Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
khwHsyfsJ1.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_khwHsyfsJ1.exe_cedc721fedcefff4fd769557be0c6a9fb641d7_026cf9bc_01bbeda8-9df9-431d-b05b-aa7134e7ccfd\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x867a2d70, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1F87.tmp.dmp
|
Mini DuMP crash report, 14 streams, Fri Oct 25 17:27:15 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER216C.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER21AC.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER21B9.tmp.csv
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2208.tmp.txt
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 4770 bytes, 1 file, at 0x2c +A "disallowedcert.stl", number 1, 1 datablock,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
Certificate, Version=3
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
|
Certificate, Version=3
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
data
|
modified
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\manifests\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\manifests\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (10073), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\manifests\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\manifests\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\manifests\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\manifests\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\manifests\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\manifests\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\manifests\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\manifests\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\manifests\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\manifests\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (63849), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\manifests\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\manifests\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.ClientService.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.WindowsBackstageShell.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.WindowsBackstageShell.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.WindowsClient.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.WindowsFileManager.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.WindowsFileManager.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f\ScreenConnect.Core.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af\ScreenConnect.Windows.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c\ScreenConnect.WindowsClient.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883\ScreenConnect.Client.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\1co5soej.newcfg
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\Client.Override.en-US.resources
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\Client.Override.resources
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\Client.en-US.resources
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\Client.resources
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\app.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\user.config
(copy)
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea\ScreenConnect.ClientService.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dfsvc.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ScreenConnect.ClientService.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\62C6HAPT.log
|
Unicode text, UTF-16, little-endian text, with very long lines (618), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\ATCJGV5C.AJP\B8PVKCMA.Z7R.application
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (63849), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\RV7HOO4L.7TM\1O7BWTAO.H01\ScreenConnect.Client.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\RV7HOO4L.7TM\1O7BWTAO.H01\ScreenConnect.Client.dll.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\RV7HOO4L.7TM\1O7BWTAO.H01\ScreenConnect.ClientService.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\RV7HOO4L.7TM\1O7BWTAO.H01\ScreenConnect.ClientService.dll.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\RV7HOO4L.7TM\1O7BWTAO.H01\ScreenConnect.ClientService.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\RV7HOO4L.7TM\1O7BWTAO.H01\ScreenConnect.Core.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\RV7HOO4L.7TM\1O7BWTAO.H01\ScreenConnect.Core.dll.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\RV7HOO4L.7TM\1O7BWTAO.H01\ScreenConnect.Windows.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\RV7HOO4L.7TM\1O7BWTAO.H01\ScreenConnect.Windows.dll.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\RV7HOO4L.7TM\1O7BWTAO.H01\ScreenConnect.WindowsBackstageShell.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\RV7HOO4L.7TM\1O7BWTAO.H01\ScreenConnect.WindowsBackstageShell.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\RV7HOO4L.7TM\1O7BWTAO.H01\ScreenConnect.WindowsClient.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\RV7HOO4L.7TM\1O7BWTAO.H01\ScreenConnect.WindowsClient.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\RV7HOO4L.7TM\1O7BWTAO.H01\ScreenConnect.WindowsClient.exe.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\RV7HOO4L.7TM\1O7BWTAO.H01\ScreenConnect.WindowsClient.exe.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (10073), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\RV7HOO4L.7TM\1O7BWTAO.H01\ScreenConnect.WindowsFileManager.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\RV7HOO4L.7TM\1O7BWTAO.H01\ScreenConnect.WindowsFileManager.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\932a2db58c237abd381d22df4c63a04a_9e146be9-c76a-4720-bcdb-53011b87bd06
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ScreenConnect.ClientService.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 68 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\khwHsyfsJ1.exe
|
"C:\Users\user\Desktop\khwHsyfsJ1.exe"
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe"
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe"
"?e=Support&y=Guest&h=kjh231a.zapto.org&p=8041&s=41bb451f-21e9-4165-b8b1-29146c1a400a&k=BgIAAACkAABSU0ExAAgAAAEAAQAFiJkYSsHWAiMLqCRmzzktgQckyG3TGgm6yPTLawNtNX6q1gr57JH4PrLfClMTmwPp16%2ftpUu72MJPhrP9Fe%2fDAOLI7IxssEnqHo0cK7GF8605xW1%2b29YYv7Gp%2f%2bRVnS8EXpyfNuusFYa%2bCoXawQboJM2Gi1VXFl4XcMGGJmYswsgo9qU%2fBqW3jX3LRGSRskHQDuJYQ8zNUvX1ZvvvtewO8gfRa7Z6WeC1pOnkHykQZ7ux8aNy9iCaTKjcx7FnTu1T7GRag6eNtt4weTuPK2uLu2HYzL%2fVKjjkmkP1xXy2lhSPvloy810giaMzeQQElR11NNJ7O%2bcRI%2b4xi9%2bIANXb&r=&i=Untitled%20Session"
"1"
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe"
"?e=Support&y=Guest&h=kjh231a.zapto.org&p=8041&s=41bb451f-21e9-4165-b8b1-29146c1a400a&k=BgIAAACkAABSU0ExAAgAAAEAAQAFiJkYSsHWAiMLqCRmzzktgQckyG3TGgm6yPTLawNtNX6q1gr57JH4PrLfClMTmwPp16%2ftpUu72MJPhrP9Fe%2fDAOLI7IxssEnqHo0cK7GF8605xW1%2b29YYv7Gp%2f%2bRVnS8EXpyfNuusFYa%2bCoXawQboJM2Gi1VXFl4XcMGGJmYswsgo9qU%2fBqW3jX3LRGSRskHQDuJYQ8zNUvX1ZvvvtewO8gfRa7Z6WeC1pOnkHykQZ7ux8aNy9iCaTKjcx7FnTu1T7GRag6eNtt4weTuPK2uLu2HYzL%2fVKjjkmkP1xXy2lhSPvloy810giaMzeQQElR11NNJ7O%2bcRI%2b4xi9%2bIANXb&r=&i=Untitled%20Session"
"1"
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\Q0B52QGM.675\BV2JH5RM.NCD\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe"
"RunRole" "22550ff7-91dc-46b5-a75f-0870a9ece610" "User"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k WerSvcGroup
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 652 -ip 652
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 844
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://secure.stansup.com/Bin/ScreenConnect.Client.application9
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdtp:
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.applicationD
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsBackstageShell.exe
|
79.110.49.185
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.application#ScreenConnect.WindowsCli
|
unknown
|
||
https://secure.stansup.com/Bin
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsBackstageShell.exe.config
|
79.110.49.185
|
||
https://login.microsoftonline.com/ppsecure/ResolveUser.srf
|
unknown
|
||
https://secure.stansup.com
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdA
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.application1
|
unknown
|
||
https://secure.stansup.c
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdence
|
unknown
|
||
https://secure.staP2
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.applicationY
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdAAAAA
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/devicechangecredential.srf
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srf.
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/EnumerateDevices.srf
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.application
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdecuri
|
unknown
|
||
https://account.live.com/InlineSignup.aspx?iww=1&id=80502
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsClient.exea
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.applicationX
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200
|
unknown
|
||
http://Passport.NET/tb_
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdd
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsClient.exe.configdZ
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdema#1
|
unknown
|
||
http://www.w3.(
|
unknown
|
||
https://secure.stansa
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/DeviceAssociate.srfJ
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsClient.exe.config
|
79.110.49.185
|
||
https://account.live.com/msangcwam
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsFileManager.exe.config
|
79.110.49.185
|
||
http://www.w3.or
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
http://passport.net/tb
|
unknown
|
||
https://secure.staP
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.applicationx
|
unknown
|
||
https://secure.stansup.com/B
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Windo
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.ClientService.exe
|
79.110.49.185
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsFileManager.exe
|
79.110.49.185
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdAAAAAA
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdxml
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.application?e=Support&y=Guest&h=kjh231a.zapto.or
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdlns:p
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.manifestU
|
unknown
|
||
https://g.live.com/odclientsettings/Prod-C:
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.ClientService.exeO
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.ClientService.dll
|
79.110.49.185
|
||
http://schemas.xmlsoap.org/ws/2005/02/scon
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
|
unknown
|
||
http://crl3.digice
|
unknown
|
||
https://login.ecur
|
unknown
|
||
https://account.live.com/Wizard/Password/Change?id=806013
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.manifestn1CD
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdhema
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.dll
|
79.110.49.185
|
||
https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srf:CLSID
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/deviceremovecredential.srf
|
unknown
|
||
https://secure.stansup.com/Bin/ScreeTX
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdwsse:S
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdAAAA
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/DeviceQuery.srf
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust
|
unknown
|
||
https://login.microsoftonline.com/MSARST2.srf
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Windows.dll#
|
unknown
|
||
http://Passport.NET/STS
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdpC9fPITA
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/DeviceQuery.srf-
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/DeviceUpdate.srf%
|
unknown
|
||
http://www.xrml.org/schema/2001/11/xrml2coreS
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecu
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Issue502
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdAABGI2aS3a
|
unknown
|
||
http://www.w3.o
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Windows.dll
|
79.110.49.185
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.application#Scre0
|
unknown
|
||
http://Passport.NET/tb
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.manifest
|
79.110.49.185
|
||
http://Passport.NET/STS09/xmldsig#ripledes-cbcices/SOAPFaultcurity-utility-1.0.xsd
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/devicechangecredential.srfMM
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdsis-2
|
unknown
|
||
https://signup.live.com/signup.aspx
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsClient.exe
|
79.110.49.185
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecu-1.0
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80601
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80600
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80603
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/09/policy
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Core.dll
|
79.110.49.185
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdAAAAAA
|
unknown
|
||
http://www.xrml.org/schema/2001/11/xrml2core
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80605
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
secure.stansup.com
|
79.110.49.185
|
||
kjh231a.zapto.org
|
79.110.49.185
|
||
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
|
84.201.210.34
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
127.0.0.1
|
unknown
|
unknown
|
||
79.110.49.185
|
secure.stansup.com
|
Germany
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Network\ScreenConnect Client (41bb451f-21e9-4165-b8b1-29146c1a400a)
|
NULL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
|
Blob
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\4C2272FBA7A7380F55E2A424E9E624AEE1C14579
|
Blob
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
|
ComponentStore_RandomString
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
|
ComponentStore_RandomString
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager
|
StateStore_RandomString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
|
Blob
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{60051b8f-4f12-400a-8e50-dd05ebd438d1}
|
NonCanonicalData
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{60051b8f-4f12-400a-8e50-dd05ebd438d1}\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{60051b8f-4f12-400a-8e50-dd05ebd438d1}\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
{c989bb7a-8385-4715-98cf-a741a8edb823}!ApplicationTrust
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
lock!01000000c375b60a14060000741b00000000000000000000055475cd9428db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}
|
NonCanonicalData
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!DeploymentSourceUri
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!ApplicationSourceUri
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!IsFullTrust
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!IsShellVisible
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!PreviousBind
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!PendingBind
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!ExcludedDeployment
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!PendingDeployment
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!DeploymentProviderUri
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!MinimumRequiredVersion
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!LastCheckTime
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!UpdateSkippedDeployment
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!UpdateSkipTime
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!AppType
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!CurrentBind
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
pin!S_{3f471841-eef2-47d6-89c0-d028f03a4ad5}
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.ClientService.exe_e781b1ee36f7c0e0
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.ClientService.exe_e781b1ee36f7c0e0
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsBackstageShell.exe_898f6d085da479bc
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsBackstageShell.exe_898f6d085da479bc
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsFileManager.exe.config_ceab8affc7343daa
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsFileManager.exe.config_ceab8affc7343daa
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsClient.exe.config_f7f106a5cc529540
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsClient.exe.config_f7f106a5cc529540
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsBackstageShell.exe.config_61230ac9d37a71e2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsBackstageShell.exe.config_61230ac9d37a71e2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsFileManager.exe_0e21f87bfcff26be
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsFileManager.exe_0e21f87bfcff26be
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883\Files
|
ScreenConnect.Client.dll_fc1d7bd48553fcab
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883\Files
|
ScreenConnect.Client.dll_fc1d7bd48553fcab
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af\Files
|
ScreenConnect.Windows.dll_fc0d83aff7df0b5b
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af\Files
|
ScreenConnect.Windows.dll_fc0d83aff7df0b5b
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea\Files
|
ScreenConnect.ClientService.dll_e781b1c636f7bfae
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea\Files
|
ScreenConnect.ClientService.dll_e781b1c636f7bfae
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f\Files
|
ScreenConnect.Core.dll_b96889d378047e27
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f\Files
|
ScreenConnect.Core.dll_b96889d378047e27
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c\Files
|
ScreenConnect.WindowsClient.exe_6492277df2db17d2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c\Files
|
ScreenConnect.WindowsClient.exe_6492277df2db17d2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment
|
OnlineAppQuotaUsageEstimate
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f
|
lock!100000001432d00a14060000741b00000000000000000000616e13bb9828db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
lock!0e0000001432d00a14060000741b00000000000000000000616e13bb9828db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
lock!0c0000001432d00a14060000741b00000000000000000000616e13bb9828db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
lock!0a0000001432d00a14060000741b00000000000000000000616e13bb9828db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
lock!080000001432d00a14060000741b00000000000000000000616e13bb9828db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
lock!060000001432d00a14060000741b00000000000000000000616e13bb9828db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee
|
lock!040000001432d00a14060000741b00000000000000000000616e13bb9828db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Applications\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Applications\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
PreparedForExecution
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
lock!110000001432d00a14060000741b00000000000000000000616e13bb9828db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.ClientService.exe_5e8c1e841cd8db20
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsBackstageShell.exe_89b7a517a15abfdc
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsFileManager.exe.config_5db10293a642be8a
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsClient.exe.config_432322067acab5c0
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsBackstageShell.exe.config_bc78256f1e952942
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsFileManager.exe_74b82db4db38179e
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea\Files
|
ScreenConnect.ClientService.dll_5e8c1e5c1cd8d9ee
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c\Files
|
ScreenConnect.WindowsClient.exe_fd0fcfe1fd1a6cd2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f\Files
|
ScreenConnect.Core.dll_963930cc5ced28c7
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883\Files
|
ScreenConnect.Client.dll_7b0ea606092ddbcb
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af\Files
|
ScreenConnect.Windows.dll_fa5f7fd8f7c108bb
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
SubstructureCreated
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
|
Blob
|
||
\REGISTRY\A\{2bcf3aae-6175-c71f-adb4-3020a6517082}\Root\InventoryApplicationFile\khwhsyfsj1.exe|239c70f602c0009d
|
ProgramId
|
||
\REGISTRY\A\{2bcf3aae-6175-c71f-adb4-3020a6517082}\Root\InventoryApplicationFile\khwhsyfsj1.exe|239c70f602c0009d
|
FileId
|
||
\REGISTRY\A\{2bcf3aae-6175-c71f-adb4-3020a6517082}\Root\InventoryApplicationFile\khwhsyfsj1.exe|239c70f602c0009d
|
LowerCaseLongPath
|
||
\REGISTRY\A\{2bcf3aae-6175-c71f-adb4-3020a6517082}\Root\InventoryApplicationFile\khwhsyfsj1.exe|239c70f602c0009d
|
LongPathHash
|
||
\REGISTRY\A\{2bcf3aae-6175-c71f-adb4-3020a6517082}\Root\InventoryApplicationFile\khwhsyfsj1.exe|239c70f602c0009d
|
Name
|
||
\REGISTRY\A\{2bcf3aae-6175-c71f-adb4-3020a6517082}\Root\InventoryApplicationFile\khwhsyfsj1.exe|239c70f602c0009d
|
OriginalFileName
|
||
\REGISTRY\A\{2bcf3aae-6175-c71f-adb4-3020a6517082}\Root\InventoryApplicationFile\khwhsyfsj1.exe|239c70f602c0009d
|
Publisher
|
||
\REGISTRY\A\{2bcf3aae-6175-c71f-adb4-3020a6517082}\Root\InventoryApplicationFile\khwhsyfsj1.exe|239c70f602c0009d
|
Version
|
||
\REGISTRY\A\{2bcf3aae-6175-c71f-adb4-3020a6517082}\Root\InventoryApplicationFile\khwhsyfsj1.exe|239c70f602c0009d
|
BinFileVersion
|
||
\REGISTRY\A\{2bcf3aae-6175-c71f-adb4-3020a6517082}\Root\InventoryApplicationFile\khwhsyfsj1.exe|239c70f602c0009d
|
BinaryType
|
||
\REGISTRY\A\{2bcf3aae-6175-c71f-adb4-3020a6517082}\Root\InventoryApplicationFile\khwhsyfsj1.exe|239c70f602c0009d
|
ProductName
|
||
\REGISTRY\A\{2bcf3aae-6175-c71f-adb4-3020a6517082}\Root\InventoryApplicationFile\khwhsyfsj1.exe|239c70f602c0009d
|
ProductVersion
|
||
\REGISTRY\A\{2bcf3aae-6175-c71f-adb4-3020a6517082}\Root\InventoryApplicationFile\khwhsyfsj1.exe|239c70f602c0009d
|
LinkDate
|
||
\REGISTRY\A\{2bcf3aae-6175-c71f-adb4-3020a6517082}\Root\InventoryApplicationFile\khwhsyfsj1.exe|239c70f602c0009d
|
BinProductVersion
|
||
\REGISTRY\A\{2bcf3aae-6175-c71f-adb4-3020a6517082}\Root\InventoryApplicationFile\khwhsyfsj1.exe|239c70f602c0009d
|
AppxPackageFullName
|
||
\REGISTRY\A\{2bcf3aae-6175-c71f-adb4-3020a6517082}\Root\InventoryApplicationFile\khwhsyfsj1.exe|239c70f602c0009d
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{2bcf3aae-6175-c71f-adb4-3020a6517082}\Root\InventoryApplicationFile\khwhsyfsj1.exe|239c70f602c0009d
|
Size
|
||
\REGISTRY\A\{2bcf3aae-6175-c71f-adb4-3020a6517082}\Root\InventoryApplicationFile\khwhsyfsj1.exe|239c70f602c0009d
|
Language
|
||
\REGISTRY\A\{2bcf3aae-6175-c71f-adb4-3020a6517082}\Root\InventoryApplicationFile\khwhsyfsj1.exe|239c70f602c0009d
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates\2C85006A1A028BCC349DF23C474724C055FDE8B6
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates\B68D8F953E551914324E557E6164D68B9926650C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC
|
Data
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
|
Data
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
|
Data
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f
|
lock!0e00000011ad6e00ec120000fc1200000000000000000000ba9ebe370327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
lock!0c00000011ad6e00ec120000fc1200000000000000000000ba9ebe370327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
lock!0a00000011ad6e00ec120000fc1200000000000000000000ba9ebe370327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
lock!0800000011ad6e00ec120000fc1200000000000000000000ba9ebe370327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
lock!0600000011ad6e00ec120000fc1200000000000000000000ba9ebe370327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
lock!0400000011ad6e00ec120000fc1200000000000000000000ba9ebe370327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee
|
lock!0200000011ad6e00ec120000fc1200000000000000000000ba9ebe370327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f
|
lock!1c00000021ad6e00ec120000fc1200000000000000000000b701c1370327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
lock!1a00000021ad6e00ec120000fc1200000000000000000000b701c1370327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
lock!1800000021ad6e00ec120000fc1200000000000000000000b701c1370327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
lock!1600000021ad6e00ec120000fc1200000000000000000000b701c1370327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
lock!1400000021ad6e00ec120000fc1200000000000000000000b701c1370327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
lock!1200000021ad6e00ec120000fc1200000000000000000000b701c1370327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee
|
lock!1000000021ad6e00ec120000fc1200000000000000000000b701c1370327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
lock!1d00000040ad6e00ec120000fc120000000000000000000007c6c5370327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Families\F_scre..tion_25b0fbb6ef7eb094_98134c89f0fa827c
|
LastRunVersion
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Families\Gc_scre..tion_503889a8656f441d
|
LastRunVersion
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Families\Gi_scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
LastRunVersion
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Applications\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
HasRunBefore
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
|
AutoBackupLogFiles
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\ScreenConnect
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (41bb451f-21e9-4165-b8b1-29146c1a400a)
|
ImagePath
|
There are 182 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FF888120000
|
trusted library allocation
|
page read and write
|
||
1D4572FB000
|
heap
|
page read and write
|
||
FF4000
|
unkown
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
2FA0000
|
trusted library section
|
page read and write
|
||
1D4572A8000
|
heap
|
page read and write
|
||
1B697000
|
heap
|
page read and write
|
||
1E0E83A0000
|
trusted library section
|
page readonly
|
||
189C5600000
|
heap
|
page read and write
|
||
1425000
|
heap
|
page read and write
|
||
7FF888250000
|
trusted library allocation
|
page read and write
|
||
B63A07E000
|
unkown
|
page readonly
|
||
B6380EC000
|
stack
|
page read and write
|
||
189C5680000
|
heap
|
page read and write
|
||
55E0000
|
unkown
|
page readonly
|
||
E9E000
|
stack
|
page read and write
|
||
98328FD000
|
stack
|
page read and write
|
||
1D459179000
|
heap
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
1060000
|
heap
|
page execute and read and write
|
||
7FF887FE7000
|
trusted library allocation
|
page read and write
|
||
189C6437000
|
heap
|
page read and write
|
||
1D43EDB2000
|
trusted library allocation
|
page read and write
|
||
16CF79000
|
stack
|
page read and write
|
||
1E0EC8E5000
|
heap
|
page read and write
|
||
FAE000
|
stack
|
page read and write
|
||
1D459130000
|
heap
|
page read and write
|
||
B6392FE000
|
stack
|
page read and write
|
||
5590000
|
trusted library allocation
|
page read and write
|
||
1E0ECB60000
|
remote allocation
|
page read and write
|
||
1E0EC730000
|
trusted library allocation
|
page read and write
|
||
1D44ED34000
|
trusted library allocation
|
page read and write
|
||
7FF8881B2000
|
trusted library allocation
|
page read and write
|
||
1D43EDAE000
|
trusted library allocation
|
page read and write
|
||
189C640D000
|
heap
|
page read and write
|
||
2DBF000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
1E0ECA04000
|
trusted library allocation
|
page read and write
|
||
7FF8880C1000
|
trusted library allocation
|
page read and write
|
||
7FF44CB40000
|
trusted library allocation
|
page execute and read and write
|
||
1D457820000
|
heap
|
page read and write
|
||
1F160000
|
trusted library allocation
|
page read and write
|
||
1D458BB2000
|
trusted library allocation
|
page read and write
|
||
1256000
|
heap
|
page read and write
|
||
1249000
|
heap
|
page read and write
|
||
1E0ECA90000
|
trusted library allocation
|
page read and write
|
||
1906000
|
trusted library allocation
|
page read and write
|
||
1D459182000
|
heap
|
page read and write
|
||
1D45785D000
|
heap
|
page read and write
|
||
1BBAE000
|
stack
|
page read and write
|
||
1BE88000
|
heap
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
1D43EBFC000
|
trusted library allocation
|
page read and write
|
||
189C56BA000
|
heap
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
16D0FE000
|
stack
|
page read and write
|
||
5560000
|
trusted library allocation
|
page read and write
|
||
1E0E8380000
|
trusted library section
|
page readonly
|
||
16E07E000
|
unkown
|
page readonly
|
||
5544000
|
unkown
|
page readonly
|
||
1771000
|
trusted library allocation
|
page read and write
|
||
B6B000
|
unkown
|
page readonly
|
||
1D4589B0000
|
heap
|
page read and write
|
||
3661000
|
trusted library allocation
|
page read and write
|
||
1E0EC7D0000
|
trusted library allocation
|
page read and write
|
||
7FF88818C000
|
trusted library allocation
|
page read and write
|
||
1D45AFA7000
|
heap
|
page read and write
|
||
1BEA2000
|
heap
|
page read and write
|
||
12DB1000
|
trusted library allocation
|
page read and write
|
||
7FF887E0D000
|
trusted library allocation
|
page execute and read and write
|
||
1B34D000
|
stack
|
page read and write
|
||
1176000
|
heap
|
page read and write
|
||
7FF887EC0000
|
trusted library allocation
|
page execute and read and write
|
||
189C5F72000
|
heap
|
page read and write
|
||
362F000
|
trusted library allocation
|
page read and write
|
||
1D43D170000
|
trusted library allocation
|
page read and write
|
||
189C643E000
|
heap
|
page read and write
|
||
B63987A000
|
stack
|
page read and write
|
||
3BE5000
|
trusted library allocation
|
page read and write
|
||
15DE000
|
stack
|
page read and write
|
||
2726AF02000
|
heap
|
page read and write
|
||
1E0EC7B0000
|
trusted library allocation
|
page read and write
|
||
189C6512000
|
heap
|
page read and write
|
||
189C5F3B000
|
heap
|
page read and write
|
||
2DB1000
|
trusted library allocation
|
page read and write
|
||
B6393FE000
|
stack
|
page read and write
|
||
189C641B000
|
heap
|
page read and write
|
||
1D4572F5000
|
heap
|
page read and write
|
||
1AEA000
|
trusted library allocation
|
page read and write
|
||
1650000
|
trusted library allocation
|
page read and write
|
||
B639BFE000
|
unkown
|
page readonly
|
||
10EB000
|
heap
|
page read and write
|
||
1E0EC854000
|
heap
|
page read and write
|
||
1640000
|
trusted library allocation
|
page read and write
|
||
7FF887E24000
|
trusted library allocation
|
page read and write
|
||
189C5F55000
|
heap
|
page read and write
|
||
7FF888040000
|
trusted library allocation
|
page read and write
|
||
7FF8881C0000
|
trusted library allocation
|
page read and write
|
||
7FF887FC0000
|
trusted library allocation
|
page read and write
|
||
1D43EDBE000
|
trusted library allocation
|
page read and write
|
||
1BAAE000
|
stack
|
page read and write
|
||
1E0EC903000
|
heap
|
page read and write
|
||
16D07E000
|
unkown
|
page readonly
|
||
1B6FB000
|
heap
|
page read and write
|
||
1D43D1C0000
|
heap
|
page read and write
|
||
189C5F5D000
|
heap
|
page read and write
|
||
1C2F0000
|
heap
|
page read and write
|
||
189C5697000
|
heap
|
page read and write
|
||
1E0EC90A000
|
heap
|
page read and write
|
||
30F1000
|
trusted library allocation
|
page read and write
|
||
7FF88805E000
|
trusted library allocation
|
page read and write
|
||
1E0E7A02000
|
heap
|
page read and write
|
||
7FF888070000
|
trusted library allocation
|
page read and write
|
||
3CE0000
|
trusted library allocation
|
page read and write
|
||
42CE000
|
stack
|
page read and write
|
||
1E0E7D01000
|
trusted library allocation
|
page read and write
|
||
189C5683000
|
heap
|
page read and write
|
||
4620000
|
trusted library allocation
|
page read and write
|
||
7FF887FBE000
|
trusted library allocation
|
page read and write
|
||
3ED0000
|
trusted library allocation
|
page read and write
|
||
1653000
|
heap
|
page read and write
|
||
189C649D000
|
heap
|
page read and write
|
||
1D45927F000
|
heap
|
page read and write
|
||
7FF888060000
|
trusted library allocation
|
page read and write
|
||
1D45AF07000
|
heap
|
page read and write
|
||
189C5F5F000
|
heap
|
page read and write
|
||
1BE0F000
|
heap
|
page read and write
|
||
1D4572D8000
|
heap
|
page read and write
|
||
189C5613000
|
heap
|
page read and write
|
||
1E0EC90F000
|
heap
|
page read and write
|
||
1E0E7A15000
|
heap
|
page read and write
|
||
2726A950000
|
trusted library allocation
|
page read and write
|
||
189C5F6D000
|
heap
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
CBE000
|
stack
|
page read and write
|
||
3EBE000
|
stack
|
page read and write
|
||
1E0E7B13000
|
heap
|
page read and write
|
||
7FF888180000
|
trusted library allocation
|
page read and write
|
||
7FF888210000
|
trusted library allocation
|
page read and write
|
||
142B000
|
heap
|
page read and write
|
||
B638C7C000
|
stack
|
page read and write
|
||
3CD0000
|
trusted library allocation
|
page read and write
|
||
B63977E000
|
unkown
|
page readonly
|
||
12DBF000
|
trusted library allocation
|
page read and write
|
||
B63907E000
|
unkown
|
page readonly
|
||
7FF888060000
|
trusted library allocation
|
page read and write
|
||
7FF887E7C000
|
trusted library allocation
|
page execute and read and write
|
||
2726AF00000
|
heap
|
page read and write
|
||
7FF887FC0000
|
trusted library allocation
|
page read and write
|
||
189C647C000
|
heap
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
1D45AF90000
|
heap
|
page read and write
|
||
7FF887EE6000
|
trusted library allocation
|
page execute and read and write
|
||
5B5000
|
heap
|
page read and write
|
||
98327FA000
|
stack
|
page read and write
|
||
3CEA000
|
trusted library allocation
|
page read and write
|
||
7FF888030000
|
trusted library allocation
|
page read and write
|
||
189C5F10000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
5530000
|
unkown
|
page readonly
|
||
98325FD000
|
stack
|
page read and write
|
||
10E3000
|
heap
|
page read and write
|
||
7FF888040000
|
trusted library allocation
|
page read and write
|
||
FF4000
|
unkown
|
page read and write
|
||
189C5E02000
|
heap
|
page read and write
|
||
189C6433000
|
heap
|
page read and write
|
||
1D43EF36000
|
trusted library allocation
|
page read and write
|
||
16DF7C000
|
stack
|
page read and write
|
||
189C5F00000
|
heap
|
page read and write
|
||
189C6502000
|
heap
|
page read and write
|
||
FDD000
|
trusted library allocation
|
page execute and read and write
|
||
189C5F29000
|
heap
|
page read and write
|
||
189C5F2A000
|
heap
|
page read and write
|
||
7FF888080000
|
trusted library allocation
|
page read and write
|
||
7FF887FDD000
|
trusted library allocation
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
15E0000
|
heap
|
page read and write
|
||
1E0EC84E000
|
heap
|
page read and write
|
||
7FF887FF6000
|
trusted library allocation
|
page read and write
|
||
189C5F56000
|
heap
|
page read and write
|
||
7FF887E43000
|
trusted library allocation
|
page read and write
|
||
B73000
|
unkown
|
page readonly
|
||
1D4591F8000
|
heap
|
page read and write
|
||
1C390000
|
heap
|
page read and write
|
||
1B747000
|
heap
|
page read and write
|
||
FCD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF88831A000
|
trusted library allocation
|
page read and write
|
||
7FF8880D5000
|
trusted library allocation
|
page read and write
|
||
1E0E728F000
|
heap
|
page read and write
|
||
7FF888312000
|
trusted library allocation
|
page read and write
|
||
B71000
|
unkown
|
page write copy
|
||
1D45AFAA000
|
heap
|
page read and write
|
||
7FF888160000
|
trusted library allocation
|
page read and write
|
||
1E0E8040000
|
trusted library allocation
|
page read and write
|
||
1E0EC7C0000
|
trusted library allocation
|
page read and write
|
||
189C5F57000
|
heap
|
page read and write
|
||
1D4591E6000
|
heap
|
page read and write
|
||
1B763000
|
heap
|
page read and write
|
||
1E0E7200000
|
heap
|
page read and write
|
||
B6B000
|
unkown
|
page readonly
|
||
7FF887E04000
|
trusted library allocation
|
page read and write
|
||
7FF888390000
|
trusted library allocation
|
page read and write
|
||
189C5F32000
|
heap
|
page read and write
|
||
1D459215000
|
heap
|
page read and write
|
||
93D000
|
stack
|
page read and write
|
||
131A1000
|
trusted library allocation
|
page read and write
|
||
7FF887E5C000
|
trusted library allocation
|
page execute and read and write
|
||
1D45AFD4000
|
heap
|
page read and write
|
||
7FF887E4D000
|
trusted library allocation
|
page execute and read and write
|
||
B63937E000
|
unkown
|
page readonly
|
||
9D0000
|
heap
|
page read and write
|
||
1462000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
B71000
|
unkown
|
page read and write
|
||
189C6370000
|
remote allocation
|
page read and write
|
||
B63957E000
|
stack
|
page read and write
|
||
1E0E7291000
|
heap
|
page read and write
|
||
7FF887E33000
|
trusted library allocation
|
page execute and read and write
|
||
7FF888220000
|
trusted library allocation
|
page read and write
|
||
189C5F52000
|
heap
|
page read and write
|
||
1BE71000
|
heap
|
page read and write
|
||
B63A5FE000
|
stack
|
page read and write
|
||
B99000
|
heap
|
page read and write
|
||
839F9F9000
|
stack
|
page read and write
|
||
1D4591CC000
|
heap
|
page read and write
|
||
7FF887F16000
|
trusted library allocation
|
page execute and read and write
|
||
7FF88801B000
|
trusted library allocation
|
page read and write
|
||
141F000
|
heap
|
page read and write
|
||
7FF887FF0000
|
trusted library allocation
|
page read and write
|
||
1D4591F1000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
16DD7E000
|
unkown
|
page readonly
|
||
7FF887FE0000
|
trusted library allocation
|
page read and write
|
||
1B6A9000
|
heap
|
page read and write
|
||
167A000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887E10000
|
trusted library allocation
|
page read and write
|
||
B63967E000
|
unkown
|
page readonly
|
||
7FF888314000
|
trusted library allocation
|
page read and write
|
||
1D45919B000
|
heap
|
page read and write
|
||
7FF887FE0000
|
trusted library allocation
|
page read and write
|
||
1E0E8280000
|
trusted library allocation
|
page read and write
|
||
1D43F23F000
|
trusted library allocation
|
page read and write
|
||
7FF887FD7000
|
trusted library allocation
|
page read and write
|
||
116C000
|
heap
|
page read and write
|
||
1D4573B0000
|
heap
|
page execute and read and write
|
||
7FF888000000
|
trusted library allocation
|
page read and write
|
||
131AE000
|
trusted library allocation
|
page read and write
|
||
1D45AFC6000
|
heap
|
page read and write
|
||
16D87B000
|
stack
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
7FF888057000
|
trusted library allocation
|
page read and write
|
||
7FF8882E0000
|
trusted library allocation
|
page read and write
|
||
1E0ECB60000
|
remote allocation
|
page read and write
|
||
1D43CF18000
|
heap
|
page read and write
|
||
2EDE000
|
stack
|
page read and write
|
||
B63927E000
|
unkown
|
page readonly
|
||
1E0ECB10000
|
trusted library allocation
|
page read and write
|
||
B638F7E000
|
unkown
|
page readonly
|
||
189C64A3000
|
heap
|
page read and write
|
||
1982000
|
trusted library allocation
|
page read and write
|
||
7FF888050000
|
trusted library allocation
|
page read and write
|
||
7FF887E24000
|
trusted library allocation
|
page read and write
|
||
1E0EC7A0000
|
trusted library allocation
|
page read and write
|
||
1D457395000
|
heap
|
page read and write
|
||
7FF887E34000
|
trusted library allocation
|
page read and write
|
||
3DA0000
|
trusted library allocation
|
page read and write
|
||
1D44EE36000
|
trusted library allocation
|
page read and write
|
||
428E000
|
stack
|
page read and write
|
||
1E0E7213000
|
heap
|
page read and write
|
||
1E0EC8F7000
|
heap
|
page read and write
|
||
FD7000
|
trusted library allocation
|
page read and write
|
||
7FF887FA5000
|
trusted library allocation
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
3BF0000
|
trusted library allocation
|
page read and write
|
||
1D43EB40000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
5280000
|
heap
|
page read and write
|
||
3080000
|
trusted library section
|
page readonly
|
||
189C6469000
|
heap
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
7FF8880C9000
|
trusted library allocation
|
page read and write
|
||
1477000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887E02000
|
trusted library allocation
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
2E3B000
|
trusted library allocation
|
page execute and read and write
|
||
1E0E8390000
|
trusted library section
|
page readonly
|
||
1D43CEF0000
|
heap
|
page read and write
|
||
189C6487000
|
heap
|
page read and write
|
||
4410000
|
trusted library allocation
|
page read and write
|
||
1E0EC81F000
|
heap
|
page read and write
|
||
189C5644000
|
heap
|
page read and write
|
||
189C5F30000
|
heap
|
page read and write
|
||
7FF887FF0000
|
trusted library allocation
|
page read and write
|
||
1178000
|
heap
|
page read and write
|
||
1E0ED000000
|
heap
|
page read and write
|
||
14DE000
|
stack
|
page read and write
|
||
15C0000
|
trusted library allocation
|
page execute and read and write
|
||
189C5670000
|
heap
|
page read and write
|
||
7FF887E13000
|
trusted library allocation
|
page read and write
|
||
2781000
|
trusted library allocation
|
page read and write
|
||
1B72D000
|
stack
|
page read and write
|
||
1E0EC841000
|
heap
|
page read and write
|
||
189C56FC000
|
heap
|
page read and write
|
||
1AE5000
|
trusted library allocation
|
page read and write
|
||
16D67C000
|
stack
|
page read and write
|
||
7FF887E5B000
|
trusted library allocation
|
page execute and read and write
|
||
10AA000
|
heap
|
page read and write
|
||
1D4591D6000
|
heap
|
page read and write
|
||
1B76F000
|
heap
|
page read and write
|
||
1D45AF05000
|
heap
|
page read and write
|
||
B639D79000
|
stack
|
page read and write
|
||
19A4000
|
trusted library allocation
|
page read and write
|
||
189C5F13000
|
heap
|
page read and write
|
||
189C5F29000
|
heap
|
page read and write
|
||
12E3000
|
heap
|
page read and write
|
||
1630000
|
trusted library allocation
|
page read and write
|
||
189C6478000
|
heap
|
page read and write
|
||
1643000
|
trusted library allocation
|
page execute and read and write
|
||
7FF888310000
|
trusted library allocation
|
page read and write
|
||
189C64A5000
|
heap
|
page read and write
|
||
1E0E727D000
|
heap
|
page read and write
|
||
A9D000
|
heap
|
page read and write
|
||
189C6476000
|
heap
|
page read and write
|
||
3C00000
|
trusted library allocation
|
page read and write
|
||
FC3000
|
trusted library allocation
|
page execute and read and write
|
||
1D43F1B5000
|
trusted library allocation
|
page read and write
|
||
1E0E8370000
|
trusted library section
|
page readonly
|
||
1D43EDC2000
|
trusted library allocation
|
page read and write
|
||
3050000
|
trusted library allocation
|
page read and write
|
||
12F1000
|
stack
|
page read and write
|
||
189C565E000
|
heap
|
page read and write
|
||
B6390FE000
|
stack
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
7FF887EBC000
|
trusted library allocation
|
page execute and read and write
|
||
12C0000
|
heap
|
page read and write
|
||
7FF888200000
|
trusted library allocation
|
page read and write
|
||
7FF888036000
|
trusted library allocation
|
page read and write
|
||
189C572C000
|
heap
|
page read and write
|
||
189C56B7000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
1640000
|
trusted library allocation
|
page read and write
|
||
B63887E000
|
stack
|
page read and write
|
||
189C5F54000
|
heap
|
page read and write
|
||
189C6445000
|
heap
|
page read and write
|
||
1475000
|
trusted library allocation
|
page execute and read and write
|
||
1D43F189000
|
trusted library allocation
|
page read and write
|
||
7FF887EB0000
|
trusted library allocation
|
page read and write
|
||
1E0EC8E1000
|
heap
|
page read and write
|
||
2726AE00000
|
heap
|
page read and write
|
||
1E0EC8E5000
|
heap
|
page read and write
|
||
1D44ED46000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
189C56EF000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
A66000
|
heap
|
page read and write
|
||
1D43EF20000
|
trusted library allocation
|
page read and write
|
||
8FC000
|
stack
|
page read and write
|
||
189C6400000
|
heap
|
page read and write
|
||
7FF88833E000
|
trusted library allocation
|
page read and write
|
||
1E0E7B02000
|
heap
|
page read and write
|
||
189C5F52000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
C7E000
|
stack
|
page read and write
|
||
189C56C8000
|
heap
|
page read and write
|
||
3BCE000
|
trusted library allocation
|
page read and write
|
||
1D459273000
|
heap
|
page read and write
|
||
1E0EC8FB000
|
heap
|
page read and write
|
||
B638D7E000
|
unkown
|
page readonly
|
||
2726AB02000
|
trusted library allocation
|
page read and write
|
||
7FF887EEC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887F20000
|
trusted library allocation
|
page execute and read and write
|
||
1D43F26F000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
trusted library allocation
|
page read and write
|
||
1C82A000
|
heap
|
page read and write
|
||
189C5F32000
|
heap
|
page read and write
|
||
189C5713000
|
heap
|
page read and write
|
||
7FF888020000
|
trusted library allocation
|
page read and write
|
||
189C5F55000
|
heap
|
page read and write
|
||
1D4591A0000
|
heap
|
page read and write
|
||
16D47C000
|
stack
|
page read and write
|
||
7FF888170000
|
trusted library allocation
|
page read and write
|
||
165D000
|
trusted library allocation
|
page execute and read and write
|
||
3DEE000
|
stack
|
page read and write
|
||
7FF888010000
|
trusted library allocation
|
page execute and read and write
|
||
55E0000
|
heap
|
page read and write
|
||
189C56A9000
|
heap
|
page read and write
|
||
7FF887EE6000
|
trusted library allocation
|
page read and write
|
||
1D43D220000
|
heap
|
page read and write
|
||
1B6E9000
|
heap
|
page read and write
|
||
189C64CE000
|
heap
|
page read and write
|
||
1D44EC62000
|
trusted library allocation
|
page read and write
|
||
1E0EC7C0000
|
trusted library allocation
|
page read and write
|
||
1E0ECAA0000
|
trusted library allocation
|
page read and write
|
||
4440000
|
trusted library allocation
|
page read and write
|
||
189C6495000
|
heap
|
page read and write
|
||
1D44ED4C000
|
trusted library allocation
|
page read and write
|
||
7FF887F50000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887FD0000
|
trusted library allocation
|
page read and write
|
||
7FF887E3D000
|
trusted library allocation
|
page execute and read and write
|
||
3523000
|
trusted library allocation
|
page read and write
|
||
1E0EC7F0000
|
trusted library allocation
|
page read and write
|
||
1D44EC04000
|
trusted library allocation
|
page read and write
|
||
189C5F5D000
|
heap
|
page read and write
|
||
7FF888363000
|
trusted library allocation
|
page read and write
|
||
1E0ECB00000
|
trusted library allocation
|
page read and write
|
||
FF6000
|
unkown
|
page readonly
|
||
1460000
|
trusted library allocation
|
page read and write
|
||
1E0E7296000
|
heap
|
page read and write
|
||
1D45AF5B000
|
heap
|
page read and write
|
||
1D43EC00000
|
trusted library allocation
|
page read and write
|
||
2FE0000
|
unkown
|
page readonly
|
||
7FF888025000
|
trusted library allocation
|
page read and write
|
||
7FF88806E000
|
trusted library allocation
|
page read and write
|
||
1172000
|
heap
|
page read and write
|
||
1D43F166000
|
trusted library allocation
|
page read and write
|
||
7FF888260000
|
trusted library allocation
|
page execute and read and write
|
||
40F1000
|
trusted library allocation
|
page read and write
|
||
55E2000
|
unkown
|
page readonly
|
||
13CF000
|
stack
|
page read and write
|
||
1E0ECB60000
|
remote allocation
|
page read and write
|
||
7FF888100000
|
trusted library allocation
|
page read and write
|
||
DDC000
|
stack
|
page read and write
|
||
2DA0000
|
heap
|
page execute and read and write
|
||
1D457301000
|
heap
|
page read and write
|
||
2726AE02000
|
heap
|
page read and write
|
||
B63877E000
|
unkown
|
page readonly
|
||
10BF000
|
stack
|
page read and write
|
||
1D43ED68000
|
trusted library allocation
|
page read and write
|
||
189C5F30000
|
heap
|
page read and write
|
||
1E0ECAF0000
|
trusted library allocation
|
page read and write
|
||
7FF887E50000
|
trusted library allocation
|
page read and write
|
||
1BE80000
|
heap
|
page read and write
|
||
45D0000
|
heap
|
page read and write
|
||
1BE4D000
|
heap
|
page read and write
|
||
7FF887E40000
|
trusted library allocation
|
page read and write
|
||
189C5680000
|
heap
|
page read and write
|
||
189C647F000
|
heap
|
page read and write
|
||
10FD000
|
stack
|
page read and write
|
||
189C5E00000
|
heap
|
page read and write
|
||
1BCAE000
|
stack
|
page read and write
|
||
1BE6B000
|
heap
|
page read and write
|
||
2E37000
|
trusted library allocation
|
page execute and read and write
|
||
189C5F5A000
|
heap
|
page read and write
|
||
1C3B0000
|
heap
|
page read and write
|
||
189C5F32000
|
heap
|
page read and write
|
||
14DE000
|
stack
|
page read and write
|
||
1D43EBED000
|
trusted library allocation
|
page read and write
|
||
1650000
|
trusted library allocation
|
page read and write
|
||
1E0ECA00000
|
trusted library allocation
|
page read and write
|
||
1470000
|
trusted library allocation
|
page read and write
|
||
A30000
|
unkown
|
page readonly
|
||
19A6000
|
trusted library allocation
|
page read and write
|
||
1E0EC800000
|
heap
|
page read and write
|
||
7FF888340000
|
trusted library allocation
|
page read and write
|
||
189C5DB0000
|
remote allocation
|
page read and write
|
||
7FF887FE9000
|
trusted library allocation
|
page read and write
|
||
1E0E83B0000
|
trusted library section
|
page readonly
|
||
189C5560000
|
heap
|
page read and write
|
||
16D37E000
|
unkown
|
page readonly
|
||
1D43CF36000
|
heap
|
page read and write
|
||
1E0EC7D0000
|
trusted library allocation
|
page read and write
|
||
189C56AD000
|
heap
|
page read and write
|
||
1E0E7329000
|
heap
|
page read and write
|
||
131B0000
|
trusted library allocation
|
page read and write
|
||
1E0EC8CE000
|
heap
|
page read and write
|
||
7FF88800C000
|
trusted library allocation
|
page read and write
|
||
1BB6E000
|
stack
|
page read and write
|
||
189C5F55000
|
heap
|
page read and write
|
||
1D43EB60000
|
heap
|
page read and write
|
||
325F000
|
trusted library allocation
|
page read and write
|
||
7FF887E20000
|
trusted library allocation
|
page read and write
|
||
1E0E8730000
|
trusted library allocation
|
page read and write
|
||
189C646E000
|
heap
|
page read and write
|
||
189C573B000
|
heap
|
page read and write
|
||
1D44ED43000
|
trusted library allocation
|
page read and write
|
||
305E000
|
stack
|
page read and write
|
||
7FF887E20000
|
trusted library allocation
|
page read and write
|
||
189C645F000
|
heap
|
page read and write
|
||
2726AA13000
|
unkown
|
page read and write
|
||
1B6A4000
|
heap
|
page read and write
|
||
B61000
|
unkown
|
page execute read
|
||
2E35000
|
trusted library allocation
|
page execute and read and write
|
||
7FF888000000
|
trusted library allocation
|
page read and write
|
||
1406000
|
heap
|
page read and write
|
||
1C7F0000
|
heap
|
page read and write
|
||
7FF88831C000
|
trusted library allocation
|
page read and write
|
||
189C643D000
|
heap
|
page read and write
|
||
1620000
|
trusted library allocation
|
page read and write
|
||
7FF887E4B000
|
trusted library allocation
|
page execute and read and write
|
||
16DA7E000
|
stack
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
F9E000
|
stack
|
page read and write
|
||
4400000
|
trusted library allocation
|
page execute and read and write
|
||
1466000
|
trusted library allocation
|
page execute and read and write
|
||
1B90F000
|
stack
|
page read and write
|
||
1E0E7240000
|
heap
|
page read and write
|
||
1B72B000
|
heap
|
page read and write
|
||
1E0E7313000
|
heap
|
page read and write
|
||
1D43E9D7000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
1E0ECA00000
|
trusted library allocation
|
page read and write
|
||
5550000
|
trusted library allocation
|
page read and write
|
||
10CF000
|
heap
|
page read and write
|
||
7FF887E30000
|
trusted library allocation
|
page read and write
|
||
10AD000
|
heap
|
page read and write
|
||
1BE26000
|
heap
|
page read and write
|
||
98324FE000
|
stack
|
page read and write
|
||
16DC7B000
|
stack
|
page read and write
|
||
7FF8881A0000
|
trusted library allocation
|
page read and write
|
||
3BFB000
|
trusted library allocation
|
page read and write
|
||
1E0E8701000
|
trusted library allocation
|
page read and write
|
||
13EF000
|
stack
|
page read and write
|
||
189C5F59000
|
heap
|
page read and write
|
||
1AEC000
|
trusted library allocation
|
page read and write
|
||
1E0E7274000
|
heap
|
page read and write
|
||
3BD1000
|
trusted library allocation
|
page read and write
|
||
B638FFE000
|
stack
|
page read and write
|
||
16C9FB000
|
stack
|
page read and write
|
||
FC4000
|
trusted library allocation
|
page read and write
|
||
3023000
|
heap
|
page execute and read and write
|
||
1D45AFB4000
|
heap
|
page read and write
|
||
1490000
|
trusted library allocation
|
page read and write
|
||
189C640F000
|
heap
|
page read and write
|
||
1D45924E000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
189C5702000
|
heap
|
page read and write
|
||
189C56A4000
|
heap
|
page read and write
|
||
7FF887E3D000
|
trusted library allocation
|
page execute and read and write
|
||
4460000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
51EE000
|
stack
|
page read and write
|
||
1D457854000
|
heap
|
page read and write
|
||
1D456B70000
|
trusted library allocation
|
page read and write
|
||
189C6448000
|
heap
|
page read and write
|
||
189C5460000
|
heap
|
page read and write
|
||
125E000
|
heap
|
page read and write
|
||
1D43EAE0000
|
heap
|
page execute and read and write
|
||
1BD62000
|
unkown
|
page readonly
|
||
1BC6E000
|
stack
|
page read and write
|
||
189C5F56000
|
heap
|
page read and write
|
||
189C5F52000
|
heap
|
page read and write
|
||
1D44ED40000
|
trusted library allocation
|
page read and write
|
||
189C64B6000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
1E0E74E0000
|
heap
|
page read and write
|
||
141D000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
B638E7B000
|
stack
|
page read and write
|
||
16D17E000
|
unkown
|
page readonly
|
||
FB0000
|
trusted library allocation
|
page read and write
|
||
1D43EDB6000
|
trusted library allocation
|
page read and write
|
||
1161000
|
heap
|
page read and write
|
||
1D43CEC0000
|
heap
|
page read and write
|
||
1E0EC740000
|
trusted library allocation
|
page read and write
|
||
1672000
|
trusted library allocation
|
page read and write
|
||
189C5DD0000
|
remote allocation
|
page read and write
|
||
1E0E727B000
|
heap
|
page read and write
|
||
1D43EDD7000
|
trusted library allocation
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
7FF888040000
|
trusted library allocation
|
page read and write
|
||
1E0EC8F2000
|
heap
|
page read and write
|
||
2726AA02000
|
unkown
|
page read and write
|
||
55F0000
|
trusted library allocation
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
1E0E72A0000
|
heap
|
page read and write
|
||
AC8000
|
heap
|
page read and write
|
||
1D457330000
|
heap
|
page read and write
|
||
7FF887E2D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF888090000
|
trusted library allocation
|
page read and write
|
||
FE1000
|
unkown
|
page execute read
|
||
7FF888000000
|
trusted library allocation
|
page read and write
|
||
1D459221000
|
heap
|
page read and write
|
||
7FF888080000
|
trusted library allocation
|
page read and write
|
||
1D457859000
|
heap
|
page read and write
|
||
7FF887FD0000
|
trusted library allocation
|
page read and write
|
||
7FF888027000
|
trusted library allocation
|
page read and write
|
||
16D278000
|
stack
|
page read and write
|
||
7FF887E03000
|
trusted library allocation
|
page execute and read and write
|
||
A32000
|
unkown
|
page readonly
|
||
1D45786F000
|
heap
|
page read and write
|
||
7FF888010000
|
trusted library allocation
|
page read and write
|
||
1C800000
|
heap
|
page read and write
|
||
B639A7E000
|
stack
|
page read and write
|
||
1E0E7A00000
|
heap
|
page read and write
|
||
189C6483000
|
heap
|
page read and write
|
||
189C5F35000
|
heap
|
page read and write
|
||
1640000
|
trusted library allocation
|
page read and write
|
||
1D4591B5000
|
heap
|
page read and write
|
||
1C7DD000
|
stack
|
page read and write
|
||
1D45788B000
|
heap
|
page read and write
|
||
7FF8881CA000
|
trusted library allocation
|
page read and write
|
||
189C5F34000
|
heap
|
page read and write
|
||
189C5DD0000
|
remote allocation
|
page read and write
|
||
B63A67E000
|
unkown
|
page readonly
|
||
1E0E7B1A000
|
heap
|
page read and write
|
||
5532000
|
unkown
|
page readonly
|
||
1BE00000
|
heap
|
page read and write
|
||
1630000
|
trusted library allocation
|
page read and write
|
||
1BD60000
|
unkown
|
page readonly
|
||
B60000
|
heap
|
page read and write
|
||
189C5F5D000
|
heap
|
page read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
1D43EAF0000
|
heap
|
page execute and read and write
|
||
3D00000
|
trusted library allocation
|
page read and write
|
||
189C5F40000
|
heap
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
2771000
|
trusted library allocation
|
page read and write
|
||
189C5F67000
|
heap
|
page read and write
|
||
3CF0000
|
trusted library allocation
|
page execute and read and write
|
||
12DBD000
|
trusted library allocation
|
page read and write
|
||
189C573B000
|
heap
|
page read and write
|
||
1D43D120000
|
trusted library allocation
|
page read and write
|
||
189C64C6000
|
heap
|
page read and write
|
||
1914000
|
trusted library allocation
|
page read and write
|
||
189C562B000
|
heap
|
page read and write
|
||
9831DFE000
|
stack
|
page read and write
|
||
1B6B8000
|
heap
|
page read and write
|
||
2726AB15000
|
trusted library allocation
|
page read and write
|
||
7FF8881B6000
|
trusted library allocation
|
page read and write
|
||
7FF888070000
|
trusted library allocation
|
page read and write
|
||
1E0E7B1A000
|
heap
|
page read and write
|
||
1D44EB71000
|
trusted library allocation
|
page read and write
|
||
1D457660000
|
heap
|
page read and write
|
||
5BDE000
|
stack
|
page read and write
|
||
9831BFE000
|
stack
|
page read and write
|
||
7FF888050000
|
trusted library allocation
|
page read and write
|
||
189C5702000
|
heap
|
page read and write
|
||
1BE78000
|
heap
|
page read and write
|
||
7FF888380000
|
trusted library allocation
|
page read and write
|
||
31A1000
|
trusted library allocation
|
page read and write
|
||
1D4573B3000
|
heap
|
page execute and read and write
|
||
1E0EC85A000
|
heap
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
7FF888300000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887EE0000
|
trusted library allocation
|
page execute and read and write
|
||
1D45915E000
|
heap
|
page read and write
|
||
1E0E72A7000
|
heap
|
page read and write
|
||
1D43CF7A000
|
heap
|
page read and write
|
||
1E0EC80F000
|
heap
|
page read and write
|
||
7FF8880A3000
|
trusted library allocation
|
page read and write
|
||
189C64BE000
|
heap
|
page read and write
|
||
3E40000
|
unkown
|
page readonly
|
||
1D43CF4C000
|
heap
|
page read and write
|
||
1E0E722B000
|
heap
|
page read and write
|
||
123E000
|
stack
|
page read and write
|
||
1D4591DC000
|
heap
|
page read and write
|
||
1D43D0C0000
|
heap
|
page read and write
|
||
1D43CE90000
|
heap
|
page read and write
|
||
4430000
|
trusted library allocation
|
page read and write
|
||
121B000
|
heap
|
page read and write
|
||
189C572B000
|
heap
|
page read and write
|
||
98318F3000
|
stack
|
page read and write
|
||
1D4589FC000
|
heap
|
page read and write
|
||
3020000
|
heap
|
page execute and read and write
|
||
189C6481000
|
heap
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
1D45918A000
|
heap
|
page read and write
|
||
2E32000
|
trusted library allocation
|
page read and write
|
||
1D456BA0000
|
trusted library allocation
|
page read and write
|
||
7FF8881F0000
|
trusted library allocation
|
page read and write
|
||
B638677000
|
stack
|
page read and write
|
||
2E50000
|
trusted library allocation
|
page read and write
|
||
189C5480000
|
heap
|
page read and write
|
||
2726A940000
|
heap
|
page read and write
|
||
2726AA39000
|
heap
|
page read and write
|
||
1D4591D4000
|
heap
|
page read and write
|
||
7FF888330000
|
trusted library allocation
|
page read and write
|
||
2E9E000
|
stack
|
page read and write
|
||
1E0E8360000
|
trusted library section
|
page readonly
|
||
189C5F02000
|
heap
|
page read and write
|
||
1D43EB3F000
|
trusted library section
|
page readonly
|
||
1D43EBF8000
|
trusted library allocation
|
page read and write
|
||
1E0EC8E0000
|
heap
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
FED000
|
unkown
|
page readonly
|
||
1E0E7970000
|
trusted library allocation
|
page read and write
|
||
56B000
|
stack
|
page read and write
|
||
98320FD000
|
stack
|
page read and write
|
||
12A2000
|
unkown
|
page readonly
|
||
1463000
|
heap
|
page read and write
|
||
418E000
|
stack
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
15D0000
|
heap
|
page execute and read and write
|
||
43D0000
|
trusted library allocation
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
189C6500000
|
heap
|
page read and write
|
||
3631000
|
trusted library allocation
|
page read and write
|
||
1D43EB8A000
|
trusted library allocation
|
page read and write
|
||
2EE0000
|
trusted library allocation
|
page execute and read and write
|
||
B63947E000
|
unkown
|
page readonly
|
||
FD0000
|
trusted library allocation
|
page read and write
|
||
1E0EC7F0000
|
trusted library allocation
|
page read and write
|
||
98321F4000
|
stack
|
page read and write
|
||
1D4592E6000
|
heap
|
page read and write
|
||
1D43D1E0000
|
heap
|
page read and write
|
||
FE0000
|
unkown
|
page readonly
|
||
5880000
|
trusted library allocation
|
page execute and read and write
|
||
1D45AF8A000
|
heap
|
page read and write
|
||
1E0E7302000
|
heap
|
page read and write
|
||
7FF887ED6000
|
trusted library allocation
|
page read and write
|
||
189C5F2B000
|
heap
|
page read and write
|
||
189C56D3000
|
heap
|
page read and write
|
||
10D3000
|
heap
|
page read and write
|
||
1E0EC82C000
|
heap
|
page read and write
|
||
7FF888350000
|
trusted library allocation
|
page read and write
|
||
7FF887F06000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8880A0000
|
trusted library allocation
|
page read and write
|
||
2726AF13000
|
heap
|
page read and write
|
||
7FF887FD0000
|
trusted library allocation
|
page read and write
|
||
189C5F63000
|
heap
|
page read and write
|
||
1615000
|
heap
|
page read and write
|
||
1D43D225000
|
heap
|
page read and write
|
||
B638B7E000
|
unkown
|
page readonly
|
||
164D000
|
trusted library allocation
|
page execute and read and write
|
||
9DE000
|
heap
|
page read and write
|
||
1E0EC861000
|
heap
|
page read and write
|
||
143B000
|
heap
|
page read and write
|
||
B73000
|
unkown
|
page readonly
|
||
7FF8880E0000
|
trusted library allocation
|
page read and write
|
||
121E000
|
heap
|
page read and write
|
||
189C5F59000
|
heap
|
page read and write
|
||
7FF888190000
|
trusted library allocation
|
page read and write
|
||
1D43D100000
|
trusted library allocation
|
page read and write
|
||
7FF887E2D000
|
trusted library allocation
|
page execute and read and write
|
||
9831FFC000
|
stack
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
189C5F2E000
|
heap
|
page read and write
|
||
1D43EBEF000
|
trusted library allocation
|
page read and write
|
||
3EC0000
|
trusted library allocation
|
page read and write
|
||
1676000
|
trusted library allocation
|
page execute and read and write
|
||
151E000
|
stack
|
page read and write
|
||
B63917E000
|
unkown
|
page readonly
|
||
1D457882000
|
heap
|
page read and write
|
||
15BC000
|
stack
|
page read and write
|
||
A30000
|
unkown
|
page readonly
|
||
B6391FE000
|
stack
|
page read and write
|
||
A2B000
|
heap
|
page read and write
|
||
B639F7C000
|
stack
|
page read and write
|
||
1B690000
|
heap
|
page read and write
|
||
7FF887FAC000
|
trusted library allocation
|
page read and write
|
||
1E0EC883000
|
heap
|
page read and write
|
||
1B74F000
|
heap
|
page read and write
|
||
1D459193000
|
heap
|
page read and write
|
||
7FF888064000
|
trusted library allocation
|
page read and write
|
||
7FF888140000
|
trusted library allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
1C5EE000
|
stack
|
page read and write
|
||
4630000
|
trusted library allocation
|
page execute and read and write
|
||
98315BF000
|
stack
|
page read and write
|
||
7FF8881E0000
|
trusted library allocation
|
page read and write
|
||
7FF887EE0000
|
trusted library allocation
|
page read and write
|
||
3EE0000
|
unkown
|
page readonly
|
||
7FF887E30000
|
trusted library allocation
|
page read and write
|
||
5130000
|
trusted library allocation
|
page read and write
|
||
2726A920000
|
heap
|
page read and write
|
||
1BE6E000
|
heap
|
page read and write
|
||
7FF887E4D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887FA9000
|
trusted library allocation
|
page read and write
|
||
189C5F32000
|
heap
|
page read and write
|
||
1D43EF42000
|
trusted library allocation
|
page read and write
|
||
147B000
|
trusted library allocation
|
page execute and read and write
|
||
1D43CF00000
|
heap
|
page read and write
|
||
7FF888230000
|
trusted library allocation
|
page execute and read and write
|
||
2726AE13000
|
heap
|
page read and write
|
||
189C5F32000
|
heap
|
page read and write
|
||
189C5F6B000
|
heap
|
page read and write
|
||
1D45AEF0000
|
heap
|
page read and write
|
||
1E0E71E0000
|
heap
|
page read and write
|
||
9831EF8000
|
stack
|
page read and write
|
||
1E0E725B000
|
heap
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
7FF888320000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
1D457230000
|
heap
|
page read and write
|
||
7FF888150000
|
trusted library allocation
|
page read and write
|
||
9DA000
|
heap
|
page read and write
|
||
F46000
|
heap
|
page read and write
|
||
1D457840000
|
heap
|
page read and write
|
||
1D43EB71000
|
trusted library allocation
|
page read and write
|
||
337D000
|
trusted library allocation
|
page read and write
|
||
1B800000
|
heap
|
page read and write
|
||
189C571A000
|
heap
|
page read and write
|
||
43CF000
|
stack
|
page read and write
|
||
1D43D1C5000
|
heap
|
page read and write
|
||
A6B000
|
heap
|
page read and write
|
||
1D4589D7000
|
heap
|
page read and write
|
||
2726AF13000
|
heap
|
page read and write
|
||
189C644A000
|
heap
|
page read and write
|
||
189C5F5B000
|
heap
|
page read and write
|
||
189C5DD0000
|
remote allocation
|
page read and write
|
||
189C5F2A000
|
heap
|
page read and write
|
||
1D45930D000
|
heap
|
page read and write
|
||
10ED000
|
heap
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
189C5F53000
|
heap
|
page read and write
|
||
7FF888370000
|
trusted library allocation
|
page read and write
|
||
1D457862000
|
heap
|
page read and write
|
||
1AEE000
|
trusted library allocation
|
page read and write
|
||
7FF887E23000
|
trusted library allocation
|
page execute and read and write
|
||
189C5F57000
|
heap
|
page read and write
|
||
9831CFB000
|
stack
|
page read and write
|
||
7FF888110000
|
trusted library allocation
|
page read and write
|
||
1D43EDD5000
|
trusted library allocation
|
page read and write
|
||
1D43CF75000
|
heap
|
page read and write
|
||
7FF887E1D000
|
trusted library allocation
|
page execute and read and write
|
||
9832AFE000
|
stack
|
page read and write
|
||
161F000
|
stack
|
page read and write
|
||
839F67E000
|
stack
|
page read and write
|
||
1D4592FB000
|
heap
|
page read and write
|
||
1B6CF000
|
heap
|
page read and write
|
||
189C56FF000
|
heap
|
page read and write
|
||
1B9A0000
|
heap
|
page read and write
|
||
1E0EC8F7000
|
heap
|
page read and write
|
||
189C56CF000
|
heap
|
page read and write
|
||
7FF888020000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887FF0000
|
trusted library allocation
|
page read and write
|
||
1259000
|
heap
|
page read and write
|
||
1D43EE27000
|
trusted library allocation
|
page read and write
|
||
56D0000
|
heap
|
page execute and read and write
|
||
B639C7E000
|
unkown
|
page readonly
|
||
189C572B000
|
heap
|
page read and write
|
||
1D45AFE6000
|
heap
|
page read and write
|
||
7FF887EF0000
|
trusted library allocation
|
page execute and read and write
|
||
3BB6000
|
trusted library allocation
|
page read and write
|
||
2777000
|
trusted library allocation
|
page read and write
|
||
1D43CEA0000
|
heap
|
page read and write
|
||
1D43EE6A000
|
trusted library allocation
|
page read and write
|
||
7FF887E54000
|
trusted library allocation
|
page read and write
|
||
7FF888030000
|
trusted library allocation
|
page read and write
|
||
7FF887ED0000
|
trusted library allocation
|
page read and write
|
||
16F5000
|
heap
|
page read and write
|
||
16D97E000
|
unkown
|
page readonly
|
||
98322FE000
|
stack
|
page read and write
|
||
B6396FE000
|
stack
|
page read and write
|
||
1D43CF32000
|
heap
|
page read and write
|
||
1E0E7980000
|
trusted library section
|
page read and write
|
||
1D43EDBA000
|
trusted library allocation
|
page read and write
|
||
35B0000
|
trusted library allocation
|
page read and write
|
||
1D45AF0A000
|
heap
|
page read and write
|
||
189C5F5B000
|
heap
|
page read and write
|
||
FC0000
|
trusted library allocation
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
1103000
|
heap
|
page read and write
|
||
5A1E000
|
stack
|
page read and write
|
||
7FF887E32000
|
trusted library allocation
|
page read and write
|
||
189C6444000
|
heap
|
page read and write
|
||
7FF887F40000
|
trusted library allocation
|
page execute and read and write
|
||
1D43CF15000
|
heap
|
page read and write
|
||
98326FE000
|
stack
|
page read and write
|
||
1E0E7400000
|
heap
|
page read and write
|
||
B63897E000
|
unkown
|
page readonly
|
||
7FF8880D0000
|
trusted library allocation
|
page read and write
|
||
7FF887E00000
|
trusted library allocation
|
page read and write
|
||
1E0EC7D1000
|
trusted library allocation
|
page read and write
|
||
1D459170000
|
heap
|
page read and write
|
||
15E0000
|
trusted library allocation
|
page read and write
|
||
1472000
|
trusted library allocation
|
page read and write
|
||
B639E7E000
|
unkown
|
page readonly
|
||
7FF8882F0000
|
trusted library allocation
|
page read and write
|
||
7FF888046000
|
trusted library allocation
|
page read and write
|
||
1D43EF44000
|
trusted library allocation
|
page read and write
|
||
189C6444000
|
heap
|
page read and write
|
||
E59000
|
heap
|
page read and write
|
||
189C5E15000
|
heap
|
page read and write
|
||
1B6E5000
|
heap
|
page read and write
|
||
5480000
|
trusted library allocation
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
1D4589E8000
|
heap
|
page read and write
|
||
7FF8881D0000
|
trusted library allocation
|
page read and write
|
||
1D459317000
|
heap
|
page read and write
|
||
B638A7C000
|
stack
|
page read and write
|
||
3030000
|
heap
|
page execute and read and write
|
||
1C811000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
4450000
|
trusted library allocation
|
page execute and read and write
|
||
1D43F13A000
|
trusted library allocation
|
page read and write
|
||
3BB2000
|
trusted library allocation
|
page read and write
|
||
1D43F1F0000
|
trusted library allocation
|
page read and write
|
||
AFF000
|
heap
|
page read and write
|
||
ED8000
|
stack
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
1E0E7B00000
|
heap
|
page read and write
|
||
17FF000
|
stack
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
1D43EDAA000
|
trusted library allocation
|
page read and write
|
||
1E0E72A2000
|
heap
|
page read and write
|
||
2D6F000
|
stack
|
page read and write
|
||
FF4000
|
unkown
|
page write copy
|
||
11FE000
|
stack
|
page read and write
|
||
7FF8881B4000
|
trusted library allocation
|
page read and write
|
||
B63997E000
|
unkown
|
page readonly
|
||
7FF887FB7000
|
trusted library allocation
|
page read and write
|
||
7FF888060000
|
trusted library allocation
|
page execute and read and write
|
||
189C5F2C000
|
heap
|
page read and write
|
||
189C5F53000
|
heap
|
page read and write
|
||
1B75C000
|
heap
|
page read and write
|
||
98329FD000
|
stack
|
page read and write
|
||
189C5F72000
|
heap
|
page read and write
|
||
189C5590000
|
trusted library allocation
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
7FF887E2B000
|
trusted library allocation
|
page execute and read and write
|
||
983157F000
|
stack
|
page read and write
|
||
1D43F136000
|
trusted library allocation
|
page read and write
|
||
1E0E7279000
|
heap
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
FED000
|
unkown
|
page readonly
|
||
7FF888050000
|
trusted library allocation
|
page read and write
|
||
1D44ED10000
|
trusted library allocation
|
page read and write
|
||
839F47D000
|
stack
|
page read and write
|
||
E56000
|
heap
|
page read and write
|
||
16D77E000
|
unkown
|
page readonly
|
||
7FF887EB6000
|
trusted library allocation
|
page read and write
|
||
7FF888070000
|
trusted library allocation
|
page read and write
|
||
3C10000
|
trusted library allocation
|
page read and write
|
||
EF4000
|
stack
|
page read and write
|
||
2726AF02000
|
heap
|
page read and write
|
||
3D17000
|
trusted library allocation
|
page read and write
|
||
1D44ED01000
|
trusted library allocation
|
page read and write
|
||
2726AB00000
|
trusted library allocation
|
page read and write
|
||
189C64CE000
|
heap
|
page read and write
|
||
2726AA00000
|
unkown
|
page read and write
|
||
16DB7E000
|
unkown
|
page readonly
|
||
2F20000
|
heap
|
page execute and read and write
|
||
7FF888080000
|
trusted library allocation
|
page read and write
|
||
129E000
|
stack
|
page read and write
|
||
B61000
|
unkown
|
page execute read
|
||
FD0000
|
trusted library allocation
|
page read and write
|
||
B5B000
|
heap
|
page read and write
|
||
1D43CF2C000
|
heap
|
page read and write
|
||
7FF887FB3000
|
trusted library allocation
|
page read and write
|
||
5B1D000
|
stack
|
page read and write
|
||
1E0ECA33000
|
trusted library allocation
|
page read and write
|
||
16D57E000
|
unkown
|
page readonly
|
||
F40000
|
heap
|
page read and write
|
||
189C571A000
|
heap
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
1D457390000
|
heap
|
page read and write
|
||
2726AB24000
|
heap
|
page read and write
|
||
141B000
|
heap
|
page read and write
|
||
7FF887EDC000
|
trusted library allocation
|
page execute and read and write
|
||
98319FE000
|
stack
|
page read and write
|
||
189C64BE000
|
heap
|
page read and write
|
||
7FF888090000
|
trusted library allocation
|
page read and write
|
||
2726AF00000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
1E0E7226000
|
heap
|
page read and write
|
||
1E0E7D91000
|
trusted library allocation
|
page read and write
|
||
2726AA2B000
|
heap
|
page read and write
|
||
7FF887E44000
|
trusted library allocation
|
page read and write
|
||
1644000
|
trusted library allocation
|
page read and write
|
||
2EF0000
|
trusted library allocation
|
page read and write
|
||
3060000
|
heap
|
page execute and read and write
|
||
1E0ECA90000
|
trusted library allocation
|
page read and write
|
||
1BEA5000
|
heap
|
page read and write
|
||
118E000
|
heap
|
page read and write
|
||
189C6479000
|
heap
|
page read and write
|
||
189C5F37000
|
heap
|
page read and write
|
||
1D44ED98000
|
trusted library allocation
|
page read and write
|
||
5CDE000
|
stack
|
page read and write
|
||
12A0000
|
unkown
|
page readonly
|
||
1D457830000
|
heap
|
page read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
7FF887E8C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8880F0000
|
trusted library allocation
|
page read and write
|
||
7FF887FA1000
|
trusted library allocation
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
1670000
|
trusted library allocation
|
page read and write
|
||
D27000
|
heap
|
page read and write
|
||
1E0EC8F2000
|
heap
|
page read and write
|
||
4420000
|
trusted library allocation
|
page read and write
|
||
B639AFE000
|
stack
|
page read and write
|
||
1D43F0EE000
|
trusted library allocation
|
page read and write
|
||
443F000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
5380000
|
heap
|
page read and write
|
||
1D4591BB000
|
heap
|
page read and write
|
||
189C642D000
|
heap
|
page read and write
|
||
189C6432000
|
heap
|
page read and write
|
||
1D45AFC0000
|
heap
|
page read and write
|
||
1BD6F000
|
stack
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
1D43EB43000
|
heap
|
page read and write
|
||
AF1000
|
heap
|
page read and write
|
||
1E0EC8C5000
|
heap
|
page read and write
|
||
319F000
|
trusted library allocation
|
page read and write
|
||
1B910000
|
unkown
|
page readonly
|
||
83D000
|
stack
|
page read and write
|
||
7FF888130000
|
trusted library allocation
|
page read and write
|
||
3D20000
|
heap
|
page execute and read and write
|
||
1C7F9000
|
heap
|
page read and write
|
||
1D45917B000
|
heap
|
page read and write
|
||
189C5F2C000
|
heap
|
page read and write
|
||
3BF9000
|
trusted library allocation
|
page read and write
|
||
1D43EB30000
|
trusted library section
|
page readonly
|
||
7FF888020000
|
trusted library allocation
|
page read and write
|
||
10EF000
|
heap
|
page read and write
|
||
189C64B6000
|
heap
|
page read and write
|
||
176E000
|
stack
|
page read and write
|
||
189C5F27000
|
heap
|
page read and write
|
||
7FF888030000
|
trusted library allocation
|
page read and write
|
||
7FF888360000
|
trusted library allocation
|
page read and write
|
||
7FF888240000
|
trusted library allocation
|
page read and write
|
||
1D43CF30000
|
heap
|
page read and write
|
||
1E0E72FF000
|
heap
|
page read and write
|
||
189C64A0000
|
heap
|
page read and write
|
There are 1001 hidden memdumps, click here to show them.