IOC Report
MIKGZIBT.msi

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps15105010010Label

Files

File Path
Type
Category
Malicious
Download
MIKGZIBT.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Urethane, Author: Linkage Getout, Keywords: Installer, Comments: This installer database contains the logic and data required to install Urethane., Template: Intel;1033, Revision Number: {77646B61-F7C7-4112-AAFF-B3A20ACE20CB}, Create Time/Date: Fri Feb 14 20:28:02 2025, Last Saved Time/Date: Fri Feb 14 20:28:02 2025, Number of Pages: 500, Number of Words: 10, Name of Creating Application: WiX Toolset (4.0.0.0), Security: 2
initial sample
malicious
C:\Users\user\AppData\Local\Sprit\TiVoServer.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\fbckka
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ojfbsdqart
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\MSBuild.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MSBuild.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Patchsystemv3\TiVoServer.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Config.Msi\5246fe.rbs
data
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Sprit\BorlndMm.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Sprit\CC3260MT.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Sprit\MindClient.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Sprit\Rtl60.bpl
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Sprit\StlpMt45.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Sprit\Vcl60.bpl
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Sprit\leprosarium.mpg
data
dropped
C:\Users\user\AppData\Local\Sprit\libglib-2.0-0.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Sprit\loudmouth.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Sprit\trickery.tif
data
dropped
C:\Users\user\AppData\Local\Sprit\wspconfig.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\905c7a22
data
dropped
C:\Users\user\AppData\Local\Temp\a699a817
data
dropped
C:\Users\user\AppData\Local\Temp\ddrngkpjrs
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Feb 19 00:13:04 2025, mtime=Wed Feb 19 00:13:05 2025, atime=Fri Feb 14 16:26:06 2025, length=2264336, window=hide
dropped
C:\Users\user\AppData\Roaming\Patchsystemv3\BorlndMm.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Patchsystemv3\CC3260MT.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Roaming\Patchsystemv3\MindClient.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Patchsystemv3\Rtl60.bpl
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Patchsystemv3\StlpMt45.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Roaming\Patchsystemv3\Vcl60.bpl
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Patchsystemv3\leprosarium.mpg
data
dropped
C:\Users\user\AppData\Roaming\Patchsystemv3\libglib-2.0-0.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Roaming\Patchsystemv3\loudmouth.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Patchsystemv3\trickery.tif
data
dropped
C:\Users\user\AppData\Roaming\Patchsystemv3\wspconfig.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\5246fd.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Urethane, Author: Linkage Getout, Keywords: Installer, Comments: This installer database contains the logic and data required to install Urethane., Template: Intel;1033, Revision Number: {77646B61-F7C7-4112-AAFF-B3A20ACE20CB}, Create Time/Date: Fri Feb 14 20:28:02 2025, Last Saved Time/Date: Fri Feb 14 20:28:02 2025, Number of Pages: 500, Number of Words: 10, Name of Creating Application: WiX Toolset (4.0.0.0), Security: 2
dropped
C:\Windows\Installer\5246ff.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Urethane, Author: Linkage Getout, Keywords: Installer, Comments: This installer database contains the logic and data required to install Urethane., Template: Intel;1033, Revision Number: {77646B61-F7C7-4112-AAFF-B3A20ACE20CB}, Create Time/Date: Fri Feb 14 20:28:02 2025, Last Saved Time/Date: Fri Feb 14 20:28:02 2025, Number of Pages: 500, Number of Words: 10, Name of Creating Application: WiX Toolset (4.0.0.0), Security: 2
dropped
C:\Windows\Installer\MSI48E1.tmp
data
dropped
C:\Windows\Installer\SourceHash{8DD042DC-D97C-4A68-8206-B2A3FD126C5E}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\~DF083CE2306658DB02.TMP
data
dropped
C:\Windows\Temp\~DF23502A3D3EB8F297.TMP
data
dropped
C:\Windows\Temp\~DF2CB237CF934BDEB8.TMP
data
dropped
C:\Windows\Temp\~DF40C7449A8426A76E.TMP
data
dropped
C:\Windows\Temp\~DF879C39F283CE21A7.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF926C8650F97C4590.TMP
data
dropped
C:\Windows\Temp\~DF9ABCD590FB340E9E.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFB03EA3ACC8BFB8BA.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFC279629CC6AAFC81.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFEAAA1AFB5299B5E7.TMP
data
dropped
C:\Windows\Temp\~DFF0DDC839B6E9F9A0.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFFD88ABF3B877B32B.TMP
data
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 43 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\Sprit\TiVoServer.exe
"C:\Users\user\AppData\Local\Sprit\TiVoServer.exe"
malicious
C:\Users\user\AppData\Roaming\Patchsystemv3\TiVoServer.exe
C:\Users\user\AppData\Roaming\Patchsystemv3\TiVoServer.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "MSBuild" /tr "C:\Users\user\AppData\Roaming\MSBuild.exe"
malicious
C:\Users\user\AppData\Roaming\Patchsystemv3\TiVoServer.exe
"C:\Users\user\AppData\Roaming\Patchsystemv3\TiVoServer.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Roaming\MSBuild.exe
C:\Users\user\AppData\Roaming\MSBuild.exe
malicious
C:\Users\user\AppData\Roaming\MSBuild.exe
"C:\Users\user\AppData\Roaming\MSBuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Users\user\AppData\Roaming\MSBuild.exe
C:\Users\user\AppData\Roaming\MSBuild.exe
malicious
C:\Users\user\AppData\Roaming\MSBuild.exe
"C:\Users\user\AppData\Roaming\MSBuild.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MSBuild.exe
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MSBuild.exe"
malicious
C:\Users\user\AppData\Roaming\MSBuild.exe
C:\Users\user\AppData\Roaming\MSBuild.exe
malicious
C:\Users\user\AppData\Roaming\MSBuild.exe
C:\Users\user\AppData\Roaming\MSBuild.exe
malicious
C:\Users\user\AppData\Roaming\MSBuild.exe
C:\Users\user\AppData\Roaming\MSBuild.exe
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\MIKGZIBT.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 19 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.tivo.com/source.
unknown
http://%s:%d/TiVoConnect?Command=QueryServerUSTiVoServer.LocationGetCountryFromDvrGetCountryFromDvr(
unknown
http://www.vmware.com/0
unknown
http://crl3.digicer
unknown
http://www.vmware.com/0/
unknown
http://www.freedesktop.org/standards/desktop-bookmarks
unknown
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.txt.
unknown
http://%s:%d/TiVoConnect?Command=QueryFormats&SourceFormat=video/x-tivo-mpeg-tsTiVoFormats.Format.Co
unknown
http://www.apache.org/licenses/LICENSE-2.0.
unknown
http://www.freedesktop.org/standards/desktop-bookmarksapplicationgroupapplicationsgroupsprivatehttp:
unknown
http://c0rl.m%L
unknown
http://www.symauth.com/cps0(
unknown
http://www.gnu.org/licenses/old-licenses/old-licenses.html#LGPL.
unknown
http://www.netbsd.org/.
unknown
http://www.google.com/talk/protocol/auth
unknown
http://www.openssl.org/support/faq.html
unknown
http://:/server_portserver_ip./subscribed_dvr_state/state
unknown
http://www.openssl.org/support/faq.html....................
unknown
http://www.symauth.com/rpa00
unknown
http://www.freedesktop.org/standards/shared-mime-info
unknown
http://www.gnu.org/copyleft/library.html.
unknown
http://www.info-zip.org/
unknown
http://www.google.com/talk/protocol/authga:client-uses-full-bind-resulttruePLAIN%s:
unknown
http://go.microsoft.c
unknown
http://www.loudmouth-project.org/.
unknown
http://www.matroska.org
unknown
http://etherx.jabber.org/streams
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.nevrona.com/indy/.
unknown
http://freedesktop.org
unknown
http://download.sourceforge.net/id3lib/.
unknown
http://etherx.jabber.org/streamsjabber:clientversion1.0Sending
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
217.20.57.20
www3.l.google.com
142.250.186.78
s-part-0017.t-0009.t-msedge.net
13.107.246.45
appengine.google.com
unknown

IPs

IP
Domain
Country
Malicious
185.95.159.238
unknown
Bulgaria
malicious
142.250.186.78
www3.l.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\5246fe.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\5246fe.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\Microsoft\Installer\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\E0DF4D39A915D0E53996BD6F29C05187
CD240DD8C79D86A428602B3ADF21C6E5
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\3717A68C90C092659B6545491030A689
CD240DD8C79D86A428602B3ADF21C6E5
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\198FC5E7F152EA8598CAC5708D0B43B2
CD240DD8C79D86A428602B3ADF21C6E5
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\281D1066C15FB55549A8678A1CF980B1
CD240DD8C79D86A428602B3ADF21C6E5
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\70B4F6E67525DDA5DBD4A65CCA50F8FF
CD240DD8C79D86A428602B3ADF21C6E5
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\20AF8B731C5BFEE52B7392062C55AC8F
CD240DD8C79D86A428602B3ADF21C6E5
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\0BCFC72D7D82648578E0552F706E0933
CD240DD8C79D86A428602B3ADF21C6E5
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\05890CCEB3C19E45EB9CFEC963E3B8B0
CD240DD8C79D86A428602B3ADF21C6E5
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\67A84EDD7C292375BACBD6EE2E8B030E
CD240DD8C79D86A428602B3ADF21C6E5
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\60CF064B552752C5188A0515741F5C11
CD240DD8C79D86A428602B3ADF21C6E5
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\AC027404BCD15335AAF9E8319D326F36
CD240DD8C79D86A428602B3ADF21C6E5
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\604C632ECB573A2588967E8372EFFB36
CD240DD8C79D86A428602B3ADF21C6E5
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Local\Sprit\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8DD042DC-D97C-4A68-8206-B2A3FD126C5E}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8DD042DC-D97C-4A68-8206-B2A3FD126C5E}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8DD042DC-D97C-4A68-8206-B2A3FD126C5E}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8DD042DC-D97C-4A68-8206-B2A3FD126C5E}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8DD042DC-D97C-4A68-8206-B2A3FD126C5E}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8DD042DC-D97C-4A68-8206-B2A3FD126C5E}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8DD042DC-D97C-4A68-8206-B2A3FD126C5E}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8DD042DC-D97C-4A68-8206-B2A3FD126C5E}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8DD042DC-D97C-4A68-8206-B2A3FD126C5E}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8DD042DC-D97C-4A68-8206-B2A3FD126C5E}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8DD042DC-D97C-4A68-8206-B2A3FD126C5E}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8DD042DC-D97C-4A68-8206-B2A3FD126C5E}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8DD042DC-D97C-4A68-8206-B2A3FD126C5E}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8DD042DC-D97C-4A68-8206-B2A3FD126C5E}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8DD042DC-D97C-4A68-8206-B2A3FD126C5E}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8DD042DC-D97C-4A68-8206-B2A3FD126C5E}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8DD042DC-D97C-4A68-8206-B2A3FD126C5E}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8DD042DC-D97C-4A68-8206-B2A3FD126C5E}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8DD042DC-D97C-4A68-8206-B2A3FD126C5E}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8DD042DC-D97C-4A68-8206-B2A3FD126C5E}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8DD042DC-D97C-4A68-8206-B2A3FD126C5E}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8DD042DC-D97C-4A68-8206-B2A3FD126C5E}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\DAAE08F3D58F52948AA00531474FFB0F
CD240DD8C79D86A428602B3ADF21C6E5
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8DD042DC-D97C-4A68-8206-B2A3FD126C5E}
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Features\CD240DD8C79D86A428602B3ADF21C6E5
BurnetFeature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\Features
BurnetFeature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Products\CD240DD8C79D86A428602B3ADF21C6E5\Patches
AllPatches
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CD240DD8C79D86A428602B3ADF21C6E5
ProductName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CD240DD8C79D86A428602B3ADF21C6E5
PackageCode
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CD240DD8C79D86A428602B3ADF21C6E5
Language
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CD240DD8C79D86A428602B3ADF21C6E5
Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CD240DD8C79D86A428602B3ADF21C6E5
Assignment
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CD240DD8C79D86A428602B3ADF21C6E5
AdvertiseFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CD240DD8C79D86A428602B3ADF21C6E5
InstanceType
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CD240DD8C79D86A428602B3ADF21C6E5
AuthorizedLUAApp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CD240DD8C79D86A428602B3ADF21C6E5
DeploymentFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\UpgradeCodes\DAAE08F3D58F52948AA00531474FFB0F
CD240DD8C79D86A428602B3ADF21C6E5
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CD240DD8C79D86A428602B3ADF21C6E5\SourceList
PackageName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CD240DD8C79D86A428602B3ADF21C6E5\SourceList\Net
1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CD240DD8C79D86A428602B3ADF21C6E5\SourceList\Media
1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CD240DD8C79D86A428602B3ADF21C6E5
Clients
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\CD240DD8C79D86A428602B3ADF21C6E5\SourceList
LastUsedSource
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
MSBuild
There are 77 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
5D70000
direct allocation
page read and write
malicious
5FF0000
direct allocation
page read and write
malicious
13C2000
unkown
page readonly
malicious
22B1000
trusted library allocation
page read and write
malicious
95E0000
unkown
page read and write
79E000
stack
page read and write
3154000
unkown
page read and write
977000
heap
page read and write
3154000
unkown
page read and write
2576000
trusted library allocation
page read and write
4C20000
heap
page execute and read and write
2547000
heap
page read and write
12C7000
trusted library allocation
page execute and read and write
50D7000
trusted library allocation
page read and write
2E6B000
trusted library allocation
page read and write
504E000
stack
page read and write
DFA000
trusted library allocation
page execute and read and write
132E000
stack
page read and write
40065000
unkown
page read and write
8B9E000
heap
page read and write
68655000
unkown
page readonly
2380000
trusted library allocation
page execute and read and write
3360000
heap
page read and write
B78000
unkown
page execute read
8B26000
heap
page read and write
C8C000
unkown
page readonly
3154000
unkown
page read and write
8C0000
trusted library allocation
page read and write
C63000
unkown
page readonly
2A5F000
stack
page read and write
68657000
unkown
page readonly
129D000
trusted library allocation
page execute and read and write
92E000
stack
page read and write
3091000
trusted library allocation
page read and write
BED000
trusted library allocation
page execute and read and write
B2E000
unkown
page read and write
1907000
trusted library allocation
page execute and read and write
2FFC000
stack
page read and write
37FE000
unkown
page read and write
3154000
unkown
page read and write
239D000
stack
page read and write
1093000
heap
page read and write
12A3000
trusted library allocation
page read and write
9C0000
heap
page read and write
1710000
trusted library allocation
page execute and read and write
C1A000
trusted library allocation
page execute and read and write
31DE000
stack
page read and write
C70000
heap
page read and write
191B000
trusted library allocation
page execute and read and write
8DE000
heap
page read and write
18F0000
trusted library allocation
page read and write
BC1000
unkown
page readonly
2578000
trusted library allocation
page read and write
8C0000
heap
page read and write
2521000
heap
page read and write
32B1000
trusted library allocation
page read and write
18A0000
heap
page execute and read and write
3210000
heap
page execute and read and write
2710000
heap
page read and write
4C00000
heap
page read and write
6C4000
heap
page read and write
171D000
trusted library allocation
page execute and read and write
5290000
trusted library allocation
page read and write
9A5000
heap
page read and write
5435000
trusted library allocation
page read and write
2583000
trusted library allocation
page read and write
5FCE000
stack
page read and write
9E3000
trusted library allocation
page read and write
BA0000
heap
page read and write
C27000
unkown
page execute read
3484000
unkown
page read and write
6BE000
stack
page read and write
56D0000
trusted library allocation
page read and write
35D0000
unkown
page read and write
7A4000
heap
page read and write
5A31000
unkown
page read and write
3226000
trusted library allocation
page read and write
B9E000
stack
page read and write
32600000
unkown
page readonly
21661000
unkown
page execute read
91B000
heap
page read and write
21668000
unkown
page read and write
2ED0000
trusted library allocation
page read and write
1950000
trusted library allocation
page execute and read and write
3311000
trusted library allocation
page read and write
95F000
heap
page read and write
40062000
unkown
page write copy
5EE000
stack
page read and write
5B90000
heap
page execute and read and write
DE9000
trusted library allocation
page read and write
2290000
trusted library allocation
page read and write
944F000
unkown
page read and write
8EA000
trusted library allocation
page execute and read and write
10000000
unkown
page readonly
584000
unkown
page write copy
3150000
heap
page read and write
760000
heap
page read and write
C7A000
unkown
page read and write
EA0000
trusted library allocation
page read and write
2DFC000
stack
page read and write
3140000
unkown
page readonly
933D000
unkown
page read and write
3234000
trusted library allocation
page read and write
12C0000
trusted library allocation
page read and write
57AD000
direct allocation
page read and write
3154000
unkown
page read and write
7F4000
trusted library allocation
page read and write
1980000
trusted library allocation
page execute and read and write
800000
trusted library allocation
page read and write
19ED000
stack
page read and write
2576000
heap
page read and write
2E60000
trusted library allocation
page read and write
284F000
stack
page read and write
977000
heap
page read and write
12CB000
trusted library allocation
page execute and read and write
685C1000
unkown
page execute read
5E30000
unkown
page read and write
13C0000
unkown
page readonly
3156000
trusted library allocation
page read and write
258F000
stack
page read and write
529E000
trusted library allocation
page read and write
170E000
stack
page read and write
BE0000
trusted library allocation
page read and write
8B48000
heap
page read and write
19D000
stack
page read and write
B50000
unkown
page readonly
E90000
trusted library allocation
page read and write
18F4000
trusted library allocation
page read and write
2521000
heap
page read and write
5243000
heap
page read and write
744000
heap
page read and write
32601000
unkown
page execute read
5407000
trusted library allocation
page read and write
3154000
unkown
page read and write
930000
heap
page read and write
6C0000
heap
page read and write
AD1000
unkown
page execute read
530000
heap
page read and write
2CC000
stack
page read and write
8B49000
heap
page read and write
3761000
trusted library allocation
page read and write
31FE000
stack
page read and write
5680000
direct allocation
page read and write
31A1000
trusted library allocation
page read and write
22DE000
stack
page read and write
8A02000
heap
page read and write
9F0000
trusted library allocation
page read and write
744000
heap
page read and write
5404000
trusted library allocation
page read and write
24B7000
heap
page read and write
4940000
trusted library allocation
page read and write
4F7000
stack
page read and write
1567000
heap
page read and write
143F000
stack
page read and write
B75000
unkown
page execute read
59E9000
direct allocation
page read and write
1345000
heap
page read and write
D7F000
stack
page read and write
2166D000
unkown
page read and write
5ECE000
stack
page read and write
5E9000
heap
page read and write
1730000
heap
page read and write
3154000
unkown
page read and write
549E000
stack
page read and write
95F2000
unkown
page read and write
1007F000
unkown
page read and write
16D0000
trusted library allocation
page read and write
17B0000
trusted library allocation
page read and write
12F8000
stack
page read and write
1506000
heap
page read and write
DDD000
trusted library allocation
page execute and read and write
128B000
stack
page read and write
1320000
heap
page read and write
FD0000
heap
page read and write
C0F000
stack
page read and write
151E000
stack
page read and write
401E2000
unkown
page readonly
1900000
trusted library allocation
page read and write
2E50000
trusted library allocation
page read and write
8BD9000
heap
page read and write
9C5000
heap
page read and write
C66000
unkown
page readonly
339E000
stack
page read and write
197E000
stack
page read and write
B0E000
stack
page read and write
3154000
unkown
page read and write
8CB9000
heap
page read and write
3163000
trusted library allocation
page read and write
5289000
stack
page read and write
94F000
heap
page read and write
C31000
unkown
page execute read
45FD000
stack
page read and write
5A90000
heap
page read and write
744000
heap
page read and write
1850000
trusted library allocation
page read and write
9C000
stack
page read and write
1930000
heap
page read and write
17F0000
heap
page read and write
985000
heap
page read and write
5D8E000
stack
page read and write
3750000
heap
page read and write
27C0000
heap
page read and write
38C4000
unkown
page read and write
1D4000
heap
page read and write
99E000
stack
page read and write
3220000
trusted library allocation
page read and write
2570000
trusted library allocation
page read and write
146F000
heap
page read and write
5FCF000
stack
page read and write
2EA0000
heap
page read and write
1007F000
unkown
page read and write
32B9000
trusted library allocation
page read and write
90B000
heap
page read and write
2461000
heap
page read and write
3200000
trusted library allocation
page read and write
1790000
trusted library allocation
page read and write
8A86000
heap
page read and write
25F3000
heap
page read and write
3154000
unkown
page read and write
93CA000
unkown
page read and write
880000
heap
page read and write
96E0000
unkown
page read and write
5E8000
unkown
page readonly
43A1000
trusted library allocation
page read and write
BE9000
unkown
page read and write
3730000
trusted library allocation
page read and write
DD3000
trusted library allocation
page execute and read and write
A9F000
stack
page read and write
1773000
heap
page read and write
255E000
stack
page read and write
6C4000
heap
page read and write
844000
heap
page read and write
21667000
unkown
page read and write
4291000
trusted library allocation
page read and write
3484000
unkown
page read and write
25D0000
heap
page read and write
94C000
heap
page read and write
3154000
unkown
page read and write
17C0000
trusted library allocation
page read and write
255C000
heap
page read and write
5F0000
heap
page read and write
400B1000
unkown
page execute read
1280000
trusted library allocation
page read and write
1330000
heap
page read and write
1328000
heap
page read and write
322B000
trusted library allocation
page read and write
FE0000
heap
page read and write
13EE000
stack
page read and write
15C6000
heap
page read and write
A53000
heap
page read and write
E07000
trusted library allocation
page execute and read and write
B42000
unkown
page readonly
C09000
trusted library allocation
page read and write
2537000
heap
page read and write
3154000
unkown
page read and write
76E000
stack
page read and write
32AE000
heap
page read and write
35C1000
trusted library allocation
page read and write
17B9000
trusted library allocation
page read and write
1970000
heap
page read and write
35CE000
unkown
page read and write
910000
trusted library allocation
page read and write
17DB000
trusted library allocation
page execute and read and write
2EBB000
trusted library allocation
page execute and read and write
274B000
trusted library allocation
page read and write
23DA000
stack
page read and write
833000
heap
page read and write
1720000
trusted library allocation
page read and write
68641000
unkown
page readonly
57C000
heap
page read and write
3154000
unkown
page read and write
168F000
stack
page read and write
549E000
stack
page read and write
17D0000
trusted library allocation
page read and write
25B0000
heap
page execute and read and write
A06000
heap
page read and write
C89000
unkown
page read and write
3154000
unkown
page read and write
1070000
heap
page read and write
55AE000
trusted library allocation
page read and write
9600000
unkown
page read and write
2746000
trusted library allocation
page read and write
1358000
heap
page read and write
127C000
stack
page read and write
700000
heap
page read and write
3154000
unkown
page read and write
9701000
unkown
page read and write
5E7000
unkown
page readonly
3484000
unkown
page read and write
2480000
heap
page read and write
5E6000
unkown
page readonly
78E000
stack
page read and write
BE3000
trusted library allocation
page execute and read and write
8E56000
heap
page read and write
24AE000
stack
page read and write
59B0000
heap
page execute and read and write
9749000
unkown
page read and write
2E40000
heap
page read and write
2EAA000
trusted library allocation
page execute and read and write
170F000
heap
page read and write
6D3000
heap
page read and write
DCF000
stack
page read and write
401000
unkown
page execute read
444D000
stack
page read and write
846000
heap
page read and write
2FD0000
trusted library allocation
page read and write
7E0000
trusted library allocation
page read and write
273A000
heap
page read and write
ABE000
stack
page read and write
1400000
heap
page read and write
10E3000
heap
page read and write
95E000
stack
page read and write
400000
unkown
page readonly
32FA000
stack
page read and write
BF9000
unkown
page readonly
599E000
stack
page read and write
7AE000
stack
page read and write
DE3000
trusted library allocation
page read and write
3154000
unkown
page read and write
5570000
heap
page execute and read and write
24C0000
heap
page read and write
158F000
stack
page read and write
6EC000
stack
page read and write
3130000
unkown
page readonly
168F000
stack
page read and write
1078000
heap
page read and write
1007F000
unkown
page read and write
B23000
unkown
page readonly
548C000
heap
page read and write
36FE000
unkown
page read and write
9D0000
heap
page read and write
9AA000
trusted library allocation
page execute and read and write
53B0000
heap
page read and write
92B000
trusted library allocation
page execute and read and write
155E000
stack
page read and write
1713000
trusted library allocation
page execute and read and write
4017D000
unkown
page read and write
68669000
unkown
page readonly
17CA000
trusted library allocation
page execute and read and write
4F0E000
stack
page read and write
C2B000
unkown
page execute read
49C0000
heap
page execute and read and write
326B5000
unkown
page readonly
1F0000
heap
page read and write
586000
heap
page read and write
550000
heap
page read and write
18EF000
stack
page read and write
81E000
stack
page read and write
15AD000
heap
page read and write
ACE000
stack
page read and write
750000
heap
page read and write
145E000
stack
page read and write
8CD000
trusted library allocation
page execute and read and write
3614000
unkown
page read and write
49C000
stack
page read and write
1589000
heap
page read and write
9090000
trusted library allocation
page read and write
3160000
unkown
page readonly
AD0000
unkown
page readonly
8D0000
trusted library allocation
page read and write
999000
trusted library allocation
page read and write
38C0000
unkown
page read and write
3154000
unkown
page read and write
5500000
trusted library allocation
page read and write
1D4000
heap
page read and write
2750000
heap
page read and write
B50000
heap
page read and write
91B9000
trusted library allocation
page read and write
720000
heap
page read and write
BE6000
unkown
page read and write
660000
heap
page read and write
990000
trusted library allocation
page execute and read and write
1240000
heap
page read and write
3080000
heap
page execute and read and write
10001000
unkown
page execute read
6C4000
heap
page read and write
984000
trusted library allocation
page read and write
970000
trusted library allocation
page read and write
98E000
stack
page read and write
3890000
heap
page read and write
5090000
heap
page read and write
AC1000
unkown
page execute read
3158000
trusted library allocation
page read and write
1310000
heap
page read and write
24D0000
heap
page read and write
A30000
heap
page read and write
60CE000
stack
page read and write
757000
heap
page read and write
134A000
heap
page read and write
710000
heap
page read and write
B51000
unkown
page execute read
1388000
stack
page read and write
8AA0000
heap
page read and write
986000
heap
page read and write
740000
heap
page read and write
2166E000
unkown
page readonly
538000
stack
page read and write
744000
heap
page read and write
1580000
heap
page read and write
3154000
unkown
page read and write
1424000
heap
page read and write
10D3000
heap
page read and write
17A4000
trusted library allocation
page read and write
667000
heap
page read and write
45EE000
stack
page read and write
5850000
heap
page execute and read and write
B1D000
unkown
page readonly
CA9000
unkown
page readonly
56F3000
trusted library allocation
page read and write
19D000
stack
page read and write
10083000
unkown
page readonly
27A0000
heap
page read and write
B28000
unkown
page readonly
B2E000
unkown
page read and write
5FA000
heap
page read and write
977000
heap
page read and write
1728000
heap
page read and write
24BB000
heap
page read and write
C29000
unkown
page execute read
56E8000
trusted library allocation
page read and write
1784000
heap
page read and write
68694000
unkown
page write copy
1330000
heap
page read and write
8D2F000
stack
page read and write
C27000
trusted library allocation
page execute and read and write
28BB000
heap
page read and write
685C0000
unkown
page readonly
810000
heap
page read and write
5CEE000
unkown
page read and write
40067000
unkown
page readonly
660000
heap
page read and write
1433000
heap
page read and write
8DA000
heap
page read and write
585E000
stack
page read and write
B51000
unkown
page execute read
5E2E000
stack
page read and write
190A000
trusted library allocation
page execute and read and write
BE8000
unkown
page write copy
5A0000
heap
page read and write
800000
heap
page read and write
24C9000
heap
page read and write
8E6000
trusted library allocation
page execute and read and write
C7D000
unkown
page readonly
A66000
heap
page read and write
3154000
unkown
page read and write
2EA7000
trusted library allocation
page execute and read and write
1410000
heap
page read and write
1D4000
heap
page read and write
581E000
stack
page read and write
977000
heap
page read and write
3280000
heap
page read and write
8C25000
heap
page read and write
8C4000
trusted library allocation
page read and write
3484000
unkown
page read and write
5A31000
unkown
page read and write
68A000
heap
page read and write
3154000
unkown
page read and write
2520000
heap
page read and write
1930000
trusted library allocation
page read and write
130E000
stack
page read and write
5366000
heap
page read and write
977000
heap
page read and write
1378000
stack
page read and write
3150000
trusted library allocation
page read and write
1F0000
heap
page read and write
4301000
trusted library allocation
page read and write
2720000
heap
page read and write
4091000
trusted library allocation
page read and write
68695000
unkown
page readonly
5C71000
unkown
page read and write
5BEE000
unkown
page read and write
1A50000
heap
page read and write
C43000
unkown
page execute read
3154000
unkown
page read and write
7E8000
heap
page read and write
3484000
unkown
page read and write
5DA0000
trusted library allocation
page execute and read and write
28B0000
heap
page read and write
48E0000
trusted library allocation
page read and write
1583000
heap
page read and write
7E8000
stack
page read and write
400B0000
unkown
page readonly
261B000
heap
page read and write
665000
heap
page read and write
5A8D000
stack
page read and write
19C000
stack
page read and write
6C4000
heap
page read and write
3228000
trusted library allocation
page read and write
1447000
heap
page read and write
C61000
unkown
page readonly
3154000
unkown
page read and write
8CE000
stack
page read and write
183F000
stack
page read and write
2E83000
trusted library allocation
page execute and read and write
16ED000
trusted library allocation
page execute and read and write
8F2000
trusted library allocation
page read and write
598E000
stack
page read and write
5A31000
unkown
page read and write
25E0000
heap
page read and write
C50000
trusted library allocation
page execute and read and write
2E68000
trusted library allocation
page read and write
143A000
heap
page read and write
454E000
stack
page read and write
F68000
stack
page read and write
3250000
heap
page read and write
839000
heap
page read and write
8B0000
trusted library allocation
page read and write
BF1000
unkown
page execute read
3484000
unkown
page read and write
2460000
heap
page read and write
C60000
trusted library allocation
page read and write
1560000
heap
page read and write
6C4000
heap
page read and write
B7A000
unkown
page execute read
279F000
unkown
page read and write
9575000
unkown
page read and write
57A9000
direct allocation
page read and write
257B000
trusted library allocation
page read and write
5D2D000
stack
page read and write
16CE000
stack
page read and write
4B5D000
stack
page read and write
744000
heap
page read and write
2590000
heap
page read and write
3154000
unkown
page read and write
95E000
stack
page read and write
DD4000
trusted library allocation
page read and write
9D8000
trusted library allocation
page read and write
1900000
trusted library allocation
page read and write
34B1000
trusted library allocation
page read and write
9BB000
trusted library allocation
page execute and read and write
3154000
unkown
page read and write
4BE0000
heap
page execute and read and write
5440000
heap
page read and write
3484000
unkown
page read and write
5A30000
unkown
page read and write
32FF000
stack
page read and write
99E000
stack
page read and write
8C3000
trusted library allocation
page execute and read and write
F20000
unkown
page readonly
13AE000
stack
page read and write
2A61000
trusted library allocation
page read and write
185B000
trusted library allocation
page execute and read and write
630000
heap
page read and write
24CB000
heap
page read and write
1890000
trusted library allocation
page read and write
400A0000
unkown
page readonly
1294000
trusted library allocation
page read and write
9B7000
trusted library allocation
page execute and read and write
10A6000
heap
page read and write
12E0000
trusted library allocation
page read and write
1595000
heap
page read and write
14F0000
heap
page read and write
21668000
unkown
page read and write
2B90000
heap
page read and write
479E000
stack
page read and write
24B0000
heap
page read and write
635000
heap
page read and write
33A1000
trusted library allocation
page read and write
7E6000
heap
page read and write
3154000
unkown
page read and write
3154000
unkown
page read and write
3264000
heap
page read and write
46FE000
stack
page read and write
3190000
heap
page execute and read and write
192E000
stack
page read and write
508E000
stack
page read and write
16E3000
trusted library allocation
page execute and read and write
50D0000
trusted library allocation
page read and write
94E0000
unkown
page read and write
1A40000
heap
page read and write
41A9000
trusted library allocation
page read and write
26EE000
stack
page read and write
2745000
heap
page read and write
59B0000
heap
page read and write
2EB7000
trusted library allocation
page execute and read and write
35CC000
heap
page read and write
3A61000
trusted library allocation
page read and write
347E000
unkown
page read and write
1700000
trusted library allocation
page read and write
269E000
stack
page read and write
E6C000
stack
page read and write
3154000
unkown
page read and write
2750000
heap
page execute and read and write
7F3000
trusted library allocation
page execute and read and write
3607000
unkown
page read and write
993000
trusted library allocation
page read and write
9444000
unkown
page read and write
3C8000
stack
page read and write
564E000
stack
page read and write
1178000
stack
page read and write
1A20000
trusted library allocation
page read and write
BF0000
heap
page read and write
348D000
unkown
page read and write
17AD000
trusted library allocation
page execute and read and write
1D4000
heap
page read and write
22AF000
stack
page read and write
744000
heap
page read and write
C73000
unkown
page readonly
9C000
stack
page read and write
40000000
unkown
page readonly
2FC0000
trusted library allocation
page execute and read and write
3600000
unkown
page read and write
A00000
heap
page read and write
3154000
unkown
page read and write
E80000
trusted library allocation
page execute and read and write
F22000
unkown
page readonly
338E000
unkown
page read and write
1099000
heap
page read and write
2660000
heap
page read and write
13E0000
heap
page read and write
C6C000
unkown
page readonly
588000
heap
page read and write
1990000
trusted library allocation
page read and write
697000
heap
page read and write
A58000
heap
page read and write
584E000
stack
page read and write
3154000
unkown
page read and write
3607000
unkown
page read and write
83F000
heap
page read and write
C03000
trusted library allocation
page read and write
3154000
unkown
page read and write
1360000
heap
page read and write
3480000
heap
page read and write
5C9F000
stack
page read and write
267D000
heap
page read and write
8CA000
heap
page read and write
3484000
unkown
page read and write
106E000
stack
page read and write
41A1000
trusted library allocation
page read and write
8D3000
trusted library allocation
page read and write
529E000
stack
page read and write
1293000
trusted library allocation
page execute and read and write
74E000
stack
page read and write
12A9000
trusted library allocation
page read and write
38C4000
unkown
page read and write
325B000
heap
page read and write
4017B000
unkown
page write copy
560D000
stack
page read and write
9DB000
trusted library allocation
page read and write
630000
heap
page read and write
2E93000
trusted library allocation
page read and write
8D33000
heap
page read and write
30FF000
stack
page read and write
12BA000
trusted library allocation
page execute and read and write
21660000
unkown
page readonly
5DF0000
unkown
page read and write
2E84000
trusted library allocation
page read and write
17A3000
trusted library allocation
page execute and read and write
BF0000
heap
page read and write
684000
heap
page read and write
1500000
heap
page read and write
500F000
stack
page read and write
3154000
unkown
page read and write
1960000
trusted library allocation
page read and write
59ED000
direct allocation
page read and write
5CD000
heap
page read and write
3330000
unkown
page readonly
24B1000
trusted library allocation
page read and write
3154000
unkown
page read and write
2166A000
unkown
page read and write
E30000
heap
page read and write
EB0000
heap
page read and write
927000
trusted library allocation
page execute and read and write
5C71000
unkown
page read and write
91BD000
trusted library allocation
page read and write
983000
trusted library allocation
page execute and read and write
9C000
stack
page read and write
16DF000
stack
page read and write
56E0000
trusted library allocation
page read and write
4DE0000
heap
page execute and read and write
139B000
heap
page read and write
8CE000
heap
page read and write
12A0000
trusted library allocation
page read and write
BBA000
unkown
page read and write
977000
heap
page read and write
5A5E000
direct allocation
page read and write
818000
heap
page read and write
275E000
unkown
page read and write
289E000
stack
page read and write
28A3000
trusted library allocation
page read and write
2560000
trusted library allocation
page read and write
1480000
heap
page read and write
2E70000
trusted library allocation
page read and write
9CC000
stack
page read and write
7FD000
trusted library allocation
page execute and read and write
1418000
heap
page read and write
540E000
trusted library allocation
page read and write
24D1000
heap
page read and write
4930000
heap
page read and write
1720000
trusted library allocation
page read and write
56E6000
trusted library allocation
page read and write
19A0000
heap
page execute and read and write
6C4000
heap
page read and write
23A0000
heap
page read and write
16F8000
heap
page read and write
2510000
heap
page read and write
C11000
unkown
page execute read
38B0000
unkown
page read and write
3291000
trusted library allocation
page read and write
3154000
unkown
page read and write
955E000
unkown
page read and write
64E000
stack
page read and write
3340000
unkown
page readonly
6863F000
unkown
page write copy
3170000
heap
page read and write
8BCB000
heap
page read and write
1840000
trusted library allocation
page read and write
40061000
unkown
page read and write
538E000
stack
page read and write
24B9000
heap
page read and write
3484000
unkown
page read and write
1880000
trusted library allocation
page execute and read and write
594A000
stack
page read and write
68689000
unkown
page readonly
389B000
heap
page read and write
1D4000
heap
page read and write
40189000
unkown
page readonly
768000
heap
page read and write
3607000
unkown
page read and write
8B3B000
heap
page read and write
3154000
unkown
page read and write
8D0000
heap
page read and write
68692000
unkown
page read and write
5E9E000
stack
page read and write
2F1E000
stack
page read and write
980000
heap
page read and write
2748000
trusted library allocation
page read and write
598000
stack
page read and write
B1A000
unkown
page readonly
8FB000
trusted library allocation
page execute and read and write
2166A000
unkown
page read and write
BE4000
trusted library allocation
page read and write
56D0000
heap
page execute and read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
9C0000
heap
page read and write
12C0000
heap
page read and write
2950000
heap
page execute and read and write
42B8000
trusted library allocation
page read and write
35A0000
direct allocation
page read and write
17B3000
trusted library allocation
page read and write
358E000
unkown
page read and write
315B000
trusted library allocation
page read and write
9A0000
trusted library allocation
page read and write
495B000
trusted library allocation
page read and write
4017D000
unkown
page read and write
18EE000
stack
page read and write
581E000
direct allocation
page read and write
3154000
unkown
page read and write
5C70000
unkown
page read and write
3154000
unkown
page read and write
1723000
trusted library allocation
page read and write
857000
heap
page read and write
34CE000
unkown
page read and write
DE0000
trusted library allocation
page read and write
FEC000
stack
page read and write
4930000
trusted library allocation
page read and write
2FE0000
trusted library allocation
page read and write
2E73000
trusted library allocation
page read and write
595E000
stack
page read and write
BD0000
trusted library allocation
page read and write
E7E000
stack
page read and write
630000
heap
page read and write
2E4E000
stack
page read and write
E0B000
trusted library allocation
page execute and read and write
4933000
heap
page read and write
12B0000
trusted library allocation
page read and write
58C0000
direct allocation
page read and write
13F0000
heap
page read and write
B9E000
stack
page read and write
13F0000
heap
page read and write
107C000
stack
page read and write
809000
trusted library allocation
page read and write
1857000
trusted library allocation
page execute and read and write
5E6000
unkown
page readonly
102E000
stack
page read and write
1917000
trusted library allocation
page execute and read and write
2EB0000
trusted library allocation
page read and write
3710000
direct allocation
page read and write
326B5000
unkown
page readonly
1AB000
stack
page read and write
5D9E000
stack
page read and write
5837000
trusted library allocation
page read and write
44EE000
stack
page read and write
A96000
heap
page read and write
81E000
heap
page read and write
55F6000
trusted library allocation
page read and write
171B000
heap
page read and write
304E000
stack
page read and write
3154000
unkown
page read and write
18FF000
stack
page read and write
FF150000
trusted library allocation
page execute and read and write
820000
heap
page read and write
55AF000
heap
page read and write
32A7000
heap
page read and write
C2B000
trusted library allocation
page execute and read and write
BA0000
heap
page read and write
B18000
unkown
page readonly
2740000
trusted library allocation
page read and write
600000
heap
page read and write
4950000
trusted library allocation
page read and write
4017A000
unkown
page read and write
2560000
heap
page read and write
960000
trusted library allocation
page execute and read and write
184A000
trusted library allocation
page execute and read and write
40065000
unkown
page read and write
30FA000
stack
page read and write
56EB000
trusted library allocation
page read and write
3590000
unkown
page read and write
744000
heap
page read and write
1910000
trusted library allocation
page read and write
518C000
stack
page read and write
1006F000
unkown
page readonly
5130000
trusted library allocation
page read and write
19F0000
heap
page read and write
558000
heap
page read and write
3154000
unkown
page read and write
3154000
unkown
page read and write
1714000
trusted library allocation
page read and write
744000
heap
page read and write
977000
heap
page read and write
175F000
stack
page read and write
9D0000
trusted library allocation
page read and write
5A40000
unkown
page read and write
1D0000
heap
page read and write
A4D000
heap
page read and write
95C000
heap
page read and write
990000
trusted library allocation
page read and write
38A0000
unkown
page read and write
970000
heap
page execute and read and write
11E0000
heap
page read and write
67E000
stack
page read and write
3154000
unkown
page read and write
2FF0000
heap
page read and write
C86000
unkown
page read and write
2390000
heap
page execute and read and write
458E000
stack
page read and write
1820000
heap
page read and write
9B0000
trusted library allocation
page read and write
2543000
heap
page read and write
9C0000
heap
page read and write
153F000
stack
page read and write
95E000
stack
page read and write
3154000
unkown
page read and write
17D7000
trusted library allocation
page execute and read and write
2EA0000
trusted library allocation
page read and write
67F000
heap
page read and write
6C4000
heap
page read and write
4B7E000
stack
page read and write
3484000
unkown
page read and write
3757000
heap
page read and write
24D1000
heap
page read and write
C7F000
unkown
page readonly
91A000
trusted library allocation
page execute and read and write
88F000
stack
page read and write
2E8D000
trusted library allocation
page execute and read and write
3154000
unkown
page read and write
1870000
trusted library allocation
page read and write
12C5000
heap
page read and write
199B000
trusted library allocation
page read and write
84A000
heap
page read and write
63A000
heap
page read and write
8F7000
trusted library allocation
page execute and read and write
1D4000
heap
page read and write
3290000
heap
page read and write
ACE000
stack
page read and write
43C000
stack
page read and write
1730000
heap
page read and write
750000
heap
page read and write
489E000
stack
page read and write
16E4000
trusted library allocation
page read and write
C00000
trusted library allocation
page read and write
C10000
unkown
page readonly
2E90000
trusted library allocation
page read and write
2640000
heap
page read and write
B73000
unkown
page execute read
5ABE000
stack
page read and write
194E000
stack
page read and write
154E000
stack
page read and write
922E000
trusted library allocation
page read and write
280E000
stack
page read and write
4D30000
heap
page read and write
313D000
stack
page read and write
2761000
trusted library allocation
page read and write
35C0000
heap
page read and write
3154000
unkown
page read and write
803000
trusted library allocation
page read and write
3154000
unkown
page read and write
57EF000
trusted library allocation
page read and write
3154000
unkown
page read and write
B3E000
unkown
page read and write
269E000
stack
page read and write
3350000
unkown
page readonly
40001000
unkown
page execute read
A00000
heap
page read and write
4963000
trusted library allocation
page read and write
89E000
stack
page read and write
5050000
heap
page execute and read and write
32686000
unkown
page write copy
6C4000
heap
page read and write
540000
heap
page read and write
285F000
stack
page read and write
5A31000
unkown
page read and write
25C1000
trusted library allocation
page read and write
810000
heap
page read and write
827000
heap
page read and write
2E66000
trusted library allocation
page read and write
AE0000
heap
page read and write
3154000
unkown
page read and write
9D6000
trusted library allocation
page read and write
98D000
trusted library allocation
page execute and read and write
744000
heap
page read and write
24C7000
heap
page read and write
A37000
heap
page read and write
16F0000
heap
page read and write
1410000
heap
page read and write
605000
heap
page read and write
5DE000
heap
page read and write
3301000
trusted library allocation
page read and write
There are 909 hidden memdumps, click here to show them.