

Which is directly followed by "cmp byte ptr, 06h" and "jc 0043D82Ch". Which is directly followed by "cmp al, 06h" and "jnbe 0050B0A1h". Which is directly followed by "cmp al, 06h" and "jnbe 004DD2B4h". +816 call dword ptr GetVersionExWįound API call (Target: "" Stream UID: "51414-6172-004DCF10") Which is directly followed by "cmp al, 06h" and "jnbe 004F97FBh". Reads information about supported languagesįound API call (Target: "" Stream UID: "51414-4975-004F94A0") "iexplore.exe" wrote bytes "e99cf3bcf7" to virtual address "0x77D2E869" (part of module "USER32.DLL") "iexplore.exe" wrote bytes "e92e0dbef7" to virtual address "0x77D1CF42" (part of module "USER32.DLL")

"iexplore.exe" wrote bytes "e939543cf9" to virtual address "0x765393FC" (part of module "OLEAUT32.DLL") "iexplore.exe" wrote bytes "e9efb9cdfa" to virtual address "0x74C2388E" (part of module "COMCT元2.DLL") "iexplore.exe" wrote bytes "e9b943a0f7" to virtual address "0x77CF3B9B" (part of module "USER32.DLL") "iexplore.exe" wrote bytes "e954a1bff7" to virtual address "0x77D03B7F" (part of module "USER32.DLL") "iexplore.exe" wrote bytes "e9b34baef7" to virtual address "0x77CDEC7C" (part of module "USER32.DLL") "iexplore.exe" wrote bytes "e99ac3f5f8" to virtual address "0x769A2694" (part of module "COMDLG32.DLL") "iexplore.exe" wrote bytes "e9fc79c3fa" to virtual address "0x74CC7922" (part of module "COMCT元2.DLL") "iexplore.exe" wrote bytes "e9c20abef7" to virtual address "0x77D1D274" (part of module "USER32.DLL") "iexplore.exe" wrote bytes "e937f2bcf7" to virtual address "0x77D2E963" (part of module "USER32.DLL") "iexplore.exe" wrote bytes "e96ff1bcf7" to virtual address "0x77D2E9C9" (part of module "USER32.DLL") "iexplore.exe" wrote bytes "e9e9f0bcf7" to virtual address "0x77D2E9ED" (part of module "USER32.DLL") Installs hooks/patches the running process
