Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
iieCxV2b1n.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Semolina, Author: Kwela Eirenicon, Keywords: Installer, Comments: This installer database contains the
logic and data required to install Semolina., Template: Intel;1033, Revision Number: {E399BBE4-4063-457E-BB84-F6CBF9E31491},
Create Time/Date: Wed Oct 9 11:42:28 2024, Last Saved Time/Date: Wed Oct 9 11:42:28 2024, Number of Pages: 500, Number of
Words: 10, Name of Creating Application: WiX Toolset (4.0.0.0), Security: 2
|
initial sample
|
||
C:\Users\user\AppData\Local\Ormolu\CrashRpt.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Ormolu\ManyCam.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Ormolu\cv099.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Ormolu\cxcore099.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Ormolu\cximagecrt.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Ormolu\dbghelp.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Ormolu\highgui099.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ndae
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\svubpwldttjkvt
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\demoArchivebcz\CrashRpt.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\demoArchivebcz\ManyCam.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\demoArchivebcz\cv099.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\demoArchivebcz\cxcore099.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\demoArchivebcz\cximagecrt.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\demoArchivebcz\dbghelp.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\demoArchivebcz\highgui099.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Config.Msi\6c18ea.rbs
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Ormolu\gxfiogr
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Ormolu\rsjddfw
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\804a2825
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\8f084743
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\exuquepx
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Oct 18 09:09:10
2024, mtime=Fri Oct 18 09:09:10 2024, atime=Wed Oct 9 15:39:50 2024, length=1756232, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\demoArchivebcz\gxfiogr
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\demoArchivebcz\rsjddfw
|
data
|
dropped
|
||
C:\Windows\Installer\6c18e9.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Semolina, Author: Kwela Eirenicon, Keywords: Installer, Comments: This installer database contains the
logic and data required to install Semolina., Template: Intel;1033, Revision Number: {E399BBE4-4063-457E-BB84-F6CBF9E31491},
Create Time/Date: Wed Oct 9 11:42:28 2024, Last Saved Time/Date: Wed Oct 9 11:42:28 2024, Number of Pages: 500, Number of
Words: 10, Name of Creating Application: WiX Toolset (4.0.0.0), Security: 2
|
dropped
|
||
C:\Windows\Installer\6c18eb.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Semolina, Author: Kwela Eirenicon, Keywords: Installer, Comments: This installer database contains the
logic and data required to install Semolina., Template: Intel;1033, Revision Number: {E399BBE4-4063-457E-BB84-F6CBF9E31491},
Create Time/Date: Wed Oct 9 11:42:28 2024, Last Saved Time/Date: Wed Oct 9 11:42:28 2024, Number of Pages: 500, Number of
Words: 10, Name of Creating Application: WiX Toolset (4.0.0.0), Security: 2
|
dropped
|
||
C:\Windows\Installer\MSI1A22.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\SourceHash{39F520E4-6237-4FBB-8F2E-71C60962EC87}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\~DF0990806D57BC3AEC.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF14890820A40800E0.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF3044E6FF2211BFB4.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF46874C96EA2F3823.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF49307B85DBB1A515.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF551A278F797377D0.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF8B2F9407D39D8958.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF98277DCBF98DF427.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF9D929FC9F6DAB395.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFBCF32403695355B2.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFE130414A9DA75E26.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFF585C7427396405F.TMP
|
data
|
dropped
|
There are 34 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\AppData\Local\Ormolu\ManyCam.exe
|
"C:\Users\user\AppData\Local\Ormolu\ManyCam.exe"
|
||
C:\Users\user\AppData\Roaming\demoArchivebcz\ManyCam.exe
|
C:\Users\user\AppData\Roaming\demoArchivebcz\ManyCam.exe
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\SysWOW64\cmd.exe
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
||
C:\Users\user\AppData\Roaming\demoArchivebcz\ManyCam.exe
|
"C:\Users\user\AppData\Roaming\demoArchivebcz\ManyCam.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\SysWOW64\cmd.exe
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\iieCxV2b1n.msi"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\System32\pcaui.exe
|
"C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {bce4b583-343f-44b8-8f95-9f76104077b9} -a "ManyCam"
-v "ManyCam LLC" -s "To work properly, this app must be reinstalled after you upgrade Windows." -n 4 -f 0 -k 0 -e "C:\Users\user\AppData\Local\Ormolu\ManyCam.exe"
|
||
C:\Windows\System32\pcaui.exe
|
"C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {bce4b583-343f-44b8-8f95-9f76104077b9} -a "ManyCam"
-v "ManyCam LLC" -s "To work properly, this app must be reinstalled after you upgrade Windows." -n 4 -f 0 -k 0 -e "C:\Users\user\AppData\Roaming\demoArchivebcz\ManyCam.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\pcaui.exe
|
"C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {bce4b583-343f-44b8-8f95-9f76104077b9} -a "ManyCam"
-v "ManyCam LLC" -s "To work properly, this app must be reinstalled after you upgrade Windows." -n 4 -f 0 -k 0 -e "C:\Users\user\AppData\Roaming\demoArchivebcz\ManyCam.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.manycam.com/codec
|
unknown
|
||
http://www.manycam.com/codecVerdanaTo
|
unknown
|
||
http://www.vmware.com/0
|
unknown
|
||
http://www.manycam.com/help/effects/snapshot/these
|
unknown
|
||
http://www.manycam.com/codecVerdanaThis
|
unknown
|
||
https://pastebin.com/raw/TeiUkREy
|
unknown
|
||
http://www.symauth.com/rpa00
|
unknown
|
||
http://manycam.com/help/effects
|
unknown
|
||
http://manycam.com/upload_effect?filepath=ManyCam
|
unknown
|
||
https://pastebin.com/raw/TeiUkREyPO
|
unknown
|
||
http://www.manycam.com0
|
unknown
|
||
http://download.manycam.comVerdanaThis
|
unknown
|
||
http://www.info-zip.org/
|
unknown
|
||
http://download.manycam.com
|
unknown
|
||
http://www.manycam.comhttp://manycam.com/feedback/?version=%sAnchor
|
unknown
|
||
http://www.vmware.com/0/
|
unknown
|
||
http://download.manycam.com/effects/%s/%s?v=%sBackgroundsDynamicDynamic
|
unknown
|
||
http://download.manycam.com/effects/%s/%s?v=%sManyCam
|
unknown
|
||
http://download.manycam.comNew
|
unknown
|
||
http://www.symauth.com/cps0(
|
unknown
|
||
http://www.manycam.com
|
unknown
|
||
http://manycam.com/feedback/?version=%s
|
unknown
|
There are 12 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s-part-0032.t-0009.t-msedge.net
|
13.107.246.60
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
91.240.118.154
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\6c18ea.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\6c18ea.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Users\user\AppData\Roaming\Microsoft\Installer\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\162AD73B5A63F7959BE041468351DDF3
|
4E025F937326BBF4F8E2176C9026CE78
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\26F77710D51CF7358B761A50575789CC
|
4E025F937326BBF4F8E2176C9026CE78
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\79D6585F7B8AEF65AB47BB396054CD5B
|
4E025F937326BBF4F8E2176C9026CE78
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\C211A4BDF3E23B553875602E3AD16B5D
|
4E025F937326BBF4F8E2176C9026CE78
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\80DA6156C4ABA0453BA622FB968DE9F2
|
4E025F937326BBF4F8E2176C9026CE78
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\86280FDD32BAE8C509533984CA27BAE4
|
4E025F937326BBF4F8E2176C9026CE78
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\F98AB89274B46315E97590357EE73945
|
4E025F937326BBF4F8E2176C9026CE78
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\F714C411421885A5B80009E76F019362
|
4E025F937326BBF4F8E2176C9026CE78
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\A4E8B871B7654705D98A33D5C9A76113
|
4E025F937326BBF4F8E2176C9026CE78
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Users\user\AppData\Local\Ormolu\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{39F520E4-6237-4FBB-8F2E-71C60962EC87}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{39F520E4-6237-4FBB-8F2E-71C60962EC87}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{39F520E4-6237-4FBB-8F2E-71C60962EC87}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{39F520E4-6237-4FBB-8F2E-71C60962EC87}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{39F520E4-6237-4FBB-8F2E-71C60962EC87}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{39F520E4-6237-4FBB-8F2E-71C60962EC87}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{39F520E4-6237-4FBB-8F2E-71C60962EC87}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{39F520E4-6237-4FBB-8F2E-71C60962EC87}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{39F520E4-6237-4FBB-8F2E-71C60962EC87}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{39F520E4-6237-4FBB-8F2E-71C60962EC87}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{39F520E4-6237-4FBB-8F2E-71C60962EC87}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{39F520E4-6237-4FBB-8F2E-71C60962EC87}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{39F520E4-6237-4FBB-8F2E-71C60962EC87}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{39F520E4-6237-4FBB-8F2E-71C60962EC87}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{39F520E4-6237-4FBB-8F2E-71C60962EC87}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{39F520E4-6237-4FBB-8F2E-71C60962EC87}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{39F520E4-6237-4FBB-8F2E-71C60962EC87}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{39F520E4-6237-4FBB-8F2E-71C60962EC87}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{39F520E4-6237-4FBB-8F2E-71C60962EC87}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{39F520E4-6237-4FBB-8F2E-71C60962EC87}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{39F520E4-6237-4FBB-8F2E-71C60962EC87}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{39F520E4-6237-4FBB-8F2E-71C60962EC87}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\0CC4FAA3E43A61146AE40F4A4D37B7DB
|
4E025F937326BBF4F8E2176C9026CE78
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{39F520E4-6237-4FBB-8F2E-71C60962EC87}
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Features\4E025F937326BBF4F8E2176C9026CE78
|
TelepathyFeature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\Features
|
TelepathyFeature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\4E025F937326BBF4F8E2176C9026CE78\Patches
|
AllPatches
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\4E025F937326BBF4F8E2176C9026CE78
|
ProductName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\4E025F937326BBF4F8E2176C9026CE78
|
PackageCode
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\4E025F937326BBF4F8E2176C9026CE78
|
Language
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\4E025F937326BBF4F8E2176C9026CE78
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\4E025F937326BBF4F8E2176C9026CE78
|
Assignment
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\4E025F937326BBF4F8E2176C9026CE78
|
AdvertiseFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\4E025F937326BBF4F8E2176C9026CE78
|
InstanceType
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\4E025F937326BBF4F8E2176C9026CE78
|
AuthorizedLUAApp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\4E025F937326BBF4F8E2176C9026CE78
|
DeploymentFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\UpgradeCodes\0CC4FAA3E43A61146AE40F4A4D37B7DB
|
4E025F937326BBF4F8E2176C9026CE78
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\4E025F937326BBF4F8E2176C9026CE78\SourceList
|
PackageName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\4E025F937326BBF4F8E2176C9026CE78\SourceList\Net
|
1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\4E025F937326BBF4F8E2176C9026CE78\SourceList\Media
|
1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\4E025F937326BBF4F8E2176C9026CE78
|
Clients
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\4E025F937326BBF4F8E2176C9026CE78\SourceList
|
LastUsedSource
|
There are 73 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
56B0000
|
direct allocation
|
page read and write
|
||
E22000
|
unkown
|
page readonly
|
||
5680000
|
direct allocation
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
E96000
|
heap
|
page read and write
|
||
2D04000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4EF4000
|
trusted library allocation
|
page read and write
|
||
1D551856000
|
heap
|
page read and write
|
||
4F2E000
|
direct allocation
|
page read and write
|
||
2EC4000
|
heap
|
page read and write
|
||
36D0000
|
heap
|
page read and write
|
||
59C000
|
unkown
|
page write copy
|
||
2A8C000
|
stack
|
page read and write
|
||
2750000
|
unkown
|
page readonly
|
||
2914000
|
unkown
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
29B0000
|
trusted library allocation
|
page read and write
|
||
2CE0000
|
direct allocation
|
page read and write
|
||
3124000
|
unkown
|
page read and write
|
||
201A000
|
unkown
|
page readonly
|
||
4E05000
|
heap
|
page read and write
|
||
B8E000
|
stack
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
246BE905000
|
heap
|
page read and write
|
||
36D5000
|
heap
|
page read and write
|
||
1A4000
|
heap
|
page read and write
|
||
1D5533C0000
|
heap
|
page read and write
|
||
3448000
|
heap
|
page read and write
|
||
1790000
|
unkown
|
page readonly
|
||
AB6000
|
stack
|
page read and write
|
||
14D0000
|
trusted library allocation
|
page execute and read and write
|
||
B90000
|
heap
|
page read and write
|
||
1E60000
|
heap
|
page read and write
|
||
3EE1000
|
heap
|
page read and write
|
||
1FE000
|
stack
|
page read and write
|
||
2C54000
|
unkown
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
1D04FC80000
|
heap
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
2740000
|
unkown
|
page readonly
|
||
2AEE000
|
unkown
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
2820000
|
trusted library allocation
|
page read and write
|
||
3BA1000
|
trusted library allocation
|
page read and write
|
||
5010000
|
trusted library allocation
|
page execute and read and write
|
||
2E9F000
|
trusted library allocation
|
page read and write
|
||
1A5000
|
heap
|
page read and write
|
||
B98000
|
heap
|
page read and write
|
||
BEC000
|
unkown
|
page read and write
|
||
4CE2000
|
heap
|
page read and write
|
||
1D04FED0000
|
heap
|
page read and write
|
||
F13000
|
trusted library allocation
|
page execute and read and write
|
||
1311000
|
unkown
|
page execute read
|
||
298B000
|
trusted library allocation
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
952C5DD000
|
stack
|
page read and write
|
||
121F000
|
stack
|
page read and write
|
||
C24000
|
heap
|
page read and write
|
||
1164000
|
heap
|
page read and write
|
||
189A000
|
unkown
|
page read and write
|
||
43A9000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
4F84000
|
trusted library allocation
|
page read and write
|
||
6D510000
|
unkown
|
page readonly
|
||
27F8000
|
heap
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
F47000
|
trusted library allocation
|
page execute and read and write
|
||
566E000
|
stack
|
page read and write
|
||
1C91000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
BEB000
|
unkown
|
page write copy
|
||
2019000
|
unkown
|
page read and write
|
||
582E000
|
stack
|
page read and write
|
||
2EA1000
|
trusted library allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
504F000
|
trusted library allocation
|
page read and write
|
||
BE6000
|
unkown
|
page read and write
|
||
F1D000
|
trusted library allocation
|
page execute and read and write
|
||
13B8000
|
unkown
|
page readonly
|
||
4D90000
|
direct allocation
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
C87000
|
heap
|
page read and write
|
||
BFB000
|
unkown
|
page write copy
|
||
DFE000
|
stack
|
page read and write
|
||
2EC1000
|
trusted library allocation
|
page read and write
|
||
47E0000
|
unkown
|
page read and write
|
||
6D580000
|
unkown
|
page write copy
|
||
54BE000
|
stack
|
page read and write
|
||
4F18000
|
trusted library allocation
|
page read and write
|
||
26FA000
|
stack
|
page read and write
|
||
10062000
|
unkown
|
page readonly
|
||
2914000
|
unkown
|
page read and write
|
||
C3F000
|
heap
|
page read and write
|
||
1D551830000
|
heap
|
page read and write
|
||
2770000
|
unkown
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
43F2000
|
heap
|
page read and write
|
||
2970000
|
trusted library allocation
|
page execute and read and write
|
||
CA2000
|
heap
|
page read and write
|
||
6D580000
|
unkown
|
page write copy
|
||
2914000
|
unkown
|
page read and write
|
||
43AD000
|
trusted library allocation
|
page read and write
|
||
2C50000
|
unkown
|
page read and write
|
||
6D510000
|
unkown
|
page readonly
|
||
2914000
|
unkown
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
27A8000
|
heap
|
page read and write
|
||
605E000
|
stack
|
page read and write
|
||
C8A000
|
heap
|
page read and write
|
||
6420000
|
heap
|
page read and write
|
||
1791000
|
unkown
|
page execute read
|
||
D20000
|
unkown
|
page readonly
|
||
14EB000
|
trusted library allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
5A4000
|
unkown
|
page readonly
|
||
B3E000
|
stack
|
page read and write
|
||
2000000
|
unkown
|
page readonly
|
||
592E000
|
stack
|
page read and write
|
||
10074000
|
unkown
|
page readonly
|
||
2D04000
|
unkown
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
52FD000
|
direct allocation
|
page read and write
|
||
530B000
|
trusted library allocation
|
page read and write
|
||
5581000
|
unkown
|
page read and write
|
||
BE8000
|
stack
|
page read and write
|
||
E7E000
|
stack
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
2D04000
|
unkown
|
page read and write
|
||
55EE000
|
stack
|
page read and write
|
||
461D000
|
unkown
|
page read and write
|
||
189B000
|
unkown
|
page write copy
|
||
12BE000
|
stack
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
6D585000
|
unkown
|
page readonly
|
||
2012000
|
unkown
|
page readonly
|
||
438D000
|
trusted library allocation
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
190E000
|
stack
|
page read and write
|
||
18BF000
|
stack
|
page read and write
|
||
151C000
|
trusted library allocation
|
page read and write
|
||
D21000
|
unkown
|
page execute read
|
||
2914000
|
unkown
|
page read and write
|
||
3DC6000
|
heap
|
page read and write
|
||
487D000
|
trusted library allocation
|
page read and write
|
||
2D04000
|
unkown
|
page read and write
|
||
1538000
|
trusted library allocation
|
page read and write
|
||
DC8000
|
unkown
|
page readonly
|
||
CFD000
|
heap
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
53B000
|
unkown
|
page readonly
|
||
1841000
|
unkown
|
page execute read
|
||
6D580000
|
unkown
|
page write copy
|
||
E7B000
|
heap
|
page read and write
|
||
3EC1000
|
trusted library allocation
|
page read and write
|
||
59B000
|
unkown
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
47C0000
|
unkown
|
page read and write
|
||
4123000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
BEE000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
3C4A000
|
heap
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
CE1000
|
unkown
|
page readonly
|
||
5A4000
|
unkown
|
page readonly
|
||
2914000
|
unkown
|
page read and write
|
||
BA0000
|
unkown
|
page readonly
|
||
BFB000
|
heap
|
page read and write
|
||
6D1C4FE000
|
stack
|
page read and write
|
||
BF5000
|
heap
|
page read and write
|
||
1D04FC00000
|
heap
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
595000
|
unkown
|
page write copy
|
||
1840000
|
unkown
|
page readonly
|
||
1500000
|
trusted library allocation
|
page read and write
|
||
C24000
|
heap
|
page read and write
|
||
D14000
|
unkown
|
page readonly
|
||
12F4000
|
unkown
|
page read and write
|
||
3BA7000
|
trusted library allocation
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
59B000
|
unkown
|
page read and write
|
||
121B000
|
trusted library allocation
|
page execute and read and write
|
||
6D511000
|
unkown
|
page execute read
|
||
2B2E000
|
unkown
|
page read and write
|
||
4833000
|
unkown
|
page read and write
|
||
1A5000
|
heap
|
page read and write
|
||
1210000
|
trusted library allocation
|
page read and write
|
||
6D1C57E000
|
stack
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
3437000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page execute and read and write
|
||
1D04FC9A000
|
heap
|
page read and write
|
||
1E0F000
|
stack
|
page read and write
|
||
1A4000
|
heap
|
page read and write
|
||
595000
|
unkown
|
page write copy
|
||
CF8000
|
heap
|
page read and write
|
||
3124000
|
unkown
|
page read and write
|
||
48B7000
|
heap
|
page read and write
|
||
246BEA80000
|
heap
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
4F0E000
|
trusted library allocation
|
page read and write
|
||
1A4000
|
heap
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
BF6000
|
unkown
|
page read and write
|
||
2E00000
|
heap
|
page execute and read and write
|
||
2914000
|
unkown
|
page read and write
|
||
10074000
|
unkown
|
page readonly
|
||
55AE000
|
stack
|
page read and write
|
||
C44000
|
unkown
|
page readonly
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
B91000
|
unkown
|
page execute read
|
||
4F9C000
|
trusted library allocation
|
page read and write
|
||
1838000
|
unkown
|
page readonly
|
||
12D1000
|
unkown
|
page readonly
|
||
1D04FC89000
|
heap
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
C24000
|
heap
|
page read and write
|
||
4F48000
|
trusted library allocation
|
page read and write
|
||
5290000
|
heap
|
page execute and read and write
|
||
E1C000
|
heap
|
page read and write
|
||
111E000
|
heap
|
page read and write
|
||
5F1C000
|
stack
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
6FB000
|
stack
|
page read and write
|
||
57EF000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
5097000
|
trusted library allocation
|
page read and write
|
||
14E0000
|
trusted library allocation
|
page read and write
|
||
1C90000
|
heap
|
page read and write
|
||
1D551A00000
|
heap
|
page read and write
|
||
556F000
|
stack
|
page read and write
|
||
28DE000
|
unkown
|
page read and write
|
||
C4D000
|
heap
|
page read and write
|
||
565F000
|
stack
|
page read and write
|
||
1897000
|
unkown
|
page write copy
|
||
C24000
|
heap
|
page read and write
|
||
1E30000
|
heap
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
181F000
|
unkown
|
page readonly
|
||
5F5E000
|
stack
|
page read and write
|
||
3120000
|
unkown
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
C73000
|
heap
|
page read and write
|
||
BFE000
|
unkown
|
page readonly
|
||
1070000
|
heap
|
page read and write
|
||
189E000
|
unkown
|
page readonly
|
||
10073000
|
unkown
|
page read and write
|
||
404A000
|
heap
|
page read and write
|
||
246BE760000
|
heap
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
B61000
|
unkown
|
page execute read
|
||
BA1000
|
unkown
|
page execute read
|
||
246BE840000
|
heap
|
page read and write
|
||
14CE000
|
stack
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
1C91000
|
heap
|
page read and write
|
||
4F40000
|
trusted library allocation
|
page read and write
|
||
4389000
|
trusted library allocation
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
B90000
|
unkown
|
page readonly
|
||
AEB000
|
stack
|
page read and write
|
||
1302000
|
unkown
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
4F70000
|
heap
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
ABB000
|
stack
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
C24000
|
heap
|
page read and write
|
||
48EE000
|
trusted library allocation
|
page read and write
|
||
4F04000
|
trusted library allocation
|
page read and write
|
||
BAE000
|
heap
|
page read and write
|
||
4C58000
|
trusted library allocation
|
page read and write
|
||
CA5000
|
heap
|
page read and write
|
||
296F000
|
stack
|
page read and write
|
||
555E000
|
stack
|
page read and write
|
||
36F9000
|
heap
|
page read and write
|
||
4F86000
|
trusted library allocation
|
page read and write
|
||
10E8000
|
heap
|
page read and write
|
||
27B4000
|
heap
|
page read and write
|
||
29B8000
|
trusted library allocation
|
page read and write
|
||
3EE0000
|
heap
|
page read and write
|
||
1D04FCA6000
|
heap
|
page read and write
|
||
2C54000
|
unkown
|
page read and write
|
||
BDD000
|
unkown
|
page readonly
|
||
952C55C000
|
stack
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
E22000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
2012000
|
unkown
|
page readonly
|
||
5E1F000
|
stack
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
DAF000
|
unkown
|
page readonly
|
||
59C000
|
unkown
|
page write copy
|
||
7F8000
|
stack
|
page read and write
|
||
BFC000
|
unkown
|
page read and write
|
||
53B000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
30F0000
|
heap
|
page read and write
|
||
4F39000
|
trusted library allocation
|
page read and write
|
||
2A8E000
|
stack
|
page read and write
|
||
246BE8E0000
|
heap
|
page read and write
|
||
3FE6000
|
heap
|
page read and write
|
||
595000
|
unkown
|
page write copy
|
||
401000
|
unkown
|
page execute read
|
||
BF7000
|
unkown
|
page write copy
|
||
10073000
|
unkown
|
page read and write
|
||
2D04000
|
unkown
|
page read and write
|
||
53BE000
|
stack
|
page read and write
|
||
1A4000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
56EE000
|
stack
|
page read and write
|
||
59B000
|
unkown
|
page read and write
|
||
2990000
|
trusted library allocation
|
page read and write
|
||
1E35000
|
heap
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
536E000
|
stack
|
page read and write
|
||
D33000
|
heap
|
page read and write
|
||
4C10000
|
trusted library allocation
|
page read and write
|
||
556E000
|
stack
|
page read and write
|
||
2019000
|
unkown
|
page read and write
|
||
F00000
|
trusted library allocation
|
page read and write
|
||
1230000
|
trusted library allocation
|
page read and write
|
||
F10000
|
trusted library allocation
|
page read and write
|
||
110C000
|
heap
|
page read and write
|
||
106E000
|
stack
|
page read and write
|
||
DBE000
|
unkown
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
182E000
|
unkown
|
page read and write
|
||
6D511000
|
unkown
|
page execute read
|
||
F37000
|
trusted library allocation
|
page execute and read and write
|
||
10073000
|
unkown
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
595000
|
unkown
|
page write copy
|
||
4260000
|
trusted library allocation
|
page read and write
|
||
6D511000
|
unkown
|
page execute read
|
||
2DFE000
|
stack
|
page read and write
|
||
2D4E000
|
unkown
|
page read and write
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
152E000
|
trusted library allocation
|
page read and write
|
||
595000
|
unkown
|
page write copy
|
||
1C91000
|
heap
|
page read and write
|
||
2DCB000
|
heap
|
page read and write
|
||
188D000
|
unkown
|
page readonly
|
||
246BE8F8000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
139F000
|
unkown
|
page readonly
|
||
246BE880000
|
heap
|
page read and write
|
||
178F000
|
stack
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
53B000
|
unkown
|
page readonly
|
||
5A4000
|
unkown
|
page readonly
|
||
10062000
|
unkown
|
page readonly
|
||
1C90000
|
heap
|
page read and write
|
||
1D551810000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1531000
|
trusted library allocation
|
page read and write
|
||
5141000
|
unkown
|
page read and write
|
||
2B8A000
|
stack
|
page read and write
|
||
2BE0000
|
unkown
|
page readonly
|
||
2780000
|
direct allocation
|
page read and write
|
||
1D04FFA0000
|
heap
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
619E000
|
stack
|
page read and write
|
||
C42000
|
unkown
|
page read and write
|
||
2000000
|
unkown
|
page readonly
|
||
4A10000
|
unkown
|
page read and write
|
||
1A5000
|
heap
|
page read and write
|
||
6D1C47C000
|
stack
|
page read and write
|
||
C2C000
|
heap
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
246C0400000
|
heap
|
page read and write
|
||
665E000
|
stack
|
page read and write
|
||
4F25000
|
trusted library allocation
|
page read and write
|
||
53B000
|
unkown
|
page readonly
|
||
500D000
|
stack
|
page read and write
|
||
4756000
|
unkown
|
page read and write
|
||
5A4000
|
unkown
|
page readonly
|
||
952C87F000
|
stack
|
page read and write
|
||
2980000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
3F27000
|
heap
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
23FC000
|
stack
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
1A5000
|
heap
|
page read and write
|
||
1D04FC50000
|
heap
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
201A000
|
unkown
|
page readonly
|
||
2910000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
2012000
|
unkown
|
page readonly
|
||
1A5000
|
heap
|
page read and write
|
||
4879000
|
trusted library allocation
|
page read and write
|
||
53B000
|
unkown
|
page readonly
|
||
110000
|
heap
|
page read and write
|
||
DD6193C000
|
stack
|
page read and write
|
||
C9C000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
10062000
|
unkown
|
page readonly
|
||
C24000
|
heap
|
page read and write
|
||
F20000
|
trusted library allocation
|
page read and write
|
||
C34000
|
unkown
|
page read and write
|
||
1A5000
|
heap
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
5460000
|
heap
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
3100000
|
unkown
|
page read and write
|
||
1A4000
|
heap
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
4F16000
|
trusted library allocation
|
page read and write
|
||
C24000
|
heap
|
page read and write
|
||
15E000
|
stack
|
page read and write
|
||
4853000
|
unkown
|
page read and write
|
||
1A4000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
3D70000
|
heap
|
page read and write
|
||
1545000
|
trusted library allocation
|
page read and write
|
||
1524000
|
trusted library allocation
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
127E000
|
stack
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1D551A30000
|
heap
|
page read and write
|
||
E7E000
|
heap
|
page read and write
|
||
2BD0000
|
unkown
|
page readonly
|
||
10000000
|
unkown
|
page readonly
|
||
1D04FCA3000
|
heap
|
page read and write
|
||
5141000
|
unkown
|
page read and write
|
||
3C3C000
|
heap
|
page read and write
|
||
4740000
|
unkown
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
5770000
|
unkown
|
page read and write
|
||
1104000
|
heap
|
page read and write
|
||
2E8E000
|
unkown
|
page read and write
|
||
2D04000
|
unkown
|
page read and write
|
||
C24000
|
heap
|
page read and write
|
||
4F8A000
|
trusted library allocation
|
page read and write
|
||
49DA000
|
heap
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
trusted library allocation
|
page read and write
|
||
2730000
|
unkown
|
page readonly
|
||
5250000
|
trusted library allocation
|
page execute and read and write
|
||
1D04FC95000
|
heap
|
page read and write
|
||
201A000
|
unkown
|
page readonly
|
||
6446000
|
heap
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
3EC5000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
3F0F000
|
heap
|
page read and write
|
||
537E000
|
unkown
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
D04000
|
unkown
|
page read and write
|
||
6D510000
|
unkown
|
page readonly
|
||
4F95000
|
trusted library allocation
|
page read and write
|
||
441E000
|
trusted library allocation
|
page read and write
|
||
E20000
|
unkown
|
page readonly
|
||
49C8000
|
unkown
|
page read and write
|
||
C24000
|
heap
|
page read and write
|
||
5A4000
|
unkown
|
page readonly
|
||
10001000
|
unkown
|
page execute read
|
||
595000
|
unkown
|
page write copy
|
||
2000000
|
unkown
|
page readonly
|
||
343F000
|
heap
|
page read and write
|
||
4032000
|
heap
|
page read and write
|
||
F3A000
|
trusted library allocation
|
page execute and read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
2D04000
|
unkown
|
page read and write
|
||
536E000
|
direct allocation
|
page read and write
|
||
C0D000
|
heap
|
page read and write
|
||
C24000
|
heap
|
page read and write
|
||
1A40000
|
heap
|
page read and write
|
||
ECD000
|
heap
|
page read and write
|
||
59C000
|
unkown
|
page write copy
|
||
4F3B000
|
trusted library allocation
|
page read and write
|
||
10074000
|
unkown
|
page readonly
|
||
1C91000
|
heap
|
page read and write
|
||
1D551838000
|
heap
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
2C2E000
|
unkown
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
29A0000
|
heap
|
page read and write
|
||
5581000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
AFE000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2E98000
|
trusted library allocation
|
page read and write
|
||
F4B000
|
trusted library allocation
|
page execute and read and write
|
||
1E46000
|
heap
|
page read and write
|
||
BC7000
|
heap
|
page read and write
|
||
5140000
|
unkown
|
page read and write
|
||
2D04000
|
unkown
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
unkown
|
page read and write
|
||
2001000
|
unkown
|
page execute read
|
||
EAC000
|
heap
|
page read and write
|
||
48E0000
|
unkown
|
page read and write
|
||
1516000
|
trusted library allocation
|
page read and write
|
||
F14000
|
trusted library allocation
|
page read and write
|
||
11E3000
|
trusted library allocation
|
page execute and read and write
|
||
3450000
|
heap
|
page read and write
|
||
609E000
|
stack
|
page read and write
|
||
4EBD000
|
direct allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
2BA1000
|
trusted library allocation
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
2019000
|
unkown
|
page read and write
|
||
AB6000
|
stack
|
page read and write
|
||
1220000
|
unkown
|
page readonly
|
||
2001000
|
unkown
|
page execute read
|
||
BEA000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
655E000
|
stack
|
page read and write
|
||
4633000
|
unkown
|
page read and write
|
||
5580000
|
unkown
|
page read and write
|
||
BFA000
|
unkown
|
page read and write
|
||
1221000
|
unkown
|
page execute read
|
||
2DC0000
|
heap
|
page read and write
|
||
1D04FCA3000
|
heap
|
page read and write
|
||
1A80000
|
heap
|
page read and write
|
||
C30000
|
unkown
|
page readonly
|
||
1521000
|
trusted library allocation
|
page read and write
|
||
49EB000
|
unkown
|
page read and write
|
||
4EFC000
|
trusted library allocation
|
page read and write
|
||
52F9000
|
direct allocation
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
30AF000
|
unkown
|
page read and write
|
||
2EA5000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
BE7000
|
unkown
|
page write copy
|
||
51D0000
|
direct allocation
|
page read and write
|
||
13AE000
|
unkown
|
page read and write
|
||
C31000
|
unkown
|
page execute read
|
||
1A80000
|
heap
|
page read and write
|
||
ABB000
|
stack
|
page read and write
|
||
1304000
|
unkown
|
page readonly
|
||
1A4000
|
heap
|
page read and write
|
||
D12000
|
unkown
|
page read and write
|
||
1D04FC10000
|
heap
|
page read and write
|
||
4EF6000
|
trusted library allocation
|
page read and write
|
||
3110000
|
unkown
|
page read and write
|
||
6D585000
|
unkown
|
page readonly
|
||
2914000
|
unkown
|
page read and write
|
||
2BC0000
|
unkown
|
page readonly
|
||
6D585000
|
unkown
|
page readonly
|
||
BED000
|
unkown
|
page readonly
|
||
5309000
|
trusted library allocation
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
1E55000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
56AE000
|
stack
|
page read and write
|
||
11F4000
|
trusted library allocation
|
page read and write
|
||
4EB9000
|
direct allocation
|
page read and write
|
||
5300000
|
trusted library allocation
|
page read and write
|
||
128E000
|
stack
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
140F000
|
stack
|
page read and write
|
||
2001000
|
unkown
|
page execute read
|
||
1896000
|
unkown
|
page read and write
|
||
5318000
|
trusted library allocation
|
page read and write
|
||
2EBC000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
48C0000
|
unkown
|
page read and write
|
||
3D8F000
|
heap
|
page read and write
|
||
1D551B30000
|
heap
|
page read and write
|
||
53B000
|
unkown
|
page readonly
|
||
4A33000
|
unkown
|
page read and write
|
||
1310000
|
unkown
|
page readonly
|
||
1E50000
|
heap
|
page read and write
|
||
2D04000
|
unkown
|
page read and write
|
||
C24000
|
heap
|
page read and write
|
||
42BE000
|
heap
|
page read and write
|
||
4515000
|
heap
|
page read and write
|
||
286E000
|
stack
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
54C0000
|
unkown
|
page read and write
|
||
5141000
|
unkown
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
ABB000
|
stack
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
189C000
|
unkown
|
page read and write
|
||
11E4000
|
trusted library allocation
|
page read and write
|
||
AB6000
|
stack
|
page read and write
|
||
43FE000
|
trusted library allocation
|
page read and write
|
||
C11000
|
unkown
|
page readonly
|
||
4268000
|
heap
|
page read and write
|
||
109E000
|
stack
|
page read and write
|
||
246BE8E9000
|
heap
|
page read and write
|
||
5A4000
|
unkown
|
page readonly
|
||
2E4E000
|
unkown
|
page read and write
|
||
4280000
|
trusted library allocation
|
page read and write
|
||
3DE5000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
5D1E000
|
stack
|
page read and write
|
||
E96000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
36E8000
|
heap
|
page read and write
|
||
2914000
|
unkown
|
page read and write
|
||
527E000
|
unkown
|
page read and write
|
||
E96000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
4F11000
|
trusted library allocation
|
page read and write
|
||
51CE000
|
stack
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
There are 614 hidden memdumps, click here to show them.