IOC Report
IEW113_2311a.exe

loading gif

Files

File Path
Type
Category
Malicious
IEW113_2311a.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Config.Msi\3b1c82.rbs
data
dropped
C:\Program Files\Sony\Imaging Edge Webcam\Driver\ImagingEdgeWebcam.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Sony\Imaging Edge Webcam\Driver\ImagingEdgeWebcam_Driver.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Sony\Imaging Edge Webcam\Driver\ImagingEdgeWebcam_Driver.inf
Windows setup INFormation
dropped
C:\Program Files\Sony\Imaging Edge Webcam\Driver\imagingedgewebcam.cat
data
dropped
C:\Program Files\Sony\Imaging Edge Webcam\EULA.rtf
Rich Text Format data, version 1, ANSI
dropped
C:\Program Files\Sony\Imaging Edge Webcam\ImagingEdgeWebcamLauncher.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Sony\Imaging Edge Webcam\License.txt
Unicode text, UTF-8 (with BOM) text, with very long lines (760), with CRLF line terminators
dropped
C:\Program Files\Sony\Imaging Edge Webcam\LjAdapter\Lja_PTP_USB.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Sony\Imaging Edge Webcam\LjAdapter\Lja_PTP_WIA.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Sony\Imaging Edge Webcam\LjAdapter\libusb-1.0.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Sony\Imaging Edge Webcam\LjCore.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Sony\Imaging Edge Webcam\USBReset.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Program Files\Sony\Imaging Edge Webcam\Webcam.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Sony\Imaging Edge Webcam\default.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=1, orientation=upper-left], baseline, precision 8, 1024x576, components 3
dropped
C:\Program Files\Sony\Imaging Edge Webcam\mfc140u.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Sony\Imaging Edge Webcam\mfcm140u.dll
PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Sony\Imaging Edge Webcam\msvcp140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Sony\Imaging Edge Webcam\vcruntime140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\Sony\Imaging Edge Webcam\webcam_help.ico
MS Windows icon resource - 5 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, 64x64, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\MSIF12C.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIF18A.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Package\SetupIEW.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Imaging Edge Webcam, Author: Sony Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Imaging Edge Webcam., Create Time/Date: Fri Oct 6 08:39:02 2023, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2, Template: x64;0, Last Saved By: x64;0, Revision Number: {77F8518A-144A-4DB2-80EB-C544B68375EE}1.1.03.10061;{95690A63-A7AD-4F7B-8CD3-F94BF8573A8E}1.1.03.10061;{28FB0552-E7A4-4193-ACA1-2CA8F06EC841}, Number of Pages: 300, Number of Characters: 0
dropped
C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Support\E8FF0748-2339-49f9-9A79-824D7561736C.cab
Microsoft Cabinet archive data, Windows 2000/XP setup, 4828811 bytes, 1 file, at 0x2c +AUtf? "SetupIEW.msi", number 1, 240 datablocks, 0x1503 compression
dropped
C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Support\Settings.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\ImagingEdgeWebcam.cat (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\ImagingEdgeWebcam.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\ImagingEdgeWebcam_Driver.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\ImagingEdgeWebcam_Driver.inf (copy)
Windows setup INFormation
dropped
C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\SET25F7.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\SET2618.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\SET2638.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\SET2658.tmp
Windows setup INFormation
dropped
C:\Windows\INF\c_camera.PNF
Windows Precompiled iNF, version 3.3 (Windows 10), flags 0x1000083, unicoded, has strings, at 0x1728 "Signature", at 0x68 WinDirPath, LanguageID 809, at 0x80 language en-GB
dropped
C:\Windows\INF\setupapi.dev.log
Generic INItialization configuration [BeginLog]
dropped
C:\Windows\Installer\3b1c81.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Imaging Edge Webcam, Author: Sony Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Imaging Edge Webcam., Create Time/Date: Fri Oct 6 08:39:02 2023, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2, Template: x64;0, Last Saved By: x64;0, Revision Number: {77F8518A-144A-4DB2-80EB-C544B68375EE}1.1.03.10061;{95690A63-A7AD-4F7B-8CD3-F94BF8573A8E}1.1.03.10061;{28FB0552-E7A4-4193-ACA1-2CA8F06EC841}, Number of Pages: 300, Number of Characters: 0
dropped
C:\Windows\Installer\MSI1E56.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\MSI1EC5.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI1F71.tmp
data
dropped
C:\Windows\Installer\MSI1F92.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI239A.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
modified
C:\Windows\Installer\SourceHash{77F8518A-144A-4DB2-80EB-C544B68375EE}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam.cat (copy)
data
dropped
C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam_Driver.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam_Driver.inf (copy)
Windows setup INFormation
dropped
C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\SET27DC.tmp
data
dropped
C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\SET27EC.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\SET27FD.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\SET282D.tmp
Windows setup INFormation
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_1280.db
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_16.db
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_1920.db
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_256.db
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_2560.db
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_32.db
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_48.db
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_768.db
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_96.db
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_custom_stream.db
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_exif.db
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_sr.db
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_wide.db
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_wide_alternate.db
data
dropped
C:\Windows\Temp\~DF078B503D22F595BD.TMP
data
dropped
C:\Windows\Temp\~DF374548108D8C982B.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF42DCA64EBD2EB59D.TMP
data
dropped
C:\Windows\Temp\~DF7C575039BFD3D0D1.TMP
data
dropped
There are 62 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\IEW113_2311a.exe
"C:\Users\user\Desktop\IEW113_2311a.exe"
malicious
C:\Users\user\Desktop\IEW113_2311a.exe
"C:\Users\user\Desktop\IEW113_2311a.exe" -run {192AB307-8DDD-45B1-BC93-D10838BCC13F} 0|Yes|No|C:\Windows\System32\msiexec.exe /i C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Package\SetupIEW.msi
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{94bae122-cba7-1d4a-abe9-55200fb5c9ba} Global\{f15111e6-e2a2-7143-bb08-c644d6dcff21} C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam_Driver.inf C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam.cat
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Package\SetupIEW.msi
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\System32\msiexec.exe
C:\Windows\System32\MsiExec.exe -Embedding 87308A77B4DC65560968A93A1904E71A C
C:\Windows\System32\msiexec.exe
C:\Windows\System32\MsiExec.exe -Embedding 026172C647FCA3CC45C109DD1CF65201
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 1F622DA67DE9472AD76099B184CCC342
C:\Windows\System32\msiexec.exe
C:\Windows\System32\MsiExec.exe -Embedding 41D4778385EEC697935AEB0EB737BBE8 E Global\MSI0000
C:\Windows\System32\cmd.exe
cmd /c pnputil /add-driver "C:\Program Files\Sony\Imaging Edge Webcam\Driver\*.inf" /install
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\pnputil.exe
pnputil /add-driver "C:\Program Files\Sony\Imaging Edge Webcam\Driver\*.inf" /install
C:\Windows\System32\drvinst.exe
DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\ImagingEdgeWebcam_Driver.inf" "9" "40c79f59f" "000000000000015C" "WinSta0\Default" "0000000000000168" "208" "C:\Program Files\Sony\Imaging Edge Webcam\Driver"
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://libusb.infoneed
unknown
http://wixtoolset.org
unknown
https://github.com/microsoft/Windows-driver-samples)
unknown
http://www.gnu.org/licenses/lgpl-2.1.htmlF
unknown
https://oss.sony.net/Products/Linux/
unknown
http://libusb.info
unknown
https://support.d-imaging.sony.co.jp/app/webcam/l/instruction/index.php
unknown

Domains

Name
IP
Malicious
56.163.245.4.in-addr.arpa
unknown
198.187.3.20.in-addr.arpa
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\3b1c82.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\3b1c82.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\565B39C49C142B848B2611F6FE85CE1C
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\368D6C451CF45EF49A7B647A02CC2FA4
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3461B35DE2E8D7446B96161B8D4BC38D
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8C578DB4141727C44ADD0A76A2922659
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1B923F50CBCB59B4A8AB4797F087F532
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F473D2EE294C37D4F80385B875669DF2
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\32DE20E59CE7EB14AB96B18B60D85B97
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C5B58056EE83D5944AA96E4FB0CBAA3F
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\52F08E7CBF6508B4887BE8B82136094D
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DABA3C146D695734083CA975EA5DF8BD
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4806BEAA0B8A924A86B5B70B0927D89
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F2BE0AA8C4519CC48823BBF24478211F
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0370AAC86FD27DC4FB9CE4EBAADD5113
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9C2B1115AD8B560449038EE79A7ED038
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E5EB15BD74E42CB48AB7924A8DB7F94B
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CBE100F38BE250045831B8CD7B4F21FA
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8CAF08A3FCFB1E4469FD7164FE737F42
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C84AB9ABE96055D4F8E6DAC99E607912
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BDE9349C694FD024BA8DA02780EA8A76
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\254D5872ACF0FB043B3ED89D6EB24B5E
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BA0A7C6C0E062414292020E294D514B7
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43074C19AD01A29498FC9F24E79FB518
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\95F9535F02A89294F815A4F8505743EF
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5D2795D85745C3949BB6E38B0D5A43C4
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\810147B8BC6CE7545B1616823CF558F3
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\093251A696A41CA4BB9C7BB5DD8F3358
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\275FBF3235C614544AF68D339CBA5337
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\010B638A413F362598EFE7777E138738
A8158F77A4412BD408BE5C446B3857EE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Imaging Edge Webcam\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files\Sony\Imaging Edge Webcam\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files\Sony\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files\Sony\Imaging Edge Webcam\Driver\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files\Sony\Imaging Edge Webcam\LjAdapter\
HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupapiLogStatus
setupapi.dev.log
There are 30 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
23325E55000
heap
page read and write
1DD9AE93000
heap
page read and write
1DD9AE6A000
heap
page read and write
DD0000
heap
page read and write
1DD9AEA6000
heap
page read and write
1DD9B040000
heap
page read and write
23325E3F000
heap
page read and write
D11000
unkown
page execute read
D55000
unkown
page read and write
1DD9AE1B000
heap
page read and write
221F94A7000
heap
page read and write
1DD9AED0000
heap
page read and write
4F30000
heap
page read and write
7C6000
heap
page read and write
23325E63000
heap
page read and write
1DD9AEF0000
heap
page read and write
1DD9AEBC000
heap
page read and write
221FB850000
heap
page read and write
1B2A9544000
heap
page read and write
23325E4E000
heap
page read and write
1DD9AE44000
heap
page read and write
C8B000
stack
page read and write
D10000
unkown
page readonly
23325E4F000
heap
page read and write
7CD000
heap
page read and write
221F943D000
heap
page read and write
1DD9AE32000
heap
page read and write
23325E4B000
heap
page read and write
7E2000
heap
page read and write
221FB610000
unkown
page read and write
7D6000
heap
page read and write
37D0000
trusted library allocation
page read and write
D10000
unkown
page readonly
37D0000
trusted library allocation
page read and write
1DD9AE1E000
heap
page read and write
1DD9AE34000
heap
page read and write
1DD9AE44000
heap
page read and write
1DD9AE44000
heap
page read and write
1DD9AE2D000
heap
page read and write
BBF000
stack
page read and write
221F9427000
heap
page read and write
221F9425000
heap
page read and write
1DD9AE6A000
heap
page read and write
1DD9AE44000
heap
page read and write
221F94C2000
heap
page read and write
221FAFB3000
heap
page read and write
7E1000
heap
page read and write
1DD9AECB000
heap
page read and write
A7F000
stack
page read and write
D11000
unkown
page execute read
D57000
unkown
page readonly
221FB872000
heap
page read and write
6FC000
stack
page read and write
1DD9AE50000
heap
page read and write
1B2A9460000
heap
page read and write
23325E3F000
heap
page read and write
7CC000
heap
page read and write
770000
heap
page read and write
1DD9AE53000
heap
page read and write
37D0000
trusted library allocation
page read and write
7EA000
heap
page read and write
1DD9AEDD000
heap
page read and write
23325E18000
heap
page read and write
79E000
heap
page read and write
710000
heap
page read and write
23325E3B000
heap
page read and write
37D0000
trusted library allocation
page read and write
1DD9AE37000
heap
page read and write
23325E3F000
heap
page read and write
37D0000
trusted library allocation
page read and write
23325E8B000
heap
page read and write
23325E3F000
heap
page read and write
221F9429000
heap
page read and write
221FB883000
heap
page read and write
1DD9AE6A000
heap
page read and write
1DD9AE0F000
heap
page read and write
2A60000
heap
page read and write
1DD9AE2B000
heap
page read and write
23325E4E000
heap
page read and write
23325DF0000
heap
page read and write
23325E40000
heap
page read and write
23325E46000
heap
page read and write
1DD9AE91000
heap
page read and write
1DD9AE16000
heap
page read and write
1B2A9470000
heap
page read and write
1DD9AE50000
heap
page read and write
1000FC000
stack
page read and write
1B2A97B0000
heap
page read and write
C30000
heap
page read and write
221FB8AD000
heap
page read and write
7A8000
heap
page read and write
78E000
heap
page read and write
2A5F000
stack
page read and write
7C6000
heap
page read and write
12D0000
heap
page read and write
23325E4F000
heap
page read and write
1DD9AE6A000
heap
page read and write
221F93F0000
heap
page read and write
1DD9AE53000
heap
page read and write
37D0000
trusted library allocation
page read and write
37D0000
trusted library allocation
page read and write
1DD9AE59000
heap
page read and write
23325E50000
heap
page read and write
37D0000
trusted library allocation
page read and write
1600000
heap
page read and write
1DD9AE44000
heap
page read and write
37D0000
trusted library allocation
page read and write
23325E40000
heap
page read and write
221FB510000
heap
page read and write
23325E10000
heap
page read and write
1DD9AE63000
heap
page read and write
3470000
heap
page read and write
1DD9AE49000
heap
page read and write
221F9380000
heap
page read and write
7E1000
heap
page read and write
1DD9AE6A000
heap
page read and write
23325E4B000
heap
page read and write
23325E47000
heap
page read and write
399000
stack
page read and write
221F9670000
heap
page read and write
15B0000
heap
page read and write
23325E71000
heap
page read and write
37D0000
trusted library allocation
page read and write
23325E72000
heap
page read and write
221FB896000
heap
page read and write
23325E56000
heap
page read and write
1DD9AE24000
heap
page read and write
1DD9AE44000
heap
page read and write
23325E67000
heap
page read and write
1DD9AE50000
heap
page read and write
1DD9B390000
heap
page read and write
D47000
unkown
page readonly
1DD9AE00000
heap
page read and write
1DD9AE24000
heap
page read and write
37D0000
trusted library allocation
page read and write
1B2A9548000
heap
page read and write
1DD9AE50000
heap
page read and write
1B2A97A0000
heap
page read and write
12CF000
stack
page read and write
7CC000
heap
page read and write
D57000
unkown
page readonly
23325E4E000
heap
page read and write
221F93B0000
heap
page read and write
37D0000
trusted library allocation
page read and write
1DD9B045000
heap
page read and write
37D0000
trusted library allocation
page read and write
1DD9AE24000
heap
page read and write
23325E47000
heap
page read and write
23325E38000
heap
page read and write
37D0000
trusted library allocation
page read and write
23325EA7000
heap
page read and write
CF0000
heap
page read and write
1DD9AE32000
heap
page read and write
1DD9AE59000
heap
page read and write
1DD9AC70000
heap
page read and write
D57000
unkown
page readonly
23325E4E000
heap
page read and write
1DD9AE44000
heap
page read and write
221FAFB0000
heap
page read and write
221FB8A1000
heap
page read and write
23325E4B000
heap
page read and write
221FB86E000
heap
page read and write
D10000
unkown
page readonly
37D0000
trusted library allocation
page read and write
A4120FF000
stack
page read and write
1DD9AE49000
heap
page read and write
221F9420000
heap
page read and write
221FB830000
heap
page read and write
1DD9AE50000
heap
page read and write
1DD9AE44000
heap
page read and write
1DD9AE37000
heap
page read and write
1DD9AE30000
heap
page read and write
1DD9AE49000
heap
page read and write
37D0000
trusted library allocation
page read and write
37D0000
trusted library allocation
page read and write
23325E45000
heap
page read and write
1DD9AE6A000
heap
page read and write
23325E63000
heap
page read and write
3260000
heap
page read and write
37D0000
trusted library allocation
page read and write
97E000
stack
page read and write
23325E33000
heap
page read and write
1DD9AE59000
heap
page read and write
1DD9AE35000
heap
page read and write
221FB883000
heap
page read and write
1DD9AE44000
heap
page read and write
1DD9B391000
heap
page read and write
37D0000
trusted library allocation
page read and write
37D0000
trusted library allocation
page read and write
221FB85F000
heap
page read and write
1DD9AE6A000
heap
page read and write
23325E63000
heap
page read and write
23325E67000
heap
page read and write
23325E72000
heap
page read and write
221F9679000
heap
page read and write
1DD9AE46000
heap
page read and write
1DD9AE1E000
heap
page read and write
1DD9AE44000
heap
page read and write
23325FE0000
heap
page read and write
1DD9AEAF000
heap
page read and write
37D0000
trusted library allocation
page read and write
1DD9AE53000
heap
page read and write
37D0000
trusted library allocation
page read and write
1DD9AD50000
heap
page read and write
37CA000
stack
page read and write
37D0000
trusted library allocation
page read and write
23325E45000
heap
page read and write
1DD9AE49000
heap
page read and write
D47000
unkown
page readonly
37D0000
trusted library allocation
page read and write
23325E38000
heap
page read and write
1DD9AE49000
heap
page read and write
BE48D86000
stack
page read and write
1DD9AE53000
heap
page read and write
221F9421000
heap
page read and write
23325E33000
heap
page read and write
1DD9AE32000
heap
page read and write
D06000
heap
page read and write
1DD9AE3B000
heap
page read and write
23325DE0000
heap
page read and write
D55000
unkown
page write copy
221F9390000
heap
page read and write
C39000
heap
page read and write
221FB877000
heap
page read and write
7E1000
heap
page read and write
37D0000
trusted library allocation
page read and write
221F93F7000
heap
page read and write
D47000
unkown
page readonly
1B2A9490000
heap
page read and write
1DD9AE46000
heap
page read and write
1DD9AE6A000
heap
page read and write
1DD9AE3B000
heap
page read and write
221FB8A5000
heap
page read and write
1DD9AE63000
heap
page read and write
2DAC000
stack
page read and write
1DD9AE2C000
heap
page read and write
1DD9AE37000
heap
page read and write
1DD9AE49000
heap
page read and write
A412076000
stack
page read and write
221F942F000
heap
page read and write
D10000
unkown
page readonly
221FB87F000
heap
page read and write
7A5000
heap
page read and write
1DD9AE0B000
heap
page read and write
37D0000
trusted library allocation
page read and write
23325E8B000
heap
page read and write
1DD9AE49000
heap
page read and write
221FB883000
heap
page read and write
D47000
unkown
page readonly
221F94C5000
heap
page read and write
1DD9AE2B000
heap
page read and write
7E1000
heap
page read and write
23326070000
heap
page read and write
700000
heap
page read and write
37D0000
trusted library allocation
page read and write
23325E66000
heap
page read and write
23325E4B000
heap
page read and write
23325E38000
heap
page read and write
12F7000
heap
page read and write
735000
heap
page read and write
1DD9AD70000
heap
page read and write
36CB000
stack
page read and write
1DD9AE53000
heap
page read and write
1DD9AE32000
heap
page read and write
778000
heap
page read and write
37D0000
trusted library allocation
page read and write
37D0000
trusted library allocation
page read and write
1DD9AEF4000
heap
page read and write
1DD9AE3B000
heap
page read and write
D11000
unkown
page execute read
1DD9AE1F000
heap
page read and write
221F9426000
heap
page read and write
D57000
unkown
page readonly
1DD9AE49000
heap
page read and write
83E26D8000
stack
page read and write
37D0000
trusted library allocation
page read and write
7C5000
heap
page read and write
730000
heap
page read and write
23325E66000
heap
page read and write
D11000
unkown
page execute read
23325E45000
heap
page read and write
23325E38000
heap
page read and write
23325E56000
heap
page read and write
23325E2D000
heap
page read and write
1DD9AE2B000
heap
page read and write
C36000
heap
page read and write
221F94A1000
heap
page read and write
1DD9AE4D000
heap
page read and write
221F9675000
heap
page read and write
1DD9AE37000
heap
page read and write
1DD9AE37000
heap
page read and write
2E40000
trusted library allocation
page read and write
1DD9AE37000
heap
page read and write
740000
direct allocation
page execute and read and write
1DD9AE19000
heap
page read and write
37D0000
heap
page read and write
1DD9AE2C000
heap
page read and write
1DD9AEDD000
heap
page read and write
2CAB000
stack
page read and write
1DD9AE32000
heap
page read and write
1DD9AE44000
heap
page read and write
1DD9AE2D000
heap
page read and write
D55000
unkown
page write copy
1DD9AE4C000
heap
page read and write
1DD9AEF0000
heap
page read and write
7CD000
heap
page read and write
23325E52000
heap
page read and write
D55000
unkown
page read and write
23326075000
heap
page read and write
2DB0000
heap
page read and write
D00000
heap
page read and write
1DD9AE3B000
heap
page read and write
23325E38000
heap
page read and write
1DD9AE1A000
heap
page read and write
23325E4E000
heap
page read and write
1DD9AE59000
heap
page read and write
23325E6E000
heap
page read and write
37D0000
trusted library allocation
page read and write
7CC000
heap
page read and write
2A64000
heap
page read and write
1DD9AE2B000
heap
page read and write
1DD9AE37000
heap
page read and write
BD0000
heap
page read and write
1DD9AE3D000
heap
page read and write
1B2A9520000
heap
page read and write
23325E4E000
heap
page read and write
221F94CB000
heap
page read and write
23325E40000
heap
page read and write
83E2A7E000
stack
page read and write
7EA000
heap
page read and write
1B2A97A5000
heap
page read and write
221FB897000
heap
page read and write
12D8000
heap
page read and write
1DD9AECB000
heap
page read and write
DCE000
stack
page read and write
1DD9AE44000
heap
page read and write
1DD9AE2C000
heap
page read and write
1DD9AE59000
heap
page read and write
221FB896000
heap
page read and write
1DD9AE2B000
heap
page read and write
1317000
heap
page read and write
1DD9AE6A000
heap
page read and write
1B2A952B000
heap
page read and write
23325E38000
heap
page read and write
221F9467000
heap
page read and write
221FB8C9000
heap
page read and write
23325E45000
heap
page read and write
23325EA7000
heap
page read and write
1DD9AE6D000
heap
page read and write
37D0000
trusted library allocation
page read and write
1DD9AED0000
heap
page read and write
1DD9AE3B000
heap
page read and write
1DD9AE3B000
heap
page read and write
ABE000
stack
page read and write
1DD9AE4D000
heap
page read and write
23325E47000
heap
page read and write
1DD9AE6B000
heap
page read and write
23325E47000
heap
page read and write
37D0000
trusted library allocation
page read and write
4F65000
heap
page read and write
83E2B7F000
stack
page read and write
83E275E000
stack
page read and write
1DD9AE6A000
heap
page read and write
23325EA7000
heap
page read and write
23325E8B000
heap
page read and write
37D0000
trusted library allocation
page read and write
23325E4A000
heap
page read and write
1DD9AE31000
heap
page read and write
BE4907F000
stack
page read and write
23325E67000
heap
page read and write
37D0000
trusted library allocation
page read and write
7D6000
heap
page read and write
4F60000
heap
page read and write
23325E55000
heap
page read and write
37D0000
trusted library allocation
page read and write
1314000
heap
page read and write
C7E000
stack
page read and write
1DD9AE2B000
heap
page read and write
7DF000
heap
page read and write
A41227E000
stack
page read and write
10FB000
stack
page read and write
1DD9AE2B000
heap
page read and write
There are 372 hidden memdumps, click here to show them.