Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
IEW113_2311a.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Config.Msi\3b1c82.rbs
|
data
|
dropped
|
||
C:\Program Files\Sony\Imaging Edge Webcam\Driver\ImagingEdgeWebcam.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\Sony\Imaging Edge Webcam\Driver\ImagingEdgeWebcam_Driver.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\Sony\Imaging Edge Webcam\Driver\ImagingEdgeWebcam_Driver.inf
|
Windows setup INFormation
|
dropped
|
||
C:\Program Files\Sony\Imaging Edge Webcam\Driver\imagingedgewebcam.cat
|
data
|
dropped
|
||
C:\Program Files\Sony\Imaging Edge Webcam\EULA.rtf
|
Rich Text Format data, version 1, ANSI
|
dropped
|
||
C:\Program Files\Sony\Imaging Edge Webcam\ImagingEdgeWebcamLauncher.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\Sony\Imaging Edge Webcam\License.txt
|
Unicode text, UTF-8 (with BOM) text, with very long lines (760), with CRLF line terminators
|
dropped
|
||
C:\Program Files\Sony\Imaging Edge Webcam\LjAdapter\Lja_PTP_USB.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\Sony\Imaging Edge Webcam\LjAdapter\Lja_PTP_WIA.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\Sony\Imaging Edge Webcam\LjAdapter\libusb-1.0.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\Sony\Imaging Edge Webcam\LjCore.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\Sony\Imaging Edge Webcam\USBReset.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\Sony\Imaging Edge Webcam\Webcam.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\Sony\Imaging Edge Webcam\default.jpg
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=1, orientation=upper-left], baseline, precision 8, 1024x576, components 3
|
dropped
|
||
C:\Program Files\Sony\Imaging Edge Webcam\mfc140u.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\Sony\Imaging Edge Webcam\mfcm140u.dll
|
PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\Sony\Imaging Edge Webcam\msvcp140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\Sony\Imaging Edge Webcam\vcruntime140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\Sony\Imaging Edge Webcam\webcam_help.ico
|
MS Windows icon resource - 5 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel,
64x64, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MSIF12C.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MSIF18A.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Package\SetupIEW.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Imaging Edge Webcam, Author: Sony Corporation, Keywords: Installer, Comments: This installer database contains
the logic and data required to install Imaging Edge Webcam., Create Time/Date: Fri Oct 6 08:39:02 2023, Name of Creating
Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2, Template: x64;0, Last Saved By: x64;0, Revision Number:
{77F8518A-144A-4DB2-80EB-C544B68375EE}1.1.03.10061;{95690A63-A7AD-4F7B-8CD3-F94BF8573A8E}1.1.03.10061;{28FB0552-E7A4-4193-ACA1-2CA8F06EC841},
Number of Pages: 300, Number of Characters: 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Support\E8FF0748-2339-49f9-9A79-824D7561736C.cab
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 4828811 bytes, 1 file, at 0x2c +AUtf? "SetupIEW.msi", number 1, 240
datablocks, 0x1503 compression
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Support\Settings.ini
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\ImagingEdgeWebcam.cat (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\ImagingEdgeWebcam.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\ImagingEdgeWebcam_Driver.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\ImagingEdgeWebcam_Driver.inf (copy)
|
Windows setup INFormation
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\SET25F7.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\SET2618.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\SET2638.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\SET2658.tmp
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\INF\c_camera.PNF
|
Windows Precompiled iNF, version 3.3 (Windows 10), flags 0x1000083, unicoded, has strings, at 0x1728 "Signature", at 0x68
WinDirPath, LanguageID 809, at 0x80 language en-GB
|
dropped
|
||
C:\Windows\INF\setupapi.dev.log
|
Generic INItialization configuration [BeginLog]
|
dropped
|
||
C:\Windows\Installer\3b1c81.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Imaging Edge Webcam, Author: Sony Corporation, Keywords: Installer, Comments: This installer database contains
the logic and data required to install Imaging Edge Webcam., Create Time/Date: Fri Oct 6 08:39:02 2023, Name of Creating
Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2, Template: x64;0, Last Saved By: x64;0, Revision Number:
{77F8518A-144A-4DB2-80EB-C544B68375EE}1.1.03.10061;{95690A63-A7AD-4F7B-8CD3-F94BF8573A8E}1.1.03.10061;{28FB0552-E7A4-4193-ACA1-2CA8F06EC841},
Number of Pages: 300, Number of Characters: 0
|
dropped
|
||
C:\Windows\Installer\MSI1E56.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI1EC5.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI1F71.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSI1F92.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI239A.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
modified
|
||
C:\Windows\Installer\SourceHash{77F8518A-144A-4DB2-80EB-C544B68375EE}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam.cat (copy)
|
data
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam_Driver.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam_Driver.inf (copy)
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\SET27DC.tmp
|
data
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\SET27EC.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\SET27FD.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\SET282D.tmp
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_1280.db
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_16.db
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_1920.db
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_256.db
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_2560.db
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_32.db
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_48.db
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_768.db
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_96.db
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_custom_stream.db
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_exif.db
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_sr.db
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_wide.db
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_wide_alternate.db
|
data
|
dropped
|
||
C:\Windows\Temp\~DF078B503D22F595BD.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF374548108D8C982B.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF42DCA64EBD2EB59D.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF7C575039BFD3D0D1.TMP
|
data
|
dropped
|
There are 62 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\IEW113_2311a.exe
|
"C:\Users\user\Desktop\IEW113_2311a.exe"
|
||
C:\Users\user\Desktop\IEW113_2311a.exe
|
"C:\Users\user\Desktop\IEW113_2311a.exe" -run {192AB307-8DDD-45B1-BC93-D10838BCC13F} 0|Yes|No|C:\Windows\System32\msiexec.exe
/i C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Package\SetupIEW.msi
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{94bae122-cba7-1d4a-abe9-55200fb5c9ba} Global\{f15111e6-e2a2-7143-bb08-c644d6dcff21}
C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam_Driver.inf C:\Windows\System32\DriverStore\Temp\{3347bb72-55b2-694f-9e55-f9870c8dc803}\ImagingEdgeWebcam.cat
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i C:\Users\user\AppData\Local\Temp\SPackTool\{89B93025-7962-486C-9882-CB09CA156C38}\Package\SetupIEW.msi
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\System32\MsiExec.exe -Embedding 87308A77B4DC65560968A93A1904E71A C
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\System32\MsiExec.exe -Embedding 026172C647FCA3CC45C109DD1CF65201
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 1F622DA67DE9472AD76099B184CCC342
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\System32\MsiExec.exe -Embedding 41D4778385EEC697935AEB0EB737BBE8 E Global\MSI0000
|
||
C:\Windows\System32\cmd.exe
|
cmd /c pnputil /add-driver "C:\Program Files\Sony\Imaging Edge Webcam\Driver\*.inf" /install
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\pnputil.exe
|
pnputil /add-driver "C:\Program Files\Sony\Imaging Edge Webcam\Driver\*.inf" /install
|
||
C:\Windows\System32\drvinst.exe
|
DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{62ac3150-e217-504f-99b6-ba32b85dda90}\ImagingEdgeWebcam_Driver.inf"
"9" "40c79f59f" "000000000000015C" "WinSta0\Default" "0000000000000168" "208" "C:\Program Files\Sony\Imaging Edge Webcam\Driver"
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://libusb.infoneed
|
unknown
|
||
http://wixtoolset.org
|
unknown
|
||
https://github.com/microsoft/Windows-driver-samples)
|
unknown
|
||
http://www.gnu.org/licenses/lgpl-2.1.htmlF
|
unknown
|
||
https://oss.sony.net/Products/Linux/
|
unknown
|
||
http://libusb.info
|
unknown
|
||
https://support.d-imaging.sony.co.jp/app/webcam/l/instruction/index.php
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
56.163.245.4.in-addr.arpa
|
unknown
|
||
198.187.3.20.in-addr.arpa
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\3b1c82.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\3b1c82.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\565B39C49C142B848B2611F6FE85CE1C
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\368D6C451CF45EF49A7B647A02CC2FA4
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3461B35DE2E8D7446B96161B8D4BC38D
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8C578DB4141727C44ADD0A76A2922659
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1B923F50CBCB59B4A8AB4797F087F532
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F473D2EE294C37D4F80385B875669DF2
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\32DE20E59CE7EB14AB96B18B60D85B97
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C5B58056EE83D5944AA96E4FB0CBAA3F
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\52F08E7CBF6508B4887BE8B82136094D
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DABA3C146D695734083CA975EA5DF8BD
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4806BEAA0B8A924A86B5B70B0927D89
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F2BE0AA8C4519CC48823BBF24478211F
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0370AAC86FD27DC4FB9CE4EBAADD5113
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9C2B1115AD8B560449038EE79A7ED038
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E5EB15BD74E42CB48AB7924A8DB7F94B
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CBE100F38BE250045831B8CD7B4F21FA
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8CAF08A3FCFB1E4469FD7164FE737F42
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C84AB9ABE96055D4F8E6DAC99E607912
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BDE9349C694FD024BA8DA02780EA8A76
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\254D5872ACF0FB043B3ED89D6EB24B5E
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BA0A7C6C0E062414292020E294D514B7
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43074C19AD01A29498FC9F24E79FB518
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\95F9535F02A89294F815A4F8505743EF
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5D2795D85745C3949BB6E38B0D5A43C4
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\810147B8BC6CE7545B1616823CF558F3
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\093251A696A41CA4BB9C7BB5DD8F3358
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\275FBF3235C614544AF68D339CBA5337
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\010B638A413F362598EFE7777E138738
|
A8158F77A4412BD408BE5C446B3857EE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Imaging Edge Webcam\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files\Sony\Imaging Edge Webcam\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files\Sony\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files\Sony\Imaging Edge Webcam\Driver\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files\Sony\Imaging Edge Webcam\LjAdapter\
|
||
HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupapiLogStatus
|
setupapi.dev.log
|
There are 30 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
23325E55000
|
heap
|
page read and write
|
||
1DD9AE93000
|
heap
|
page read and write
|
||
1DD9AE6A000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
1DD9AEA6000
|
heap
|
page read and write
|
||
1DD9B040000
|
heap
|
page read and write
|
||
23325E3F000
|
heap
|
page read and write
|
||
D11000
|
unkown
|
page execute read
|
||
D55000
|
unkown
|
page read and write
|
||
1DD9AE1B000
|
heap
|
page read and write
|
||
221F94A7000
|
heap
|
page read and write
|
||
1DD9AED0000
|
heap
|
page read and write
|
||
4F30000
|
heap
|
page read and write
|
||
7C6000
|
heap
|
page read and write
|
||
23325E63000
|
heap
|
page read and write
|
||
1DD9AEF0000
|
heap
|
page read and write
|
||
1DD9AEBC000
|
heap
|
page read and write
|
||
221FB850000
|
heap
|
page read and write
|
||
1B2A9544000
|
heap
|
page read and write
|
||
23325E4E000
|
heap
|
page read and write
|
||
1DD9AE44000
|
heap
|
page read and write
|
||
C8B000
|
stack
|
page read and write
|
||
D10000
|
unkown
|
page readonly
|
||
23325E4F000
|
heap
|
page read and write
|
||
7CD000
|
heap
|
page read and write
|
||
221F943D000
|
heap
|
page read and write
|
||
1DD9AE32000
|
heap
|
page read and write
|
||
23325E4B000
|
heap
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
221FB610000
|
unkown
|
page read and write
|
||
7D6000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
D10000
|
unkown
|
page readonly
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
1DD9AE1E000
|
heap
|
page read and write
|
||
1DD9AE34000
|
heap
|
page read and write
|
||
1DD9AE44000
|
heap
|
page read and write
|
||
1DD9AE44000
|
heap
|
page read and write
|
||
1DD9AE2D000
|
heap
|
page read and write
|
||
BBF000
|
stack
|
page read and write
|
||
221F9427000
|
heap
|
page read and write
|
||
221F9425000
|
heap
|
page read and write
|
||
1DD9AE6A000
|
heap
|
page read and write
|
||
1DD9AE44000
|
heap
|
page read and write
|
||
221F94C2000
|
heap
|
page read and write
|
||
221FAFB3000
|
heap
|
page read and write
|
||
7E1000
|
heap
|
page read and write
|
||
1DD9AECB000
|
heap
|
page read and write
|
||
A7F000
|
stack
|
page read and write
|
||
D11000
|
unkown
|
page execute read
|
||
D57000
|
unkown
|
page readonly
|
||
221FB872000
|
heap
|
page read and write
|
||
6FC000
|
stack
|
page read and write
|
||
1DD9AE50000
|
heap
|
page read and write
|
||
1B2A9460000
|
heap
|
page read and write
|
||
23325E3F000
|
heap
|
page read and write
|
||
7CC000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
1DD9AE53000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
7EA000
|
heap
|
page read and write
|
||
1DD9AEDD000
|
heap
|
page read and write
|
||
23325E18000
|
heap
|
page read and write
|
||
79E000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
23325E3B000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
1DD9AE37000
|
heap
|
page read and write
|
||
23325E3F000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
23325E8B000
|
heap
|
page read and write
|
||
23325E3F000
|
heap
|
page read and write
|
||
221F9429000
|
heap
|
page read and write
|
||
221FB883000
|
heap
|
page read and write
|
||
1DD9AE6A000
|
heap
|
page read and write
|
||
1DD9AE0F000
|
heap
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
1DD9AE2B000
|
heap
|
page read and write
|
||
23325E4E000
|
heap
|
page read and write
|
||
23325DF0000
|
heap
|
page read and write
|
||
23325E40000
|
heap
|
page read and write
|
||
23325E46000
|
heap
|
page read and write
|
||
1DD9AE91000
|
heap
|
page read and write
|
||
1DD9AE16000
|
heap
|
page read and write
|
||
1B2A9470000
|
heap
|
page read and write
|
||
1DD9AE50000
|
heap
|
page read and write
|
||
1000FC000
|
stack
|
page read and write
|
||
1B2A97B0000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
221FB8AD000
|
heap
|
page read and write
|
||
7A8000
|
heap
|
page read and write
|
||
78E000
|
heap
|
page read and write
|
||
2A5F000
|
stack
|
page read and write
|
||
7C6000
|
heap
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
23325E4F000
|
heap
|
page read and write
|
||
1DD9AE6A000
|
heap
|
page read and write
|
||
221F93F0000
|
heap
|
page read and write
|
||
1DD9AE53000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
1DD9AE59000
|
heap
|
page read and write
|
||
23325E50000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
1DD9AE44000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
23325E40000
|
heap
|
page read and write
|
||
221FB510000
|
heap
|
page read and write
|
||
23325E10000
|
heap
|
page read and write
|
||
1DD9AE63000
|
heap
|
page read and write
|
||
3470000
|
heap
|
page read and write
|
||
1DD9AE49000
|
heap
|
page read and write
|
||
221F9380000
|
heap
|
page read and write
|
||
7E1000
|
heap
|
page read and write
|
||
1DD9AE6A000
|
heap
|
page read and write
|
||
23325E4B000
|
heap
|
page read and write
|
||
23325E47000
|
heap
|
page read and write
|
||
399000
|
stack
|
page read and write
|
||
221F9670000
|
heap
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
23325E71000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
23325E72000
|
heap
|
page read and write
|
||
221FB896000
|
heap
|
page read and write
|
||
23325E56000
|
heap
|
page read and write
|
||
1DD9AE24000
|
heap
|
page read and write
|
||
1DD9AE44000
|
heap
|
page read and write
|
||
23325E67000
|
heap
|
page read and write
|
||
1DD9AE50000
|
heap
|
page read and write
|
||
1DD9B390000
|
heap
|
page read and write
|
||
D47000
|
unkown
|
page readonly
|
||
1DD9AE00000
|
heap
|
page read and write
|
||
1DD9AE24000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
1B2A9548000
|
heap
|
page read and write
|
||
1DD9AE50000
|
heap
|
page read and write
|
||
1B2A97A0000
|
heap
|
page read and write
|
||
12CF000
|
stack
|
page read and write
|
||
7CC000
|
heap
|
page read and write
|
||
D57000
|
unkown
|
page readonly
|
||
23325E4E000
|
heap
|
page read and write
|
||
221F93B0000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
1DD9B045000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
1DD9AE24000
|
heap
|
page read and write
|
||
23325E47000
|
heap
|
page read and write
|
||
23325E38000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
23325EA7000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
1DD9AE32000
|
heap
|
page read and write
|
||
1DD9AE59000
|
heap
|
page read and write
|
||
1DD9AC70000
|
heap
|
page read and write
|
||
D57000
|
unkown
|
page readonly
|
||
23325E4E000
|
heap
|
page read and write
|
||
1DD9AE44000
|
heap
|
page read and write
|
||
221FAFB0000
|
heap
|
page read and write
|
||
221FB8A1000
|
heap
|
page read and write
|
||
23325E4B000
|
heap
|
page read and write
|
||
221FB86E000
|
heap
|
page read and write
|
||
D10000
|
unkown
|
page readonly
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
A4120FF000
|
stack
|
page read and write
|
||
1DD9AE49000
|
heap
|
page read and write
|
||
221F9420000
|
heap
|
page read and write
|
||
221FB830000
|
heap
|
page read and write
|
||
1DD9AE50000
|
heap
|
page read and write
|
||
1DD9AE44000
|
heap
|
page read and write
|
||
1DD9AE37000
|
heap
|
page read and write
|
||
1DD9AE30000
|
heap
|
page read and write
|
||
1DD9AE49000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
23325E45000
|
heap
|
page read and write
|
||
1DD9AE6A000
|
heap
|
page read and write
|
||
23325E63000
|
heap
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
97E000
|
stack
|
page read and write
|
||
23325E33000
|
heap
|
page read and write
|
||
1DD9AE59000
|
heap
|
page read and write
|
||
1DD9AE35000
|
heap
|
page read and write
|
||
221FB883000
|
heap
|
page read and write
|
||
1DD9AE44000
|
heap
|
page read and write
|
||
1DD9B391000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
221FB85F000
|
heap
|
page read and write
|
||
1DD9AE6A000
|
heap
|
page read and write
|
||
23325E63000
|
heap
|
page read and write
|
||
23325E67000
|
heap
|
page read and write
|
||
23325E72000
|
heap
|
page read and write
|
||
221F9679000
|
heap
|
page read and write
|
||
1DD9AE46000
|
heap
|
page read and write
|
||
1DD9AE1E000
|
heap
|
page read and write
|
||
1DD9AE44000
|
heap
|
page read and write
|
||
23325FE0000
|
heap
|
page read and write
|
||
1DD9AEAF000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
1DD9AE53000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
1DD9AD50000
|
heap
|
page read and write
|
||
37CA000
|
stack
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
23325E45000
|
heap
|
page read and write
|
||
1DD9AE49000
|
heap
|
page read and write
|
||
D47000
|
unkown
|
page readonly
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
23325E38000
|
heap
|
page read and write
|
||
1DD9AE49000
|
heap
|
page read and write
|
||
BE48D86000
|
stack
|
page read and write
|
||
1DD9AE53000
|
heap
|
page read and write
|
||
221F9421000
|
heap
|
page read and write
|
||
23325E33000
|
heap
|
page read and write
|
||
1DD9AE32000
|
heap
|
page read and write
|
||
D06000
|
heap
|
page read and write
|
||
1DD9AE3B000
|
heap
|
page read and write
|
||
23325DE0000
|
heap
|
page read and write
|
||
D55000
|
unkown
|
page write copy
|
||
221F9390000
|
heap
|
page read and write
|
||
C39000
|
heap
|
page read and write
|
||
221FB877000
|
heap
|
page read and write
|
||
7E1000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
221F93F7000
|
heap
|
page read and write
|
||
D47000
|
unkown
|
page readonly
|
||
1B2A9490000
|
heap
|
page read and write
|
||
1DD9AE46000
|
heap
|
page read and write
|
||
1DD9AE6A000
|
heap
|
page read and write
|
||
1DD9AE3B000
|
heap
|
page read and write
|
||
221FB8A5000
|
heap
|
page read and write
|
||
1DD9AE63000
|
heap
|
page read and write
|
||
2DAC000
|
stack
|
page read and write
|
||
1DD9AE2C000
|
heap
|
page read and write
|
||
1DD9AE37000
|
heap
|
page read and write
|
||
1DD9AE49000
|
heap
|
page read and write
|
||
A412076000
|
stack
|
page read and write
|
||
221F942F000
|
heap
|
page read and write
|
||
D10000
|
unkown
|
page readonly
|
||
221FB87F000
|
heap
|
page read and write
|
||
7A5000
|
heap
|
page read and write
|
||
1DD9AE0B000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
23325E8B000
|
heap
|
page read and write
|
||
1DD9AE49000
|
heap
|
page read and write
|
||
221FB883000
|
heap
|
page read and write
|
||
D47000
|
unkown
|
page readonly
|
||
221F94C5000
|
heap
|
page read and write
|
||
1DD9AE2B000
|
heap
|
page read and write
|
||
7E1000
|
heap
|
page read and write
|
||
23326070000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
23325E66000
|
heap
|
page read and write
|
||
23325E4B000
|
heap
|
page read and write
|
||
23325E38000
|
heap
|
page read and write
|
||
12F7000
|
heap
|
page read and write
|
||
735000
|
heap
|
page read and write
|
||
1DD9AD70000
|
heap
|
page read and write
|
||
36CB000
|
stack
|
page read and write
|
||
1DD9AE53000
|
heap
|
page read and write
|
||
1DD9AE32000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
1DD9AEF4000
|
heap
|
page read and write
|
||
1DD9AE3B000
|
heap
|
page read and write
|
||
D11000
|
unkown
|
page execute read
|
||
1DD9AE1F000
|
heap
|
page read and write
|
||
221F9426000
|
heap
|
page read and write
|
||
D57000
|
unkown
|
page readonly
|
||
1DD9AE49000
|
heap
|
page read and write
|
||
83E26D8000
|
stack
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
23325E66000
|
heap
|
page read and write
|
||
D11000
|
unkown
|
page execute read
|
||
23325E45000
|
heap
|
page read and write
|
||
23325E38000
|
heap
|
page read and write
|
||
23325E56000
|
heap
|
page read and write
|
||
23325E2D000
|
heap
|
page read and write
|
||
1DD9AE2B000
|
heap
|
page read and write
|
||
C36000
|
heap
|
page read and write
|
||
221F94A1000
|
heap
|
page read and write
|
||
1DD9AE4D000
|
heap
|
page read and write
|
||
221F9675000
|
heap
|
page read and write
|
||
1DD9AE37000
|
heap
|
page read and write
|
||
1DD9AE37000
|
heap
|
page read and write
|
||
2E40000
|
trusted library allocation
|
page read and write
|
||
1DD9AE37000
|
heap
|
page read and write
|
||
740000
|
direct allocation
|
page execute and read and write
|
||
1DD9AE19000
|
heap
|
page read and write
|
||
37D0000
|
heap
|
page read and write
|
||
1DD9AE2C000
|
heap
|
page read and write
|
||
1DD9AEDD000
|
heap
|
page read and write
|
||
2CAB000
|
stack
|
page read and write
|
||
1DD9AE32000
|
heap
|
page read and write
|
||
1DD9AE44000
|
heap
|
page read and write
|
||
1DD9AE2D000
|
heap
|
page read and write
|
||
D55000
|
unkown
|
page write copy
|
||
1DD9AE4C000
|
heap
|
page read and write
|
||
1DD9AEF0000
|
heap
|
page read and write
|
||
7CD000
|
heap
|
page read and write
|
||
23325E52000
|
heap
|
page read and write
|
||
D55000
|
unkown
|
page read and write
|
||
23326075000
|
heap
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
1DD9AE3B000
|
heap
|
page read and write
|
||
23325E38000
|
heap
|
page read and write
|
||
1DD9AE1A000
|
heap
|
page read and write
|
||
23325E4E000
|
heap
|
page read and write
|
||
1DD9AE59000
|
heap
|
page read and write
|
||
23325E6E000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
7CC000
|
heap
|
page read and write
|
||
2A64000
|
heap
|
page read and write
|
||
1DD9AE2B000
|
heap
|
page read and write
|
||
1DD9AE37000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
1DD9AE3D000
|
heap
|
page read and write
|
||
1B2A9520000
|
heap
|
page read and write
|
||
23325E4E000
|
heap
|
page read and write
|
||
221F94CB000
|
heap
|
page read and write
|
||
23325E40000
|
heap
|
page read and write
|
||
83E2A7E000
|
stack
|
page read and write
|
||
7EA000
|
heap
|
page read and write
|
||
1B2A97A5000
|
heap
|
page read and write
|
||
221FB897000
|
heap
|
page read and write
|
||
12D8000
|
heap
|
page read and write
|
||
1DD9AECB000
|
heap
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
1DD9AE44000
|
heap
|
page read and write
|
||
1DD9AE2C000
|
heap
|
page read and write
|
||
1DD9AE59000
|
heap
|
page read and write
|
||
221FB896000
|
heap
|
page read and write
|
||
1DD9AE2B000
|
heap
|
page read and write
|
||
1317000
|
heap
|
page read and write
|
||
1DD9AE6A000
|
heap
|
page read and write
|
||
1B2A952B000
|
heap
|
page read and write
|
||
23325E38000
|
heap
|
page read and write
|
||
221F9467000
|
heap
|
page read and write
|
||
221FB8C9000
|
heap
|
page read and write
|
||
23325E45000
|
heap
|
page read and write
|
||
23325EA7000
|
heap
|
page read and write
|
||
1DD9AE6D000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
1DD9AED0000
|
heap
|
page read and write
|
||
1DD9AE3B000
|
heap
|
page read and write
|
||
1DD9AE3B000
|
heap
|
page read and write
|
||
ABE000
|
stack
|
page read and write
|
||
1DD9AE4D000
|
heap
|
page read and write
|
||
23325E47000
|
heap
|
page read and write
|
||
1DD9AE6B000
|
heap
|
page read and write
|
||
23325E47000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
4F65000
|
heap
|
page read and write
|
||
83E2B7F000
|
stack
|
page read and write
|
||
83E275E000
|
stack
|
page read and write
|
||
1DD9AE6A000
|
heap
|
page read and write
|
||
23325EA7000
|
heap
|
page read and write
|
||
23325E8B000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
23325E4A000
|
heap
|
page read and write
|
||
1DD9AE31000
|
heap
|
page read and write
|
||
BE4907F000
|
stack
|
page read and write
|
||
23325E67000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
7D6000
|
heap
|
page read and write
|
||
4F60000
|
heap
|
page read and write
|
||
23325E55000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
C7E000
|
stack
|
page read and write
|
||
1DD9AE2B000
|
heap
|
page read and write
|
||
7DF000
|
heap
|
page read and write
|
||
A41227E000
|
stack
|
page read and write
|
||
10FB000
|
stack
|
page read and write
|
||
1DD9AE2B000
|
heap
|
page read and write
|
There are 372 hidden memdumps, click here to show them.