocation
page read and write
347A000
trusted library allocation
page read and write
8CC000
unkown
page readonly
3B50000
trusted library allocation
page read and write
EE3000
stack
page read and write
2440000
heap
page read and write
11F5000
heap
page read and write
3560000
heap
page read and write
1504000
heap
page read and write
3C6F000
stack
page read and write
1923000
heap
page read and write
3081000
trusted library allocation
page read and write
EF0000
heap
page read and write
1504000
heap
page read and write
4448000
trusted library allocation
page read and write
4523000
trusted library allocation
page read and write
1780000
heap
page read and write
18E6000
heap
page read and write
7CFE000
stack
page read and write
1504000
heap
page read and write
FE5000
heap
page read and write
8D3E000
stack
page read and write
1504000
heap
page read and write
F61000
heap
page read and write
34C8000
trusted library allocation
page read and write
3541000
heap
page read and write
34B8000
trusted library allocation
page read and write
500000
unkown
page readonly
34C8000
trusted library allocation
page read and write
170D000
heap
page read and write
4390000
trusted library allocation
page read and write
346B000
trusted library allocation
page read and write
F5A000
heap
page read and write
239E000
heap
page read and write
2CAC000
stack
page read and write
11F5000
heap
page read and write
174E000
heap
page read and write
1A9B000
heap
page read and write
11C8000
heap
page read and write
19D1000
heap
page read and write
401000
unkown
page execute read
7161000
trusted library allocation
page read and write
3468000
trusted library allocation
page read and write
1504000
heap
page read and write
9AFE000
stack
page read and write
4391000
trusted library allocation
page read and write
4366000
trusted library allocation
page read and write
11E0000
heap
page read and write
11C5000
heap
page read and write
31000
unkown
page execute read
F48000
heap
page read and write
11F5000
heap
page read and write
3445000
trusted library allocation
page read and write
86FE000
stack
page read and write
11BF000
heap
page read and write
3457000
trusted library allocation
page read and write
4A2A000
heap
page read and write
3B50000
trusted library allocation
page read and write
7569000
trusted library allocation
page read and write
11D2000
heap
page read and write
230D000
heap
page read and write
44F4000
trusted library allocation
page read and write
11DD000
heap
page read and write
4A8E000
stack
page read and write
2EBF000
stack
page read and write
11C5000
heap
page read and write
8BFE000
stack
page read and write
11DD000
heap
page read and write
435D000
trusted library allocation
page read and write
500000
unkown
page readonly
2B8C000
stack
page read and write
1504000
heap
page read and write
11F5000
heap
page read and write
11F5000
heap
page read and write
4454000
trusted library allocation
page read and write
4308000
trusted library allocation
page read and write
1173000
heap
page read and write
11DB000
heap
page read and write
3430000
trusted library allocation
page read and write
1504000
heap
page read and write
22FC000
heap
page read and write
2F30000
heap
page read and write
11CF000
heap
page read and write
341D000
trusted library allocation
page read and write
2337000
heap
page read and write
11F5000
heap
page read and write
2382000
heap
page read and write
67BE000
heap
page read and write
445A000
trusted library allocation
page read and write
11F5000
heap
page read and write
10D5000
heap
page read and write
8ABE000
stack
page read and write
16C6000
heap
page read and write
32C0000
trusted library allocation
page read and write
17C4000
heap
page read and write
17A3000
heap
page read and write
3440000
trusted library allocation
page read and write
3461000
trusted library allocation
page read and write
11DB000
heap
page read and write
4519000
trusted library allocation
page read and write
170D000
heap
page read and write
FF3000
heap
page read and write
458A000
trusted library allocation
page read and write
F94000
heap
page read and write
11E7000
heap
page read and write
2BAF000
stack
page read and write
11E5000
heap
page read and write
341B000
trusted library allocation
page read and write
1A9A000
heap
page read and write
112B000
heap
page read and write
F4000
unkown
page write copy
13BE000
stack
page read and write
8A0000
unkown
page readonly
4451000
trusted library allocation
page read and write
4251000
trusted library allocation
page read and write
34C8000
trusted library allocation
page read and write
451E000
trusted library allocation
page read and write
7161000
trusted library allocation
page read and write
4458000
trusted library allocation
page read and write
2CA0000
heap
page read and write
1504000
heap
page read and write
7226000
trusted library allocation
page read and write
3411000
trusted library allocation
page read and write
1504000
heap
page read and write
11E5000
heap
page read and write
54DE000
stack
page read and write
2307000
heap
page read and write
3B50000
trusted library allocation
page read and write
4251000
trusted library allocation
page read and write
343F000
trusted library allocation
page read and write
22F0000
heap
page read and write
4500000
trusted library allocation
page read and write
3478000
trusted library allocation
page read and write
99BE000
stack
page read and write
11DB000
heap
page read and write
85BE000
stack
page read and write
11DA000
heap
page read and write
1837000
heap
page read and write
871000
unkown
page execute read
3439000
trusted library allocation
page read and write
3C2E000
stack
page read and write
30000
unkown
page readonly
2A2E000
stack
page read and write
22DA000
heap
page read and write
3451000
trusted library allocation
page read and write
1504000
heap
page read and write
3510000
heap
page read and write
3430000
trusted library allocation
page read and write
34B8000
trusted library allocation
page read and write
2C3C000
stack
page read and write
44E2000
trusted library allocation
page read and write
11CA000
heap
page read and write
11C8000
heap
page read and write
FE5000
heap
page read and write
1504000
heap
page read and write
1A0D000
heap
page read and write
1985000
heap
page read and write
3433000
trusted library allocation
page read and write
1477000
heap
page read and write
53B0000
heap
page read and write
3413000
trusted library allocation
page read and write
19DA000
heap
page read and write
3B50000
trusted library allocation
page read and write
2364000
heap
page read and write
3460000
trusted library allocation
page read and write
31000
unkown
page execute read
3410000
trusted library allocation
page read and write
43E7000
trusted library allocation
page read and write
3439000
trusted library allocation
page read and write
7B7F000
stack
page read and write
355E000
stack
page read and write
FF3000
heap
page read and write
11F5000
heap
page read and write
343F000
trusted library allocation
page read and write
11F0000
heap
page read and write
43E7000
trusted library allocation
page read and write
174F000
heap
page read and write
428E000
trusted library allocation
page read and write
3462000
trusted library allocation
page read and write
897E000
stack
page read and write
4251000
trusted library allocation
page read and write
16D7000
heap
page read and write
340E000
stack
page read and write
1792000
heap
page read and write
11DD000
heap
page read and write
16D7000
heap
page read and write
11DA000
heap
page read and write
3444000
trusted library allocation
page read and write
73D3000
trusted library allocation
page read and write
1761000
heap
page read and write
16D5000
heap
page read and write
1995000
heap
page read and write
309A000
trusted library allocation
page read and write
11DB000
heap
page read and write
482F000
stack
page read and write
13DD000
stack
page read and write
33B0000
heap
page read and write
42D2000
trusted library allocation
page read and write
F9000
unkown
page readonly
11DB000
heap
page read and write
2382000
heap
page read and write
3447000
trusted library allocation
page read and write
FF9000
heap
page read and write
343C000
trusted library allocation
page read and write
34C8000
trusted library allocation
page read and write
F4000
unkown
page write copy
1905000
heap
page read and write
76D2000
heap
page read and write
35EB000
trusted library allocation
page read and write
E6000
unkown
page readonly
452C000
trusted library allocation
page read and write
2362000
heap
page read and write
2AEF000
stack
page read and write
1783000
heap
page read and write
1A3A000
heap
page read and write
4504000
trusted library allocation
page read and write
2352000
heap
page read and write
1A1D000
heap
page read and write
3610000
trusted library allocation
page read and write
16C6000
heap
page read and write
445A000
trusted library allocation
page read and write
18BA000
heap
page read and write
11F5000
heap
page read and write
11E4000
heap
page read and write
13CF000
stack
page read and write
11DB000
heap
page read and write
16A8000
heap
page read and write
11E5000
heap
page read and write
2420000
heap
page read and write
238D000
heap
page read and write
1504000
heap
page read and write
7161000
trusted library allocation
page read and write
196B000
heap
page read and write
F5B000
heap
page read and write
96FF000
stack
page read and write
3459000
trusted library allocation
page read and write
1504000
heap
page read and write
4456000
trusted library allocation
page read and write
486E000
stack
page read and write
36DE000
stack
page read and write
3451000
trusted library allocation
page read and write
3473000
trusted library allocation
page read and write
359B000
heap
page read and write
8AF000
stack
page read and write
F28000
heap
page read and write
33C8000
heap
page read and write
1504000
heap
page read and write
239D000
heap
page read and write
4251000
trusted library allocation
page read and write
34C0000
trusted library allocation
page read and write
82FF000
stack
page read and write
13AF000
stack
page read and write
There are 1154 hidden memdumps, click here to show them.