IOC Report
JabraDirectSetup.exe

loading gif

Files

File Path
Type
Category
Malicious
JabraDirectSetup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
3cf367.rbf (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\AvayaIPIntegration\AvayaIPIntegration_Part.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\AvayaIPIntegration\AvayaIP_InterfaceApi.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\AvayaOneXIntegration\AvayaOneXIntegration_Part.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\AvayaOneXV3Integration\Autofac.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\AvayaOneXV3Integration\AvayaOneXV3Integration_Part.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\BroadSoftIntegration\BroadSoftIntegration_Part.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\CiscoIPCommunicatorIntegration\CiscoIPCommunicator_Part.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\CiscoJabberIntegration\CiscoJabberIntegration_Part.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\CiscoUCIntegration\CiscoUCIntegration_Part.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\CiscoWebExConnectIntegration\CiscoWebExConnectIntegration_Part.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\CiscoWebExConnectIntegration\GNDeviceInterface.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\CounterpathBriaIntegration\CounterpathBriaIntegration_Part.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\BluecorePsKeyApi.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\DeviceInfo.xml
XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\DfuEngine.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\DfuEngineWrapper.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\FwVersionConstraints.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\GNAudio.CommandLineParser.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\GNAudio.DeviceApis.BluecorePsKeyApi.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\GNAudio.DeviceApis.FirmwareUpdate.Conexant.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\GNAudio.DeviceApis.FirmwareUpdate.CphAdvance.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\GNAudio.DeviceApis.FirmwareUpdate.Csr.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\GNAudio.DeviceApis.FirmwareUpdate.CsrOta.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\GNAudio.DeviceApis.FirmwareUpdate.CsrUsbOta.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\GNAudio.DeviceApis.FirmwareUpdate.DeviceAdapter.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\GNAudio.DeviceApis.FirmwareUpdate.DfuEngine.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\GNAudio.DeviceApis.FirmwareUpdate.Factories.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\GNAudio.DeviceApis.FirmwareUpdate.MassStorage.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\GNAudio.DeviceApis.FirmwareUpdate.MxUvc.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\GNAudio.DeviceApis.FirmwareUpdate.QualcommHid.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\GNAudio.DeviceApis.FirmwareUpdate.Sitel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\GNAudio.DeviceApis.FirmwareUpdate.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\GNAudio.DeviceApis.FwBuildVectorReader.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\GNAudio.DeviceApis.GnProtocol.UsbHid.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\GNAudio.DeviceApis.GnProtocol.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\GNAudio.DeviceApis.ModelBase.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\GNAudio.DeviceApis.PanaCast.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\GNAudio.DeviceApis.UsbDeviceInformation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\GNAudio.DeviceApis.UsbDeviceScanning.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\GNAudio.DeviceApis.UsbHidDevices.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\GNAudio.FirmwareUpdate.DeviceFirmwareUpdateInfo.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\JabraCmdlineFwUpdater.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\JabraCmdlineFwUpdater.exe.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\Microsoft.Bcl.AsyncInterfaces.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\Microsoft.VC80.CRT.manifest
XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\MxUvcFwu.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\MxUvcFwuWrapper.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\PanaCastAPI.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\PanaCastAPIWrapper.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\SitelHidFwu.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\SitelHidFwuWrapper.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\System.Buffers.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\System.Memory.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\System.Numerics.Vectors.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\System.Runtime.CompilerServices.Unsafe.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\System.Text.Encodings.Web.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\System.Text.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\System.Threading.Tasks.Extensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\TestEngine.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\msvcp80.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\msvcr80.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\FWU\pttransport.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\LICENSE
ASCII text
dropped
C:\Program Files (x86)\Jabra\Direct4\LICENSES.chromium.html
HTML document, UTF-8 Unicode text, with very long lines, with CRLF, LF line terminators
dropped
C:\Program Files (x86)\Jabra\Direct4\LyncIntegration\default.xml
XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\Jabra\Direct4\NEC SP 350 Integration\GNDeviceInterface.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
modified
C:\Program Files (x86)\Jabra\Direct4\ZoomIntegration\Autofac.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\chrome_100_percent.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\chrome_200_percent.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\d3dcompiler_47.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\ffmpeg.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\icudtl.dat
data
dropped
C:\Program Files (x86)\Jabra\Direct4\jabra-direct.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\am.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\ar.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\bg.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\bn.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\ca.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\cs.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\da.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\de.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\el.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\en-GB.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\en-US.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\es-419.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\es.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\et.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\fa.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\fi.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\fil.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\fr.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\gu.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\he.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\hi.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\hr.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\hu.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\id.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\it.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\ja.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\kn.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\ko.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\lt.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\lv.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\ml.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\mr.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\ms.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\nb.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\nl.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\pl.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\pt-BR.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\pt-PT.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\ro.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\ru.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\sk.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\sl.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\sr.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\sv.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\sw.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\ta.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\te.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\th.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\tr.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\uk.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\vi.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\zh-CN.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\locales\zh-TW.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\resources.pak
data
dropped
C:\Program Files (x86)\Jabra\Direct4\resources\app.asar
data
dropped
C:\Program Files (x86)\Jabra\Direct4\resources\app.asar.unpacked\node_modules\@gnaudio\jabra-node-sdk\build\Release\libjabra.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\resources\app.asar.unpacked\node_modules\@gnaudio\jabra-node-sdk\build\Release\sdkintegration.node
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\resources\app.asar.unpacked\node_modules\applicationinsights-native-metrics\build\Release\native_metrics.node
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\resources\app.asar.unpacked\node_modules\panacastapi\build\Release\panacastapi.node
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\snapshot_blob.bin
data
dropped
C:\Program Files (x86)\Jabra\Direct4\swiftshader\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\swiftshader\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\v8_context_snapshot.bin
data
dropped
C:\Program Files (x86)\Jabra\Direct4\version
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\Jabra\Direct4\vk_swiftshader.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Jabra\Direct4\vk_swiftshader_icd.json
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\Jabra\Direct4\vulkan-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Package Cache\.unverified\DFUDriverSetupX64Setup.msi (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: DFUDriverSetupX64Setup, Author: GN Netcom A/S, Keywords: Installer, Comments: This installer database contains the logic and data required to install DFUDriverSetupX64Setup., Template: Intel;1033, Revision Number: {7963E9FB-725D-4343-A916-B8153882B1F1}, Create Time/Date: Wed Apr 28 11:13:02 2021, Last Saved Time/Date: Wed Apr 28 11:13:02 2021, Number of Pages: 300, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\ProgramData\Package Cache\.unverified\JabraDirect.msi (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Jabra Direct, Author: GN Audio A/S, Keywords: Installer, Comments: This installer database contains the logic and data required to install Jabra Direct., Template: Intel;1033, Revision Number: {DE4E175C-DDE6-476B-99A0-8B5D3A2341CF}, Create Time/Date: Mon Mar 7 18:17:12 2022, Last Saved Time/Date: Mon Mar 7 18:17:12 2022, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\ProgramData\Package Cache\{316F5FBF-4536-4A14-8D29-C1A9A8D800B6}v5.12.06601\JabraDirect.msi (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Jabra Direct, Author: GN Audio A/S, Keywords: Installer, Comments: This installer database contains the logic and data required to install Jabra Direct., Template: Intel;1033, Revision Number: {DE4E175C-DDE6-476B-99A0-8B5D3A2341CF}, Create Time/Date: Mon Mar 7 18:17:12 2022, Last Saved Time/Date: Mon Mar 7 18:17:12 2022, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\ProgramData\Package Cache\{50c3bcea-1203-4bf1-9103-09af1bf52966}\JabraDirectSetup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Package Cache\{50c3bcea-1203-4bf1-9103-09af1bf52966}\state.rsm
data
dropped
C:\ProgramData\Package Cache\{D662C345-04FD-4F6C-AB68-B9BC6D6A5D2F}v7.0.32822.0\DFUDriverSetupX64Setup.msi (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: DFUDriverSetupX64Setup, Author: GN Netcom A/S, Keywords: Installer, Comments: This installer database contains the logic and data required to install DFUDriverSetupX64Setup., Template: Intel;1033, Revision Number: {7963E9FB-725D-4343-A916-B8153882B1F1}, Create Time/Date: Wed Apr 28 11:13:02 2021, Last Saved Time/Date: Wed Apr 28 11:13:02 2021, Number of Pages: 300, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Users\user\AppData\Local\Temp\DELC182.tmp (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{332EE04F-741A-4188-8924-1DBA26FBF992}\.ba\Background.png
PNG image data, 581 x 291, 8-bit colormap, interlaced
dropped
C:\Users\user\AppData\Local\Temp\{332EE04F-741A-4188-8924-1DBA26FBF992}\.ba\BootstrapperApplicationData.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{332EE04F-741A-4188-8924-1DBA26FBF992}\.ba\license.rtf
Rich Text Format data, version 1, ANSI
dropped
C:\Users\user\AppData\Local\Temp\{332EE04F-741A-4188-8924-1DBA26FBF992}\.ba\logo.png
PNG image data, 581 x 291, 8-bit colormap, interlaced
dropped
C:\Users\user\AppData\Local\Temp\{332EE04F-741A-4188-8924-1DBA26FBF992}\.ba\thm.wxl
XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{332EE04F-741A-4188-8924-1DBA26FBF992}\.ba\thm.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{332EE04F-741A-4188-8924-1DBA26FBF992}\.ba\wixstdba.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\3cf364.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Jabra Direct, Author: GN Audio A/S, Keywords: Installer, Comments: This installer database contains the logic and data required to install Jabra Direct., Template: Intel;1033, Revision Number: {DE4E175C-DDE6-476B-99A0-8B5D3A2341CF}, Create Time/Date: Mon Mar 7 18:17:12 2022, Last Saved Time/Date: Mon Mar 7 18:17:12 2022, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\MSI1D05.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI3570.tmp
data
dropped
C:\Windows\Installer\MSI38BC.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Windows\SysWOW64\concrt140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{240BAF75-3E5B-4E93-8F26-E04B9DE786C2}\.ba\Background.png
PNG image data, 581 x 291, 8-bit colormap, interlaced
dropped
C:\Windows\Temp\{240BAF75-3E5B-4E93-8F26-E04B9DE786C2}\.ba\BootstrapperApplicationData.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Windows\Temp\{240BAF75-3E5B-4E93-8F26-E04B9DE786C2}\.ba\license.rtf
Rich Text Format data, version 1, ANSI
dropped
C:\Windows\Temp\{240BAF75-3E5B-4E93-8F26-E04B9DE786C2}\.ba\logo.png
PNG image data, 581 x 291, 8-bit colormap, interlaced
dropped
C:\Windows\Temp\{240BAF75-3E5B-4E93-8F26-E04B9DE786C2}\.ba\thm.wxl
XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Windows\Temp\{240BAF75-3E5B-4E93-8F26-E04B9DE786C2}\.ba\thm.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\{240BAF75-3E5B-4E93-8F26-E04B9DE786C2}\.ba\wixstdba.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{240BAF75-3E5B-4E93-8F26-E04B9DE786C2}\.be\JabraDirectSetup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{240BAF75-3E5B-4E93-8F26-E04B9DE786C2}\DFUDriverSetupX64Setup.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: DFUDriverSetupX64Setup, Author: GN Netcom A/S, Keywords: Installer, Comments: This installer database contains the logic and data required to install DFUDriverSetupX64Setup., Template: Intel;1033, Revision Number: {7963E9FB-725D-4343-A916-B8153882B1F1}, Create Time/Date: Wed Apr 28 11:13:02 2021, Last Saved Time/Date: Wed Apr 28 11:13:02 2021, Number of Pages: 300, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Temp\{240BAF75-3E5B-4E93-8F26-E04B9DE786C2}\JabraDirect.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Jabra Direct, Author: GN Audio A/S, Keywords: Installer, Comments: This installer database contains the logic and data required to install Jabra Direct., Template: Intel;1033, Revision Number: {DE4E175C-DDE6-476B-99A0-8B5D3A2341CF}, Create Time/Date: Mon Mar 7 18:17:12 2022, Last Saved Time/Date: Mon Mar 7 18:17:12 2022, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Temp\{E08359EB-BFFA-49B5-8115-528C8789A364}\.cr\JabraDirectSetup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\~DF131044FCCF062C91.TMP
data
dropped
C:\Windows\Temp\~DF7460504A156BF38D.TMP
Composite Document File V2 Document, Cannot read section info
dropped
There are 168 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\JabraDirectSetup.exe
"C:\Users\user\Desktop\JabraDirectSetup.exe"
C:\Windows\Temp\{E08359EB-BFFA-49B5-8115-528C8789A364}\.cr\JabraDirectSetup.exe
"C:\Windows\Temp\{E08359EB-BFFA-49B5-8115-528C8789A364}\.cr\JabraDirectSetup.exe" -burn.clean.room="C:\Users\user\Desktop\JabraDirectSetup.exe" -burn.filehandle.attached=572 -burn.filehandle.self=568
C:\Windows\Temp\{240BAF75-3E5B-4E93-8F26-E04B9DE786C2}\.be\JabraDirectSetup.exe
"C:\Windows\Temp\{240BAF75-3E5B-4E93-8F26-E04B9DE786C2}\.be\JabraDirectSetup.exe" -q -burn.elevated BurnPipe.{D9E1E3E0-161A-4566-8CAE-5A87964B54C8} {D37BA658-0E76-49AC-BEF7-9E23554C8C54} 1120
C:\ProgramData\Package Cache\{50c3bcea-1203-4bf1-9103-09af1bf52966}\JabraDirectSetup.exe
"C:\ProgramData\Package Cache\{50c3bcea-1203-4bf1-9103-09af1bf52966}\JabraDirectSetup.exe" /burn.runonce
C:\ProgramData\Package Cache\{50c3bcea-1203-4bf1-9103-09af1bf52966}\JabraDirectSetup.exe
C:\ProgramData\Package Cache\{50c3bcea-1203-4bf1-9103-09af1bf52966}\JabraDirectSetup.exe" /burn.log.append "C:\Users\user\AppData\Local\Temp\Jabra_Direct_20220923074951.log
C:\ProgramData\Package Cache\{50c3bcea-1203-4bf1-9103-09af1bf52966}\JabraDirectSetup.exe
C:\ProgramData\Package Cache\{50c3bcea-1203-4bf1-9103-09af1bf52966}\JabraDirectSetup.exe" -burn.clean.room="C:\ProgramData\Package Cache\{50c3bcea-1203-4bf1-9103-09af1bf52966}\JabraDirectSetup.exe" -burn.filehandle.attached=560 -burn.filehandle.self=580 /burn.log.append "C:\Users\user\AppData\Local\Temp\Jabra_Direct_20220923074951.log
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 094F350B1881CEA527676BAF5570DA2D
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\\System32\taskkill.exe" /F /IM jabra-direct.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\ProgramData\Package Cache\{50c3bcea-1203-4bf1-9103-09af1bf52966}\JabraDirectSetup.exe
"C:\ProgramData\Package Cache\{50c3bcea-1203-4bf1-9103-09af1bf52966}\JabraDirectSetup.exe" -q -burn.elevated BurnPipe.{9C247021-F0C8-4FC2-9304-77A36769657D} {3D1A53A5-B618-4AC6-9F29-86FEE8B34C1A} 1240
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://service.conversation.v2.soap.uc.cisco.com/startConversation
unknown
http://client.system.v2.soap.uc.cisco.comT
unknown
http://service.phone.v2.soap.uc.cisco.com/unsubscribe
unknown
http://service.system.v2.soap.uc.cisco.com/getCredentials
unknown
http://service.system.v2.soap.uc.cisco.com/registerClient
unknown
https://support.google.com/chrome/answer/6098869
unknown
http://client.audio.v2.soap.uc.cisco.com/onAudioSnapshot
unknown
http://service.audio.v2.soap.uc.cisco.com/setCurrentOutputVolume
unknown
http://client.system.v2.soap.uc.cisco.comf
unknown
http://client.config.v2.soap.uc.cisco.comT
unknown
http://service.phone.v2.soap.uc.cisco.com/subscribe
unknown
http://service.conversation.v2.soap.uc.cisco.com/unsubscribe
unknown
http://service.conversation.v2.soap.uc.cisco.com/addMediaToConversation
unknown
http://service.system.v2.soap.uc.cisco.comTU
unknown
http://service.device.v1.soap.uc.cisco.com/setDefaultLine
unknown
http://client.audio.v2.soap.uc.cisco.com/onDefaultInputVolumeUpdated_
unknown
http://client.system.v2.soap.uc.cisco.com9
unknown
http://service.phone.v2.soap.uc.cisco.com/resume
unknown
http://client.config.v2.soap.uc.cisco.com/onConfigDataDeletedW
unknown
http://wixtoolset.org
unknown
https://bugs.chromium.org/p/chromium/issues/entry?template=Safety
unknown
http://service.audio.v2.soap.uc.cisco.com/setVoiceActivityDetectionParameters
unknown
http://service.phone.v2.soap.uc.cisco.com/sendDtmfTone
unknown
http://service.audio.v2.soap.uc.cisco.com/setRingerDevice
unknown
http://service.phone.v2.soap.uc.cisco.com/setDoNotDisturb
unknown
http://service.device.v2.soap.uc.cisco.com/setDeviceAlias
unknown
http://client.phone.v2.soap.uc.cisco.com/onErrorU
unknown
http://service.system.v2.soap.uc.cisco.com/unregisterClient
unknown
http://client.device.v2.soap.uc.cisco.com/onErrorT
unknown
http://service.system.v2.soap.uc.cisco.com/setServerAddressTypes
unknown
http://service.audio.v2.soap.uc.cisco.com/getDefaultInputVolume
unknown
http://client.conversation.v2.soap.uc.cisco.com/onRemoteMediaOffered_
unknown
http://config.v2.soap.uc.cisco.com/types
unknown
http://client.audio.v2.soap.uc.cisco.com/onCurrentInputVolumeUpdated
unknown
http://client.phone.v2.soap.uc.cisco.com/onPhoneParticipantUpdatedU
unknown
https://www.jabra.com/direct
unknown
http://client.device.v2.soap.uc.cisco.como
unknown
http://client.device.v2.soap.uc.cisco.coml
unknown
http://client.device.v2.soap.uc.cisco.comm
unknown
http://service.audio.v2.soap.uc.cisco.com/setEchoCancellationParameters
unknown
http://service.phone.v2.soap.uc.cisco.com/completeAttendedTransfer
unknown
http://client.device.v2.soap.uc.cisco.comj
unknown
http://www.symauth.com/cps0(
unknown
http://client.presence.v2.soap.uc.cisco.com/onSubscriptionRequest
unknown
http://service.presence.v2.soap.uc.cisco.com/setPrivacyListT
unknown
http://service.config.v2.soap.uc.cisco.comT
unknown
http://wixtoolset.org/schemas/thmutil/2010(
unknown
http://www.opensource.org/licenses/cpl1.0.txt
unknown
http://service.audio.v2.soap.uc.cisco.com/getAutomaticGainControlParameters
unknown
http://device.v2.soap.uc.cisco.com/types
unknown
http://client.system.v2.soap.uc.cisco.comm
unknown
http://service.conversation.v2.soap.uc.cisco.com/merge
unknown
http://client.system.v2.soap.uc.cisco.comn
unknown
http://www.symauth.com/rpa00
unknown
http://client.system.v2.soap.uc.cisco.comr
unknown
http://service.audio.v2.soap.uc.cisco.com/getEchoCancellationParameters
unknown
http://client.device.v2.soap.uc.cisco.comT
unknown
http://service.audio.v2.soap.uc.cisco.com/setAutomaticGainControlParameters
unknown
http://client.audio.v2.soap.uc.cisco.com/onDeviceUnpluggedW
unknown
http://service.device.v2.soap.uc.cisco.com/unsubscribe
unknown
http://client.conversation.v2.soap.uc.cisco.com/onCapabilitiesUpdatedk
unknown
http://client.conversation.v2.soap.uc.cisco.com/onParticipantChanged
unknown
http://service.audio.v2.soap.uc.cisco.com/getAudioOutputDevice
unknown
http://client.audio.v2.soap.uc.cisco.com(
unknown
http://service.device.v2.soap.uc.cisco.com/disableDeviceSelectionEvents
unknown
http://service.audio.v2.soap.uc.cisco.com/setOutputLowFreqRolloff
unknown
http://service.presence.v2.soap.uc.cisco.com/unsubscribeT
unknown
http://client.presence.v2.soap.uc.cisco.com/onDerivedPresenceUpdatedZ
unknown
http://service.config.v2.soap.uc.cisco.com/subscribe
unknown
http://service.presence.v2.soap.uc.cisco.com/subscribeT
unknown
http://www.unicode.org/copyright.html
unknown
http://service.phone.v2.soap.uc.cisco.com/getVoicemailPilotNumber
unknown
http://service.presence.v2.soap.uc.cisco.com/initializeT
unknown
http://client.audio.v2.soap.uc.cisco.comT
unknown
http://client.conversation.v2.soap.uc.cisco.com/onConversationEnded
unknown
http://client.conversation.v2.soap.uc.cisco.com/onParticipantAdded
unknown
http://service.phone.v2.soap.uc.cisco.com/enableMobility
unknown
http://client.config.v2.soap.uc.cisco.com/onConfigDataCreatedW
unknown
http://service.conversation.v2.soap.uc.cisco.com/unmute
unknown
https://www.jabra.com
unknown
http://service.phone.v2.soap.uc.cisco.com/getCallStatistics
unknown
http://service.audio.v2.soap.uc.cisco.com/getNoiseSuppressionParameters
unknown
https://www.jabra.com/directd=am
unknown
http://client.audio.v2.soap.uc.cisco.comw
unknown
http://client.audio.v2.soap.uc.cisco.com/onInputDeviceRemovedX
unknown
http://client.audio.v2.soap.uc.cisco.comx
unknown
http://client.audio.v2.soap.uc.cisco.comn
unknown
http://client.audio.v2.soap.uc.cisco.comq
unknown
http://client.conversation.v2.soap.uc.cisco.com/onParticipantRemovedg
unknown
http://client.audio.v2.soap.uc.cisco.com/onDevicePluggedInT
unknown
http://client.audio.v2.soap.uc.cisco.comp
unknown
http://service.presence.v2.soap.uc.cisco.com/setPresenceT
unknown
http://client.phone.v2.soap.uc.cisco.com/onCapabilitiesUpdated
unknown
http://service.device.v2.soap.uc.cisco.com/setPhoneMode
unknown
http://system.v2.soap.uc.cisco.com/types
unknown
http://autofac.org8
unknown
http://client.system.v2.soap.uc.cisco.com/onSystemSnapshotY
unknown
http://service.system.v2.soap.uc.cisco.com/setLogLevel
unknown
http://client.audio.v2.soap.uc.cisco.comm
unknown
http://service.conversation.v2.soap.uc.cisco.comT
unknown
There are 90 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{50c3bcea-1203-4bf1-9103-09af1bf52966}
BundleCachePath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{50c3bcea-1203-4bf1-9103-09af1bf52966}
BundleUpgradeCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{50c3bcea-1203-4bf1-9103-09af1bf52966}
BundleAddonCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{50c3bcea-1203-4bf1-9103-09af1bf52966}
BundleDetectCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{50c3bcea-1203-4bf1-9103-09af1bf52966}
BundlePatchCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{50c3bcea-1203-4bf1-9103-09af1bf52966}
BundleVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{50c3bcea-1203-4bf1-9103-09af1bf52966}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{50c3bcea-1203-4bf1-9103-09af1bf52966}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{50c3bcea-1203-4bf1-9103-09af1bf52966}
BundleProviderKey
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{50c3bcea-1203-4bf1-9103-09af1bf52966}
BundleTag
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{50c3bcea-1203-4bf1-9103-09af1bf52966}
EngineVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{50c3bcea-1203-4bf1-9103-09af1bf52966}
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{50c3bcea-1203-4bf1-9103-09af1bf52966}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{50c3bcea-1203-4bf1-9103-09af1bf52966}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{50c3bcea-1203-4bf1-9103-09af1bf52966}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{50c3bcea-1203-4bf1-9103-09af1bf52966}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{50c3bcea-1203-4bf1-9103-09af1bf52966}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{50c3bcea-1203-4bf1-9103-09af1bf52966}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{50c3bcea-1203-4bf1-9103-09af1bf52966}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{50c3bcea-1203-4bf1-9103-09af1bf52966}
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{50c3bcea-1203-4bf1-9103-09af1bf52966}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{50c3bcea-1203-4bf1-9103-09af1bf52966}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{50c3bcea-1203-4bf1-9103-09af1bf52966}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{50c3bcea-1203-4bf1-9103-09af1bf52966}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{50c3bcea-1203-4bf1-9103-09af1bf52966}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{50c3bcea-1203-4bf1-9103-09af1bf52966}
Resume
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
{50c3bcea-1203-4bf1-9103-09af1bf52966}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{50c3bcea-1203-4bf1-9103-09af1bf52966}
BundleResumeCommandLine
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{316F5FBF-4536-4A14-8D29-C1A9A8D800B6}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{316F5FBF-4536-4A14-8D29-C1A9A8D800B6}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{316F5FBF-4536-4A14-8D29-C1A9A8D800B6}
DisplayName
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\3cf366.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\3cf366.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3D74DB07FACE9814F9C80831D0247C57
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1300C438A21DA0945A81712167458E73
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9A239434DCBA403449A6ED5494B78F65
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FD1B13183C7F93D4C94E3C06237AC58E
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8AF8A84BFAF3C8143BFB276448A470EB
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\EEA3466047811F1408BC9F1447031910
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\4C98D68631C9DA54295DB533D928FDB7
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\86B058896BA560A428A9487ABB95B915
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7F1993BDEE4FDF24EB39D2E1DFF3BC2A
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\543DA5FAD10A93D45BCBB481AE0AAF52
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\95B7239B4D3506142A2A71E3A1E328EA
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F226D000E78F6D9498CAB4CB979454CC
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F22B73C856BD02F4AB5A82BE43AE11CD
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8A5BFB8453E798549B74D955397A9AE2
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\262A526CE1F34F04B818F3257474787D
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\4154BF5100EEFA04A925A9BDBBEE8A4E
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\455882B106C35BB40BBD29E494E2D7BF
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\4D0380D473CB4ED4AAC636E4EF5A28F7
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5AB28AA614EB7964DB44401EF8F06548
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DAF0FF8BC2B53DB469265FA83F2477CE
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\80DB707ECF2BB1B4FB289C9073997B90
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\793091DE1D41FFF4F8D608B5D0FD9093
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\95A9727649FBAED43925CC53959DCC81
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B879E47BA8D99F04089A2349EB939EEE
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\67C51BA0F87FBF34BB6BF330DBC48989
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\123306C3332DB67418762EFA132A91DF
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9331C5BA0F377964882861B60ED88D3C
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB3FE304DBE80EB40BC672EDCB40A7F5
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\935145ED7C354E3468FA51DD4680243F
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\35A2C3A535E9F084D86C8B85352A7BF8
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DEF2930FDE869441970B0BDE30F145F
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1AB0726982FFBDE40A5A6573D239092C
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\903F60E399883C449ACBF1C6C8923DF5
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8F70C29051EE87542B75F1835E123487
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E8BC60B2C01F1DB438A66AA745966F68
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A843999ECCDC84244B29058D69D2AC26
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\86883750F0D4D6047AA71EDDF58C52F6
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E986327AB83D9BF4EB545C3679712EB2
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\10A4628ECE5BE0B4097ADA9086DAA733
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9A6F9905053AE8044A9E09C557369DBF
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C84307C3B72ABC7439F6C8F04D804A1F
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7B1954D38C5A83843B973D1FBC26724D
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\89211D2CD3CBBFA4BA514AC8EFEB1813
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3AC848101632EE7428504F5568C8FA98
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1C2BB13777C9C2245AF191852727D096
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\713C340957D98ED47848B3CD33A3D7B8
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E31FE1B2825D60448AB908004FB63917
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5B0B505ABF066E04DACB8E7035B722EB
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B7C60FD3BABFD5F4C9C8B691B5335B52
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E5D4F4EB81120E4448FBC5C81B5B7DA7
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A2837D09C5A628348987AA3327A64946
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6811A73A252870B4CA94902C2248A6D9
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\4971DFB48E7B5124280E1B3D2D82DBC6
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8BE25BC96CF17AD45B6755CFE870E712
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\86D4D64C902E8E042A6020F5FFDF7563
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8AEF6C14153DC4D4B9EBE5A552CDAF85
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AEDE7C21EFDDFB148BE0C2C644A912B7
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6F80FCEB78A440140AC3DCE4CD5E6217
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6EFE4E4B6E3FA7B499D933741F89A545
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C9BEC6DA421001448A8DBCAC364CACD0
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BC960F49A8BE3E34EB63CAE4E96505AF
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\79612DE4431BF384CA8F36E729F4412C
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F0E825B1778FAC04094AE70CEE5B0484
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F6118EDCC54EBB74EAA1794F7838535C
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9A1C8774178FB1F4D9322B56287D703D
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DC48A110922A8C242B05BA34FE91C469
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CCB8A5BBA9415124FB86B1D4ABA6374C
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B736C12FE129D8F4EB3853132E778C29
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7768358E123F1E245BB690C299097922
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\EB7A11D4B5F1A7F4CAE8DA96EB0A4AA0
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5B66DF2ACB110864BBF84EAA75744FC0
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A554A439A7CF8F448965DA2C31FC35F1
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FC3E94C4578590A4891AA1C2D35A8946
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\EB12BE273BDB5224EA125A3B1000A0CE
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2DEB4075B7E4F25478538925D4509A24
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\98C77F44DB1A0A4449A14D2AA1A0FBB1
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7CA90AA25D783A44193F4092847E65EE
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B7C8A02D3452911499FC88499CFEC293
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01B87AC2BE9B5614E8B248EC1EE08E98
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C2AD8CBCE76DFA04C9E3016AB52C1265
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D5D4A55A22A318048B2F0F2A6C39119F
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\070B0B9F472C40E4EB93967C424D48BA
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\69DAF4470D410794BACD434466EA115F
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E13DF55C9DF5AEC4C9996B07B03DEA7D
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\94F58CCF144949D4B8045239A54DC4D1
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B656D6D15AEDD5C47A2076CF82B0C59F
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3FF5B9A0DA05EA343907899C0D030B9A
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7A62CC9F07FEC8447ABB68B49EE055FB
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\171879B402FD8D548818D2A0BC136973
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\181B2E294BB60314C813BE386D204168
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\67598B8724BA0E348B36D962FBA9A83F
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A5D013BD80ADE574BAD6A0927DFE0172
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FCA1D36B5AF377C4DAA58332918DD44F
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2F3E55794BA51194CB07D0EFA3332287
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\496C60B38C900EA41A646314B46E414F
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3272CB096BEF4F646934E384A4CB33B6
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CEC91772A48A3FD4E9F174D08A652C66
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7954E6FA0DACB8748A1B03F6DDFE5A30
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7B14FF144AA6DFF4D9AE07911FE95D4F
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FADD4752E29F2144AA56319AF674BE13
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FD88A84145257014783CAA8A9B206B67
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\339F228ED07C4FC39AD227368BCAFC03
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C069AA2AC3DFD6A3DBF641390311FA3B
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F3027E2A2C06E7D3A864BDD383A1C26E
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcp140_atomic_wait.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D2CEC367661A6084E955D760679C2B2C
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcp140_codecvt_ids.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9512E90A57FAE634AAD4526B0B1AD106
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8F139CF91DE936230A1FA8ED33D0E0EC
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\97FC00201A9B4EB359A592AFD9B4A1C5
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1EF4376BDDFA1D441A46E0225E1E3717
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CFA82E6E1BE31C14996A7DB156D74560
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6F70B3B4229BBF24DACE53AB60AD9F7B
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1627759EF3F09C746B764922BB98910E
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2B86247E498A4544582A1FBD93F54995
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CF1122EFD894DF74EA64314CA3C425DD
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8583313B71CBEC445A83C59E1F8A4A23
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\05196A807456BFA4E94359962F973B9D
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\59977C3675B186D4DB4D5CB2CBE92AF0
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\59A2297B5BD9ABD4085FD7AB1AF29201
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\4D14F9D3609FE0543B11E9D52B9900A9
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1DD53482610C0054B9F55DF417FB0F1E
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0C5E2CDE53668DF4A8876BE18E905FE9
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\086E80868FDE4CC45BE5200A8A93CF3E
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D01B34774A0E23B48A783DACC3DE7B36
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AF797487E4708374F8A30E242C8CAEDA
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\81804CA0CBFFE3547AE9334B1DC84929
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\14E6B94D233EC5B4D982052F2DF28FE4
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A56FEC4ACC20077459BE983C41F50C87
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6D28D167A0467A74C803C4DE24DFB976
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B1704A9407166764E8844D40D3CFCA34
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9935565E1115B4840A7D4061259C2DC8
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\782021A2303AFE24081AD8275D96587B
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8FBBDC87A885FD14187E7848C695CDBE
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\96DC3F07D041E6A4A9C4FCEBCBF52B6A
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A85DA875DD5B4C24BA6A9245E62F8353
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6662D3F6B6BABDA4EA51B80CDFC71397
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CB4C6D0ED7BBF5A4C9D451985E45C471
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02D6F7E0576F9F046B3718F2E650F197
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F21872922A6039D4396BEA4056458B9C
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3D5967BB7EA85CD4E91470AB4AA10E83
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3ADCC943A1E71FC4088E158D1D4E2AB6
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\156D3A8276208214F9FCE6B37AE7C7CB
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2A553BC195ACBD84CAEC3A19C64A4A69
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3D7C01A3A05B39E479B6EB05D73CB76C
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02D76CD82D51FD6449CC31F9892E6EA6
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3BC55C119331D84459FE35A7AEA30C22
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E474B69144A6DC4468B8752B429BBC39
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84102D98F4FA26A4780997923A104113
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D5CD0F41E4BA8F4469817CC4D0EA3DC4
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3C505F8D608BE1946921F5CED9A31B18
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\15683A48857D3E44ABD4A915C68C92D2
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3F339B28424F4604C97611F6DAE9D04B
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B72ED9C8DE5725C4D8EAD6A2FD75A078
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\188A261A1342DFA4F903C3209CA426A6
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FA28600E51EAC1D4DA712F4D8FCB76F4
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9B5CBC4A376E751409BCA8BF8F118A8F
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\365EAE8C1614C604CB5E79B2D0623E8F
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\4C5B35936D46FC9409AF13DFF15EDE6A
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3DA4BFF54D3EBFA4981650D8D28D42C7
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\735BEB076918E9A438982E747ECEC5C6
FBF5F613635441A4D8921C9A8A8D006B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\AvayaOneXV3Integration\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\ZoomIntegration\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\AvayaIPIntegration\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\AvayaOneXIntegration\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\BroadSoftIntegration\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\CiscoIPCommunicatorIntegration\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\CiscoJabberIntegration\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\CiscoUCIntegration\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\CiscoWebExConnectIntegration\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8F139CF91DE936230A1FA8ED33D0E0EC\FBF5F613635441A4D8921C9A8A8D006B
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8F139CF91DE936230A1FA8ED33D0E0EC\FBF5F613635441A4D8921C9A8A8D006B
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8F139CF91DE936230A1FA8ED33D0E0EC\FBF5F613635441A4D8921C9A8A8D006B
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8F139CF91DE936230A1FA8ED33D0E0EC\FBF5F613635441A4D8921C9A8A8D006B
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8F139CF91DE936230A1FA8ED33D0E0EC\FBF5F613635441A4D8921C9A8A8D006B
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8F139CF91DE936230A1FA8ED33D0E0EC\FBF5F613635441A4D8921C9A8A8D006B
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8F139CF91DE936230A1FA8ED33D0E0EC\FBF5F613635441A4D8921C9A8A8D006B
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8F139CF91DE936230A1FA8ED33D0E0EC\FBF5F613635441A4D8921C9A8A8D006B
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8F139CF91DE936230A1FA8ED33D0E0EC\FBF5F613635441A4D8921C9A8A8D006B
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8F139CF91DE936230A1FA8ED33D0E0EC\FBF5F613635441A4D8921C9A8A8D006B
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\CounterpathBriaIntegration\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\LyncIntegration\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\FWU\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\locales\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\resources\app.asar.unpacked\node_modules\@gnaudio\jabra-node-sdk\build\Release\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\resources\app.asar.unpacked\node_modules\@gnaudio\jabra-node-sdk\build\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\resources\app.asar.unpacked\node_modules\@gnaudio\jabra-node-sdk\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\resources\app.asar.unpacked\node_modules\@gnaudio\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\resources\app.asar.unpacked\node_modules\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\resources\app.asar.unpacked\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\resources\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\swiftshader\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\resources\app.asar.unpacked\node_modules\applicationinsights-native-metrics\build\Release\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\resources\app.asar.unpacked\node_modules\applicationinsights-native-metrics\build\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\resources\app.asar.unpacked\node_modules\applicationinsights-native-metrics\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\resources\app.asar.unpacked\node_modules\panacastapi\build\Release\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\resources\app.asar.unpacked\node_modules\panacastapi\build\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\resources\app.asar.unpacked\node_modules\panacastapi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Jabra\Direct4\NEC SP 350 Integration\
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcr100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcp100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\vcruntime140.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcp140.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcp140_1.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcp140_2.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\concrt140.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\vccorlib140.dll
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
There are 241 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
15B6000
heap
page read and write
99AB6FE000
stack
page read and write
1576000
heap
page read and write
AD1000
unkown
page execute read
B85000
heap
page read and write
2D20000
trusted library allocation
page read and write
1C63814E000
heap
page read and write
13A0000
trusted library allocation
page read and write
DBC000
heap
page read and write
1AC6E44F000
heap
page read and write
2D30000
heap
page read and write
1C6378E9000
heap
page read and write
317E000
stack
page read and write
1C63818D000
heap
page read and write
341EBFD000
stack
page read and write
2CA0000
heap
page read and write
2D30000
trusted library allocation
page read and write
1E2DCC29000
heap
page read and write
133B000
stack
page read and write
DA1000
unkown
page execute read
9E0000
heap
page read and write
157D000
heap
page read and write
B61000
heap
page read and write
8FB000
stack
page read and write
2BB0000
trusted library allocation
page read and write
6D55B000
unkown
page read and write
99AB879000
stack
page read and write
1460000
heap
page read and write
434EFFE000
stack
page read and write
13B0000
heap
page read and write
1C637893000
heap
page read and write
1C63818D000
heap
page read and write
2C91000
trusted library allocation
page read and write
A49000
heap
page read and write
BA0000
heap
page read and write
2C847E20000
heap
page read and write
1C638169000
heap
page read and write
BA0000
heap
page read and write
868000
heap
page read and write
B6C000
heap
page read and write
21301480000
heap
page read and write
89C000
heap
page read and write
872000
heap
page read and write
1C638190000
heap
page read and write
B9D000
heap
page read and write
B71000
heap
page read and write
1A0000
heap
page read and write
1E2DD602000
trusted library allocation
page read and write
76E000
stack
page read and write
BB0000
heap
page read and write
409E000
trusted library allocation
page read and write
4760000
trusted library allocation
page read and write
BA1000
heap
page read and write
B8A000
heap
page read and write
E0D000
unkown
page readonly
409E000
trusted library allocation
page read and write
B75000
heap
page read and write
1E2DCC4D000
heap
page read and write
7FF524F18000
unkown
page readonly
18F0000
heap
page read and write
B83000
heap
page read and write
DA0000
unkown
page readonly
2C847E90000
heap
page read and write
1140000
heap
page read and write
21301491000
heap
page read and write
A70000
trusted library allocation
page read and write
D95000
heap
page read and write
494E000
stack
page read and write
B1A000
unkown
page readonly
DA1000
unkown
page execute read
2880000
heap
page read and write
B5C000
heap
page read and write
2C848802000
unkown
page read and write
21301670000
trusted library allocation
page read and write
35F0000
heap
page read and write
9D0000
heap
page read and write
3CE0000
trusted library allocation
page read and write
B88000
heap
page read and write
B71000
heap
page read and write
E0A000
unkown
page write copy
4095000
trusted library allocation
page read and write
1AC6EC02000
trusted library allocation
page read and write
B3A000
unkown
page write copy
1C638189000
heap
page read and write
B59000
heap
page read and write
B9E000
heap
page read and write
A68000
heap
page read and write
C49000
stack
page read and write
39BA000
stack
page read and write
1C637FC0000
remote allocation
page read and write
4098000
trusted library allocation
page read and write
2C848013000
unkown
page read and write
A58000
heap
page read and write
1C6378B3000
heap
page read and write
B6C000
heap
page read and write
BA0000
heap
page read and write
DA1000
unkown
page execute read
1C637813000
heap
page read and write
B9F000
heap
page read and write
1AC6E508000
heap
page read and write
A60000
heap
page read and write
9B0000
trusted library allocation
page read and write
A58000
heap
page read and write
4095000
trusted library allocation
page read and write
1C637FC0000
remote allocation
page read and write
B1A000
unkown
page readonly
1C63817E000
heap
page read and write
4098000
trusted library allocation
page read and write
E0D000
unkown
page readonly
B55000
heap
page read and write
141B000
heap
page read and write
99AB77F000
stack
page read and write
1E2DCD02000
heap
page read and write
32B8000
heap
page read and write
AC0000
trusted library allocation
page read and write
B61000
heap
page read and write
1C638194000
heap
page read and write
4088000
heap
page read and write
1C6381B1000
heap
page read and write
434EF7E000
stack
page read and write
1C638602000
heap
page read and write
B71000
heap
page read and write
1025000
heap
page read and write
459D000
stack
page read and write
1C63815F000
heap
page read and write
A68000
heap
page read and write
30D0000
heap
page read and write
A60000
heap
page read and write
A1B000
heap
page read and write
4390000
trusted library allocation
page read and write
7FF524F4B000
unkown
page readonly
B8B000
heap
page read and write
409E000
trusted library allocation
page read and write
32BB000
heap
page read and write
2C9F000
trusted library allocation
page read and write
B7F000
heap
page read and write
2C847E30000
heap
page read and write
87E000
heap
page read and write
341EDFD000
stack
page read and write
1AC6E210000
heap
page read and write
4092000
trusted library allocation
page read and write
680000
trusted library allocation
page read and write
B60000
heap
page read and write
3590000
trusted library allocation
page read and write
1C638179000
heap
page read and write
409E000
trusted library allocation
page read and write
2C90000
trusted library allocation
page read and write
B87000
heap
page read and write
AD0000
unkown
page readonly
2D20000
trusted library allocation
page read and write
32D5000
heap
page read and write
1E2DCB10000
heap
page read and write
1C63819F000
heap
page read and write
B71000
heap
page read and write
B5C000
heap
page read and write
A2C000
heap
page read and write
18E0000
heap
page read and write
2C848029000
unkown
page read and write
B71000
heap
page read and write
837000
heap
page read and write
7FF524EA4000
unkown
page readonly
A60000
heap
page read and write
BF0000
unkown
page readonly
BB2000
heap
page read and write
B69000
heap
page read and write
2ED0000
trusted library allocation
page read and write
1C63817B000
heap
page read and write
6D54F000
unkown
page readonly
7FF524E5B000
unkown
page readonly
3FC6000
heap
page read and write
2CA1000
trusted library allocation
page read and write
5A362FF000
stack
page read and write
8A4192B000
stack
page read and write
2F70000
heap
page read and write
B61000
heap
page read and write
B75000
heap
page read and write
A58000
heap
page read and write
1C638170000
heap
page read and write
B81000
heap
page read and write
DA0000
unkown
page readonly
2ED0000
trusted library allocation
page read and write
4093000
trusted library allocation
page read and write
134A000
unkown
page write copy
4090000
trusted library allocation
page read and write
B81000
heap
page read and write
B8A000
heap
page read and write
2C84803C000
unkown
page read and write
12A9000
stack
page read and write
A2C000
heap
page read and write
B69000
heap
page read and write
1C637FC0000
remote allocation
page read and write
B54000
heap
page read and write
E0A000
unkown
page read and write
B88000
heap
page read and write
160F000
heap
page read and write
86E000
heap
page read and write
1E2DCB70000
heap
page read and write
B8A000
heap
page read and write
128D000
unkown
page readonly
132A000
unkown
page readonly
3830000
trusted library section
page read and write
E4C000
heap
page read and write
4092000
trusted library allocation
page read and write
4090000
trusted library allocation
page read and write
872000
heap
page read and write
DFE000
heap
page read and write
1C637800000
heap
page read and write
419E000
stack
page read and write
1C6378EC000
heap
page read and write
7FF524E7B000
unkown
page readonly
B83000
heap
page read and write
B97000
heap
page read and write
5A361FD000
stack
page read and write
3840000
trusted library section
page read and write
4092000
trusted library allocation
page read and write
6D531000
unkown
page execute read
DA1000
unkown
page execute read
2D20000
trusted library allocation
page read and write
B64000
heap
page read and write
B85000
heap
page read and write
B1C000
heap
page read and write
409E000
trusted library allocation
page read and write
B71000
heap
page read and write
3873000
heap
page read and write
4230000
trusted library allocation
page read and write
1E2DCC51000
heap
page read and write
5A35FF7000
stack
page read and write
2D00000
heap
page read and write
2C90000
trusted library allocation
page read and write
B61000
heap
page read and write
B7D000
heap
page read and write
BF0000
unkown
page readonly
B88000
heap
page read and write
2CF0000
trusted library allocation
page read and write
21301410000
heap
page read and write
4081000
trusted library allocation
page read and write
B84000
heap
page read and write
341F17F000
stack
page read and write
1C63816A000
heap
page read and write
3E90000
trusted library allocation
page read and write
B82000
heap
page read and write
B80000
heap
page read and write
B5E000
heap
page read and write
DA0000
unkown
page readonly
DEA000
unkown
page readonly
B69000
heap
page read and write
B69000
heap
page read and write
7FF524E72000
unkown
page readonly
E40000
unkown
page readonly
12E1000
unkown
page execute read
2C848200000
unkown
page readonly
B88000
heap
page read and write
B90000
heap
page read and write
1C6378DA000
heap
page read and write
3E94000
trusted library allocation
page read and write
4090000
trusted library allocation
page read and write
3390000
heap
page read and write
1C63818D000
heap
page read and write
1AC6E400000
heap
page read and write
B6C000
heap
page read and write
A05000
heap
page read and write
5F0000
heap
page read and write
431C000
stack
page read and write
1AC6E500000
heap
page read and write
2C848200000
unkown
page readonly
B9F000
heap
page read and write
1C6378F5000
heap
page read and write
A58000
heap
page read and write
DE9000
heap
page read and write
2D20000
trusted library allocation
page read and write
B6C000
heap
page read and write
A58000
heap
page read and write
1C638182000
heap
page read and write
2C847F70000
unkown
page readonly
2C848052000
unkown
page read and write
2D20000
trusted library allocation
page read and write
126A000
unkown
page readonly
A60000
heap
page read and write
111C000
stack
page read and write
1C638187000
heap
page read and write
469E000
stack
page read and write
4FBF000
stack
page read and write
2CE0000
unkown
page read and write
7FF524F0F000
unkown
page readonly
1040000
heap
page read and write
B81000
heap
page read and write
E0A000
unkown
page write copy
B81000
heap
page read and write
B77000
heap
page read and write
159D000
heap
page read and write
B3D000
unkown
page readonly
19EEE526000
heap
page read and write
341EFFF000
stack
page read and write
36F0000
heap
page read and write
A4F000
stack
page read and write
1AC6E43C000
heap
page read and write
A68000
heap
page read and write
2F20000
trusted library section
page read and write
1C63817A000
heap
page read and write
341EAFE000
stack
page read and write
A50000
heap
page read and write
8A1000
heap
page read and write
B97000
heap
page read and write
B64000
heap
page read and write
E0A000
unkown
page read and write
2F70000
heap
page read and write
3FC8000
heap
page read and write
7FF524F0F000
unkown
page readonly
8A41D7B000
stack
page read and write
2F19000
trusted library section
page read and write
10AE000
stack
page read and write
E10000
heap
page read and write
4093000
trusted library allocation
page read and write
29A0000
heap
page read and write
3EDE000
stack
page read and write
2D20000
trusted library allocation
page read and write
1E2DCB00000
heap
page read and write
E50000
unkown
page read and write
B62000
heap
page read and write
4090000
trusted library allocation
page read and write
BB0000
heap
page read and write
B64000
heap
page read and write
1C63816C000
heap
page read and write
B77000
heap
page read and write
4092000
trusted library allocation
page read and write
E50000
unkown
page read and write
13E0000
heap
page read and write
A5D000
stack
page read and write
2C93000
trusted library allocation
page read and write
BA3000
heap
page read and write
1119000
stack
page read and write
21301610000
trusted library allocation
page read and write
1AC6E220000
heap
page read and write
2C848052000
unkown
page read and write
2C847F70000
unkown
page readonly
213012E0000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
1E2DCD13000
heap
page read and write
1E2DCD08000
heap
page read and write
6B0000
heap
page read and write
42F0000
trusted library allocation
page read and write
A61000
heap
page read and write
E0D000
unkown
page readonly
57C000
stack
page read and write
BAD000
heap
page read and write
B76000
heap
page read and write
4500000
trusted library allocation
page read and write
B87000
heap
page read and write
BA1000
heap
page read and write
44F0000
trusted library allocation
page read and write
E0A000
unkown
page write copy
940000
heap
page read and write
A58000
heap
page read and write
5F6000
heap
page read and write
1220000
unkown
page readonly
1850000
heap
page read and write
15D0000
heap
page read and write
B65000
heap
page read and write
2F6E000
stack
page read and write
B87000
heap
page read and write
15A4000
heap
page read and write
7FF524E55000
unkown
page readonly
E06469B000
stack
page read and write
2DF0000
trusted library allocation
page read and write
7FF524DE7000
unkown
page readonly
AF0000
heap
page read and write
D90000
heap
page read and write
3180000
heap
page read and write
2ED0000
trusted library allocation
page read and write
B5A000
heap
page read and write
1C63783C000
heap
page read and write
19EEE52F000
heap
page read and write
88C000
heap
page read and write
2D20000
trusted library allocation
page read and write
B85000
heap
page read and write
32DA000
heap
page read and write
86E000
heap
page read and write
408C000
trusted library allocation
page read and write
1C638110000
heap
page read and write
1C638190000
heap
page read and write
40A2000
trusted library allocation
page read and write
128D000
unkown
page readonly
A68000
heap
page read and write
B58000
heap
page read and write
1C638187000
heap
page read and write
2FE0000
heap
page read and write
2DEC000
stack
page read and write
2DAE000
stack
page read and write
DA0000
unkown
page readonly
2ED0000
trusted library allocation
page read and write
4098000
trusted library allocation
page read and write
875000
heap
page read and write
E064BFF000
stack
page read and write
B92000
heap
page read and write
4080000
heap
page read and write
7FF524E69000
unkown
page readonly
2ED0000
trusted library allocation
page read and write
326E000
stack
page read and write
A68000
heap
page read and write
B75000
heap
page read and write
15D0000
heap
page read and write
1E2DCC8B000
heap
page read and write
1C6378EC000
heap
page read and write
BB3000
heap
page read and write
302E000
stack
page read and write
D99000
stack
page read and write
1221000
unkown
page execute read
21301440000
heap
page read and write
1020000
heap
page read and write
B95000
heap
page read and write
B73000
heap
page read and write
B6C000
heap
page read and write
B81000
heap
page read and write
33A0000
trusted library allocation
page read and write
4660000
trusted library allocation
page read and write
2850000
heap
page read and write
BB0000
heap
page read and write
2C96000
trusted library allocation
page read and write
B55000
heap
page read and write
A49000
heap
page read and write
2C9D000
trusted library allocation
page read and write
B9E000
heap
page read and write
DEA000
unkown
page readonly
43A0000
trusted library allocation
page read and write
1AC6E402000
heap
page read and write
2F09000
trusted library section
page read and write
A60000
heap
page read and write
2C848802000
unkown
page read and write
1C638602000
heap
page read and write
34B0000
heap
page read and write
E3B000
stack
page read and write
10EE000
stack
page read and write
B6E000
heap
page read and write
21301660000
heap
page readonly
7FF524F18000
unkown
page readonly
B71000
heap
page read and write
434EBEF000
stack
page read and write
1C638190000
heap
page read and write
1C638181000
heap
page read and write
30ED000
stack
page read and write
2C848013000
unkown
page read and write
341F0F7000
stack
page read and write
1C63818D000
heap
page read and write
89C000
heap
page read and write
858000
heap
page read and write
4098000
trusted library allocation
page read and write
1C638172000
heap
page read and write
1C638194000
heap
page read and write
B92000
heap
page read and write
2EE0000
heap
page read and write
21301680000
trusted library allocation
page read and write
2C97000
trusted library allocation
page read and write
2EB0000
heap
page read and write
B59000
heap
page read and write
DA0000
unkown
page readonly
1220000
unkown
page readonly
B8B000
heap
page read and write
134A000
unkown
page read and write
B88000
heap
page read and write
18A9000
stack
page read and write
2D20000
trusted library allocation
page read and write
89C000
heap
page read and write
1870000
heap
page read and write
213015A0000
trusted library allocation
page read and write
2E10000
heap
page read and write
434EB6A000
stack
page read and write
15E5000
heap
page read and write
3000000
heap
page read and write
E40000
unkown
page readonly
1120000
heap
page read and write
341E7FC000
stack
page read and write
B74000
heap
page read and write
8A2000
heap
page read and write
313E000
stack
page read and write
2C848000000
unkown
page read and write
1C63815A000
heap
page read and write
2CB0000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
DEA000
unkown
page readonly
B92000
heap
page read and write
9E8000
heap
page read and write
2FDD000
stack
page read and write
B69000
heap
page read and write
3500000
unkown
page read and write
1C63818D000
heap
page read and write
4090000
trusted library allocation
page read and write
8A41FF7000
stack
page read and write
B90000
heap
page read and write
BB2000
heap
page read and write
4EFE000
stack
page read and write
B61000
heap
page read and write
B92000
heap
page read and write
1C638602000
heap
page read and write
1E2DCC00000
heap
page read and write
2D90000
trusted library allocation
page read and write
88D000
heap
page read and write
134D000
unkown
page readonly
142C000
heap
page read and write
B61000
heap
page read and write
29F0000
heap
page read and write
BB0000
heap
page read and write
E0A000
unkown
page read and write
E50000
unkown
page read and write
2C847F90000
unkown
page read and write
1C638171000
heap
page read and write
B6C000
heap
page read and write
341EEF7000
stack
page read and write
2ED0000
trusted library allocation
page read and write
3F4A000
stack
page read and write
B71000
heap
page read and write
B2B000
heap
page read and write
1C63813E000
heap
page read and write
445D000
stack
page read and write
850000
heap
page read and write
70591000
unkown
page execute read
2B90000
heap
page read and write
429F000
stack
page read and write
7FF524F24000
unkown
page readonly
3F0000
trusted library allocation
page read and write
2B30000
heap
page read and write
B92000
heap
page read and write
2F00000
trusted library section
page read and write
19EEE511000
heap
page read and write
E0D000
unkown
page readonly
32A0000
heap
page read and write
7FF524E72000
unkown
page readonly
B7C000
heap
page read and write
E0D000
unkown
page readonly
3AB000
stack
page read and write
B40000
heap
page read and write
886000
heap
page read and write
5A360FE000
stack
page read and write
40A2000
trusted library allocation
page read and write
3A90000
trusted library allocation
page read and write
D9C000
heap
page read and write
B6C000
heap
page read and write
E02000
heap
page read and write
1C63816D000
heap
page read and write
B69000
heap
page read and write
93B000
stack
page read and write
DA0000
unkown
page readonly
2C848102000
unkown
page read and write
4092000
trusted library allocation
page read and write
A60000
heap
page read and write
19EEE865000
heap
page read and write
DEA000
unkown
page readonly
A1B000
heap
page read and write
1150000
heap
page read and write
4EBF000
stack
page read and write
B8C000
heap
page read and write
3829000
trusted library section
page read and write
4180000
trusted library allocation
page read and write
213015B0000
trusted library allocation
page read and write
88C000
heap
page read and write
3819000
stack
page read and write
1404000
heap
page read and write
1C63818D000
heap
page read and write
A60000
heap
page read and write
2ED0000
trusted library allocation
page read and write
434F07F000
stack
page read and write
B90000
heap
page read and write
1E2DCC81000
heap
page read and write
3820000
trusted library section
page read and write
2ED0000
trusted library allocation
page read and write
E01000
heap
page read and write
409F000
stack
page read and write
30AC000
stack
page read and write
A68000
heap
page read and write
705BB000
unkown
page read and write
872000
heap
page read and write
2C95000
trusted library allocation
page read and write
1415000
heap
page read and write
1550000
heap
page read and write
5A35DFC000
stack
page read and write
1C63817B000
heap
page read and write
1AC6E502000
heap
page read and write
158D000
heap
page read and write
8A41C7F000
stack
page read and write
7FF524EA1000
unkown
page readonly
1C63819D000
heap
page read and write
7FF524F35000
unkown
page readonly
1359000
stack
page read and write
3F50000
trusted library allocation
page read and write
2AA0000
heap
page read and write
1AC6E380000
trusted library allocation
page read and write
2C848590000
unkown
page readonly
2C847E90000
heap
page read and write
4A4F000
stack
page read and write
5A0000
heap
page read and write
19EEE52F000
heap
page read and write
B8E000
heap
page read and write
408C000
trusted library allocation
page read and write
28B0000
heap
page read and write
43C000
stack
page read and write
2910000
heap
page read and write
408C000
trusted library allocation
page read and write
1C637829000
heap
page read and write
5A35C7F000
stack
page read and write
1C6378A9000
heap
page read and write
4097000
trusted library allocation
page read and write
5A359AB000
stack
page read and write
B9E000
heap
page read and write
B77000
heap
page read and write
4098000
trusted library allocation
page read and write
B7F000
heap
page read and write
A44000
heap
page read and write
A58000
heap
page read and write
4F7E000
stack
page read and write
DA1000
unkown
page execute read
BB0000
heap
page read and write
32A7000
heap
page read and write
B7D000
heap
page read and write
AF8000
heap
page read and write
1C638600000
heap
page read and write
7FF524E7B000
unkown
page readonly
B52000
heap
page read and write
B55000
heap
page read and write
2C80000
heap
page read and write
1C638620000
heap
page read and write
B8D000
heap
page read and write
2920000
heap
page read and write
1C6381AE000
heap
page read and write
1C63817B000
heap
page read and write
213021A0000
trusted library allocation
page read and write
7AE000
stack
page read and write
2DFE000
stack
page read and write
128A000
unkown
page write copy
DEA000
unkown
page readonly
87C000
heap
page read and write
DA0000
unkown
page readonly
1AC6E455000
heap
page read and write
1060000
heap
page read and write
21301540000
heap
page read and write
AD1000
unkown
page execute read
126A000
unkown
page readonly
3740000
heap
page read and write
E3E000
heap
page read and write
7FF524E5B000
unkown
page readonly
B87000
heap
page read and write
B8D000
heap
page read and write
21301482000
heap
page read and write
B77000
heap
page read and write
B6A000
heap
page read and write
A0C000
heap
page read and write
159D000
heap
page read and write
5A35EFB000
stack
page read and write
830000
trusted library allocation
page read and write
2DA3000
heap
page read and write
7FF524F2C000
unkown
page readonly
7FF524F24000
unkown
page readonly
408E000
trusted library allocation
page read and write
B15000
heap
page read and write
18C0000
trusted library allocation
page read and write
213012D0000
heap
page read and write
B75000
heap
page read and write
3520000
heap
page read and write
B5F000
heap
page read and write
6D55D000
unkown
page readonly
BB3000
heap
page read and write
89B000
heap
page read and write
5A35CFE000
stack
page read and write
B8F000
heap
page read and write
BED000
stack
page read and write
4098000
trusted library allocation
page read and write
341EA7E000
stack
page read and write
2C99000
trusted library allocation
page read and write
A68000
heap
page read and write
1221000
unkown
page execute read
2CA0000
trusted library allocation
page read and write
7FF524F4B000
unkown
page readonly
42DE000
stack
page read and write
408C000
trusted library allocation
page read and write
B5C000
heap
page read and write
B80000
heap
page read and write
B61000
heap
page read and write
44F0000
trusted library allocation
page read and write
128A000
unkown
page read and write
1C638002000
heap
page read and write
BB3000
heap
page read and write
2E30000
heap
page read and write
87E000
heap
page read and write
2A10000
heap
page read and write
727F000
stack
page read and write
85E000
heap
page read and write
B8F000
heap
page read and write
BB0000
heap
page read and write
3839000
trusted library section
page read and write
B82000
heap
page read and write
83C000
stack
page read and write
A58000
heap
page read and write
650000
heap
page read and write
BA2000
heap
page read and write
1C638100000
heap
page read and write
1E2DCBA0000
trusted library allocation
page read and write
B77000
heap
page read and write
2ED0000
trusted library allocation
page read and write
B77000
heap
page read and write
B99000
heap
page read and write
2D70000
heap
page read and write
4450000
trusted library allocation
page read and write
B77000
heap
page read and write
409E000
trusted library allocation
page read and write
2E20000
trusted library allocation
page read and write
2D40000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
1AC6E46F000
heap
page read and write
125C000
stack
page read and write
BB0000
heap
page read and write
857000
heap
page read and write
A68000
heap
page read and write
213014AB000
heap
page read and write
D78000
heap
page read and write
B77000
heap
page read and write
7E0000
heap
page read and write
B71000
heap
page read and write
B69000
heap
page read and write
1E2DCC2D000
heap
page read and write
BF0000
unkown
page readonly
3560000
heap
page read and write
DEA000
unkown
page readonly
86D000
heap
page read and write
2D20000
trusted library allocation
page read and write
1C63816F000
heap
page read and write
B63000
heap
page read and write
1C63818D000
heap
page read and write
434EE7E000
stack
page read and write
2C848002000
unkown
page read and write
1C63817B000
heap
page read and write
3520000
heap
page read and write
E064CFB000
stack
page read and write
4095000
trusted library allocation
page read and write
1C6381AF000
heap
page read and write
B8A000
heap
page read and write
874000
heap
page read and write
4098000
trusted library allocation
page read and write
1C63818D000
heap
page read and write
30C0000
heap
page read and write
B90000
heap
page read and write
B69000
heap
page read and write
B61000
heap
page read and write
E06469B000
stack
page read and write
B69000
heap
page read and write
13E8000
heap
page read and write
1C637913000
heap
page read and write
1130000
trusted library allocation
page read and write
21301650000
trusted library allocation
page read and write
E064BFF000
stack
page read and write
B55000
heap
page read and write
6D530000
unkown
page readonly
3F54000
trusted library allocation
page read and write
BA1000
heap
page read and write
2E20000
heap
page read and write
89C000
heap
page read and write
7FF524DE7000
unkown
page readonly
3A70000
heap
page read and write
86D000
heap
page read and write
2D2C000
stack
page read and write
2ED0000
trusted library allocation
page read and write
8A422FE000
stack
page read and write
4092000
trusted library allocation
page read and write
DEA000
unkown
page readonly
FF0000
heap
page read and write
2D20000
trusted library allocation
page read and write
BAD000
heap
page read and write
1C63818D000
heap
page read and write
8A420FF000
stack
page read and write
19EEE6F0000
heap
page read and write
40A2000
trusted library allocation
page read and write
B88000
heap
page read and write
40DE000
stack
page read and write
86A000
heap
page read and write
B69000
heap
page read and write
B6C000
heap
page read and write
2C9E000
trusted library allocation
page read and write
B6C000
heap
page read and write
717E000
stack
page read and write
1C63819E000
heap
page read and write
1C6381AE000
heap
page read and write
7FF524EA1000
unkown
page readonly
141B000
heap
page read and write
510000
heap
page read and write
DA0000
unkown
page readonly
38B0000
heap
page read and write
1C638198000
heap
page read and write
2D20000
trusted library allocation
page read and write
99AB979000
stack
page read and write
4F3F000
stack
page read and write
1C637870000
heap
page read and write
1C638603000
heap
page read and write
15CD000
heap
page read and write
DAC000
heap
page read and write
40A2000
trusted library allocation
page read and write
DA1000
unkown
page execute read
B8B000
heap
page read and write
B5C000
heap
page read and write
1C63818D000
heap
page read and write
1C638187000
heap
page read and write
134D000
unkown
page readonly
2EF9000
stack
page read and write
1C63817C000
heap
page read and write
4081000
trusted library allocation
page read and write
12E0000
unkown
page readonly
3570000
heap
page read and write
3530000
trusted library allocation
page read and write
3FDE000
stack
page read and write
2FED000
stack
page read and write
B6A000
heap
page read and write
21301448000
heap
page read and write
19EEE860000
heap
page read and write
B60000
heap
page read and write
A60000
heap
page read and write
19EEE4A0000
heap
page read and write
213023E0000
trusted library allocation
page read and write
1C63819E000
heap
page read and write
4090000
trusted library allocation
page read and write
2C848029000
unkown
page read and write
1C638194000
heap
page read and write
7FF524E69000
unkown
page readonly
703E000
stack
page read and write
2BD0000
heap
page read and write
1AC6E47E000
heap
page read and write
1159000
heap
page read and write
B69000
heap
page read and write
1C63818D000
heap
page read and write
B82000
heap
page read and write
A58000
heap
page read and write
3190000
trusted library allocation
page read and write
3A80000
heap
page read and write
123D000
stack
page read and write
8A41DFF000
stack
page read and write
2C70000
trusted library allocation
page read and write
2C98000
trusted library allocation
page read and write
3710000
heap
page read and write
2C847F90000
unkown
page read and write
B92000
heap
page read and write
4095000
trusted library allocation
page read and write
1C638175000
heap
page read and write
4090000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
12E1000
unkown
page execute read
140B000
heap
page read and write
34DD000
stack
page read and write
E01000
heap
page read and write
19EEE516000
heap
page read and write
3750000
trusted library allocation
page read and write
B3A000
unkown
page read and write
7E0000
heap
page read and write
1E2DCD00000
heap
page read and write
21301489000
heap
page read and write
15DF000
heap
page read and write
8A421FC000
stack
page read and write
1C63818F000
heap
page read and write
40A2000
trusted library allocation
page read and write
A58000
heap
page read and write
B65000
heap
page read and write
7FF524F2C000
unkown
page readonly
B6C000
heap
page read and write
7FF524EA4000
unkown
page readonly
142C000
heap
page read and write
B69000
heap
page read and write
BB0000
heap
page read and write
A60000
heap
page read and write
2ED0000
trusted library allocation
page read and write
4095000
trusted library allocation
page read and write
A60000
heap
page read and write
B54000
heap
page read and write
1146000
heap
page read and write
B95000
heap
page read and write
B61000
heap
page read and write
4081000
trusted library allocation
page read and write
2D30000
trusted library allocation
page read and write
B90000
heap
page read and write
8A419AE000
stack
page read and write
B6C000
heap
page read and write
89C000
heap
page read and write
341ECFB000
stack
page read and write
4081000
trusted library allocation
page read and write
B9E000
heap
page read and write
1C63818D000
heap
page read and write
DA1000
unkown
page execute read
3870000
heap
page read and write
A68000
heap
page read and write
34C0000
trusted library allocation
page read and write
E0D000
unkown
page readonly
3FC0000
heap
page read and write
1AC6E429000
heap
page read and write
DE5000
heap
page read and write
4B4F000
stack
page read and write
B5C000
heap
page read and write
341F37B000
stack
page read and write
213016B0000
trusted library allocation
page read and write
B6C000
heap
page read and write
1C6381B1000
heap
page read and write
409E000
trusted library allocation
page read and write
1E2DCC49000
heap
page read and write
705BD000
unkown
page readonly
2DA0000
heap
page read and write
37A0000
trusted library allocation
page read and write
7FF524E55000
unkown
page readonly
A68000
heap
page read and write
7FF524EB8000
unkown
page readonly
2F29000
trusted library section
page read and write
2D6E000
stack
page read and write
B5D000
heap
page read and write
1AC6E413000
heap
page read and write
89C000
heap
page read and write
B61000
heap
page read and write
713E000
stack
page read and write
2ED0000
trusted library allocation
page read and write
1C637600000
heap
page read and write
B61000
heap
page read and write
40A2000
trusted library allocation
page read and write
1AC6E280000
heap
page read and write
12B0000
heap
page read and write
15D1000
heap
page read and write
408C000
trusted library allocation
page read and write
2B20000
heap
page read and write
2C9B000
trusted library allocation
page read and write
B3B000
heap
page read and write
1C6381C2000
heap
page read and write
D70000
heap
page read and write
B3D000
unkown
page readonly
441E000
stack
page read and write
21301450000
heap
page read and write
213016A0000
heap
page read and write
132A000
unkown
page readonly
A60000
heap
page read and write
2C848000000
unkown
page read and write
DEA000
unkown
page readonly
1558000
heap
page read and write
19EEE6D0000
heap
page read and write
B61000
heap
page read and write
1C637760000
trusted library allocation
page read and write
35E0000
trusted library allocation
page read and write
FD0000
heap
page read and write
53B000
stack
page read and write
B8F000
heap
page read and write
4240000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
70590000
unkown
page readonly
2C848002000
unkown
page read and write
2C847E30000
heap
page read and write
1C6378C6000
heap
page read and write
B2B000
heap
page read and write
E064CFB000
stack
page read and write
4092000
trusted library allocation
page read and write
DAC000
heap
page read and write
5F9000
heap
page read and write
12E0000
unkown
page readonly
4081000
trusted library allocation
page read and write
1E2DCC13000
heap
page read and write
1C63818D000
heap
page read and write
E40000
unkown
page readonly
B5C000
heap
page read and write
434EEF9000
stack
page read and write
32D3000
heap
page read and write
1E2DCC3C000
heap
page read and write
BA1000
heap
page read and write
1C63818E000
heap
page read and write
4095000
trusted library allocation
page read and write
32D3000
heap
page read and write
1C6378E2000
heap
page read and write
B77000
heap
page read and write
5E0000
trusted library allocation
page read and write
1C63819E000
heap
page read and write
8A41EFB000
stack
page read and write
2AC000
stack
page read and write
6FFE000
stack
page read and write
6EFE000
stack
page read and write
B6C000
heap
page read and write
1C6378A9000
heap
page read and write
21301491000
heap
page read and write
B77000
heap
page read and write
2D20000
trusted library allocation
page read and write
2D10000
heap
page read and write
BA0000
heap
page read and write
19EEE538000
heap
page read and write
E0A000
unkown
page read and write
2E6D000
stack
page read and write
1C638113000
heap
page read and write
88C000
heap
page read and write
306C000
stack
page read and write
213016A9000
heap
page read and write
18C0000
trusted library allocation
page read and write
1E2DCC62000
heap
page read and write
FDF000
unkown
page read and write
341F278000
stack
page read and write
7FF524F35000
unkown
page readonly
7FF524EB5000
unkown
page readonly
B61000
heap
page read and write
99AB7F9000
stack
page read and write
1E2DCC63000
heap
page read and write
1C63818D000
heap
page read and write
B6E000
heap
page read and write
4440000
trusted library allocation
page read and write
B55000
heap
page read and write
D4E000
stack
page read and write
1616000
heap
page read and write
B90000
heap
page read and write
886000
heap
page read and write
B9F000
heap
page read and write
BB0000
heap
page read and write
45B0000
trusted library allocation
page read and write
AB0000
heap
page read and write
3850000
trusted library allocation
page read and write
B8A000
heap
page read and write
1AC6E488000
heap
page read and write
B77000
heap
page read and write
42E0000
trusted library allocation
page read and write
1AC6E44A000
heap
page read and write
19EEE500000
heap
page read and write
2EAD000
stack
page read and write
DA1000
unkown
page execute read
1C6381AF000
heap
page read and write
1156000
heap
page read and write
F9E000
unkown
page read and write
1C637660000
heap
page read and write
B8F000
heap
page read and write
2BAC000
stack
page read and write
1C6375F0000
heap
page read and write
3FD0000
trusted library allocation
page read and write
B71000
heap
page read and write
99AB67B000
stack
page read and write
B95000
heap
page read and write
B3B000
heap
page read and write
A58000
heap
page read and write
B71000
heap
page read and write
1C6378A5000
heap
page read and write
A58000
heap
page read and write
2C60000
unkown
page read and write
1C638189000
heap
page read and write
B8C000
heap
page read and write
99AB8FF000
stack
page read and write
E0A000
unkown
page write copy
1E2DCC67000
heap
page read and write
DBC000
heap
page read and write
1C63818C000
heap
page read and write
7FF524EB5000
unkown
page readonly
34E0000
trusted library allocation
page read and write
2E00000
heap
page read and write
31A0000
heap
page read and write
B87000
heap
page read and write
1C637902000
heap
page read and write
40A2000
trusted library allocation
page read and write
B5A000
heap
page read and write
830000
heap
page read and write
19EEE527000
heap
page read and write
3849000
trusted library section
page read and write
E0D000
unkown
page readonly
B61000
heap
page read and write
AD0000
unkown
page readonly
BB0000
heap
page read and write
FE0000
trusted library allocation
page read and write
88C000
heap
page read and write
2C848590000
unkown
page readonly
2ED0000
trusted library allocation
page read and write
2C92000
trusted library allocation
page read and write
2D80000
unkown
page read and write
19EEE539000
heap
page read and write
E0D000
unkown
page readonly
1C638175000
heap
page read and write
2C847E20000
heap
page read and write
455E000
stack
page read and write
1AC6E513000
heap
page read and write
2C848102000
unkown
page read and write
B71000
heap
page read and write
31B0000
trusted library allocation
page read and write
2F10000
trusted library section
page read and write
1149000
heap
page read and write
1C63819D000
heap
page read and write
240000
heap
page read and write
E41000
heap
page read and write
19EEE52F000
heap
page read and write
408C000
trusted library allocation
page read and write
4083000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
213016A5000
heap
page read and write
4086000
heap
page read and write
A60000
heap
page read and write
A68000
heap
page read and write
7FF524EB8000
unkown
page readonly
B95000
heap
page read and write
705AF000
unkown
page readonly
B64000
heap
page read and write
21301491000
heap
page read and write
2C94000
trusted library allocation
page read and write
A68000
heap
page read and write
4081000
trusted library allocation
page read and write
158D000
heap
page read and write
4081000
trusted library allocation
page read and write
2C9A000
trusted library allocation
page read and write
2C9C000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
B59000
heap
page read and write
B77000
heap
page read and write
1C6378BF000
heap
page read and write
There are 1086 hidden memdumps, click here to show them.