IOC Report
RazerSynapseInstaller_V1.19.0.635.exe

loading gif

Files

File Path
Type
Category
Malicious
RazerSynapseInstaller_V1.19.0.635.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
C:\Windows\Installer\Razer\Installer\RazerInstaller.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Razer\Installer\Logs\RazerInstaller-cb19c464-e8c4-429d-93f5-55093fee4228.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\PatchExceptionalEID[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\dongleV2[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\systems[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\AllSystems[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\dockEID[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\dummyProt[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPF1093.tmp
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPF246D.tmp
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPF8DBD.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPF8DFC.tmp
PNG image data, 236 x 236, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPF8E0D.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPF8E1E.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPF8E1F.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPF8E20.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPF8E30.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPF8E41.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPF8E42.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPF8E43.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPF8E44.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPF8E45.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPF8EA3.tmp
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPF96E1.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPF96E2.tmp
PNG image data, 236 x 236, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPF96E3.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPF96E4.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPF96E5.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPF9773.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPF9810.tmp
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPFEF37.tmp
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\aheaoouz.1dc.xml
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (462)
dropped
C:\Windows\Installer\Razer\Installer\App\AWSSDK.Core.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\AWSSDK.Core.dll.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\AWSSDK.Kinesis.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\AWSSDK.Kinesis.dll.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\AllSystems.json
JSON data
dropped
C:\Windows\Installer\Razer\Installer\App\AllSystems.json.tmp
JSON data
dropped
C:\Windows\Installer\Razer\Installer\App\BLEConnect.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\BLEConnect.dll.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\BLEConnectWrapper.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\BLEConnectWrapper.dll.tmp
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\05b34d432336dbcf6ea0764da372603d_light_macros.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\10ef167e3fc4673a19329cfe059963d9_Rewards.png
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\17996a81108fcd78445459db3355ae93_alisha256.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\1f6bb98571bb6d014a3310426e4bc40d_Mouse-6-customize@2x.png
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\20deaa463cf012355d39684aeabde199_light_synapse.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\233df7636041add6d59c18f6037680e6_LWI-SophiePro-1.png
PNG image data, 576 x 324, 8-bit/color RGB, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\29da985a8261988461157579b673aa3d_RAZERAXONlogo.png
PNG image data, 236 x 236, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\3140d624792d0f04d02efffcc88ea3ab_dark_synapse.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\33e43f4e93382bf68e254b86d08362de_dark_macros.png
PNG image data, 256 x 256, 8-bit/color RGBA, interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\3c10c6457b0958e8d6cc1bfd4255fd31_GameBooster.png
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\3eb94c6867b24b25995491da2b5b5536_SystemBooster.png
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\42338f87a17534cce39b8c6b0e69eb61_ChromaConnect-2x.png
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\424b96b895c38a661a0707487f06489e_Dark_Hue@2x.png
PNG image data, 576 x 324, 8-bit/color RGBA, interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\45c30ef5c308822699a6815023c81281_LWI-Natalie-2.png
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\4e9512ed0ddf959ad181958f4533bca2_audio_visualizer.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\5963643b12004933f6e785fec303d18c_LWI-SophiePro-6.png
PNG image data, 576 x 324, 8-bit/color RGB, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\5f6ca8f479fe71fd77046e5799edf7a9_LWI-Natalie-0.png
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\6aeeee0f40118daff6219b7498284665_RazerCortex.png
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\6f8f3193d4fbdf128e65edd124a89bb7_GameDeals.png
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\7492f287df3f07064c6999c1a0474b96_Mouse-4-customize@2x.png
PNG image data, 576 x 324, 8-bit/color RGBA, interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\78498da289014bf19c6ae6e636578e4b_Synapse-Installer@2x.png
PNG image data, 576 x 324, 8-bit/color RGBA, interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\847e43fe011694060f49ca148ebe77f3_LWI-Alisha2.png
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\88cf9acec89f44de523bae98a788864c_LWI-Alisha4.png
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\8e859396a7087d1d842e18f64b7edccd_LWI-SophiePro-0.png
PNG image data, 576 x 324, 8-bit/color RGB, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\90cea53a9e729f143e3f017f087f9559_alexa.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\a2d451068c2275431e4f327476861009_LWI-chroma-connect.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\a6a8ab87779f3b131679289a63f21a91_LWI-Alisha3.png
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\afd837b0edb88795d2d19e7f7741d46e_Mouse-1-customize@2x.png
PNG image data, 576 x 324, 8-bit/color RGBA, interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\b49e947b3bd8ca45f28ff10684b85569_Mouse-2-customize@2x.png
PNG image data, 576 x 324, 8-bit/color RGBA, interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\c47c6f72b0eb574a9ead57257a613d44_LWI-Alisha1.png
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\cadb6e52441bad05d8d3cb09f850940f_virtualringlight.png
PNG image data, 256 x 256, 8-bit/color RGBA, interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\cb7cc25508f123af324b6fc99e28aa71_alexa-2x.png
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\ccb980f0b6e697452cf96f8cb749943c_LWI-SophiePro-4.png
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\cd208777e3a41c4806276a90824306ac_Mouse-3-customize@2x.png
PNG image data, 576 x 324, 8-bit/color RGBA, interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\cdb5dabe83b269c79ffa33d151a866c6_2018_Cortex_Booster_logo.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\ce49f7233531adb107a6808f83ca9eca_LWI-Natalie-1.png
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\d164304821b78086c309565b3124f039_thxspatial.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
modified
C:\Windows\Installer\Razer\Installer\App\ImageCache\d213d4ba8f28ea5806e21e946e9cd2ec_AxonLWI00.png
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\d5192477f6eb19de78369f83dd10a76d_LWI-SophiePro-5.png
PNG image data, 576 x 324, 8-bit/color RGB, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\d558eb30bf6c4423cd8827c1c39fd4e9_LWI-SophiePro-3.png
PNG image data, 576 x 324, 8-bit/color RGB, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\d57623940cc13a0bddb2963d052a7c3f_AxonLWI01.png
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\d5ca164e824fabfbcdb060c913bdef2e_cortex-white.png
PNG image data, 238 x 238, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\dc3d489d95fd04ae0278c4c559287c65_Mouse-5-customize@2x.png
PNG image data, 576 x 324, 8-bit/color RGBA, interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\dc3d489d95fd04ae0278c4c559287c65_macro-dark@2x.png
PNG image data, 576 x 324, 8-bit/color RGBA, interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\ef04b9e0ce1d81b72ccc5346252f5c6e_LWI-icon-hue.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\f1706ee93dc7f7beccf0ac4274789d39_AxonLWI02.png
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\f3a246fec45b5c3e594a917cf91e1be4_BoosterPrime.png
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\f626abb1339220fca14dd5a9c50f16fc_LWI-SophiePro-2.png
PNG image data, 576 x 324, 8-bit/color RGB, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\ImageCache\f8c32623ccce9d03a00257b2dd7a7312_UniversalLauncher.png
PNG image data, 576 x 324, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Installer\Razer\Installer\App\InstallerConfiguration.xml (copy)
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Installer\Razer\Installer\App\InstallerConfiguration.xml.tmp
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Installer\Razer\Installer\App\Log\rzS3detmgr.log
data
dropped
C:\Windows\Installer\Razer\Installer\App\NLog.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\NLog.dll.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\PatchExceptionalEID.json
JSON data
dropped
C:\Windows\Installer\Razer\Installer\App\PatchExceptionalEID.json.tmp
JSON data
dropped
C:\Windows\Installer\Razer\Installer\App\Razer.DetectManagerWrapper.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\Razer.DetectManagerWrapper.dll.tmp
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\Razer.RazerInstallerCommon.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\Razer.RazerInstallerCommon.dll.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\RazerInstaller.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\RazerInstaller.exe.config (copy)
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Installer\Razer\Installer\App\RazerInstaller.exe.config.tmp
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Installer\Razer\Installer\App\RazerInstaller.exe.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-console-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-console-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-datetime-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-datetime-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-debug-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-debug-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-errorhandling-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-errorhandling-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-file-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-file-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-file-l1-2-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-file-l1-2-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-file-l2-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-file-l2-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-handle-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-handle-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-heap-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-heap-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-interlocked-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-interlocked-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-libraryloader-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-libraryloader-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-localization-l1-2-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-localization-l1-2-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-memory-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-memory-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-namedpipe-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-namedpipe-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-processenvironment-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-processenvironment-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-processthreads-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-processthreads-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-processthreads-l1-1-1.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-processthreads-l1-1-1.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-profile-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-profile-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-rtlsupport-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-rtlsupport-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-string-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-string-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-synch-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-synch-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-synch-l1-2-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-synch-l1-2-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-sysinfo-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-sysinfo-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-timezone-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-timezone-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-util-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-core-util-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-conio-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-conio-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-convert-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-convert-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-environment-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-environment-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-filesystem-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-filesystem-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-heap-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-heap-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-locale-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-locale-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-math-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-math-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-multibyte-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-multibyte-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-private-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-private-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-process-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-process-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-runtime-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-runtime-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-stdio-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-stdio-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-string-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-string-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-time-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-time-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-utility-l1-1-0.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\api-ms-win-crt-utility-l1-1-0.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\concrt140.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\concrt140.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\cpprest140_2_10.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\cpprest140_2_10.dll.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\de-DE\Razer.RazerInstallerCommon.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\de-DE\Razer.RazerInstallerCommon.resources.dll.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\dockEID.json
JSON data
dropped
C:\Windows\Installer\Razer\Installer\App\dockEID.json.tmp
JSON data
dropped
C:\Windows\Installer\Razer\Installer\App\dongle.json (copy)
JSON data
dropped
C:\Windows\Installer\Razer\Installer\App\dongle.json.tmp
JSON data
dropped
C:\Windows\Installer\Razer\Installer\App\dongleV2.json
JSON data
dropped
C:\Windows\Installer\Razer\Installer\App\dongleV2.json.tmp
JSON data
dropped
C:\Windows\Installer\Razer\Installer\App\dummyProt.json
JSON data
dropped
C:\Windows\Installer\Razer\Installer\App\dummyProt.json.tmp
JSON data
dropped
C:\Windows\Installer\Razer\Installer\App\es-ES\Razer.RazerInstallerCommon.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\es-ES\Razer.RazerInstallerCommon.resources.dll.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\fr-FR\Razer.RazerInstallerCommon.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\fr-FR\Razer.RazerInstallerCommon.resources.dll.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\ja-JP\Razer.RazerInstallerCommon.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\ja-JP\Razer.RazerInstallerCommon.resources.dll.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\ko-KR\Razer.RazerInstallerCommon.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\ko-KR\Razer.RazerInstallerCommon.resources.dll.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\msvcp140.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\msvcp140.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\pt-BR\Razer.RazerInstallerCommon.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\pt-BR\Razer.RazerInstallerCommon.resources.dll.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\ru-RU\Razer.RazerInstallerCommon.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\ru-RU\Razer.RazerInstallerCommon.resources.dll.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\rzS3detgmr_CWrapper.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\rzS3detgmr_CWrapper.dll.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\rzS3detmgr.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\rzS3detmgr.dll.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\systems.json
JSON data
dropped
C:\Windows\Installer\Razer\Installer\App\systems.json.tmp
JSON data
dropped
C:\Windows\Installer\Razer\Installer\App\ucrtbase.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\ucrtbase.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
modified
C:\Windows\Installer\Razer\Installer\App\vccorlib140.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\vccorlib140.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\vcruntime140.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\vcruntime140.dll.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\zh-CHS\Razer.RazerInstallerCommon.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\zh-CHS\Razer.RazerInstallerCommon.resources.dll.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\zh-CHT\Razer.RazerInstallerCommon.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\Razer\Installer\App\zh-CHT\Razer.RazerInstallerCommon.resources.dll.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
There are 221 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RazerSynapseInstaller_V1.19.0.635.exe
"C:\Users\user\Desktop\RazerSynapseInstaller_V1.19.0.635.exe"
malicious
C:\Windows\Installer\Razer\Installer\RazerInstaller.exe
C:\Windows\Installer\Razer\Installer\RazerInstaller.exe
malicious
C:\Windows\Installer\Razer\Installer\App\RazerInstaller.exe
"C:\Windows\Installer\Razer\Installer\App\RazerInstaller.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://DotNetZip.codeplex.com/
unknown
https://deals-assets-cdn.razerzone.com/download/lwi/880_500_GER.webp
unknown
https://cdn.razersynapse.com/1718868442PNDrFGTfRazerCentral_v7.16.0.695.exe
unknown
https://deals-assets-cdn.razerzone.com/download/lwi/880_500_US.webp
unknown
https://cdn.razersynapse.com/1713509834mVPLCvYPTHXSpatialAudioSetup-v2.0.1.15.exe
unknown
https://deals-assets-cdn.razerzone.com/download/RAZERAXON/RAZERAXONlogo.pngb8
unknown
https://synapse-3-webservice.razerzone.com/dongleV2.json$
unknown
https://deals-assets-cdn.razerzone.com/download/Cortex10/RazerCortex.png
unknown
https://synapse-3-webservice.razerzone.com/PatchExceptionalEID.json
unknown
http://assets2.razerzone.comd
unknown
http://www.razer.com/sw-eula
unknown
https://assets.razerzone.com/images/software/synapse/alexa.png
unknown
https://deals-assets-cdn.razerzone.com/download/lwi/880_500_FRN.webp
unknown
http://assets.razerzone.com/images/software/lwi/LWI-SophiePro-6.png
unknown
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
unknown
http://www.razerzone.com/synapse
unknown
https://nlog-project.org/
unknown
https://www.razer.com/chroma-workshop/connected-devices
unknown
https://cdn.razersynapse.com/1727968071MLoJOfqRRazerStringTranslationsSetup_v3.9.1008.100321.exe
unknown
https://deals-assets-cdn.razerzone.com/download/cortex_test_update/cortex-white.png
unknown
https://twitter.com/intent/follow?screen_name=Razer
unknown
http://169.254.170.2aUnable
unknown
http://scripts.sil.org/OFLRazerF5ThinItalic
unknown
https://cdn.razersynapse.com/1700202653705F2WD7StreamerCompanionAppSetup-v2.0.1.12.exe
unknown
https://synapse-3-webservice.razerzone.com/AllSystems.json
unknown
https://synapse-3-webservice.razerzone.com/dummyProt.jsonG
unknown
http://razer.com/software
unknown
https://assets2.razerzone.com/images/razer-synapse/light_synapse.png
unknown
https://deals-assets-cdn.razerzone.com/download/lwi/880_500_SPN.webp
unknown
http://www.codeplex.com/CompositeWPF
unknown
https://cdn.razersynapse.com/1706157786vdp2jgQMRazerAlexaSetup_v3.9.0131.012511.exe
unknown
http://assets2.razerzone.com/images/razer-synapse/lifestyle_chroma_studio.png
unknown
https://assets2.razerzone.com/images/synapse/virtualringlight.pngC
unknown
http://defaultcontainer/Razer.RazerInstallerCommon;component/controls/showallmodule.xamld
unknown
https://assets.razerzone.com/images/software/synapse/alexa.png4
unknown
https://assets.razerzone.com
unknown
https://deals-assets-cdn.razerzone.com/download/lwi/cortex/880_500_RUS.png
unknown
https://deals-assets-cdn.razerzone.com/download/lwi/cortex/880_500_CHT.png
unknown
https://assets.razerzone.com/images/software/lwi/LWI-chroma-connect.png/N
unknown
https://deals-assets-cdn.razerzone.com/download/RAZERAXON/AxonLWI00.png
unknown
https://cdn.razersynapse.com/1721957254i4DoSkIvRazerSynapseConfigurationDataSetup_v3.9.0806.072600.e
unknown
https://deals-assets-cdn.razerzone.com/download/lwi/cortex/880_500_GER.png
unknown
https://rzr.to/synapse3
unknown
https://ip-ranges.amazonaws.com/ip-ranges.json
unknown
https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policies-json
unknown
https://cdn.razersynapse.com/1713511449gj1UXRTEVirtualRingLight-v2.0.0.24.exe
unknown
http://assets2.razerzone.com
unknown
http://scripts.sil.org/OFLRazerF5SemiBold
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://synapse-3-webservice.razerzone.com/
unknown
http://www.codeplex.com/prism#Microsoft.Practices.Prism.ViewModel
unknown
https://assets.razerzone.com/images/software/lwi/LWI-SophiePro-5.png
unknown
https://deals-assets-cdn.razerzone.com/download/lwi/880_500_CHS.webp
unknown
http://docs.aws.amazon.com/sdk-for-net/v3/developer-guide/net-dg-config-creds.html
unknown
https://www.razer.com/sg-en/thx-spatial-audio
unknown
https://deals-assets-cdn.razerzone.com/download/lwi/cortex/880_500_JPN.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://microsoft.co
unknown
https://discovery.razerapi.com:https://manifest.razerapi.com
unknown
https://www.razer.com/synapse-redirect
unknown
http://assets.razerzone.com/eeimages/categories/14594/razer-gaming-softwares-category-comms-usp.png
unknown
https://synapse-3-webservice.razerzone.com/AllSystems.jsonY
unknown
https://cdn.razersynapse.com/1660119346OLtIZnKORazerSynapseDependenciesSetup_v3.7.0830.1.exe
unknown
https://deals-assets-cdn.razerzone.com/download/lwi/cortex/880_500_FRN.png
unknown
http://assets.razerzone.com/images/software/lwi/LWI-SophiePro-1.png
unknown
https://assets2.razerzone.com/images/synapse/virtualringlight.pngQ
unknown
https://deals-assets-cdn.razerzone.com/download/lwi/cortex/880_500_CHS.png
unknown
https://synapse-3-webservice.razerzone.com/PatchExceptionalEID.jsonvC
unknown
https://www.nuget.org/packages/NLog.Web.AspNetCore
unknown
http://assets2.razerzone.com/images/razer-synapse/dark_macros.png
unknown
https://synapse-3-webservice.razerzone.com/dockEID.json1
unknown
https://cdn.razersynapse.com/1721961508TRIMuqXZRazerChromaBroadcasterSetup_v3.9.0806.072610.exe
unknown
https://cdn.razersynapse.com/1676531804G7ekRXhnRzGMS_Setup_V2.3.160.119.exe
unknown
https://deals-assets-cdn.razerzone.com/download/lwi/cortex/880_500_POB.png
unknown
http://assets.razerzone.com/images/software/lwi/LWI-SophiePro-5.pngH
unknown
https://deals-assets-cdn.razerzone.com/download/lwi/880_500_CHT.webp
unknown
https://deals-assets-cdn.razerzone.com/download/lwi/axon/LWI
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://www.newtonsoft.com/jsonschema
unknown
http://www.apache.org/licenses/LICENSE-2.0Roboto
unknown
https://deals-assets-cdn.razerzone.com/download/lwi/880_500_POB.webp
unknown
https://cdn.razersynapse.com/1718863664EiZeyh8ZRazerChromaStudioSetup_v3.9.0630.062001.exe
unknown
https://assets2.razerzone.com
unknown
http://www.razerzone.com/cortex
unknown
https://deals-assets-cdn.razerzone.com/download/lwi/880_500_RUS.webp
unknown
https://deals-assets-cdn.razerzone.com/download/RAZERAXON/RAZERAXONlogo.pngEK
unknown
https://synapse-3-webservice.razerzone.com/AllSystems.json)
unknown
https://synapse-3-webservice.razerzone.com/dockEID.jsonR
unknown
https://www.razer.com/chroma
unknown
http://www.codeplex.com/prism:Microsoft.Practices.Prism.Interactivity.InteractionRequest
unknown
https://cdn.razersynapse.com/1697631427Qv8gmMqvRazerAudioVisualizerSetup_v3.8.1030.101819.exe
unknown
https://deals-assets-cdn.razerzone.com/download/lwi/cortex/880_500_KOR.png
unknown
https://deals-assets-cdn.razerzone.com/download/lwi/cortex/880_500_US.png
unknown
http://169.254.170.2
unknown
http://scripts.sil.org/OFLRazerF5LightItalic
unknown
https://deals-assets-cdn.razerzone.com/download/lwi/cortex/880_500_RUS.pngIa
unknown
https://www.razer.com/synapse
unknown
http://scripts.sil.org/OFLRazerF5SemiBoldItalic
unknown
https://assets.razerzone.com/images/software/lwi/LWI-SophiePro-4.png
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
u05srooyhc.execute-api.us-east-1.amazonaws.com
99.86.4.106
discovery.razerapi.com
unknown
manifest.razerapi.com
unknown
assets2.razerzone.com
unknown
synapse-3-webservice.razerzone.com
unknown
cdn.razersynapse.com
unknown
deals-assets-cdn.razerzone.com
unknown
assets.razerzone.com
unknown

IPs

IP
Domain
Country
Malicious
99.86.4.106
u05srooyhc.execute-api.us-east-1.amazonaws.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RazerInstaller_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RazerInstaller_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RazerInstaller_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RazerInstaller_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RazerInstaller_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RazerInstaller_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RazerInstaller_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RazerInstaller_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RazerInstaller_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RazerInstaller_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RazerInstaller_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RazerInstaller_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RazerInstaller_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RazerInstaller_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4EE1000
trusted library allocation
page read and write
7F8D3000
trusted library allocation
page readonly
D056000
heap
page read and write
66DB000
stack
page read and write
6805000
heap
page read and write
F00000
heap
page read and write
2B19000
trusted library allocation
page read and write
2AA6000
trusted library allocation
page read and write
81B3000
trusted library allocation
page read and write
B9D3000
trusted library allocation
page read and write
63B2000
heap
page read and write
F99000
unkown
page readonly
102C000
stack
page read and write
7F834000
trusted library allocation
page readonly
336F000
trusted library allocation
page read and write
B4C0000
trusted library allocation
page read and write
2D38000
trusted library allocation
page read and write
B3F0000
trusted library allocation
page execute and read and write
F60000
unkown
page readonly
D398000
heap
page read and write
FB7B000
heap
page read and write
790000
heap
page read and write
B6A0000
trusted library allocation
page read and write
1C4E000
heap
page read and write
2E60000
trusted library allocation
page read and write
CAA0000
trusted library allocation
page read and write
5059000
heap
page read and write
7FFD34550000
trusted library allocation
page read and write
C4ED000
heap
page read and write
C13D000
stack
page read and write
C564000
heap
page read and write
1ACB8000
heap
page read and write
B78B000
trusted library allocation
page read and write
CA41000
trusted library allocation
page read and write
C860000
trusted library allocation
page read and write
CAB0000
trusted library allocation
page read and write
7F812000
trusted library allocation
page readonly
7F858000
trusted library allocation
page readonly
2995000
trusted library allocation
page read and write
B520000
trusted library allocation
page read and write
69286000
unkown
page readonly
2E30000
trusted library allocation
page read and write
504F000
heap
page read and write
2EE6000
trusted library allocation
page read and write
7FF4A9A00000
trusted library allocation
page execute and read and write
68DA1000
unkown
page execute read
B10000
heap
page read and write
3375000
trusted library allocation
page read and write
2C72000
trusted library allocation
page read and write
2F1C000
trusted library allocation
page read and write
B430000
trusted library allocation
page read and write
7F85F000
trusted library allocation
page execute read
FF6C000
stack
page read and write
630C000
heap
page read and write
2E33000
trusted library allocation
page read and write
7F863000
trusted library allocation
page execute read
31F7000
trusted library allocation
page read and write
BCFF000
stack
page read and write
2BA9000
trusted library allocation
page read and write
5E1C000
stack
page read and write
690EF000
unkown
page readonly
D386000
heap
page read and write
6530000
trusted library section
page read and write
2C4B000
trusted library allocation
page read and write
63E6000
heap
page read and write
F86000
unkown
page readonly
D227000
heap
page read and write
2F36000
trusted library allocation
page read and write
2C9A000
trusted library allocation
page read and write
4F70000
trusted library allocation
page read and write
AB70000
trusted library allocation
page read and write
BBFA000
unkown
page readonly
B45000
heap
page read and write
4F60000
trusted library allocation
page read and write
C295000
unkown
page readonly
D06A000
heap
page read and write
D3A4000
heap
page read and write
2A56000
trusted library allocation
page read and write
A681000
unkown
page execute read
2AAB000
trusted library allocation
page read and write
EC9F000
stack
page read and write
D395000
heap
page read and write
7F836000
trusted library allocation
page readonly
D250000
heap
page read and write
2CEE000
trusted library allocation
page read and write
63DE000
heap
page read and write
7F851000
trusted library allocation
page execute read
B6B000
heap
page read and write
D3A1000
heap
page read and write
5F20000
trusted library section
page read and write
67FC000
trusted library allocation
page read and write
8151000
trusted library allocation
page read and write
7E0000
heap
page read and write
C930000
trusted library allocation
page read and write
C5AF000
heap
page read and write
7F849000
trusted library allocation
page execute read
2E97000
trusted library allocation
page read and write
68DA0000
unkown
page readonly
7F853000
trusted library allocation
page execute read
2DA7000
trusted library allocation
page read and write
C420000
trusted library allocation
page read and write
D20000
trusted library allocation
page read and write
7F862000
trusted library allocation
page readonly
D204000
heap
page read and write
C9A0000
trusted library allocation
page execute and read and write
7E0000
heap
page read and write
10D0000
heap
page read and write
10B0000
heap
page read and write
7F829000
trusted library allocation
page execute read
D39A000
heap
page read and write
D2DE000
heap
page read and write
F390000
trusted library allocation
page read and write
2DC9000
trusted library allocation
page read and write
2920000
heap
page read and write
550000
unkown
page readonly
6374000
heap
page read and write
D171000
heap
page read and write
2B21000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
F960000
heap
page read and write
1C70000
heap
page read and write
2E11000
trusted library allocation
page read and write
1BA50000
heap
page read and write
69860000
unkown
page readonly
693C000
heap
page read and write
2983000
trusted library allocation
page read and write
C240000
trusted library allocation
page read and write
7F833000
trusted library allocation
page execute read
FBB1000
heap
page read and write
7F84A000
trusted library allocation
page readonly
D37B000
heap
page read and write
D030000
heap
page read and write
681E000
heap
page read and write
69210000
unkown
page readonly
6844000
heap
page read and write
DC0000
trusted library allocation
page read and write
7F821000
trusted library allocation
page execute read
D384000
heap
page read and write
2C4F000
trusted library allocation
page read and write
29CB000
trusted library allocation
page read and write
7F843000
trusted library allocation
page execute read
C708000
heap
page read and write
D120000
heap
page read and write
B9E0000
trusted library allocation
page execute and read and write
C2A6000
unkown
page write copy
7F83A000
trusted library allocation
page readonly
2E0C000
trusted library allocation
page read and write
810C000
stack
page read and write
C506000
heap
page read and write
D30000
trusted library allocation
page read and write
D3B5000
heap
page read and write
D12B000
heap
page read and write
D9C5000
trusted library allocation
page read and write
2E48000
trusted library allocation
page read and write
FE6D000
stack
page read and write
7F850000
trusted library allocation
page readonly
691D5000
unkown
page read and write
D06E000
heap
page read and write
2E09000
trusted library allocation
page read and write
4EC6000
trusted library allocation
page read and write
F60000
unkown
page readonly
A680000
unkown
page readonly
2D23000
trusted library allocation
page read and write
B4B0000
trusted library allocation
page read and write
C25F000
trusted library allocation
page read and write
698E3000
unkown
page readonly
2C65000
trusted library allocation
page read and write
2976000
trusted library allocation
page read and write
1037D000
stack
page read and write
C611000
heap
page read and write
69C4000
heap
page read and write
C737000
heap
page read and write
A6A2000
unkown
page write copy
B5EE000
stack
page read and write
6570000
trusted library allocation
page execute and read and write
1AE5000
heap
page read and write
4FA0000
heap
page read and write
C47A000
heap
page read and write
7F857000
trusted library allocation
page execute read
A6C0000
unkown
page readonly
C850000
trusted library allocation
page read and write
C9B0000
trusted library allocation
page read and write
7F8D1000
trusted library allocation
page readonly
7F841000
trusted library allocation
page execute read
D115000
heap
page read and write
69283000
unkown
page write copy
2BF2000
trusted library allocation
page read and write
299D000
trusted library allocation
page read and write
7F85C000
trusted library allocation
page readonly
DC0000
heap
page read and write
7FFD34542000
trusted library allocation
page read and write
69906000
unkown
page read and write
F3A0000
trusted library allocation
page read and write
2DC1000
trusted library allocation
page read and write
D3B1000
heap
page read and write
2E45000
trusted library allocation
page read and write
35DF000
stack
page read and write
6300000
heap
page read and write
A670000
trusted library allocation
page execute and read and write
65CB000
heap
page read and write
ED10000
trusted library allocation
page read and write
7F8D4000
trusted library allocation
page execute read
3AD0000
trusted library allocation
page read and write
778000
stack
page read and write
7F810000
trusted library allocation
page readonly
CA28000
trusted library allocation
page read and write
F380000
trusted library allocation
page read and write
D36B000
heap
page read and write
7FFD34530000
trusted library allocation
page read and write
2CC1000
trusted library allocation
page read and write
563C000
stack
page read and write
C60000
heap
page read and write
C7A2000
heap
page read and write
7F859000
trusted library allocation
page execute read
2C35000
trusted library allocation
page read and write
B96D000
stack
page read and write
7F831000
trusted library allocation
page execute read
2F20000
trusted library allocation
page read and write
C4CC000
heap
page read and write
7F865000
trusted library allocation
page execute read
C0F000
heap
page read and write
6272000
unkown
page readonly
2B1F000
trusted library allocation
page read and write
533E000
stack
page read and write
2E28000
trusted library allocation
page read and write
6623000
heap
page read and write
7F85B000
trusted library allocation
page execute read
7F840000
trusted library allocation
page readonly
2A01000
trusted library allocation
page read and write
1AE0000
heap
page read and write
3373000
trusted library allocation
page read and write
685F000
heap
page read and write
2A90000
trusted library allocation
page read and write
C250000
trusted library allocation
page read and write
D850000
trusted library allocation
page read and write
2F0E000
trusted library allocation
page read and write
B3D000
heap
page read and write
BA30000
unkown
page readonly
B4F0000
trusted library allocation
page read and write
B861000
trusted library allocation
page read and write
3ACE000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
B83000
heap
page read and write
D854000
trusted library allocation
page read and write
2E41000
trusted library allocation
page read and write
CA80000
trusted library allocation
page read and write
C1D000
heap
page read and write
68D62000
unkown
page read and write
2E40000
trusted library allocation
page read and write
7F82D000
trusted library allocation
page execute read
5D1E000
stack
page read and write
F0C0000
heap
page read and write
6308000
heap
page read and write
7F84F000
trusted library allocation
page execute read
6926D000
unkown
page readonly
12931000
trusted library allocation
page read and write
D39D000
heap
page read and write
4A5E000
stack
page read and write
6658000
heap
page read and write
2B14000
trusted library allocation
page read and write
F9B000
unkown
page readonly
C765000
heap
page read and write
6390000
heap
page read and write
5340000
heap
page read and write
B850000
trusted library allocation
page read and write
C260000
trusted library allocation
page execute and read and write
4EED000
trusted library allocation
page read and write
7F820000
trusted library allocation
page readonly
C59000
trusted library allocation
page read and write
B8ED000
stack
page read and write
12933000
trusted library allocation
page read and write
2C22000
trusted library allocation
page read and write
B42000
heap
page read and write
F4DE000
heap
page read and write
7F86F000
trusted library allocation
page execute read
C7A0000
heap
page read and write
4F09000
trusted library allocation
page read and write
B780000
trusted library allocation
page read and write
B790000
trusted library allocation
page execute and read and write
68D92000
unkown
page read and write
1C40000
heap
page read and write
656D000
trusted library allocation
page read and write
C50000
trusted library allocation
page read and write
2DF2000
trusted library allocation
page read and write
81B1000
trusted library allocation
page read and write
7F827000
trusted library allocation
page execute read
7F86D000
trusted library allocation
page execute read
65B0000
heap
page read and write
DD7000
trusted library allocation
page execute and read and write
B38000
heap
page read and write
2C84000
trusted library allocation
page read and write
CA18000
trusted library allocation
page read and write
4A70000
trusted library allocation
page read and write
2BD2000
trusted library allocation
page read and write
7C0000
heap
page read and write
2C57000
trusted library allocation
page read and write
CA11000
trusted library allocation
page read and write
B9C0000
trusted library allocation
page execute and read and write
4F53000
heap
page execute and read and write
7FFD345F0000
trusted library allocation
page execute and read and write
1AEBC000
stack
page read and write
F10000
heap
page read and write
D053000
heap
page read and write
D393000
heap
page read and write
D2B2000
heap
page read and write
D145000
heap
page read and write
69284000
unkown
page read and write
F1F8000
heap
page read and write
ED20000
trusted library allocation
page read and write
698C3000
unkown
page read and write
C310000
heap
page read and write
7F869000
trusted library allocation
page execute read
691B4000
unkown
page read and write
B9D0000
trusted library allocation
page read and write
4F39000
trusted library allocation
page read and write
2D08000
trusted library allocation
page read and write
B57000
heap
page read and write
7F86C000
trusted library allocation
page readonly
55BE000
stack
page read and write
DBD000
stack
page read and write
F4BE000
stack
page read and write
D0A0000
heap
page read and write
D1FE000
heap
page read and write
FD60000
trusted library allocation
page read and write
698F5000
unkown
page readonly
D136000
heap
page read and write
2CE9000
trusted library allocation
page read and write
2D2B000
trusted library allocation
page read and write
D39F000
heap
page read and write
4EF5000
trusted library allocation
page read and write
C23C000
stack
page read and write
7FFD34534000
trusted library allocation
page read and write
691D000
heap
page read and write
6310000
heap
page read and write
5140000
heap
page execute and read and write
68D30000
unkown
page readonly
D9B000
stack
page read and write
2E34000
trusted library allocation
page read and write
1C4A000
heap
page read and write
D33A000
heap
page read and write
12994000
trusted library allocation
page read and write
C86A000
trusted library allocation
page read and write
2D53000
trusted library allocation
page read and write
EFC4000
heap
page read and write
C4FA000
heap
page read and write
39F0000
trusted library allocation
page read and write
DC5000
heap
page read and write
5150000
trusted library allocation
page read and write
2B85000
trusted library allocation
page read and write
7A0000
heap
page read and write
29E2000
trusted library allocation
page read and write
DDB000
trusted library allocation
page execute and read and write
D129000
heap
page read and write
ECE0000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
2931000
trusted library allocation
page read and write
69861000
unkown
page execute read
68AB000
heap
page read and write
CA50000
trusted library allocation
page read and write
1B74E000
stack
page read and write
500D000
heap
page read and write
C40000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
441000
unkown
page readonly
A6D3000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
D381000
heap
page read and write
4F10000
trusted library allocation
page read and write
C21000
heap
page read and write
B6C0000
trusted library section
page read and write
D067000
heap
page read and write
2968000
trusted library allocation
page read and write
698E0000
unkown
page read and write
C840000
trusted library allocation
page execute and read and write
7F845000
trusted library allocation
page execute read
C0E0000
trusted library section
page read and write
1B310000
heap
page read and write
F234000
heap
page read and write
740000
stack
page read and write
A6A3000
unkown
page readonly
7F870000
trusted library allocation
page execute and read and write
B4D0000
trusted library allocation
page read and write
2DF6000
trusted library allocation
page read and write
285E000
stack
page read and write
E89B000
trusted library allocation
page read and write
D196000
heap
page read and write
D20C000
heap
page read and write
B50000
heap
page read and write
B67E000
stack
page read and write
7F86B000
trusted library allocation
page execute read
7F82C000
trusted library allocation
page readonly
68D77000
unkown
page readonly
2E4D000
trusted library allocation
page read and write
AF2000
stack
page read and write
7F811000
trusted library allocation
page execute read
BA32000
unkown
page readonly
ECE000
stack
page read and write
C83D000
heap
page read and write
B4E0000
trusted library allocation
page read and write
2C1A000
trusted library allocation
page read and write
2B66000
trusted library allocation
page read and write
2AC6000
trusted library allocation
page read and write
2BD7000
trusted library allocation
page read and write
65C6000
heap
page read and write
2E44000
trusted library allocation
page read and write
698E1000
unkown
page readonly
2B4F000
trusted library allocation
page read and write
ECB0000
trusted library allocation
page read and write
642E000
stack
page read and write
D3A6000
heap
page read and write
C30000
trusted library allocation
page read and write
D020000
heap
page read and write
698C6000
unkown
page readonly
D28D000
heap
page read and write
2860000
trusted library section
page read and write
7F82F000
trusted library allocation
page execute read
2E2C000
trusted library allocation
page read and write
A687000
unkown
page readonly
C7F5000
heap
page read and write
1120000
trusted library allocation
page read and write
F24F000
heap
page read and write
4F3E000
trusted library allocation
page read and write
F203000
heap
page read and write
2960000
trusted library allocation
page read and write
29E7000
trusted library allocation
page read and write
6839000
heap
page read and write
E86F000
trusted library allocation
page read and write
2E89000
trusted library allocation
page read and write
7FFD345E0000
trusted library allocation
page read and write
ECA0000
trusted library allocation
page read and write
2CCF000
trusted library allocation
page read and write
552000
unkown
page readonly
DD2000
trusted library allocation
page read and write
B890000
trusted library allocation
page read and write
D058000
heap
page read and write
C900000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
7F8D5000
trusted library allocation
page readonly
69E4000
heap
page read and write
2AFD000
trusted library allocation
page read and write
6550000
trusted library allocation
page read and write
691DB000
unkown
page readonly
834C000
stack
page read and write
7FFD3455D000
trusted library allocation
page execute and read and write
2B81000
trusted library allocation
page read and write
D841000
trusted library allocation
page read and write
D38A000
heap
page read and write
D50000
heap
page execute and read and write
F97E000
heap
page read and write
F70000
heap
page execute and read and write
FB9D000
heap
page read and write
5C8000
unkown
page readonly
D60000
trusted library section
page read and write
2E7C000
trusted library allocation
page read and write
C290000
unkown
page readonly
63D9000
heap
page read and write
698D0000
unkown
page readonly
2DFE000
trusted library allocation
page read and write
B510000
trusted library allocation
page read and write
2ECB000
trusted library allocation
page read and write
698C9000
unkown
page readonly
2C7F000
trusted library allocation
page read and write
2D3D000
trusted library allocation
page read and write
BF90000
heap
page read and write
81A0000
trusted library allocation
page execute and read and write
C2A8000
unkown
page readonly
4A60000
trusted library allocation
page read and write
2C9E000
trusted library allocation
page read and write
C469000
heap
page read and write
2B3C000
trusted library allocation
page read and write
DC6000
trusted library allocation
page execute and read and write
33B0000
trusted library allocation
page read and write
7F83B000
trusted library allocation
page execute read
7F8D8000
trusted library allocation
page execute read
55FB000
stack
page read and write
62F0000
heap
page read and write
B30000
heap
page read and write
B5AB000
stack
page read and write
BF8D000
stack
page read and write
29E1000
trusted library allocation
page read and write
6332000
heap
page read and write
2D72000
trusted library allocation
page read and write
7F837000
trusted library allocation
page execute read
B6B0000
trusted library allocation
page read and write
65C8000
heap
page read and write
550000
unkown
page readonly
39F4000
trusted library allocation
page read and write
2D8C000
trusted library allocation
page read and write
5051000
heap
page read and write
2A0000
unkown
page readonly
69282000
unkown
page read and write
F61000
unkown
page execute read
2ECF000
trusted library allocation
page read and write
C772000
heap
page read and write
D0A6000
heap
page read and write
7FFD346F0000
trusted library allocation
page read and write
6590000
heap
page read and write
7F839000
trusted library allocation
page execute read
C43000
trusted library allocation
page execute and read and write
2E38000
trusted library allocation
page read and write
2CDB000
trusted library allocation
page read and write
ED00000
trusted library allocation
page read and write
F96000
unkown
page write copy
680C000
heap
page read and write
6879000
heap
page read and write
7F8DC000
trusted library allocation
page execute read
A6B4000
trusted library allocation
page read and write
ECF0000
trusted library allocation
page read and write
C410000
trusted library allocation
page read and write
29B1000
trusted library allocation
page read and write
C0DD000
stack
page read and write
B3B000
heap
page read and write
2A2000
unkown
page readonly
7F85D000
trusted library allocation
page execute read
C5D000
trusted library allocation
page execute and read and write
C815000
heap
page read and write
1BEF000
stack
page read and write
B92F000
stack
page read and write
B710000
trusted library section
page read and write
7FFD3455B000
trusted library allocation
page execute and read and write
C2C0000
trusted library allocation
page execute and read and write
1BF0000
heap
page read and write
7F83D000
trusted library allocation
page execute read
39E1000
trusted library allocation
page read and write
6304000
heap
page read and write
2CF6000
trusted library allocation
page read and write
7FFD3458C000
trusted library allocation
page execute and read and write
81C0000
trusted library allocation
page read and write
6998000
heap
page read and write
D830000
trusted library allocation
page read and write
D38F000
heap
page read and write
2E4C000
trusted library allocation
page read and write
B870000
trusted library allocation
page read and write
2CB9000
trusted library allocation
page read and write
63EC000
heap
page read and write
65D0000
heap
page read and write
A6BD000
trusted library allocation
page read and write
C09000
heap
page read and write
691B6000
unkown
page write copy
CD9E000
stack
page read and write
C440000
heap
page read and write
65A0000
heap
page read and write
6C8E000
stack
page read and write
6854000
heap
page read and write
68D63000
unkown
page write copy
B4A0000
trusted library allocation
page read and write
7F8D0000
trusted library allocation
page execute read
4EC4000
trusted library allocation
page read and write
F6D0000
trusted library allocation
page read and write
C8D0000
trusted library allocation
page read and write
6802000
heap
page read and write
7FFD3453D000
trusted library allocation
page execute and read and write
D221000
heap
page read and write
2AE3000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
B400000
trusted library allocation
page read and write
7F83E000
trusted library allocation
page readonly
DD7D000
trusted library allocation
page read and write
D048000
heap
page read and write
68D31000
unkown
page execute read
FB0000
heap
page read and write
BFC000
heap
page read and write
2E1D000
trusted library allocation
page read and write
E00000
heap
page execute and read and write
C679000
heap
page read and write
7F847000
trusted library allocation
page execute read
2A1C000
trusted library allocation
page read and write
D073000
heap
page read and write
B410000
trusted library allocation
page read and write
D391000
heap
page read and write
C8C0000
trusted library allocation
page read and write
F99000
unkown
page readonly
C870000
trusted library allocation
page read and write
4ECE000
trusted library allocation
page read and write
D07E000
heap
page read and write
B440000
trusted library allocation
page read and write
CA60000
trusted library allocation
page read and write
B52000
heap
page read and write
D224000
heap
page read and write
6811000
heap
page read and write
4EC0000
trusted library allocation
page read and write
2DD7000
trusted library allocation
page read and write
8180000
trusted library allocation
page read and write
29EF000
trusted library allocation
page read and write
C7E2000
heap
page read and write
CA70000
trusted library allocation
page read and write
5F50000
unkown
page readonly
67D8000
stack
page read and write
7FFD346D0000
trusted library allocation
page read and write
B880000
trusted library allocation
page execute and read and write
DDB1000
trusted library allocation
page read and write
691B7000
unkown
page read and write
D106000
heap
page read and write
D0F000
stack
page read and write
BDFE000
stack
page read and write
5650000
trusted library section
page read and write
D3C5000
heap
page read and write
D230000
heap
page read and write
7F83F000
trusted library allocation
page execute read
17DE000
stack
page read and write
B7A0000
trusted library section
page read and write
17F0000
heap
page read and write
4FB3000
heap
page read and write
CA30000
trusted library allocation
page execute and read and write
2C16000
trusted library allocation
page read and write
106E000
stack
page read and write
F082000
heap
page read and write
62FC000
heap
page read and write
6991000
heap
page read and write
D2D5000
heap
page read and write
ECD0000
trusted library allocation
page read and write
7F835000
trusted library allocation
page execute read
C8E0000
trusted library allocation
page read and write
12937000
trusted library allocation
page read and write
BB7000
heap
page read and write
2DDC000
trusted library allocation
page read and write
B8A0000
trusted library allocation
page execute and read and write
C8B0000
trusted library allocation
page read and write
D10D000
heap
page read and write
69F5000
heap
page read and write
2DE4000
trusted library allocation
page read and write
B86A000
trusted library allocation
page read and write
7FFD34533000
trusted library allocation
page execute and read and write
D063000
heap
page read and write
2D88000
trusted library allocation
page read and write
7F823000
trusted library allocation
page execute read
B490000
trusted library allocation
page read and write
D33000
trusted library allocation
page read and write
C23000
heap
page read and write
4FB0000
heap
page read and write
2B6A000
trusted library allocation
page read and write
E9C000
stack
page read and write
699F000
heap
page read and write
6580000
trusted library allocation
page execute and read and write
2A3A000
trusted library allocation
page read and write
A792000
trusted library allocation
page read and write
CA00000
trusted library allocation
page read and write
E10000
trusted library allocation
page execute and read and write
C588000
heap
page read and write
2BDF000
trusted library allocation
page read and write
7FFD34540000
trusted library allocation
page read and write
B9BE000
stack
page read and write
B33000
heap
page read and write
F22D000
heap
page read and write
FA83000
heap
page read and write
CA13000
trusted library allocation
page read and write
F1FD000
heap
page read and write
696C000
heap
page read and write
A774000
trusted library allocation
page read and write
D3B8000
heap
page read and write
7F82B000
trusted library allocation
page execute read
2E19000
trusted library allocation
page read and write
BDA000
heap
page read and write
1054D000
stack
page read and write
2ECC000
trusted library allocation
page read and write
F1C9000
heap
page read and write
2DBD000
trusted library allocation
page read and write
7F867000
trusted library allocation
page execute read
CA21000
trusted library allocation
page read and write
4B7C000
stack
page read and write
6561000
trusted library allocation
page read and write
C44000
trusted library allocation
page read and write
B373000
trusted library allocation
page read and write
7F8DA000
trusted library allocation
page execute read
2D45000
trusted library allocation
page read and write
D0FB000
heap
page read and write
7F60000
trusted library allocation
page read and write
2C8C000
trusted library allocation
page read and write
7F832000
trusted library allocation
page readonly
4EE6000
trusted library allocation
page read and write
B3A0000
trusted library allocation
page execute and read and write
C522000
heap
page read and write
7F8DE000
trusted library allocation
page execute read
69211000
unkown
page execute read
3A02000
trusted library allocation
page read and write
C291000
unkown
page execute read
A6C2000
unkown
page readonly
683F000
heap
page read and write
4A1E000
stack
page read and write
6800000
heap
page read and write
2991000
trusted library allocation
page read and write
2F28000
trusted library allocation
page read and write
F985000
heap
page read and write
2D03000
trusted library allocation
page read and write
29DE000
stack
page read and write
E20000
heap
page read and write
B680000
trusted library section
page read and write
68C8000
heap
page read and write
1A960000
trusted library allocation
page read and write
A6CC000
unkown
page readonly
508A000
heap
page read and write
7F84B000
trusted library allocation
page execute read
295C000
trusted library allocation
page read and write
7F844000
trusted library allocation
page readonly
C920000
trusted library allocation
page read and write
4FC6000
heap
page read and write
6859000
heap
page read and write
2E26000
trusted library allocation
page read and write
C65000
heap
page read and write
4EDE000
trusted library allocation
page read and write
CA90000
trusted library allocation
page read and write
D17B000
heap
page read and write
7F825000
trusted library allocation
page execute read
5660000
trusted library section
page read and write
1130000
heap
page read and write
2F01000
trusted library allocation
page read and write
68D65000
unkown
page readonly
E27000
heap
page read and write
B500000
trusted library allocation
page read and write
D3AF000
heap
page read and write
5F1C000
stack
page read and write
6993000
heap
page read and write
2A62000
trusted library allocation
page read and write
2CB4000
trusted library allocation
page read and write
7FFD34616000
trusted library allocation
page execute and read and write
FBBB000
heap
page read and write
6C4D000
stack
page read and write
2BA1000
trusted library allocation
page read and write
2B9C000
trusted library allocation
page read and write
B866000
trusted library allocation
page read and write
D820000
trusted library allocation
page read and write
33A2000
trusted library allocation
page read and write
B86E000
trusted library allocation
page read and write
844C000
stack
page read and write
113A000
heap
page read and write
2A75000
trusted library allocation
page read and write
ECC0000
trusted library allocation
page read and write
4ECB000
trusted library allocation
page read and write
6381000
heap
page read and write
7F0000
heap
page read and write
3188000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
68D64000
unkown
page read and write
B1C000
heap
page read and write
F5E000
stack
page read and write
A650000
trusted library allocation
page read and write
C8F0000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
50F0000
trusted library allocation
page read and write
639B000
heap
page read and write
2C6A000
trusted library allocation
page read and write
2A5A000
trusted library allocation
page read and write
2C3D000
trusted library allocation
page read and write
7FFD345EC000
trusted library allocation
page execute and read and write
6ACD000
stack
page read and write
BE00000
trusted library section
page read and write
F5DE000
stack
page read and write
F61000
unkown
page execute read
4ED2000
trusted library allocation
page read and write
D37F000
heap
page read and write
F9B000
unkown
page readonly
691B8000
unkown
page write copy
7F8D2000
trusted library allocation
page execute read
7F84D000
trusted library allocation
page execute read
D388000
heap
page read and write
63A3000
heap
page read and write
A660000
trusted library allocation
page execute and read and write
3640000
heap
page read and write
D3A8000
heap
page read and write
2BBC000
trusted library allocation
page read and write
652F000
stack
page read and write
D04D000
heap
page read and write
4F50000
heap
page execute and read and write
B00000
trusted library allocation
page read and write
698D1000
unkown
page execute read
4EF2000
trusted library allocation
page read and write
C4DF000
heap
page read and write
F96000
unkown
page read and write
FB98000
heap
page read and write
2D5F000
trusted library allocation
page read and write
7F8D6000
trusted library allocation
page execute read
2CA6000
trusted library allocation
page read and write
7F861000
trusted library allocation
page execute read
D3BA000
heap
page read and write
C910000
trusted library allocation
page read and write
B970000
trusted library allocation
page read and write
513E000
stack
page read and write
2E2B000
trusted library allocation
page read and write
B370000
trusted library allocation
page read and write
5F52000
unkown
page readonly
B691000
trusted library allocation
page read and write
DD5000
trusted library allocation
page execute and read and write
D3AA000
heap
page read and write
1064E000
stack
page read and write
F86000
unkown
page readonly
2EB1000
trusted library allocation
page read and write
7F855000
trusted library allocation
page execute read
2D57000
trusted library allocation
page read and write
C866000
trusted library allocation
page read and write
7F813000
trusted library allocation
page execute read
2BFA000
trusted library allocation
page read and write
2E3C000
trusted library allocation
page read and write
C704000
heap
page read and write
2C08000
trusted library allocation
page read and write
7FFD3454D000
trusted library allocation
page execute and read and write
F9A0000
heap
page read and write
C991000
trusted library allocation
page read and write
50C0000
trusted library allocation
page execute and read and write
C78C000
heap
page read and write
C4D000
trusted library allocation
page execute and read and write
FB5000
heap
page read and write
4F00000
trusted library allocation
page read and write
2B34000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
D2AD000
heap
page read and write
B7E000
heap
page read and write
7FFD34650000
trusted library allocation
page execute and read and write
D0F4000
heap
page read and write
2AB3000
trusted library allocation
page read and write
C45C000
heap
page read and write
63B6000
heap
page read and write
65D2000
heap
page read and write
10AC000
stack
page read and write
7F868000
trusted library allocation
page readonly
DD0000
trusted library allocation
page read and write
7FFD346E0000
trusted library allocation
page read and write
CA48000
trusted library allocation
page read and write
2F06000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
2CD3000
trusted library allocation
page read and write
FB88000
heap
page read and write
8190000
trusted library allocation
page read and write
There are 813 hidden memdumps, click here to show them.