Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
1C769A32-2CBF-4738-9013-480E0434BAEF_06182024030338389.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x54a85fa3, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\System\UpdateSessionOrchestration.4cdd5988-935f-4255-9ab4-31eed42bc85e.1.etl
|
data
|
dropped
|
||
C:\ProgramData\regid.1991-06.com.microsoft\regid.1991-06.com.microsoft_Windows-10-Pro.swidtag
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 4770 bytes, 1 file, at 0x2c +A "disallowedcert.stl", number 1, 1 datablock,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_BE4413523710330F97BEE5D4A544C42B
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
|
Certificate, Version=3
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_BE4413523710330F97BEE5D4A544C42B
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\manifests\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\manifests\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (10073), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\manifests\scre..core_4b14c015c87c1ad8_0018.0001_none_533500b5fe8f96df.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\manifests\scre..core_4b14c015c87c1ad8_0018.0001_none_533500b5fe8f96df.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\manifests\scre..dows_4b14c015c87c1ad8_0018.0001_none_57acd8973addaa0f.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\manifests\scre..dows_4b14c015c87c1ad8_0018.0001_none_57acd8973addaa0f.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\manifests\scre..ient_4b14c015c87c1ad8_0018.0001_none_b47bd9d9e77379ec.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\manifests\scre..ient_4b14c015c87c1ad8_0018.0001_none_b47bd9d9e77379ec.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\manifests\scre..ient_4b14c015c87c1ad8_0018.0001_none_e94a5e880ddeece3.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\manifests\scre..ient_4b14c015c87c1ad8_0018.0001_none_e94a5e880ddeece3.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\manifests\scre..tion_25b0fbb6ef7eb094_0018.0001_none_38bfd8c0a9435f4e.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\manifests\scre..tion_25b0fbb6ef7eb094_0018.0001_none_38bfd8c0a9435f4e.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (63849), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\manifests\scre..vice_4b14c015c87c1ad8_0018.0001_none_048898fe944efa4a.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\manifests\scre..vice_4b14c015c87c1ad8_0018.0001_none_048898fe944efa4a.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b\ScreenConnect.ClientService.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b\ScreenConnect.WindowsBackstageShell.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b\ScreenConnect.WindowsBackstageShell.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b\ScreenConnect.WindowsClient.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b\ScreenConnect.WindowsFileManager.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b\ScreenConnect.WindowsFileManager.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..core_4b14c015c87c1ad8_0018.0001_none_533500b5fe8f96df\ScreenConnect.Core.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..dows_4b14c015c87c1ad8_0018.0001_none_57acd8973addaa0f\ScreenConnect.Windows.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..ient_4b14c015c87c1ad8_0018.0001_none_b47bd9d9e77379ec\ScreenConnect.WindowsClient.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..ient_4b14c015c87c1ad8_0018.0001_none_b47bd9d9e77379ec\ScreenConnect.WindowsClient.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..ient_4b14c015c87c1ad8_0018.0001_none_e94a5e880ddeece3\ScreenConnect.Client.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\43wurqpu.newcfg
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\5dd0qjev.newcfg
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\Client.Override.en-US.resources
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\Client.Override.resources
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\Client.en-US.resources
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\Client.resources
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\app.config
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\bbvtadq5.newcfg
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\dphy0adj.newcfg
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\ec0ivzly.newcfg
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\f0feuc05.newcfg
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\g4navqby.newcfg
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\gkvz4jgc.newcfg
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\user.config
(copy)
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..vice_4b14c015c87c1ad8_0018.0001_none_048898fe944efa4a\ScreenConnect.ClientService.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dfsvc.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ScreenConnect.ClientService.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\B3V01X1N.log
|
Unicode text, UTF-16, little-endian text, with very long lines (641), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\LE8RJV0O.0B9\JZR239YO.A4A.application
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (63849), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\QJ5J9VPB.NK8\YJ9Q36NV.4Y7\ScreenConnect.Client.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\QJ5J9VPB.NK8\YJ9Q36NV.4Y7\ScreenConnect.Client.dll.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\QJ5J9VPB.NK8\YJ9Q36NV.4Y7\ScreenConnect.ClientService.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\QJ5J9VPB.NK8\YJ9Q36NV.4Y7\ScreenConnect.ClientService.dll.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\QJ5J9VPB.NK8\YJ9Q36NV.4Y7\ScreenConnect.ClientService.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\QJ5J9VPB.NK8\YJ9Q36NV.4Y7\ScreenConnect.Core.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\QJ5J9VPB.NK8\YJ9Q36NV.4Y7\ScreenConnect.Core.dll.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\QJ5J9VPB.NK8\YJ9Q36NV.4Y7\ScreenConnect.Windows.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\QJ5J9VPB.NK8\YJ9Q36NV.4Y7\ScreenConnect.Windows.dll.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\QJ5J9VPB.NK8\YJ9Q36NV.4Y7\ScreenConnect.WindowsBackstageShell.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\QJ5J9VPB.NK8\YJ9Q36NV.4Y7\ScreenConnect.WindowsBackstageShell.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\QJ5J9VPB.NK8\YJ9Q36NV.4Y7\ScreenConnect.WindowsClient.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\QJ5J9VPB.NK8\YJ9Q36NV.4Y7\ScreenConnect.WindowsClient.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\QJ5J9VPB.NK8\YJ9Q36NV.4Y7\ScreenConnect.WindowsClient.exe.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\QJ5J9VPB.NK8\YJ9Q36NV.4Y7\ScreenConnect.WindowsClient.exe.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (10073), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\QJ5J9VPB.NK8\YJ9Q36NV.4Y7\ScreenConnect.WindowsClient.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\QJ5J9VPB.NK8\YJ9Q36NV.4Y7\ScreenConnect.WindowsFileManager.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\QJ5J9VPB.NK8\YJ9Q36NV.4Y7\ScreenConnect.WindowsFileManager.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\932a2db58c237abd381d22df4c63a04a_9e146be9-c76a-4720-bcdb-53011b87bd06
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
modified
|
There are 72 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k NetworkService -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k UnistackSvcGroup
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k LocalService -s W32Time
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\ScreenConnect.WindowsClient.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\ScreenConnect.WindowsClient.exe"
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\ScreenConnect.ClientService.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\ScreenConnect.ClientService.exe"
"?e=Support&y=Guest&h=instance-ss6pex-relay.screenconnect.com&p=443&s=e409b2f5-1e44-4489-a8a4-30f0588f10c9&k=BgIAAACkAABSU0ExAAgAAAEAAQBdjPB2q8wjCfbSeYamY%2f1I8rI%2fJv32GQaD4DfyMmJGNmo%2f%2fRNg83nebcxkKC9J9fnvQipaIXrQUsxpppQnPKZ7juxo8OMg%2fgQWhvcJ843vxr8g3Su6i%2bOQ19Uh%2b6nNu4Mvd5N1Gn7gmJQP8LmLFqcM4XdqaWncXy3DTwTAm6za8sn0Nrpx%2fR7Jc98i2Kg%2bl%2fjkHFH9my9cD1Qp8bY32WV4Poh8SZJEDL3RX7M1gNCxhAy6Of%2bu4Ov%2f99l3%2bbDBAOICkjlLTBAUBYzj9YiB5Zym8VEMCtI%2b7OFy%2bv0PXxtCiizxlfv251D4ovL7mdH2HWE5l%2fwdqfUZx0u617T5JnSJ&r=&i=Ily"
"1"
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\ScreenConnect.ClientService.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\ScreenConnect.ClientService.exe"
"?e=Support&y=Guest&h=instance-ss6pex-relay.screenconnect.com&p=443&s=e409b2f5-1e44-4489-a8a4-30f0588f10c9&k=BgIAAACkAABSU0ExAAgAAAEAAQBdjPB2q8wjCfbSeYamY%2f1I8rI%2fJv32GQaD4DfyMmJGNmo%2f%2fRNg83nebcxkKC9J9fnvQipaIXrQUsxpppQnPKZ7juxo8OMg%2fgQWhvcJ843vxr8g3Su6i%2bOQ19Uh%2b6nNu4Mvd5N1Gn7gmJQP8LmLFqcM4XdqaWncXy3DTwTAm6za8sn0Nrpx%2fR7Jc98i2Kg%2bl%2fjkHFH9my9cD1Qp8bY32WV4Poh8SZJEDL3RX7M1gNCxhAy6Of%2bu4Ov%2f99l3%2bbDBAOICkjlLTBAUBYzj9YiB5Zym8VEMCtI%2b7OFy%2bv0PXxtCiizxlfv251D4ovL7mdH2HWE5l%2fwdqfUZx0u617T5JnSJ&r=&i=Ily"
"1"
|
||
C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\ScreenConnect.WindowsClient.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\BWL7GTAY.EPV\5W5HVA52.70C\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\ScreenConnect.WindowsClient.exe"
"RunRole" "15a971cf-ed33-4068-91f7-d1656f0da9bf" "User"
|
||
C:\Users\user\Desktop\1C769A32-2CBF-4738-9013-480E0434BAEF_06182024030338389.exe
|
"C:\Users\user\Desktop\1C769A32-2CBF-4738-9013-480E0434BAEF_06182024030338389.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
|
||
C:\Windows\System32\SgrmBroker.exe
|
C:\Windows\system32\SgrmBroker.exe
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 8 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://bcl.screenconnect.com/Bin/ScreenConnect.Client.dll
|
145.40.109.218
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.WindowsFileMan8
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Routes/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Walking
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.Client.applicationataK9f
|
unknown
|
||
http://standards.iso.org/iso/19770/-2/2009/schema.xsd
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.WindowsClient.exe.P
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.Windows.dll
|
145.40.109.218
|
||
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.ClientService.exe
|
145.40.109.218
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.WindowsBackstageShell.exe
|
145.40.109.218
|
||
http://server-nixc4ced126-web.screenconnect.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.bingmapsportal.com
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
http://instance-ss6pex-relay.screenconnect.com:443/a
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.Client.applicationstt
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.Client.applicationG
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.WindowsFileManager.exeA
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.Client.application?h=instance-ss6pex-relay.screencon
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/
|
unknown
|
||
http://instance-ss6pex-relay.screenconnect.com:443/d
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.ClientServ
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
|
unknown
|
||
http://instance-ss6pex-relay.screenconnect.com:443/s
|
unknown
|
||
http://www.w3.or
|
unknown
|
||
https://bcl.screenconnect.com/Bin/
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.WindowsBackstageShell.exe.configesourceHandler
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Locations
|
unknown
|
||
https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
|
unknown
|
||
https://g.live.com/odclientsettings/Prod1C:
|
unknown
|
||
https://dynamic.t
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.WindowsBackstageShell.exe.
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Transit
|
unknown
|
||
http://instance-ss6pex-relay.screenconnect.com:443/G
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.WindowsFileManager.exex
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.ClientService.dll
|
145.40.109.218
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.WindowsBackstageShell.exe.config
|
145.40.109.218
|
||
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.WindowsFileManager.exe.config
|
145.40.109.218
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.Client.manifest?
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Driving
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.Client.applicationst
|
unknown
|
||
https://bcl.screenconnect.comptD
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
|
unknown
|
||
http://instance-ss6pex-relay.screenconnect.com:443/%
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.WindowsClient.exe.config
|
145.40.109.218
|
||
http://instance-ss6pex-relay.screenconnect.com:443/9
|
unknown
|
||
https://dev.ditu.live.com/mapcontrol/logging.ashx
|
unknown
|
||
http://schemas.microso
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.Client.manifestfm
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.WindowsBackstageShell.exes
|
unknown
|
||
http://www.xrml.org/schema/2001/11/xrml2coreS
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.WindowsBackstageShell.exem
|
unknown
|
||
https://bcl.screenconnect.com
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.Wi
|
unknown
|
||
http://www.w3.o
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.Client.applicationX
|
unknown
|
||
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://bcl.screenconnect.com:443/Bin/ScreenConnect.Clie
|
unknown
|
||
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.Core.dllJ
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.WindowsClient.exe
|
145.40.109.218
|
||
http://instance-ss6pex-relay.screenconnect.com:443/
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.Client.application%%
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.WindowsBackstageShX
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Transit/Stops/
|
unknown
|
||
http://www.xrml.org/schema/2001/11/xrml2core
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.Client.application#ScreenConnect.WindowsClient.appli
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV21C:
|
unknown
|
||
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.WindowsFileManager.exe
|
145.40.109.218
|
||
https://dev.virtualearth.net/mapcontrol/logging.ashx
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
|
unknown
|
||
https://bcl.screenconnXz
|
unknown
|
||
https://bcl.screenconnX
|
unknown
|
||
https://bcl.screenconnXr
|
unknown
|
||
https://feedback.screenconnect.com/Feedback.axd
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.Client.manifest
|
145.40.109.218
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.Client.applicationig%
|
unknown
|
||
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
|
unknown
|
||
https://bcl.screenconnect.com:443/Bin/ScreenConnect.Client.application?h=instance-ss6pex-relay.scree
|
unknown
|
||
https://bcl.ptD
|
unknown
|
||
https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=
|
unknown
|
||
http://bcl.screenconnect.com
|
unknown
|
||
https://bcl.screenconnect.com/Bin/h
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.Core.dll
|
145.40.109.218
|
||
https://dev.ditu.live.com/REST/v1/Locations
|
unknown
|
||
https://bcl.screenconnect.com/Bin/ScreenConnect.Client.application
|
unknown
|
||
https://bcl.screenconne
|
unknown
|
There are 88 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bg.microsoft.map.fastly.net
|
199.232.214.172
|
||
server-nixc4ced126-web.screenconnect.com
|
145.40.109.218
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
||
server-nixc4ced126-relay.screenconnect.com
|
145.40.109.216
|
||
instance-ss6pex-relay.screenconnect.com
|
unknown
|
||
18.31.95.13.in-addr.arpa
|
unknown
|
||
time.windows.com
|
unknown
|
||
bcl.screenconnect.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
145.40.109.216
|
server-nixc4ced126-relay.screenconnect.com
|
Netherlands
|
||
145.40.109.218
|
server-nixc4ced126-web.screenconnect.com
|
Netherlands
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av\{D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
|
STATE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\03A5B14663EB12023091B84A6D6A68BC871DE66B
|
Blob
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\A41A37D0270D8433C3CD0220248AD84A5A6A1A26
|
Blob
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\F5AD0BCC1AD56CD150725B1C866C30AD92EF21B0
|
Blob
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\B69E752BBE88B4458200A7C0F4F5B3CCE6F35B47
|
Blob
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
|
ComponentStore_RandomString
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
|
ComponentStore_RandomString
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager
|
StateStore_RandomString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{60051b8f-4f12-400a-8e50-dd05ebd438d1}
|
NonCanonicalData
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{60051b8f-4f12-400a-8e50-dd05ebd438d1}\scre..tion_25b0fbb6ef7eb094_0018.0001_20ca72b17ca9e71d
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{60051b8f-4f12-400a-8e50-dd05ebd438d1}\scre..tion_25b0fbb6ef7eb094_0018.0001_20ca72b17ca9e71d
|
{c989bb7a-8385-4715-98cf-a741a8edb823}!ApplicationTrust
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b
|
lock!01000000b637ea0b20150000941800000000000000000000554fd5d90dcfda01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}
|
NonCanonicalData
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!DeploymentSourceUri
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!ApplicationSourceUri
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!IsFullTrust
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!IsShellVisible
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!PreviousBind
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!PendingBind
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!ExcludedDeployment
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!PendingDeployment
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!DeploymentProviderUri
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!MinimumRequiredVersion
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!LastCheckTime
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!UpdateSkippedDeployment
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!UpdateSkipTime
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!AppType
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!CurrentBind
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0001_20ca72b17ca9e71d
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0001_20ca72b17ca9e71d
|
pin!S_{3f471841-eef2-47d6-89c0-d028f03a4ad5}
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0001_20ca72b17ca9e71d
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0001_none_b47bd9d9e77379ec
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0001_none_b47bd9d9e77379ec
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0001_20ca72b17ca9e71d
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0001_none_048898fe944efa4a
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0001_none_048898fe944efa4a
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0001_20ca72b17ca9e71d
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0001_none_e94a5e880ddeece3
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0001_none_e94a5e880ddeece3
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0001_20ca72b17ca9e71d
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0018.0001_none_533500b5fe8f96df
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0018.0001_none_533500b5fe8f96df
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0001_20ca72b17ca9e71d
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0018.0001_none_57acd8973addaa0f
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0001_none_38bfd8c0a9435f4e
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0001_none_38bfd8c0a9435f4e
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0001_20ca72b17ca9e71d
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_none_38bfd8c0a9435f4e
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_none_38bfd8c0a9435f4e
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_20ca72b17ca9e71d\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b\Files
|
ScreenConnect.ClientService.exe_e781b1ee36f7c0e0
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b\Files
|
ScreenConnect.ClientService.exe_e781b1ee36f7c0e0
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_20ca72b17ca9e71d\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b\Files
|
ScreenConnect.WindowsBackstageShell.exe_898f6d085da479bc
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b\Files
|
ScreenConnect.WindowsBackstageShell.exe_898f6d085da479bc
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_20ca72b17ca9e71d\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b\Files
|
ScreenConnect.WindowsFileManager.exe.config_ceab8affc7343daa
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b\Files
|
ScreenConnect.WindowsFileManager.exe.config_ceab8affc7343daa
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_20ca72b17ca9e71d\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b\Files
|
ScreenConnect.WindowsClient.exe.config_f7f106a5cc529540
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_20ca72b17ca9e71d\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b\Files
|
ScreenConnect.WindowsBackstageShell.exe.config_61230ac9d37a71e2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b\Files
|
ScreenConnect.WindowsBackstageShell.exe.config_61230ac9d37a71e2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_20ca72b17ca9e71d\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b\Files
|
ScreenConnect.WindowsFileManager.exe_0e21f87bfcff26be
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b\Files
|
ScreenConnect.WindowsFileManager.exe_0e21f87bfcff26be
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0001_none_57acd8973addaa0f
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0001_none_57acd8973addaa0f
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0001_none_57acd8973addaa0f
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0001_none_57acd8973addaa0f
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0001_none_57acd8973addaa0f
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\scre..dows_4b14c015c87c1ad8_0018.0001_none_57acd8973addaa0f\Files
|
ScreenConnect.Windows.dll_fc0d83aff7df0b5b
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0001_none_57acd8973addaa0f\Files
|
ScreenConnect.Windows.dll_fc0d83aff7df0b5b
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0018.0001_none_533500b5fe8f96df
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0018.0001_none_533500b5fe8f96df
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0018.0001_none_533500b5fe8f96df
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0018.0001_none_533500b5fe8f96df
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\scre..core_4b14c015c87c1ad8_0018.0001_none_533500b5fe8f96df\Files
|
ScreenConnect.Core.dll_b96889d378047e27
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0018.0001_none_533500b5fe8f96df\Files
|
ScreenConnect.Core.dll_b96889d378047e27
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0001_none_e94a5e880ddeece3
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0001_none_e94a5e880ddeece3
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0001_none_e94a5e880ddeece3
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0001_none_e94a5e880ddeece3
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\scre..ient_4b14c015c87c1ad8_0018.0001_none_e94a5e880ddeece3\Files
|
ScreenConnect.Client.dll_fc1d7bd48553fcab
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0001_none_e94a5e880ddeece3\Files
|
ScreenConnect.Client.dll_fc1d7bd48553fcab
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0001_none_048898fe944efa4a
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0001_none_048898fe944efa4a
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0001_none_048898fe944efa4a
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0001_none_048898fe944efa4a
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0001_none_048898fe944efa4a
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\scre..vice_4b14c015c87c1ad8_0018.0001_none_048898fe944efa4a\Files
|
ScreenConnect.ClientService.dll_e781b1c636f7bfae
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0001_none_048898fe944efa4a\Files
|
ScreenConnect.ClientService.dll_e781b1c636f7bfae
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0001_none_b47bd9d9e77379ec
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0001_none_b47bd9d9e77379ec
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0001_none_b47bd9d9e77379ec
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0001_none_b47bd9d9e77379ec
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0001_none_b47bd9d9e77379ec
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\scre..ient_4b14c015c87c1ad8_0018.0001_none_b47bd9d9e77379ec\Files
|
ScreenConnect.WindowsClient.exe_6492277df2db17d2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0001_none_b47bd9d9e77379ec\Files
|
ScreenConnect.WindowsClient.exe_6492277df2db17d2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment
|
OnlineAppQuotaUsageEstimate
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0001_none_e94a5e880ddeece3
|
lock!1000000080921d0c20150000941800000000000000000000563a6fb015cfda01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0018.0001_none_533500b5fe8f96df
|
lock!0e00000080921d0c20150000941800000000000000000000563a6fb015cfda01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0001_none_b47bd9d9e77379ec
|
lock!0c00000080921d0c20150000941800000000000000000000563a6fb015cfda01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0001_none_048898fe944efa4a
|
lock!0a00000080921d0c20150000941800000000000000000000563a6fb015cfda01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0018.0001_none_57acd8973addaa0f
|
lock!0800000080921d0c20150000941800000000000000000000563a6fb015cfda01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b
|
lock!0600000080921d0c20150000941800000000000000000000563a6fb015cfda01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0001_none_38bfd8c0a9435f4e
|
lock!0400000080921d0c20150000941800000000000000000000563a6fb015cfda01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Applications\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Applications\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e
|
PreparedForExecution
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e
|
lock!1100000080921d0c20150000941800000000000000000000563a6fb015cfda01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b\Files
|
ScreenConnect.ClientService.exe_5e8c1e841cd8db20
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b\Files
|
ScreenConnect.WindowsBackstageShell.exe_89b7a517a15abfdc
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b\Files
|
ScreenConnect.WindowsFileManager.exe.config_5db10293a642be8a
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b\Files
|
ScreenConnect.WindowsClient.exe.config_432322067acab5c0
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b\Files
|
ScreenConnect.WindowsBackstageShell.exe.config_bc78256f1e952942
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b\Files
|
ScreenConnect.WindowsFileManager.exe_74b82db4db38179e
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\scre..vice_4b14c015c87c1ad8_0018.0001_none_048898fe944efa4a\Files
|
ScreenConnect.ClientService.dll_5e8c1e5c1cd8d9ee
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\scre..ient_4b14c015c87c1ad8_0018.0001_none_b47bd9d9e77379ec\Files
|
ScreenConnect.WindowsClient.exe_fd0fcfe1fd1a6cd2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\scre..core_4b14c015c87c1ad8_0018.0001_none_533500b5fe8f96df\Files
|
ScreenConnect.Core.dll_963930cc5ced28c7
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\scre..ient_4b14c015c87c1ad8_0018.0001_none_e94a5e880ddeece3\Files
|
ScreenConnect.Client.dll_7b0ea606092ddbcb
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e\scre..dows_4b14c015c87c1ad8_0018.0001_none_57acd8973addaa0f\Files
|
ScreenConnect.Windows.dll_fa5f7fd8f7c108bb
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e
|
SubstructureCreated
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\W32Time\Config
|
LastKnownGoodTime
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\WMI\Security
|
c688cf83-9945-5ff6-0e1e-1ff1f8a2ec9a
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator
|
StartWorkerOnServiceStart
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
|
Checking to see if mostack override has changed
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
|
UsoCrmScan
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
|
CleanupUsoLogs
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0001_none_e94a5e880ddeece3
|
lock!0e0000004b1e3a00841e0000881e00000000000000000000881f6ebd4dcdda01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0018.0001_none_533500b5fe8f96df
|
lock!0c0000004b1e3a00841e0000881e00000000000000000000881f6ebd4dcdda01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0001_none_b47bd9d9e77379ec
|
lock!0a0000004b1e3a00841e0000881e00000000000000000000881f6ebd4dcdda01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0001_none_048898fe944efa4a
|
lock!080000004b1e3a00841e0000881e00000000000000000000881f6ebd4dcdda01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0018.0001_none_57acd8973addaa0f
|
lock!060000004b1e3a00841e0000881e00000000000000000000881f6ebd4dcdda01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b
|
lock!040000004b1e3a00841e0000881e00000000000000000000881f6ebd4dcdda01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0001_none_38bfd8c0a9435f4e
|
lock!020000004b1e3a00841e0000881e00000000000000000000881f6ebd4dcdda01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0001_none_e94a5e880ddeece3
|
lock!1c0000006b1e3a00841e0000881e000000000000000000002fe472bd4dcdda01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0018.0001_none_533500b5fe8f96df
|
lock!1a0000006b1e3a00841e0000881e000000000000000000002fe472bd4dcdda01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0001_none_b47bd9d9e77379ec
|
lock!180000006b1e3a00841e0000881e000000000000000000002fe472bd4dcdda01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0001_none_048898fe944efa4a
|
lock!160000006b1e3a00841e0000881e000000000000000000002fe472bd4dcdda01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0018.0001_none_57acd8973addaa0f
|
lock!140000006b1e3a00841e0000881e000000000000000000002fe472bd4dcdda01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b
|
lock!120000006b1e3a00841e0000881e000000000000000000002fe472bd4dcdda01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0001_none_38bfd8c0a9435f4e
|
lock!100000006b1e3a00841e0000881e000000000000000000002fe472bd4dcdda01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e
|
lock!1d0000008a1e3a00841e0000881e0000000000000000000042a977bd4dcdda01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Families\F_scre..tion_25b0fbb6ef7eb094_efb3523d7b199cc8
|
LastRunVersion
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Families\Gc_scre..tion_a7d88f5bef8e5e69
|
LastRunVersion
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Families\Gi_scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
LastRunVersion
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Applications\scre..tion_25b0fbb6ef7eb094_0018.0001_799011a69f7fd08e
|
HasRunBefore
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Network\ScreenConnect Client (e409b2f5-1e44-4489-a8a4-30f0588f10c9)
|
NULL
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
|
AutoBackupLogFiles
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\ScreenConnect
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ScreenConnect_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ScreenConnect_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ScreenConnect_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ScreenConnect_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ScreenConnect_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ScreenConnect_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ScreenConnect_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ScreenConnect_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ScreenConnect_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ScreenConnect_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ScreenConnect_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ScreenConnect_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ScreenConnect_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ScreenConnect_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (e409b2f5-1e44-4489-a8a4-30f0588f10c9)
|
ImagePath
|
There are 172 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
247EE060000
|
trusted library allocation
|
page read and write
|
||
247805AA000
|
trusted library allocation
|
page read and write
|
||
165B7B02000
|
heap
|
page read and write
|
||
CD0000
|
trusted library allocation
|
page read and write
|
||
A33000
|
heap
|
page read and write
|
||
2600E42B000
|
heap
|
page read and write
|
||
7FFAACB90000
|
trusted library allocation
|
page read and write
|
||
1EA88C8E000
|
heap
|
page read and write
|
||
28758C41000
|
trusted library allocation
|
page read and write
|
||
2875CEFB000
|
heap
|
page read and write
|
||
1EA88C52000
|
heap
|
page read and write
|
||
7FFAACD50000
|
trusted library allocation
|
page read and write
|
||
5E130FE000
|
unkown
|
page readonly
|
||
7FFAACC50000
|
trusted library allocation
|
page execute and read and write
|
||
D17000
|
heap
|
page read and write
|
||
F496B7E000
|
stack
|
page read and write
|
||
1A0587D000
|
stack
|
page read and write
|
||
7FFAACC40000
|
trusted library allocation
|
page read and write
|
||
3AD1000
|
trusted library allocation
|
page read and write
|
||
2981000
|
trusted library allocation
|
page read and write
|
||
1B34E000
|
stack
|
page read and write
|
||
8A55AFE000
|
unkown
|
page readonly
|
||
3A20000
|
heap
|
page execute and read and write
|
||
247F0323000
|
heap
|
page read and write
|
||
2875CE56000
|
heap
|
page read and write
|
||
2478063F000
|
trusted library allocation
|
page read and write
|
||
AF1000
|
stack
|
page read and write
|
||
7FFAACC76000
|
trusted library allocation
|
page execute and read and write
|
||
4330000
|
trusted library allocation
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
C10000
|
trusted library allocation
|
page read and write
|
||
1B682000
|
heap
|
page read and write
|
||
1292F000
|
trusted library allocation
|
page read and write
|
||
247F026C000
|
heap
|
page read and write
|
||
18C2A602000
|
heap
|
page read and write
|
||
D10000
|
trusted library allocation
|
page read and write
|
||
165B79A0000
|
trusted library allocation
|
page read and write
|
||
189C000
|
trusted library allocation
|
page read and write
|
||
7FFAACD79000
|
trusted library allocation
|
page read and write
|
||
1A0557E000
|
unkown
|
page readonly
|
||
3ECE000
|
stack
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
2875CF02000
|
heap
|
page read and write
|
||
D1D000
|
trusted library allocation
|
page execute and read and write
|
||
1EA88BA0000
|
heap
|
page read and write
|
||
1C0ED000
|
stack
|
page read and write
|
||
7FFAACD50000
|
trusted library allocation
|
page read and write
|
||
282FC000000
|
heap
|
page read and write
|
||
7F22D7E000
|
stack
|
page read and write
|
||
D20000
|
trusted library allocation
|
page read and write
|
||
1505000
|
trusted library allocation
|
page read and write
|
||
24790294000
|
trusted library allocation
|
page read and write
|
||
1D270000
|
heap
|
page read and write
|
||
17BC000
|
trusted library allocation
|
page read and write
|
||
2600E471000
|
heap
|
page read and write
|
||
247F3352000
|
trusted library allocation
|
page read and write
|
||
13AA000
|
heap
|
page read and write
|
||
4FED000
|
stack
|
page read and write
|
||
282FC02B000
|
heap
|
page read and write
|
||
7FFAACBB0000
|
trusted library allocation
|
page read and write
|
||
1EA88C8B000
|
heap
|
page read and write
|
||
7FFAACF60000
|
trusted library allocation
|
page read and write
|
||
282FC048000
|
heap
|
page read and write
|
||
2875E000000
|
heap
|
page read and write
|
||
D0B000
|
heap
|
page read and write
|
||
18C29C30000
|
heap
|
page read and write
|
||
250F885F000
|
heap
|
page read and write
|
||
2A84000
|
unkown
|
page readonly
|
||
7F2267E000
|
unkown
|
page readonly
|
||
165B8202000
|
trusted library allocation
|
page read and write
|
||
1EA88C5D000
|
heap
|
page read and write
|
||
24780001000
|
trusted library allocation
|
page read and write
|
||
7FFAACFC0000
|
trusted library allocation
|
page read and write
|
||
394B000
|
trusted library allocation
|
page read and write
|
||
250F8816000
|
heap
|
page read and write
|
||
2600E440000
|
heap
|
page read and write
|
||
2875CDC0000
|
trusted library allocation
|
page read and write
|
||
7FFAACDFE000
|
trusted library allocation
|
page read and write
|
||
1EA88C4F000
|
heap
|
page read and write
|
||
1BDF000
|
stack
|
page read and write
|
||
250F8833000
|
heap
|
page read and write
|
||
B72000
|
heap
|
page read and write
|
||
7FFB22785000
|
unkown
|
page readonly
|
||
BE4000
|
unkown
|
page read and write
|
||
8A558FE000
|
unkown
|
page readonly
|
||
1896000
|
trusted library allocation
|
page read and write
|
||
7FFAACB94000
|
trusted library allocation
|
page read and write
|
||
247EF01E000
|
heap
|
page read and write
|
||
7FFAACC60000
|
trusted library allocation
|
page execute and read and write
|
||
A20000
|
heap
|
page read and write
|
||
2875CE4E000
|
heap
|
page read and write
|
||
7FFAACD39000
|
trusted library allocation
|
page read and write
|
||
26010370000
|
remote allocation
|
page read and write
|
||
1A04E7B000
|
stack
|
page read and write
|
||
1EA88C6C000
|
heap
|
page read and write
|
||
522E000
|
stack
|
page read and write
|
||
7FFAACD3C000
|
trusted library allocation
|
page read and write
|
||
ADE000
|
heap
|
page read and write
|
||
2AA0000
|
trusted library allocation
|
page read and write
|
||
8A54E7E000
|
stack
|
page read and write
|
||
2875CEC1000
|
heap
|
page read and write
|
||
3AE7000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
7FFAACCC0000
|
trusted library allocation
|
page execute and read and write
|
||
8A548FE000
|
unkown
|
page readonly
|
||
35BE000
|
stack
|
page read and write
|
||
2875CDD0000
|
trusted library allocation
|
page read and write
|
||
1EA88B80000
|
heap
|
page read and write
|
||
2875788D000
|
heap
|
page read and write
|
||
7FFAACFA0000
|
trusted library allocation
|
page execute and read and write
|
||
28757730000
|
heap
|
page read and write
|
||
3AF0000
|
trusted library allocation
|
page read and write
|
||
4140000
|
trusted library allocation
|
page read and write
|
||
17CA3602000
|
trusted library allocation
|
page read and write
|
||
6F4000
|
unkown
|
page readonly
|
||
1A0567E000
|
stack
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
428D000
|
stack
|
page read and write
|
||
4120000
|
trusted library allocation
|
page read and write
|
||
5E1297D000
|
stack
|
page read and write
|
||
247F02D8000
|
heap
|
page read and write
|
||
546F000
|
stack
|
page read and write
|
||
42C0000
|
trusted library allocation
|
page execute and read and write
|
||
2478024E000
|
trusted library allocation
|
page read and write
|
||
247EE3E2000
|
heap
|
page read and write
|
||
28757828000
|
heap
|
page read and write
|
||
CE4000
|
trusted library allocation
|
page read and write
|
||
2875782B000
|
heap
|
page read and write
|
||
1A04FFE000
|
stack
|
page read and write
|
||
10DB77E000
|
unkown
|
page readonly
|
||
2875CCD0000
|
trusted library allocation
|
page read and write
|
||
436267E000
|
unkown
|
page readonly
|
||
50F0000
|
heap
|
page read and write
|
||
7FFAACF70000
|
trusted library allocation
|
page read and write
|
||
D14000
|
trusted library allocation
|
page read and write
|
||
7FFAACC76000
|
trusted library allocation
|
page execute and read and write
|
||
4FF0000
|
heap
|
page read and write
|
||
8A556FE000
|
unkown
|
page readonly
|
||
BD1000
|
unkown
|
page execute read
|
||
247F038B000
|
heap
|
page read and write
|
||
1B1F0000
|
heap
|
page read and write
|
||
3AD0000
|
trusted library allocation
|
page read and write
|
||
1AF0C000
|
stack
|
page read and write
|
||
2AD1000
|
trusted library allocation
|
page read and write
|
||
165B7A29000
|
heap
|
page read and write
|
||
436287E000
|
unkown
|
page readonly
|
||
247F232B000
|
heap
|
page read and write
|
||
50F7000
|
heap
|
page read and write
|
||
CE0000
|
trusted library allocation
|
page read and write
|
||
2875CE6B000
|
heap
|
page read and write
|
||
F496C7E000
|
stack
|
page read and write
|
||
7FFAACC46000
|
trusted library allocation
|
page read and write
|
||
1B685000
|
heap
|
page read and write
|
||
532B000
|
stack
|
page read and write
|
||
247EF046000
|
heap
|
page read and write
|
||
247EEFF9000
|
heap
|
page read and write
|
||
54BE000
|
stack
|
page read and write
|
||
1EA88C67000
|
heap
|
page read and write
|
||
129C000
|
stack
|
page read and write
|
||
436257E000
|
stack
|
page read and write
|
||
2875CD34000
|
trusted library allocation
|
page read and write
|
||
7FFAACBEC000
|
trusted library allocation
|
page execute and read and write
|
||
2970000
|
heap
|
page execute and read and write
|
||
247F023F000
|
heap
|
page read and write
|
||
F495EFF000
|
stack
|
page read and write
|
||
7FFAACBA2000
|
trusted library allocation
|
page read and write
|
||
DAE000
|
stack
|
page read and write
|
||
18C29F00000
|
heap
|
page read and write
|
||
7FFAACD80000
|
trusted library allocation
|
page execute and read and write
|
||
247EF03E000
|
heap
|
page read and write
|
||
28758102000
|
heap
|
page read and write
|
||
7FFAACC86000
|
trusted library allocation
|
page execute and read and write
|
||
1130000
|
heap
|
page read and write
|
||
D66000
|
heap
|
page read and write
|
||
4150000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACE60000
|
trusted library allocation
|
page read and write
|
||
18C29D30000
|
heap
|
page read and write
|
||
7FFAACC4C000
|
trusted library allocation
|
page execute and read and write
|
||
28758000000
|
heap
|
page read and write
|
||
6F4000
|
unkown
|
page readonly
|
||
7FFAACEA0000
|
trusted library allocation
|
page read and write
|
||
175D000
|
trusted library allocation
|
page read and write
|
||
7FFB22776000
|
unkown
|
page readonly
|
||
18E2000
|
trusted library allocation
|
page read and write
|
||
7FFAACE10000
|
trusted library allocation
|
page read and write
|
||
247F00D0000
|
heap
|
page read and write
|
||
4BCE000
|
stack
|
page read and write
|
||
1715000
|
trusted library allocation
|
page read and write
|
||
247EE8ED000
|
heap
|
page read and write
|
||
7FFAACF80000
|
trusted library allocation
|
page read and write
|
||
7FFAACBBB000
|
trusted library allocation
|
page execute and read and write
|
||
2875CD20000
|
trusted library allocation
|
page read and write
|
||
9D17B4B000
|
stack
|
page read and write
|
||
7FFAACBBD000
|
trusted library allocation
|
page execute and read and write
|
||
1BAD8000
|
stack
|
page read and write
|
||
10FC000
|
stack
|
page read and write
|
||
24780772000
|
trusted library allocation
|
page read and write
|
||
D3A000
|
heap
|
page read and write
|
||
F49697D000
|
stack
|
page read and write
|
||
5E12EFE000
|
unkown
|
page readonly
|
||
1EA88C5E000
|
heap
|
page read and write
|
||
7FFAACBAD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACF30000
|
trusted library allocation
|
page read and write
|
||
3950000
|
trusted library allocation
|
page read and write
|
||
2BAFFC13000
|
heap
|
page read and write
|
||
1791000
|
trusted library allocation
|
page read and write
|
||
430000
|
unkown
|
page readonly
|
||
28757877000
|
heap
|
page read and write
|
||
2478048A000
|
trusted library allocation
|
page read and write
|
||
2875811A000
|
heap
|
page read and write
|
||
282FC102000
|
heap
|
page read and write
|
||
D42000
|
trusted library allocation
|
page read and write
|
||
247F020D000
|
heap
|
page read and write
|
||
24780801000
|
trusted library allocation
|
page read and write
|
||
5E129FE000
|
unkown
|
page readonly
|
||
1A0517E000
|
unkown
|
page readonly
|
||
4190000
|
trusted library allocation
|
page read and write
|
||
1EA88C5A000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
247F011D000
|
heap
|
page read and write
|
||
400E000
|
stack
|
page read and write
|
||
9D1817B000
|
stack
|
page read and write
|
||
247EEFC0000
|
heap
|
page read and write
|
||
50B0000
|
heap
|
page execute and read and write
|
||
7FFAACCB0000
|
trusted library allocation
|
page execute and read and write
|
||
18C29E8A000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
F49667D000
|
stack
|
page read and write
|
||
CF7000
|
heap
|
page read and write
|
||
28757872000
|
heap
|
page read and write
|
||
1EA88C61000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
4FA2000
|
unkown
|
page readonly
|
||
7F22E7E000
|
unkown
|
page readonly
|
||
2875D090000
|
remote allocation
|
page read and write
|
||
18C29E41000
|
heap
|
page read and write
|
||
2BAFFC23000
|
heap
|
page read and write
|
||
282FC002000
|
heap
|
page read and write
|
||
D2B000
|
heap
|
page read and write
|
||
1B29F000
|
heap
|
page read and write
|
||
247F233A000
|
heap
|
page read and write
|
||
D27000
|
trusted library allocation
|
page read and write
|
||
28757780000
|
trusted library section
|
page read and write
|
||
DCB000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
8A550FE000
|
unkown
|
page readonly
|
||
28757913000
|
heap
|
page read and write
|
||
55BF000
|
stack
|
page read and write
|
||
1EA88BE0000
|
trusted library allocation
|
page read and write
|
||
7FFAACC4C000
|
trusted library allocation
|
page execute and read and write
|
||
18C29E13000
|
heap
|
page read and write
|
||
7FFAAD0A6000
|
trusted library allocation
|
page read and write
|
||
28758100000
|
heap
|
page read and write
|
||
287578BD000
|
heap
|
page read and write
|
||
7FFAAD06F000
|
trusted library allocation
|
page read and write
|
||
7FFAACD60000
|
trusted library allocation
|
page read and write
|
||
D47000
|
trusted library allocation
|
page execute and read and write
|
||
1B701000
|
heap
|
page read and write
|
||
1BAE3000
|
heap
|
page execute and read and write
|
||
17A8000
|
trusted library allocation
|
page read and write
|
||
7FFAACC5C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACBB3000
|
trusted library allocation
|
page read and write
|
||
247805E3000
|
trusted library allocation
|
page read and write
|
||
2BAFFC48000
|
heap
|
page read and write
|
||
42A0000
|
heap
|
page read and write
|
||
247F027D000
|
heap
|
page read and write
|
||
D4B000
|
trusted library allocation
|
page execute and read and write
|
||
247F0108000
|
heap
|
page read and write
|
||
7FFAACDB0000
|
trusted library allocation
|
page read and write
|
||
7FFAACEF0000
|
trusted library allocation
|
page read and write
|
||
247F02AD000
|
heap
|
page read and write
|
||
2875CE78000
|
heap
|
page read and write
|
||
165B7990000
|
trusted library allocation
|
page read and write
|
||
2875CED5000
|
heap
|
page read and write
|
||
1B45F000
|
stack
|
page read and write
|
||
2875D040000
|
trusted library allocation
|
page read and write
|
||
8A5567E000
|
unkown
|
page readonly
|
||
F70000
|
heap
|
page execute and read and write
|
||
7FFAACDF0000
|
trusted library allocation
|
page read and write
|
||
2875CD10000
|
trusted library allocation
|
page read and write
|
||
F4960FD000
|
stack
|
page read and write
|
||
247EEEE0000
|
heap
|
page read and write
|
||
247EEC40000
|
heap
|
page read and write
|
||
2875CCF0000
|
trusted library allocation
|
page read and write
|
||
2600E402000
|
heap
|
page read and write
|
||
7FFAACD6D000
|
trusted library allocation
|
page read and write
|
||
536D000
|
stack
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
247F01D0000
|
heap
|
page read and write
|
||
24780246000
|
trusted library allocation
|
page read and write
|
||
4160000
|
trusted library allocation
|
page read and write
|
||
55FE000
|
stack
|
page read and write
|
||
BA7000
|
heap
|
page read and write
|
||
247EC705000
|
heap
|
page read and write
|
||
16EA000
|
trusted library allocation
|
page read and write
|
||
247EC47A000
|
heap
|
page read and write
|
||
15A4000
|
trusted library allocation
|
page read and write
|
||
28757770000
|
trusted library allocation
|
page read and write
|
||
2875CCE0000
|
trusted library allocation
|
page read and write
|
||
7FFAACDC0000
|
trusted library allocation
|
page read and write
|
||
7F2307E000
|
unkown
|
page readonly
|
||
7FFAACCB0000
|
trusted library allocation
|
page execute and read and write
|
||
24780762000
|
trusted library allocation
|
page read and write
|
||
5D6000
|
heap
|
page read and write
|
||
5E128FE000
|
unkown
|
page readonly
|
||
F495CFE000
|
stack
|
page read and write
|
||
DB2000
|
unkown
|
page readonly
|
||
2BA8072A000
|
heap
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
13E3000
|
heap
|
page read and write
|
||
7FFAACD31000
|
trusted library allocation
|
page read and write
|
||
5E11D3B000
|
stack
|
page read and write
|
||
1B2AC000
|
heap
|
page read and write
|
||
418F000
|
trusted library allocation
|
page read and write
|
||
5E133FE000
|
unkown
|
page readonly
|
||
247F231D000
|
heap
|
page read and write
|
||
7FFAACEB0000
|
trusted library allocation
|
page read and write
|
||
2875CE21000
|
heap
|
page read and write
|
||
247F2251000
|
heap
|
page read and write
|
||
5E124FD000
|
stack
|
page read and write
|
||
1EA88C38000
|
heap
|
page read and write
|
||
282FC031000
|
heap
|
page read and write
|
||
760000
|
trusted library section
|
page read and write
|
||
2875787C000
|
heap
|
page read and write
|
||
42B0000
|
trusted library allocation
|
page read and write
|
||
7FFAACDD4000
|
trusted library allocation
|
page read and write
|
||
247F01DF000
|
heap
|
page read and write
|
||
7FFAACE90000
|
trusted library allocation
|
page read and write
|
||
2875CCF1000
|
trusted library allocation
|
page read and write
|
||
16C8000
|
trusted library allocation
|
page read and write
|
||
1554000
|
trusted library allocation
|
page read and write
|
||
247EF004000
|
heap
|
page read and write
|
||
2875CD30000
|
trusted library allocation
|
page read and write
|
||
7FFAACD86000
|
trusted library allocation
|
page read and write
|
||
1A042BB000
|
stack
|
page read and write
|
||
998000
|
heap
|
page read and write
|
||
B88000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
247801F8000
|
trusted library allocation
|
page read and write
|
||
17CA30F0000
|
heap
|
page read and write
|
||
7FFAACDB6000
|
trusted library allocation
|
page read and write
|
||
7FFAACE80000
|
trusted library allocation
|
page read and write
|
||
7FFAACBA0000
|
trusted library allocation
|
page read and write
|
||
130E000
|
stack
|
page read and write
|
||
26010370000
|
remote allocation
|
page read and write
|
||
250F87E0000
|
heap
|
page read and write
|
||
24780256000
|
trusted library allocation
|
page read and write
|
||
F4958F3000
|
stack
|
page read and write
|
||
247EE8C8000
|
heap
|
page read and write
|
||
7FFAACDE0000
|
trusted library allocation
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page execute and read and write
|
||
1EA88C58000
|
heap
|
page read and write
|
||
7FFAAD0A0000
|
trusted library allocation
|
page read and write
|
||
2427000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
unkown
|
page readonly
|
||
10DA8CB000
|
stack
|
page read and write
|
||
1B2CB000
|
heap
|
page read and write
|
||
7FFAACF90000
|
trusted library allocation
|
page read and write
|
||
134E000
|
stack
|
page read and write
|
||
17CA3580000
|
trusted library allocation
|
page read and write
|
||
2600E300000
|
heap
|
page read and write
|
||
7FF4B8100000
|
trusted library allocation
|
page execute and read and write
|
||
430000
|
unkown
|
page readonly
|
||
F496A7E000
|
stack
|
page read and write
|
||
7FFAAD070000
|
trusted library allocation
|
page read and write
|
||
6B7B16B000
|
stack
|
page read and write
|
||
1EA88C4A000
|
heap
|
page read and write
|
||
7FFAACB9D000
|
trusted library allocation
|
page execute and read and write
|
||
B3A000
|
heap
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
7F229FE000
|
stack
|
page read and write
|
||
247F224B000
|
heap
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
8A552FB000
|
stack
|
page read and write
|
||
2600E517000
|
heap
|
page read and write
|
||
1BEF6000
|
stack
|
page read and write
|
||
C43000
|
trusted library allocation
|
page read and write
|
||
247802FA000
|
trusted library allocation
|
page read and write
|
||
17CA3010000
|
heap
|
page read and write
|
||
7FFAACB94000
|
trusted library allocation
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
1736000
|
trusted library allocation
|
page read and write
|
||
184E000
|
trusted library allocation
|
page read and write
|
||
287578B2000
|
heap
|
page read and write
|
||
247F027F000
|
heap
|
page read and write
|
||
247EC457000
|
heap
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
5E125FE000
|
unkown
|
page readonly
|
||
1EA88C97000
|
heap
|
page read and write
|
||
1EA88C49000
|
heap
|
page read and write
|
||
157C000
|
trusted library allocation
|
page read and write
|
||
7FFAACDC7000
|
trusted library allocation
|
page read and write
|
||
2810000
|
heap
|
page execute and read and write
|
||
F49627E000
|
stack
|
page read and write
|
||
247F0244000
|
heap
|
page read and write
|
||
A11000
|
heap
|
page read and write
|
||
39FF000
|
stack
|
page read and write
|
||
2875CF0E000
|
heap
|
page read and write
|
||
1421000
|
trusted library allocation
|
page read and write
|
||
13AE000
|
heap
|
page read and write
|
||
F49613F000
|
stack
|
page read and write
|
||
282FC013000
|
heap
|
page read and write
|
||
247F01DD000
|
heap
|
page read and write
|
||
6B7B7FD000
|
stack
|
page read and write
|
||
247EE8F7000
|
heap
|
page read and write
|
||
1017000
|
trusted library allocation
|
page execute and read and write
|
||
1C170000
|
heap
|
page read and write
|
||
991000
|
heap
|
page read and write
|
||
7FFB22780000
|
unkown
|
page read and write
|
||
28757840000
|
heap
|
page read and write
|
||
1A0537E000
|
unkown
|
page readonly
|
||
10DB67E000
|
stack
|
page read and write
|
||
18C29E2B000
|
heap
|
page read and write
|
||
1679000
|
trusted library allocation
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
2DD8000
|
trusted library allocation
|
page read and write
|
||
1EA88C5B000
|
heap
|
page read and write
|
||
1A04B7E000
|
unkown
|
page readonly
|
||
247F02F1000
|
heap
|
page read and write
|
||
1B2B8000
|
heap
|
page read and write
|
||
2875787A000
|
heap
|
page read and write
|
||
2478001A000
|
trusted library allocation
|
page read and write
|
||
247EF023000
|
heap
|
page read and write
|
||
7FFAAD0B0000
|
trusted library allocation
|
page read and write
|
||
2BAFFC48000
|
heap
|
page read and write
|
||
24780776000
|
trusted library allocation
|
page read and write
|
||
1556000
|
trusted library allocation
|
page read and write
|
||
5028000
|
unkown
|
page readonly
|
||
776000
|
heap
|
page read and write
|
||
7FFAACE40000
|
trusted library allocation
|
page read and write
|
||
18C2A615000
|
heap
|
page read and write
|
||
2600E480000
|
heap
|
page read and write
|
||
250F8F40000
|
trusted library allocation
|
page read and write
|
||
2478024A000
|
trusted library allocation
|
page read and write
|
||
1292D000
|
trusted library allocation
|
page read and write
|
||
6EC000
|
unkown
|
page readonly
|
||
247EE8D4000
|
heap
|
page read and write
|
||
DDBF6FB000
|
stack
|
page read and write
|
||
18E4000
|
trusted library allocation
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
DDBFC7C000
|
stack
|
page read and write
|
||
3BDE000
|
stack
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
8A560FE000
|
unkown
|
page readonly
|
||
1B55E000
|
stack
|
page read and write
|
||
7FFAAD0C0000
|
trusted library allocation
|
page read and write
|
||
CF0000
|
trusted library section
|
page read and write
|
||
7FFAACD30000
|
trusted library allocation
|
page read and write
|
||
8A54D7E000
|
stack
|
page read and write
|
||
7FFAACD88000
|
trusted library allocation
|
page read and write
|
||
250F8813000
|
heap
|
page read and write
|
||
160F000
|
trusted library allocation
|
page read and write
|
||
247EF033000
|
heap
|
page read and write
|
||
18C29E7D000
|
heap
|
page read and write
|
||
AB7000
|
heap
|
page read and write
|
||
162F000
|
trusted library allocation
|
page read and write
|
||
7FFAACDE0000
|
trusted library allocation
|
page read and write
|
||
7FFAACC40000
|
trusted library allocation
|
page read and write
|
||
7FFAACDB0000
|
trusted library allocation
|
page read and write
|
||
2600E502000
|
heap
|
page read and write
|
||
7FFAACDA0000
|
trusted library allocation
|
page read and write
|
||
247EC46E000
|
heap
|
page read and write
|
||
38FE000
|
stack
|
page read and write
|
||
2478075E000
|
trusted library allocation
|
page read and write
|
||
DB7000
|
heap
|
page read and write
|
||
28757FB0000
|
trusted library section
|
page readonly
|
||
7F22F7E000
|
stack
|
page read and write
|
||
4D6C000
|
stack
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
159E000
|
trusted library allocation
|
page read and write
|
||
247EDF70000
|
heap
|
page read and write
|
||
7FFAACE45000
|
trusted library allocation
|
page read and write
|
||
1EA88C63000
|
heap
|
page read and write
|
||
CED000
|
trusted library allocation
|
page execute and read and write
|
||
6F2000
|
unkown
|
page write copy
|
||
7FFAACBAD000
|
trusted library allocation
|
page execute and read and write
|
||
296E000
|
stack
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
247F022A000
|
heap
|
page read and write
|
||
247EC4B4000
|
heap
|
page read and write
|
||
B79000
|
heap
|
page read and write
|
||
56FE000
|
stack
|
page read and write
|
||
5850000
|
heap
|
page read and write
|
||
10DAF7E000
|
unkown
|
page readonly
|
||
436217E000
|
stack
|
page read and write
|
||
5840000
|
trusted library allocation
|
page execute and read and write
|
||
3500000
|
heap
|
page read and write
|
||
250F87D0000
|
heap
|
page read and write
|
||
1B271000
|
heap
|
page read and write
|
||
3B00000
|
trusted library allocation
|
page read and write
|
||
2478076E000
|
trusted library allocation
|
page read and write
|
||
FFF000
|
stack
|
page read and write
|
||
24780474000
|
trusted library allocation
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
28758113000
|
heap
|
page read and write
|
||
7FFAAD0D0000
|
trusted library allocation
|
page read and write
|
||
391E000
|
trusted library allocation
|
page read and write
|
||
7FFAAD090000
|
trusted library allocation
|
page read and write
|
||
7FFAACD96000
|
trusted library allocation
|
page read and write
|
||
26010370000
|
remote allocation
|
page read and write
|
||
2BAFFC87000
|
heap
|
page read and write
|
||
DDBFF7E000
|
unkown
|
page readonly
|
||
129A1000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page execute and read and write
|
||
8F4000
|
stack
|
page read and write
|
||
1C160000
|
heap
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
282FBE20000
|
heap
|
page read and write
|
||
5E12E7E000
|
stack
|
page read and write
|
||
1B1FF000
|
heap
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
7FFAACE10000
|
trusted library allocation
|
page read and write
|
||
282FBF00000
|
heap
|
page read and write
|
||
436277E000
|
stack
|
page read and write
|
||
7FFAACDF0000
|
trusted library allocation
|
page read and write
|
||
247F032B000
|
heap
|
page read and write
|
||
F495DFB000
|
stack
|
page read and write
|
||
3902000
|
trusted library allocation
|
page read and write
|
||
7FFAACFB0000
|
trusted library allocation
|
page read and write
|
||
5E1337E000
|
stack
|
page read and write
|
||
18C29E66000
|
heap
|
page read and write
|
||
2875CE41000
|
heap
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
7FFAACDC0000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
heap
|
page execute and read and write
|
||
18C29E26000
|
heap
|
page read and write
|
||
247804C2000
|
trusted library allocation
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
247EDEE0000
|
heap
|
page read and write
|
||
28757710000
|
heap
|
page read and write
|
||
7FFAACD43000
|
trusted library allocation
|
page read and write
|
||
1A04F7E000
|
unkown
|
page readonly
|
||
2710000
|
heap
|
page read and write
|
||
17CA2E2B000
|
heap
|
page read and write
|
||
2875CE40000
|
trusted library allocation
|
page read and write
|
||
7FFAAD0A3000
|
trusted library allocation
|
page read and write
|
||
1B713000
|
heap
|
page read and write
|
||
3420000
|
trusted library allocation
|
page read and write
|
||
2A72000
|
unkown
|
page readonly
|
||
2875D020000
|
trusted library allocation
|
page read and write
|
||
9D1837C000
|
stack
|
page read and write
|
||
BE6000
|
unkown
|
page readonly
|
||
247F02DA000
|
heap
|
page read and write
|
||
1C169000
|
heap
|
page read and write
|
||
2875CE17000
|
heap
|
page read and write
|
||
2875789F000
|
heap
|
page read and write
|
||
7FFAACEC0000
|
trusted library allocation
|
page read and write
|
||
17CA2E02000
|
heap
|
page read and write
|
||
1488000
|
trusted library allocation
|
page read and write
|
||
1A0577E000
|
unkown
|
page readonly
|
||
D55000
|
heap
|
page read and write
|
||
1CDF000
|
stack
|
page read and write
|
||
4EEE000
|
stack
|
page read and write
|
||
2BAFFBF0000
|
heap
|
page read and write
|
||
6E0000
|
unkown
|
page readonly
|
||
1EA88C4C000
|
heap
|
page read and write
|
||
1EA88C4E000
|
heap
|
page read and write
|
||
247EE84E000
|
heap
|
page read and write
|
||
1B5E0000
|
trusted library section
|
page readonly
|
||
41A0000
|
trusted library allocation
|
page execute and read and write
|
||
1AEAD000
|
stack
|
page read and write
|
||
2BA80726000
|
heap
|
page read and write
|
||
1012000
|
trusted library allocation
|
page read and write
|
||
1779000
|
trusted library allocation
|
page read and write
|
||
1B2C5000
|
heap
|
page read and write
|
||
2875CE2E000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
1EA88C00000
|
heap
|
page read and write
|
||
B96000
|
heap
|
page read and write
|
||
247801EA000
|
trusted library allocation
|
page read and write
|
||
247F0284000
|
heap
|
page read and write
|
||
6F2000
|
unkown
|
page read and write
|
||
1B687000
|
heap
|
page read and write
|
||
7FFAACDCE000
|
trusted library allocation
|
page read and write
|
||
7FFAACBCB000
|
trusted library allocation
|
page execute and read and write
|
||
49EA000
|
stack
|
page read and write
|
||
2478007F000
|
trusted library allocation
|
page read and write
|
||
4361C76000
|
stack
|
page read and write
|
||
2479009D000
|
trusted library allocation
|
page read and write
|
||
4361D7E000
|
unkown
|
page readonly
|
||
250F8902000
|
heap
|
page read and write
|
||
247EEFD0000
|
heap
|
page read and write
|
||
250F8800000
|
heap
|
page read and write
|
||
6E1000
|
unkown
|
page execute read
|
||
247EC600000
|
heap
|
page read and write
|
||
2600FE02000
|
trusted library allocation
|
page read and write
|
||
1A0547B000
|
stack
|
page read and write
|
||
1B3A0000
|
heap
|
page read and write
|
||
2478076A000
|
trusted library allocation
|
page read and write
|
||
7FFAACD4E000
|
trusted library allocation
|
page read and write
|
||
CC5000
|
heap
|
page read and write
|
||
2BDF000
|
trusted library allocation
|
page read and write
|
||
F49637A000
|
stack
|
page read and write
|
||
8A544FE000
|
unkown
|
page readonly
|
||
1635000
|
trusted library allocation
|
page read and write
|
||
2875CCF0000
|
trusted library allocation
|
page read and write
|
||
7FFAACBA3000
|
trusted library allocation
|
page read and write
|
||
7F226FE000
|
stack
|
page read and write
|
||
8A559FD000
|
stack
|
page read and write
|
||
247EDF00000
|
heap
|
page execute and read and write
|
||
125D000
|
stack
|
page read and write
|
||
18E6000
|
trusted library allocation
|
page read and write
|
||
2BA80700000
|
heap
|
page read and write
|
||
5E132FE000
|
unkown
|
page readonly
|
||
1EA88C5C000
|
heap
|
page read and write
|
||
1B251000
|
heap
|
page read and write
|
||
7FFAACF10000
|
trusted library allocation
|
page read and write
|
||
436237E000
|
stack
|
page read and write
|
||
17CA2E00000
|
heap
|
page read and write
|
||
247F010B000
|
heap
|
page read and write
|
||
5470000
|
trusted library allocation
|
page read and write
|
||
7FFAAD082000
|
trusted library allocation
|
page read and write
|
||
2479023F000
|
trusted library allocation
|
page read and write
|
||
2BA80602000
|
heap
|
page read and write
|
||
7FFAACBA0000
|
trusted library allocation
|
page read and write
|
||
3E8F000
|
stack
|
page read and write
|
||
247EEFC5000
|
heap
|
page read and write
|
||
1B705000
|
heap
|
page read and write
|
||
28757894000
|
heap
|
page read and write
|
||
7FFAACBBB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACB93000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACD40000
|
trusted library allocation
|
page read and write
|
||
4B2D000
|
stack
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
4AEC000
|
stack
|
page read and write
|
||
247EC400000
|
heap
|
page read and write
|
||
282FC5B0000
|
remote allocation
|
page read and write
|
||
F10000
|
unkown
|
page readonly
|
||
4C6E000
|
stack
|
page read and write
|
||
166B000
|
trusted library allocation
|
page read and write
|
||
1298E000
|
trusted library allocation
|
page read and write
|
||
7FFAACF50000
|
trusted library allocation
|
page read and write
|
||
7FFAACE00000
|
trusted library allocation
|
page read and write
|
||
F49657E000
|
stack
|
page read and write
|
||
5D3000
|
heap
|
page read and write
|
||
1B860000
|
unkown
|
page readonly
|
||
1B207000
|
heap
|
page read and write
|
||
165B7A13000
|
heap
|
page read and write
|
||
7FFAACD7C000
|
trusted library allocation
|
page read and write
|
||
24780339000
|
trusted library allocation
|
page read and write
|
||
1EA88C54000
|
heap
|
page read and write
|
||
8A53FF7000
|
stack
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
8A54AFE000
|
unkown
|
page readonly
|
||
28757FA0000
|
trusted library section
|
page readonly
|
||
CFD000
|
trusted library allocation
|
page execute and read and write
|
||
167D000
|
trusted library allocation
|
page read and write
|
||
1B1FB000
|
heap
|
page read and write
|
||
3FCE000
|
stack
|
page read and write
|
||
7FFAACC46000
|
trusted library allocation
|
page read and write
|
||
35CE000
|
stack
|
page read and write
|
||
7FFAAD080000
|
trusted library allocation
|
page read and write
|
||
7FFAACDC0000
|
trusted library allocation
|
page read and write
|
||
2BAFFC00000
|
heap
|
page read and write
|
||
12990000
|
trusted library allocation
|
page read and write
|
||
2600E465000
|
heap
|
page read and write
|
||
2AB4000
|
trusted library allocation
|
page read and write
|
||
7F22B7E000
|
stack
|
page read and write
|
||
C30000
|
trusted library allocation
|
page read and write
|
||
5E131FD000
|
stack
|
page read and write
|
||
247F0252000
|
heap
|
page read and write
|
||
8A5557E000
|
stack
|
page read and write
|
||
2478056B000
|
trusted library allocation
|
page read and write
|
||
CE8000
|
stack
|
page read and write
|
||
10CD000
|
stack
|
page read and write
|
||
1BAF0000
|
heap
|
page read and write
|
||
5E127FE000
|
unkown
|
page readonly
|
||
165B7A5F000
|
heap
|
page read and write
|
||
2600FDD0000
|
trusted library allocation
|
page read and write
|
||
24790249000
|
trusted library allocation
|
page read and write
|
||
28758015000
|
heap
|
page read and write
|
||
4180000
|
trusted library allocation
|
page read and write
|
||
247F0232000
|
heap
|
page read and write
|
||
16A8000
|
trusted library allocation
|
page read and write
|
||
5E12CFD000
|
stack
|
page read and write
|
||
43616BB000
|
stack
|
page read and write
|
||
2478039E000
|
trusted library allocation
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
7FFAACBBD000
|
trusted library allocation
|
page execute and read and write
|
||
3B60000
|
unkown
|
page readonly
|
||
7FFAACDD0000
|
trusted library allocation
|
page read and write
|
||
5E1287C000
|
stack
|
page read and write
|
||
4320000
|
trusted library allocation
|
page read and write
|
||
247F2243000
|
heap
|
page read and write
|
||
2875CC60000
|
trusted library allocation
|
page read and write
|
||
F9F000
|
trusted library allocation
|
page read and write
|
||
7FFAACDB7000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
18C29E4E000
|
heap
|
page read and write
|
||
28757F90000
|
trusted library section
|
page readonly
|
||
2BAFFBD0000
|
heap
|
page read and write
|
||
BDD000
|
unkown
|
page readonly
|
||
165B7960000
|
heap
|
page read and write
|
||
292F000
|
trusted library allocation
|
page read and write
|
||
247EE830000
|
heap
|
page read and write
|
||
1EA88C92000
|
heap
|
page read and write
|
||
D80000
|
trusted library allocation
|
page execute and read and write
|
||
8A54B7E000
|
stack
|
page read and write
|
||
36D000
|
stack
|
page read and write
|
||
4EAB000
|
stack
|
page read and write
|
||
7FFAAD0E0000
|
trusted library allocation
|
page read and write
|
||
8A54A7E000
|
stack
|
page read and write
|
||
13EE000
|
heap
|
page read and write
|
||
C40000
|
trusted library allocation
|
page read and write
|
||
1B4AE000
|
stack
|
page read and write
|
||
2478008C000
|
trusted library allocation
|
page read and write
|
||
7FFAAD050000
|
trusted library allocation
|
page execute and read and write
|
||
1B242000
|
heap
|
page read and write
|
||
959000
|
heap
|
page read and write
|
||
1A04AFE000
|
stack
|
page read and write
|
||
247F03C3000
|
heap
|
page read and write
|
||
2BA80490000
|
trusted library allocation
|
page read and write
|
||
7FFAACD60000
|
trusted library allocation
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
7FFAACD70000
|
trusted library allocation
|
page read and write
|
||
1EA88C62000
|
heap
|
page read and write
|
||
4C2C000
|
stack
|
page read and write
|
||
287578FF000
|
heap
|
page read and write
|
||
17CA2E38000
|
heap
|
page read and write
|
||
247EC670000
|
trusted library allocation
|
page read and write
|
||
247F22BF000
|
heap
|
page read and write
|
||
17E3000
|
trusted library allocation
|
page read and write
|
||
184A000
|
trusted library allocation
|
page read and write
|
||
7FFAACB90000
|
trusted library allocation
|
page read and write
|
||
28758002000
|
heap
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
1B20A000
|
heap
|
page read and write
|
||
FC5000
|
heap
|
page read and write
|
||
247EC476000
|
heap
|
page read and write
|
||
12C6000
|
heap
|
page read and write
|
||
2875CE4A000
|
heap
|
page read and write
|
||
3935000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
3A4A000
|
trusted library allocation
|
page read and write
|
||
5123000
|
heap
|
page read and write
|
||
7F22C7E000
|
unkown
|
page readonly
|
||
1B5AE000
|
stack
|
page read and write
|
||
430D000
|
stack
|
page read and write
|
||
2875CD20000
|
trusted library allocation
|
page read and write
|
||
8A553FE000
|
unkown
|
page readonly
|
||
9F0000
|
trusted library allocation
|
page read and write
|
||
17CA2F02000
|
heap
|
page read and write
|
||
F49687D000
|
stack
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
2875CC70000
|
trusted library allocation
|
page read and write
|
||
169F000
|
stack
|
page read and write
|
||
7FFAACE39000
|
trusted library allocation
|
page read and write
|
||
12921000
|
trusted library allocation
|
page read and write
|
||
1EA88BB0000
|
heap
|
page read and write
|
||
1EA88CAA000
|
heap
|
page read and write
|
||
247806A5000
|
trusted library allocation
|
page read and write
|
||
247EC665000
|
heap
|
page read and write
|
||
5E12FFD000
|
stack
|
page read and write
|
||
17CA2E55000
|
heap
|
page read and write
|
||
247EC46C000
|
heap
|
page read and write
|
||
24780252000
|
trusted library allocation
|
page read and write
|
||
3949000
|
trusted library allocation
|
page read and write
|
||
247F0340000
|
heap
|
page read and write
|
||
179F000
|
stack
|
page read and write
|
||
13EF000
|
heap
|
page read and write
|
||
1A04C7E000
|
stack
|
page read and write
|
||
12B0000
|
trusted library allocation
|
page read and write
|
||
247901C4000
|
trusted library allocation
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
F496234000
|
stack
|
page read and write
|
||
247807CB000
|
trusted library allocation
|
page read and write
|
||
247EEFE0000
|
heap
|
page read and write
|
||
D30000
|
trusted library allocation
|
page read and write
|
||
2431000
|
trusted library allocation
|
page read and write
|
||
250F8852000
|
heap
|
page read and write
|
||
1EA88C8E000
|
heap
|
page read and write
|
||
18C29E00000
|
heap
|
page read and write
|
||
7FFAACDD0000
|
trusted library allocation
|
page read and write
|
||
2875CE95000
|
heap
|
page read and write
|
||
7FFAACD50000
|
trusted library allocation
|
page read and write
|
||
4290000
|
trusted library allocation
|
page read and write
|
||
4110000
|
trusted library allocation
|
page read and write
|
||
1EA88C55000
|
heap
|
page read and write
|
||
2875CDC0000
|
trusted library allocation
|
page read and write
|
||
282FBE00000
|
heap
|
page read and write
|
||
9D0000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
unkown
|
page readonly
|
||
18C29C50000
|
heap
|
page read and write
|
||
165B7A00000
|
heap
|
page read and write
|
||
247F0273000
|
heap
|
page read and write
|
||
247EE050000
|
heap
|
page execute and read and write
|
||
2875CD49000
|
trusted library allocation
|
page read and write
|
||
107E000
|
stack
|
page read and write
|
||
7FFAACDF0000
|
trusted library allocation
|
page read and write
|
||
1B719000
|
heap
|
page read and write
|
||
7FFAACED0000
|
trusted library allocation
|
page read and write
|
||
BDD000
|
unkown
|
page readonly
|
||
247EC6C0000
|
trusted library allocation
|
page read and write
|
||
1A0597E000
|
unkown
|
page readonly
|
||
7FFAACD35000
|
trusted library allocation
|
page read and write
|
||
1B210000
|
heap
|
page read and write
|
||
BE4000
|
unkown
|
page write copy
|
||
2BAFFCB1000
|
heap
|
page read and write
|
||
967000
|
heap
|
page read and write
|
||
17C0000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB0000
|
trusted library allocation
|
page read and write
|
||
436227E000
|
unkown
|
page readonly
|
||
7FFAACBA4000
|
trusted library allocation
|
page read and write
|
||
8A557F9000
|
stack
|
page read and write
|
||
3AC0000
|
trusted library allocation
|
page execute and read and write
|
||
436247E000
|
unkown
|
page readonly
|
||
2600E513000
|
heap
|
page read and write
|
||
101B000
|
trusted library allocation
|
page execute and read and write
|
||
10DB07E000
|
stack
|
page read and write
|
||
8A541FE000
|
stack
|
page read and write
|
||
1EA88C8F000
|
heap
|
page read and write
|
||
8A5607E000
|
stack
|
page read and write
|
||
2DD0000
|
trusted library allocation
|
page read and write
|
||
7FFAACF26000
|
trusted library allocation
|
page read and write
|
||
AF6000
|
heap
|
page read and write
|
||
28757813000
|
heap
|
page read and write
|
||
1B690000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
2AC0000
|
heap
|
page execute and read and write
|
||
D00000
|
trusted library allocation
|
page read and write
|
||
AB9000
|
heap
|
page read and write
|
||
2875CE1A000
|
heap
|
page read and write
|
||
247F0383000
|
heap
|
page read and write
|
||
D53000
|
heap
|
page read and write
|
||
7F22A7E000
|
unkown
|
page readonly
|
||
432000
|
unkown
|
page readonly
|
||
24780548000
|
trusted library allocation
|
page read and write
|
||
247EE090000
|
trusted library allocation
|
page read and write
|
||
2921000
|
trusted library allocation
|
page read and write
|
||
7FFAACE13000
|
trusted library allocation
|
page read and write
|
||
1B862000
|
unkown
|
page readonly
|
||
1EA88C41000
|
heap
|
page read and write
|
||
24790059000
|
trusted library allocation
|
page read and write
|
||
1A04D7E000
|
unkown
|
page readonly
|
||
D58000
|
heap
|
page read and write
|
||
1876000
|
trusted library allocation
|
page read and write
|
||
7FFAACBC0000
|
trusted library allocation
|
page read and write
|
||
7FFAACE70000
|
trusted library allocation
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
6FD000
|
stack
|
page read and write
|
||
247EE8B9000
|
heap
|
page read and write
|
||
7FFAAD087000
|
trusted library allocation
|
page read and write
|
||
2478050C000
|
trusted library allocation
|
page read and write
|
||
282FC5B0000
|
remote allocation
|
page read and write
|
||
3906000
|
trusted library allocation
|
page read and write
|
||
9D1827E000
|
stack
|
page read and write
|
||
D40000
|
trusted library allocation
|
page read and write
|
||
8A543FB000
|
stack
|
page read and write
|
||
247F0381000
|
heap
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
24780084000
|
trusted library allocation
|
page read and write
|
||
7FFAACDB6000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
4DAE000
|
stack
|
page read and write
|
||
5E12DFE000
|
unkown
|
page readonly
|
||
8A549FE000
|
unkown
|
page readonly
|
||
1B350000
|
heap
|
page read and write
|
||
18C29E39000
|
heap
|
page read and write
|
||
247EE8A6000
|
heap
|
page read and write
|
||
76C000
|
stack
|
page read and write
|
||
2600E400000
|
heap
|
page read and write
|
||
150B000
|
trusted library allocation
|
page read and write
|
||
28757FC0000
|
trusted library section
|
page readonly
|
||
2DA5000
|
trusted library allocation
|
page read and write
|
||
17A3000
|
trusted library allocation
|
page read and write
|
||
165B7A46000
|
heap
|
page read and write
|
||
7FFAACD67000
|
trusted library allocation
|
page read and write
|
||
1EA88C51000
|
heap
|
page read and write
|
||
2875CEE8000
|
heap
|
page read and write
|
||
2BA80000000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
2A41000
|
trusted library allocation
|
page read and write
|
||
159E000
|
stack
|
page read and write
|
||
DB0000
|
unkown
|
page readonly
|
||
7FFAACBA0000
|
trusted library allocation
|
page read and write
|
||
F495FF8000
|
stack
|
page read and write
|
||
E76000
|
heap
|
page read and write
|
||
7FFAACF22000
|
trusted library allocation
|
page read and write
|
||
1803000
|
trusted library allocation
|
page read and write
|
||
247EF05D000
|
heap
|
page read and write
|
||
8A542FE000
|
unkown
|
page readonly
|
||
1B264000
|
heap
|
page read and write
|
||
7FFAACBC4000
|
trusted library allocation
|
page read and write
|
||
2875CE50000
|
trusted library allocation
|
page read and write
|
||
247EED03000
|
heap
|
page execute and read and write
|
||
1BDF6000
|
stack
|
page read and write
|
||
7F2277E000
|
unkown
|
page readonly
|
||
247EC3E0000
|
heap
|
page read and write
|
||
CD9000
|
heap
|
page read and write
|
||
2421000
|
trusted library allocation
|
page read and write
|
||
1EA88C4D000
|
heap
|
page read and write
|
||
1EA88D02000
|
heap
|
page read and write
|
||
1809000
|
trusted library allocation
|
page read and write
|
||
100A000
|
trusted library allocation
|
page execute and read and write
|
||
2875D090000
|
remote allocation
|
page read and write
|
||
7FFAACBBD000
|
trusted library allocation
|
page execute and read and write
|
||
18C29F02000
|
heap
|
page read and write
|
||
9D1807F000
|
stack
|
page read and write
|
||
2600E45F000
|
heap
|
page read and write
|
||
B9B000
|
heap
|
page read and write
|
||
24780088000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
1015000
|
trusted library allocation
|
page execute and read and write
|
||
2BA80702000
|
heap
|
page read and write
|
||
5E12AFE000
|
stack
|
page read and write
|
||
15C0000
|
trusted library allocation
|
page read and write
|
||
24780602000
|
trusted library allocation
|
page read and write
|
||
1B236000
|
heap
|
page read and write
|
||
247F02C7000
|
heap
|
page read and write
|
||
C80000
|
trusted library section
|
page read and write
|
||
1B353000
|
heap
|
page read and write
|
||
370E000
|
stack
|
page read and write
|
||
247F2322000
|
heap
|
page read and write
|
||
D0E000
|
heap
|
page read and write
|
||
7FFAACF00000
|
trusted library allocation
|
page read and write
|
||
2B82000
|
trusted library allocation
|
page read and write
|
||
5100000
|
heap
|
page read and write
|
||
8A5497E000
|
stack
|
page read and write
|
||
7FFAACD70000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
247EC4C0000
|
heap
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
247EC48C000
|
heap
|
page read and write
|
||
1EA88C84000
|
heap
|
page read and write
|
||
247EC4B6000
|
heap
|
page read and write
|
||
7FFAACDB0000
|
trusted library allocation
|
page read and write
|
||
7FFAACE31000
|
trusted library allocation
|
page read and write
|
||
24780823000
|
trusted library allocation
|
page read and write
|
||
1B7AE000
|
stack
|
page read and write
|
||
24790001000
|
trusted library allocation
|
page read and write
|
||
4130000
|
trusted library allocation
|
page read and write
|
||
3921000
|
trusted library allocation
|
page read and write
|
||
247EF060000
|
heap
|
page read and write
|
||
17A1000
|
trusted library allocation
|
page read and write
|
||
247F0259000
|
heap
|
page read and write
|
||
4FA0000
|
unkown
|
page readonly
|
||
28757740000
|
heap
|
page read and write
|
||
2600FDF0000
|
trusted library allocation
|
page read and write
|
||
247F0218000
|
heap
|
page read and write
|
||
CE3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACEE0000
|
trusted library allocation
|
page read and write
|
||
D13000
|
trusted library allocation
|
page execute and read and write
|
||
1B680000
|
heap
|
page read and write
|
||
1EA88C70000
|
heap
|
page read and write
|
||
28757800000
|
heap
|
page read and write
|
||
2BA80732000
|
heap
|
page read and write
|
||
8A554FE000
|
stack
|
page read and write
|
||
2A90000
|
trusted library allocation
|
page read and write
|
||
247EC439000
|
heap
|
page read and write
|
||
BCC000
|
stack
|
page read and write
|
||
29CE000
|
stack
|
page read and write
|
||
24780766000
|
trusted library allocation
|
page read and write
|
||
7FFAACD90000
|
trusted library allocation
|
page read and write
|
||
247EEE50000
|
heap
|
page read and write
|
||
2A70000
|
unkown
|
page readonly
|
||
8A54DFE000
|
unkown
|
page readonly
|
||
1B703000
|
heap
|
page read and write
|
||
3428000
|
trusted library allocation
|
page read and write
|
||
24790241000
|
trusted library allocation
|
page read and write
|
||
1B268000
|
heap
|
page read and write
|
||
7FFAACDA0000
|
trusted library allocation
|
page execute and read and write
|
||
4361F7B000
|
stack
|
page read and write
|
||
247EEC43000
|
heap
|
page read and write
|
||
282FC062000
|
heap
|
page read and write
|
||
125E000
|
stack
|
page read and write
|
||
28758640000
|
trusted library allocation
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
17BA000
|
trusted library allocation
|
page read and write
|
||
247EDF50000
|
trusted library section
|
page readonly
|
||
7FFB22782000
|
unkown
|
page readonly
|
||
1A050FE000
|
stack
|
page read and write
|
||
12981000
|
trusted library allocation
|
page read and write
|
||
1B6AF000
|
stack
|
page read and write
|
||
2BAFFC16000
|
heap
|
page read and write
|
||
247EED00000
|
heap
|
page execute and read and write
|
||
250F9002000
|
trusted library allocation
|
page read and write
|
||
3940000
|
trusted library allocation
|
page read and write
|
||
2875CE00000
|
heap
|
page read and write
|
||
37F0000
|
heap
|
page read and write
|
||
5E126FE000
|
stack
|
page read and write
|
||
8A54FFE000
|
stack
|
page read and write
|
||
18C29D60000
|
trusted library allocation
|
page read and write
|
||
3600000
|
heap
|
page read and write
|
||
4310000
|
trusted library allocation
|
page read and write
|
||
7FFB22761000
|
unkown
|
page execute read
|
||
D45000
|
trusted library allocation
|
page execute and read and write
|
||
8A551FE000
|
unkown
|
page readonly
|
||
8A540FE000
|
unkown
|
page readonly
|
||
247F0222000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
D32000
|
trusted library allocation
|
page read and write
|
||
282FC062000
|
heap
|
page read and write
|
||
2600E320000
|
heap
|
page read and write
|
||
8A53C7B000
|
stack
|
page read and write
|
||
1EA88C6E000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
250F8848000
|
heap
|
page read and write
|
||
24780371000
|
trusted library allocation
|
page read and write
|
||
18DC000
|
trusted library allocation
|
page read and write
|
||
17AE000
|
trusted library allocation
|
page read and write
|
||
7FFAAD060000
|
trusted library allocation
|
page read and write
|
||
7FFAACB92000
|
trusted library allocation
|
page read and write
|
||
1006000
|
trusted library allocation
|
page execute and read and write
|
||
3BE0000
|
unkown
|
page readonly
|
||
8A54BFE000
|
unkown
|
page readonly
|
||
CF0000
|
trusted library allocation
|
page read and write
|
||
7FFAACF3C000
|
trusted library allocation
|
page read and write
|
||
6B7B9FC000
|
stack
|
page read and write
|
||
2478066D000
|
trusted library allocation
|
page read and write
|
||
7F2228B000
|
stack
|
page read and write
|
||
28758301000
|
trusted library allocation
|
page read and write
|
||
1909000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
10DB17E000
|
unkown
|
page readonly
|
||
7FFAACC56000
|
trusted library allocation
|
page read and write
|
||
7FFAACBFC000
|
trusted library allocation
|
page execute and read and write
|
||
1002000
|
trusted library allocation
|
page read and write
|
||
247F02D3000
|
heap
|
page read and write
|
||
2BAFFC37000
|
heap
|
page read and write
|
||
3A40000
|
trusted library allocation
|
page read and write
|
||
1713000
|
trusted library allocation
|
page read and write
|
||
1EA88C60000
|
heap
|
page read and write
|
||
165B7880000
|
heap
|
page read and write
|
||
2478025A000
|
trusted library allocation
|
page read and write
|
||
247EC3D0000
|
heap
|
page read and write
|
||
7FFAACD57000
|
trusted library allocation
|
page read and write
|
||
6E1000
|
unkown
|
page execute read
|
||
7FFAACD47000
|
trusted library allocation
|
page read and write
|
||
511B000
|
heap
|
page read and write
|
||
6B7B8FC000
|
stack
|
page read and write
|
||
7FFAACD40000
|
trusted library allocation
|
page read and write
|
||
A17000
|
heap
|
page read and write
|
||
D2D000
|
trusted library allocation
|
page execute and read and write
|
||
6B7B6FE000
|
stack
|
page read and write
|
||
282FC5B0000
|
remote allocation
|
page read and write
|
||
28758C60000
|
trusted library allocation
|
page read and write
|
||
250F87B0000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
247EC430000
|
heap
|
page read and write
|
||
7FFAACD60000
|
trusted library allocation
|
page read and write
|
||
2479024D000
|
trusted library allocation
|
page read and write
|
||
7FFAACE00000
|
trusted library allocation
|
page read and write
|
||
282FC602000
|
trusted library allocation
|
page read and write
|
||
7FFAACD80000
|
trusted library allocation
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
1854000
|
trusted library allocation
|
page read and write
|
||
DDBFE7E000
|
stack
|
page read and write
|
||
3A30000
|
trusted library allocation
|
page read and write
|
||
28757FE0000
|
trusted library section
|
page readonly
|
||
165B7A2B000
|
heap
|
page read and write
|
||
D11000
|
heap
|
page read and write
|
||
282FC057000
|
heap
|
page read and write
|
||
7FFAACBA3000
|
trusted library allocation
|
page execute and read and write
|
||
2875788F000
|
heap
|
page read and write
|
||
247EE000000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
247EF028000
|
heap
|
page read and write
|
||
1B260000
|
heap
|
page read and write
|
||
1EA88C42000
|
heap
|
page read and write
|
||
1EA88C68000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
247F2337000
|
heap
|
page read and write
|
||
247901E9000
|
trusted library allocation
|
page read and write
|
||
282FC590000
|
trusted library allocation
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
||
6EC000
|
unkown
|
page readonly
|
||
247EC700000
|
heap
|
page read and write
|
||
1756000
|
trusted library allocation
|
page read and write
|
||
165B7860000
|
heap
|
page read and write
|
||
10DAE7D000
|
stack
|
page read and write
|
||
8A5517E000
|
stack
|
page read and write
|
||
2720000
|
unkown
|
page readonly
|
||
7FFAACF40000
|
trusted library allocation
|
page read and write
|
||
7FFAACDA0000
|
trusted library allocation
|
page read and write
|
||
8A546FE000
|
unkown
|
page readonly
|
||
D36000
|
trusted library allocation
|
page execute and read and write
|
||
AF8000
|
stack
|
page read and write
|
||
8A545FB000
|
stack
|
page read and write
|
||
154E000
|
trusted library allocation
|
page read and write
|
||
7FFAACBAD000
|
trusted library allocation
|
page execute and read and write
|
||
247802F6000
|
trusted library allocation
|
page read and write
|
||
165B7A65000
|
heap
|
page read and write
|
||
7FFAACB9D000
|
trusted library allocation
|
page execute and read and write
|
||
247EC660000
|
heap
|
page read and write
|
||
2600E500000
|
heap
|
page read and write
|
||
17CA2DF0000
|
heap
|
page read and write
|
||
7FFAACE00000
|
trusted library allocation
|
page read and write
|
||
18E0000
|
trusted library allocation
|
page read and write
|
||
247F223F000
|
heap
|
page read and write
|
||
167F000
|
trusted library allocation
|
page read and write
|
||
24780184000
|
trusted library allocation
|
page read and write
|
||
24780481000
|
trusted library allocation
|
page read and write
|
||
28757902000
|
heap
|
page read and write
|
||
1400000
|
trusted library allocation
|
page read and write
|
||
282FC03F000
|
heap
|
page read and write
|
||
247F2331000
|
heap
|
page read and write
|
||
2478048C000
|
trusted library allocation
|
page read and write
|
||
1A0527E000
|
stack
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
2875CF0A000
|
heap
|
page read and write
|
||
7FFAACDE0000
|
trusted library allocation
|
page read and write
|
||
2478048E000
|
trusted library allocation
|
page read and write
|
||
24780509000
|
trusted library allocation
|
page read and write
|
||
1687000
|
trusted library allocation
|
page read and write
|
||
4170000
|
trusted library allocation
|
page read and write
|
||
7FFAACFD0000
|
trusted library allocation
|
page execute and read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
2875D090000
|
remote allocation
|
page read and write
|
||
7FFAACC50000
|
trusted library allocation
|
page read and write
|
||
28757859000
|
heap
|
page read and write
|
||
2875815A000
|
heap
|
page read and write
|
||
18C29E50000
|
heap
|
page read and write
|
||
165B7A02000
|
heap
|
page read and write
|
||
7FFAACB93000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACF24000
|
trusted library allocation
|
page read and write
|
||
1EA89402000
|
trusted library allocation
|
page read and write
|
||
1BAE0000
|
heap
|
page execute and read and write
|
||
28758820000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
1EA88C13000
|
heap
|
page read and write
|
||
436207E000
|
unkown
|
page readonly
|
||
13FF000
|
stack
|
page read and write
|
||
2600E43A000
|
heap
|
page read and write
|
||
2BAFFD02000
|
heap
|
page read and write
|
||
247F0299000
|
heap
|
page read and write
|
||
247901B5000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
13E6000
|
heap
|
page read and write
|
||
1B295000
|
heap
|
page read and write
|
||
250F8837000
|
heap
|
page read and write
|
||
2875811A000
|
heap
|
page read and write
|
||
247F2230000
|
heap
|
page read and write
|
||
7FFAACBB4000
|
trusted library allocation
|
page read and write
|
||
1A0507E000
|
unkown
|
page readonly
|
||
17CA2E40000
|
heap
|
page read and write
|
||
410E000
|
stack
|
page read and write
|
||
16CE000
|
trusted library allocation
|
page read and write
|
||
7FFAACC50000
|
trusted library allocation
|
page execute and read and write
|
||
28757FD0000
|
trusted library section
|
page readonly
|
||
DDBFD7E000
|
unkown
|
page readonly
|
||
F49677E000
|
stack
|
page read and write
|
||
7F2238E000
|
stack
|
page read and write
|
||
7FFAACBB4000
|
trusted library allocation
|
page read and write
|
||
D0B000
|
heap
|
page read and write
|
||
7FFAACDD0000
|
trusted library allocation
|
page read and write
|
||
18C29E02000
|
heap
|
page read and write
|
||
1C180000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
7FFAACE50000
|
trusted library allocation
|
page read and write
|
||
8A547FB000
|
stack
|
page read and write
|
||
1EA88C4B000
|
heap
|
page read and write
|
||
7FFAACD90000
|
trusted library allocation
|
page execute and read and write
|
||
2875785B000
|
heap
|
page read and write
|
||
8A54EFE000
|
unkown
|
page readonly
|
||
1EA88C31000
|
heap
|
page read and write
|
||
CAF000
|
stack
|
page read and write
|
||
1EA88C57000
|
heap
|
page read and write
|
||
7FFAACD95000
|
trusted library allocation
|
page read and write
|
||
1EA88C50000
|
heap
|
page read and write
|
||
1850000
|
trusted library allocation
|
page read and write
|
||
250F8802000
|
heap
|
page read and write
|
||
2BAFFC68000
|
heap
|
page read and write
|
||
2875D030000
|
trusted library allocation
|
page read and write
|
||
7FFAACBEC000
|
trusted library allocation
|
page execute and read and write
|
||
2600E413000
|
heap
|
page read and write
|
||
7FFAACD90000
|
trusted library allocation
|
page read and write
|
||
24780090000
|
trusted library allocation
|
page read and write
|
||
D15000
|
heap
|
page read and write
|
||
BE4000
|
unkown
|
page read and write
|
||
165B7A3F000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
2875CE5F000
|
heap
|
page read and write
|
||
17CA2E13000
|
heap
|
page read and write
|
||
1B21F000
|
heap
|
page read and write
|
||
7FFAACDAB000
|
trusted library allocation
|
page read and write
|
||
2600E600000
|
heap
|
page read and write
|
||
1EA88C2B000
|
heap
|
page read and write
|
||
247EC640000
|
trusted library allocation
|
page read and write
|
||
129E000
|
stack
|
page read and write
|
||
18C2A600000
|
heap
|
page read and write
|
||
18C29F13000
|
heap
|
page read and write
|
||
5E12BFE000
|
unkown
|
page readonly
|
||
170F000
|
trusted library allocation
|
page read and write
|
||
7FFB22760000
|
unkown
|
page readonly
|
There are 1180 hidden memdumps, click here to show them.