Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
96r3GgxntQ.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_96r3GgxntQ.exe_183a24e280da4a38e54d6993e779d74f437fce42_1e18bb33_683ddce7-d285-483b-8fbd-7e2ea1f6255e\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0xc7e8a32c, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA84.tmp.dmp
|
Mini DuMP crash report, 14 streams, Fri Oct 25 17:27:20 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBBD.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBED.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBFB.tmp.csv
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC4A.tmp.txt
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 4770 bytes, 1 file, at 0x2c +A "disallowedcert.stl", number 1, 1 datablock,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
Certificate, Version=3
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
|
Certificate, Version=3
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
data
|
modified
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\manifests\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\manifests\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (10073), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\manifests\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\manifests\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\manifests\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\manifests\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\manifests\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\manifests\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\manifests\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\manifests\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\manifests\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\manifests\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (63849), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\manifests\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\manifests\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.ClientService.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.WindowsBackstageShell.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.WindowsBackstageShell.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.WindowsClient.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.WindowsFileManager.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.WindowsFileManager.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f\ScreenConnect.Core.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af\ScreenConnect.Windows.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c\ScreenConnect.WindowsClient.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883\ScreenConnect.Client.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\Client.Override.en-US.resources
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\Client.Override.resources
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\Client.en-US.resources
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\Client.resources
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\app.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\buxsurwv.newcfg
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\user.config
(copy)
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea\ScreenConnect.ClientService.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dfsvc.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ScreenConnect.ClientService.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W9FILL1W\5W9VLRZG.log
|
Unicode text, UTF-16, little-endian text, with very long lines (620), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.Client.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.Client.dll.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.ClientService.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.ClientService.dll.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.ClientService.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.Core.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.Core.dll.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.Windows.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.Windows.dll.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.WindowsBackstageShell.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.WindowsBackstageShell.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.WindowsClient.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.WindowsClient.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.WindowsClient.exe.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.WindowsClient.exe.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (10073), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.WindowsFileManager.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.WindowsFileManager.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\YTQ2XNTD.5QH\1L9EZ96X.6J5.application
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (63849), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\932a2db58c237abd381d22df4c63a04a_9e146be9-c76a-4720-bcdb-53011b87bd06
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ScreenConnect.ClientService.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 68 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\96r3GgxntQ.exe
|
"C:\Users\user\Desktop\96r3GgxntQ.exe"
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe"
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe"
"?e=Support&y=Guest&h=kjh231a.zapto.org&p=8041&s=ae095c23-8e22-4747-b9a0-c8c8b34ba57d&k=BgIAAACkAABSU0ExAAgAAAEAAQAFiJkYSsHWAiMLqCRmzzktgQckyG3TGgm6yPTLawNtNX6q1gr57JH4PrLfClMTmwPp16%2ftpUu72MJPhrP9Fe%2fDAOLI7IxssEnqHo0cK7GF8605xW1%2b29YYv7Gp%2f%2bRVnS8EXpyfNuusFYa%2bCoXawQboJM2Gi1VXFl4XcMGGJmYswsgo9qU%2fBqW3jX3LRGSRskHQDuJYQ8zNUvX1ZvvvtewO8gfRa7Z6WeC1pOnkHykQZ7ux8aNy9iCaTKjcx7FnTu1T7GRag6eNtt4weTuPK2uLu2HYzL%2fVKjjkmkP1xXy2lhSPvloy810giaMzeQQElR11NNJ7O%2bcRI%2b4xi9%2bIANXb&r=&i=Untitled%2520Session"
"1"
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe"
"?e=Support&y=Guest&h=kjh231a.zapto.org&p=8041&s=ae095c23-8e22-4747-b9a0-c8c8b34ba57d&k=BgIAAACkAABSU0ExAAgAAAEAAQAFiJkYSsHWAiMLqCRmzzktgQckyG3TGgm6yPTLawNtNX6q1gr57JH4PrLfClMTmwPp16%2ftpUu72MJPhrP9Fe%2fDAOLI7IxssEnqHo0cK7GF8605xW1%2b29YYv7Gp%2f%2bRVnS8EXpyfNuusFYa%2bCoXawQboJM2Gi1VXFl4XcMGGJmYswsgo9qU%2fBqW3jX3LRGSRskHQDuJYQ8zNUvX1ZvvvtewO8gfRa7Z6WeC1pOnkHykQZ7ux8aNy9iCaTKjcx7FnTu1T7GRag6eNtt4weTuPK2uLu2HYzL%2fVKjjkmkP1xXy2lhSPvloy810giaMzeQQElR11NNJ7O%2bcRI%2b4xi9%2bIANXb&r=&i=Untitled%2520Session"
"1"
|
||
C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe"
"RunRole" "4e12b011-b423-4052-ba92-2560e19f3148" "User"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k WerSvcGroup
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 7608 -ip 7608
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7608 -s 864
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://secure.stansup.com/Bin/ScreenConnect.Client.application.MO3RT
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.application9
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.applicationG
|
unknown
|
||
https://secure.staPJ
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.application9e0892
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsBackstageShell.exe
|
79.110.49.185
|
||
https://g.live.com/odclientsettings/ProdV2.C:
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsBackstageShell.exe.config
|
79.110.49.185
|
||
https://login.microsoftonline.com/ppsecure/ResolveUser.srf
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-
|
unknown
|
||
https://secure.stansup.com
|
unknown
|
||
http://Passport.NET/tbA
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.applicationO3
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.application1
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsClient.exe8
|
unknown
|
||
https://g.live.com/odclientsettings/Prod.C:
|
unknown
|
||
https://secure.stansup.c
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.applicationGU
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsFileManager.exe.config~&
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.ClientService.exe(T
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsds
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/devicechangecredential.srf
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsFileManager.exeNU
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/EnumerateDevices.srf
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.application
|
unknown
|
||
https://account.live.com/InlineSignup.aspx?iww=1&id=80502
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.applicationX
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.C
|
unknown
|
||
http://Passport.NET/tb_
|
unknown
|
||
https://secure.staPJh
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdst=
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Windows.dllx
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsClient.exe.configL
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/DeviceQuery.srfsuer
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.dllI
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsClient.exe.config
|
79.110.49.185
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.x
|
unknown
|
||
https://account.live.com/msangcwam
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.applicationMO3
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Windop
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsFileManager.exe.config
|
79.110.49.185
|
||
http://www.w3.or
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.application#ScreenConnect.WindowsClient.appl
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.manifest001O3
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdx
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.applicationn
|
unknown
|
||
http://passport.net/tb
|
unknown
|
||
https://secure.staP
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Core.dllY
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Issueue
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.applicationtv
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsds
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdxmlns:
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.applicationt
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Windo
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsBackstageShell.exe=
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.ClientService.exe
|
79.110.49.185
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsFileManager.exe
|
79.110.49.185
|
||
https://account.live.com/msangcwame
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.application?e=Support&y=Guest&h=kjh231a.zapto.or
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.dlla
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsClient.exe.configj
|
unknown
|
||
http://schemas.xmlsoap.org/ws/20
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.ClientService.dll
|
79.110.49.185
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.manifestM
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdAAA
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsFileManager.exX
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsFileManager.exeyU
|
unknown
|
||
https://secure.stansup.com/Bin/Scre
|
unknown
|
||
https://account.live.com/Wizard/Password/Change?id=806013
|
unknown
|
||
https://secure.staPb
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Issuesue
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.dll
|
79.110.49.185
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Issuee0
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/deviceremovecredential.srf
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Issuee1
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdAAAA
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/DeviceQuery.srf
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsBackstageShell.exex
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.application.MO3
|
unknown
|
||
https://login.microsoftonline.com/MSARST2.srf
|
unknown
|
||
http://Passport.NET/STS
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.ClientService.dllkU9
|
unknown
|
||
http://docs.oasis-open.org/wss/2
|
unknown
|
||
http://www.w3.
|
unknown
|
||
http://www.xrml.org/schema/2001/11/xrml2coreS
|
unknown
|
||
https://account.live.com/InlineSignup.aspx?iww=1&id=80502ssuer
|
unknown
|
||
http://www.w3.o
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Windows.dll
|
79.110.49.185
|
||
http://Passport.NET/tb
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.manifest
|
79.110.49.185
|
||
http://Passport.NET/STS09/xmldsig#ripledes-cbcices/SOAPFaultcurity-utility-1.0.xsd
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bg.microsoft.map.fastly.net
|
199.232.214.172
|
||
s-part-0017.t-0009.fb-t-msedge.net
|
13.107.253.45
|
||
secure.stansup.com
|
79.110.49.185
|
||
kjh231a.zapto.org
|
79.110.49.185
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
127.0.0.1
|
unknown
|
unknown
|
||
79.110.49.185
|
secure.stansup.com
|
Germany
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Network\ScreenConnect Client (ae095c23-8e22-4747-b9a0-c8c8b34ba57d)
|
NULL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
|
Blob
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\4C2272FBA7A7380F55E2A424E9E624AEE1C14579
|
Blob
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
|
ComponentStore_RandomString
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
|
ComponentStore_RandomString
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager
|
StateStore_RandomString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
|
Blob
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{60051b8f-4f12-400a-8e50-dd05ebd438d1}
|
NonCanonicalData
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{60051b8f-4f12-400a-8e50-dd05ebd438d1}\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{60051b8f-4f12-400a-8e50-dd05ebd438d1}\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
{c989bb7a-8385-4715-98cf-a741a8edb823}!ApplicationTrust
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
lock!0100000063f2bd0ae41d00002c1e000000000000000000001ab8ebd99a28db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}
|
NonCanonicalData
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!DeploymentSourceUri
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!ApplicationSourceUri
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!IsFullTrust
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!IsShellVisible
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!PreviousBind
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!PendingBind
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!ExcludedDeployment
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!PendingDeployment
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!DeploymentProviderUri
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!MinimumRequiredVersion
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!LastCheckTime
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!UpdateSkippedDeployment
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!UpdateSkipTime
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!AppType
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!CurrentBind
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
pin!S_{3f471841-eef2-47d6-89c0-d028f03a4ad5}
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.ClientService.exe_e781b1ee36f7c0e0
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.ClientService.exe_e781b1ee36f7c0e0
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsBackstageShell.exe_898f6d085da479bc
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsFileManager.exe.config_ceab8affc7343daa
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsFileManager.exe.config_ceab8affc7343daa
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsClient.exe.config_f7f106a5cc529540
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsClient.exe.config_f7f106a5cc529540
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsBackstageShell.exe.config_61230ac9d37a71e2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsFileManager.exe_0e21f87bfcff26be
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsFileManager.exe_0e21f87bfcff26be
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883\Files
|
ScreenConnect.Client.dll_fc1d7bd48553fcab
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883\Files
|
ScreenConnect.Client.dll_fc1d7bd48553fcab
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af\Files
|
ScreenConnect.Windows.dll_fc0d83aff7df0b5b
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af\Files
|
ScreenConnect.Windows.dll_fc0d83aff7df0b5b
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea\Files
|
ScreenConnect.ClientService.dll_e781b1c636f7bfae
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea\Files
|
ScreenConnect.ClientService.dll_e781b1c636f7bfae
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f\Files
|
ScreenConnect.Core.dll_b96889d378047e27
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f\Files
|
ScreenConnect.Core.dll_b96889d378047e27
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c\Files
|
ScreenConnect.WindowsClient.exe_6492277df2db17d2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c\Files
|
ScreenConnect.WindowsClient.exe_6492277df2db17d2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment
|
OnlineAppQuotaUsageEstimate
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f
|
lock!10000000f35ee00ae41d00002c1e00000000000000000000ab65a21aa028db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
lock!0e000000f35ee00ae41d00002c1e00000000000000000000ab65a21aa028db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
lock!0c000000f35ee00ae41d00002c1e00000000000000000000ab65a21aa028db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
lock!0a000000f35ee00ae41d00002c1e00000000000000000000ab65a21aa028db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
lock!08000000f35ee00ae41d00002c1e00000000000000000000ab65a21aa028db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
lock!06000000f35ee00ae41d00002c1e00000000000000000000ab65a21aa028db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee
|
lock!04000000f35ee00ae41d00002c1e00000000000000000000ab65a21aa028db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Applications\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Applications\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
PreparedForExecution
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
lock!11000000025fe00ae41d00002c1e00000000000000000000fdc1a41aa028db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.ClientService.exe_5e8c1e841cd8db20
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsBackstageShell.exe_89b7a517a15abfdc
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsFileManager.exe.config_5db10293a642be8a
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsClient.exe.config_432322067acab5c0
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsBackstageShell.exe.config_bc78256f1e952942
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsFileManager.exe_74b82db4db38179e
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea\Files
|
ScreenConnect.ClientService.dll_5e8c1e5c1cd8d9ee
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c\Files
|
ScreenConnect.WindowsClient.exe_fd0fcfe1fd1a6cd2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f\Files
|
ScreenConnect.Core.dll_963930cc5ced28c7
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883\Files
|
ScreenConnect.Client.dll_7b0ea606092ddbcb
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af\Files
|
ScreenConnect.Windows.dll_fa5f7fd8f7c108bb
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
SubstructureCreated
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
|
Blob
|
||
\REGISTRY\A\{6418c940-f89e-06b7-f3db-554c1b972fb0}\Root\InventoryApplicationFile\96r3ggxntq.exe|15b645f72c66d5c3
|
ProgramId
|
||
\REGISTRY\A\{6418c940-f89e-06b7-f3db-554c1b972fb0}\Root\InventoryApplicationFile\96r3ggxntq.exe|15b645f72c66d5c3
|
FileId
|
||
\REGISTRY\A\{6418c940-f89e-06b7-f3db-554c1b972fb0}\Root\InventoryApplicationFile\96r3ggxntq.exe|15b645f72c66d5c3
|
LowerCaseLongPath
|
||
\REGISTRY\A\{6418c940-f89e-06b7-f3db-554c1b972fb0}\Root\InventoryApplicationFile\96r3ggxntq.exe|15b645f72c66d5c3
|
LongPathHash
|
||
\REGISTRY\A\{6418c940-f89e-06b7-f3db-554c1b972fb0}\Root\InventoryApplicationFile\96r3ggxntq.exe|15b645f72c66d5c3
|
Name
|
||
\REGISTRY\A\{6418c940-f89e-06b7-f3db-554c1b972fb0}\Root\InventoryApplicationFile\96r3ggxntq.exe|15b645f72c66d5c3
|
OriginalFileName
|
||
\REGISTRY\A\{6418c940-f89e-06b7-f3db-554c1b972fb0}\Root\InventoryApplicationFile\96r3ggxntq.exe|15b645f72c66d5c3
|
Publisher
|
||
\REGISTRY\A\{6418c940-f89e-06b7-f3db-554c1b972fb0}\Root\InventoryApplicationFile\96r3ggxntq.exe|15b645f72c66d5c3
|
Version
|
||
\REGISTRY\A\{6418c940-f89e-06b7-f3db-554c1b972fb0}\Root\InventoryApplicationFile\96r3ggxntq.exe|15b645f72c66d5c3
|
BinFileVersion
|
||
\REGISTRY\A\{6418c940-f89e-06b7-f3db-554c1b972fb0}\Root\InventoryApplicationFile\96r3ggxntq.exe|15b645f72c66d5c3
|
BinaryType
|
||
\REGISTRY\A\{6418c940-f89e-06b7-f3db-554c1b972fb0}\Root\InventoryApplicationFile\96r3ggxntq.exe|15b645f72c66d5c3
|
ProductName
|
||
\REGISTRY\A\{6418c940-f89e-06b7-f3db-554c1b972fb0}\Root\InventoryApplicationFile\96r3ggxntq.exe|15b645f72c66d5c3
|
ProductVersion
|
||
\REGISTRY\A\{6418c940-f89e-06b7-f3db-554c1b972fb0}\Root\InventoryApplicationFile\96r3ggxntq.exe|15b645f72c66d5c3
|
LinkDate
|
||
\REGISTRY\A\{6418c940-f89e-06b7-f3db-554c1b972fb0}\Root\InventoryApplicationFile\96r3ggxntq.exe|15b645f72c66d5c3
|
BinProductVersion
|
||
\REGISTRY\A\{6418c940-f89e-06b7-f3db-554c1b972fb0}\Root\InventoryApplicationFile\96r3ggxntq.exe|15b645f72c66d5c3
|
AppxPackageFullName
|
||
\REGISTRY\A\{6418c940-f89e-06b7-f3db-554c1b972fb0}\Root\InventoryApplicationFile\96r3ggxntq.exe|15b645f72c66d5c3
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{6418c940-f89e-06b7-f3db-554c1b972fb0}\Root\InventoryApplicationFile\96r3ggxntq.exe|15b645f72c66d5c3
|
Size
|
||
\REGISTRY\A\{6418c940-f89e-06b7-f3db-554c1b972fb0}\Root\InventoryApplicationFile\96r3ggxntq.exe|15b645f72c66d5c3
|
Language
|
||
\REGISTRY\A\{6418c940-f89e-06b7-f3db-554c1b972fb0}\Root\InventoryApplicationFile\96r3ggxntq.exe|15b645f72c66d5c3
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates\2C85006A1A028BCC349DF23C474724C055FDE8B6
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates\B68D8F953E551914324E557E6164D68B9926650C
|
Blob
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02uojjzuramgtrlu
|
Reason
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02iekplzegkfhdmf
|
DeviceId
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02iekplzegkfhdmf
|
Provision Friday, October 25, 2024 13:27:27
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02iekplzegkfhdmf
|
AppIdList
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02kzybzvbimeevxb
|
Request Friday, October 25, 2024 13:27:32
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02kzybzvbimeevxb
|
Response Friday, October 25, 2024 13:27:32
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02kzybzvbimeevxb
|
Reason
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02jvqbeoqxjpylvl
|
DeviceId
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02jvqbeoqxjpylvl
|
AppIdList
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02uojjzuramgtrlu
|
AppIdList
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18
|
ValidDeviceId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL
|
GlobalDeviceUpdateTime
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02iekplzegkfhdmf
|
DeviceId
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18
|
ValidDeviceId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC
|
Data
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02iekplzegkfhdmf
|
DeviceId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02iekplzegkfhdmf
|
DeviceId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003
|
ValidDeviceId
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02kzybzvbimeevxb
|
AppIdList
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
|
Data
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02jvqbeoqxjpylvl
|
DeviceId
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003
|
ValidDeviceId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
|
Data
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02jvqbeoqxjpylvl
|
DeviceId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\ExtendedProperties
|
LID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
|
Data
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02jvqbeoqxjpylvl
|
DeviceId
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f
|
lock!0e00000019914e007c0e0000d41c0000000000000000000075d2a3390327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
lock!0c00000019914e007c0e0000d41c0000000000000000000075d2a3390327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
lock!0a00000019914e007c0e0000d41c0000000000000000000075d2a3390327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
lock!0800000019914e007c0e0000d41c0000000000000000000075d2a3390327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
lock!0600000019914e007c0e0000d41c0000000000000000000075d2a3390327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
lock!0400000019914e007c0e0000d41c0000000000000000000075d2a3390327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee
|
lock!0200000019914e007c0e0000d41c0000000000000000000075d2a3390327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f
|
lock!1c00000028914e007c0e0000d41c000000000000000000001e35a6390327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
lock!1a00000028914e007c0e0000d41c000000000000000000001e35a6390327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
lock!1800000028914e007c0e0000d41c000000000000000000001e35a6390327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
lock!1600000028914e007c0e0000d41c000000000000000000001e35a6390327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
lock!1400000028914e007c0e0000d41c000000000000000000001e35a6390327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
lock!1200000028914e007c0e0000d41c000000000000000000001e35a6390327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee
|
lock!1000000028914e007c0e0000d41c000000000000000000001e35a6390327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
lock!1d00000048914e007c0e0000d41c0000000000000000000004faaa390327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Families\F_scre..tion_25b0fbb6ef7eb094_98134c89f0fa827c
|
LastRunVersion
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Families\Gc_scre..tion_503889a8656f441d
|
LastRunVersion
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Families\Gi_scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
LastRunVersion
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Applications\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
HasRunBefore
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
|
AutoBackupLogFiles
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\ScreenConnect
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (ae095c23-8e22-4747-b9a0-c8c8b34ba57d)
|
ImagePath
|
There are 210 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2768A812000
|
trusted library allocation
|
page read and write
|
||
5690000
|
unkown
|
page readonly
|
||
1A9AC000
|
stack
|
page read and write
|
||
E9A187E000
|
unkown
|
page readonly
|
||
1C600000
|
heap
|
page read and write
|
||
25CF78A0000
|
trusted library allocation
|
page read and write
|
||
2769A208000
|
trusted library allocation
|
page read and write
|
||
1CEA36F2000
|
heap
|
page read and write
|
||
A8E000
|
stack
|
page read and write
|
||
7FFE7DC80000
|
trusted library allocation
|
page read and write
|
||
276A5F10000
|
heap
|
page read and write
|
||
1CEA36F0000
|
heap
|
page read and write
|
||
276A4146000
|
heap
|
page read and write
|
||
65B000
|
heap
|
page read and write
|
||
1CEA3723000
|
heap
|
page read and write
|
||
1CEA3135000
|
heap
|
page read and write
|
||
1CEA3135000
|
heap
|
page read and write
|
||
2D31000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
25CF2280000
|
heap
|
page read and write
|
||
3930000
|
unkown
|
page readonly
|
||
1CEA3135000
|
heap
|
page read and write
|
||
7FFE7DC60000
|
trusted library allocation
|
page read and write
|
||
CC27FFE000
|
stack
|
page read and write
|
||
156F000
|
trusted library allocation
|
page read and write
|
||
E9A0A7E000
|
unkown
|
page readonly
|
||
CC2719F000
|
stack
|
page read and write
|
||
1CEA368F000
|
heap
|
page read and write
|
||
810000
|
trusted library allocation
|
page read and write
|
||
1CEA3133000
|
heap
|
page read and write
|
||
1CEA3702000
|
heap
|
page read and write
|
||
7FFE7E070000
|
trusted library allocation
|
page read and write
|
||
173E000
|
stack
|
page read and write
|
||
1CEA3135000
|
heap
|
page read and write
|
||
276A2890000
|
heap
|
page execute and read and write
|
||
39AE000
|
stack
|
page read and write
|
||
E9A157B000
|
stack
|
page read and write
|
||
276885F5000
|
heap
|
page read and write
|
||
561C000
|
stack
|
page read and write
|
||
11E0000
|
trusted library allocation
|
page read and write
|
||
25CF3410000
|
trusted library section
|
page readonly
|
||
1CEA3129000
|
heap
|
page read and write
|
||
25CF247D000
|
heap
|
page read and write
|
||
276A415C000
|
heap
|
page read and write
|
||
7FFE7DC40000
|
trusted library allocation
|
page read and write
|
||
25CF7AC2000
|
heap
|
page read and write
|
||
1ADC5000
|
heap
|
page read and write
|
||
7FFE7DF00000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
BC3000
|
unkown
|
page readonly
|
||
1436000
|
trusted library allocation
|
page read and write
|
||
7FFE7E010000
|
trusted library allocation
|
page read and write
|
||
1CEA3135000
|
heap
|
page read and write
|
||
39EE000
|
stack
|
page read and write
|
||
CC284FD000
|
stack
|
page read and write
|
||
7FFE7DEB0000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
1CEA3133000
|
heap
|
page read and write
|
||
2768A512000
|
trusted library allocation
|
page read and write
|
||
7FFE7DF05000
|
trusted library allocation
|
page read and write
|
||
2768A21E000
|
trusted library allocation
|
page read and write
|
||
276A42F9000
|
heap
|
page read and write
|
||
2768A1DA000
|
trusted library allocation
|
page read and write
|
||
800000
|
trusted library allocation
|
page read and write
|
||
BB1000
|
unkown
|
page execute read
|
||
1B8E3000
|
heap
|
page read and write
|
||
1690000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
1CEA315D000
|
heap
|
page read and write
|
||
276A4712000
|
trusted library allocation
|
page read and write
|
||
1CEA3108000
|
heap
|
page read and write
|
||
2604D037000
|
heap
|
page read and write
|
||
1CEA310E000
|
heap
|
page read and write
|
||
1CEA3129000
|
heap
|
page read and write
|
||
1CEA291A000
|
heap
|
page read and write
|
||
1B720000
|
heap
|
page execute and read and write
|
||
1CEA3600000
|
heap
|
page read and write
|
||
1CEA3673000
|
heap
|
page read and write
|
||
1CEA3702000
|
heap
|
page read and write
|
||
276887C0000
|
trusted library allocation
|
page read and write
|
||
2604D124000
|
heap
|
page read and write
|
||
1BC78000
|
heap
|
page read and write
|
||
7FFE7DE60000
|
trusted library allocation
|
page execute and read and write
|
||
DD0000
|
heap
|
page read and write
|
||
7FFE7DC6D000
|
trusted library allocation
|
page execute and read and write
|
||
25CF7A1D000
|
heap
|
page read and write
|
||
2768A664000
|
trusted library allocation
|
page read and write
|
||
1CEA312C000
|
heap
|
page read and write
|
||
1469000
|
heap
|
page read and write
|
||
276A4163000
|
heap
|
page read and write
|
||
25CF7A60000
|
heap
|
page read and write
|
||
7FFE7DDE0000
|
trusted library allocation
|
page read and write
|
||
276887B0000
|
heap
|
page execute and read and write
|
||
276885F0000
|
heap
|
page read and write
|
||
7FFE7DD06000
|
trusted library allocation
|
page execute and read and write
|
||
82A000
|
heap
|
page read and write
|
||
25CF2D1B000
|
heap
|
page read and write
|
||
7ED000
|
trusted library allocation
|
page execute and read and write
|
||
1CEA315B000
|
heap
|
page read and write
|
||
1201000
|
trusted library allocation
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
1CEA3133000
|
heap
|
page read and write
|
||
7FFE7E1C0000
|
trusted library allocation
|
page read and write
|
||
1CEA3155000
|
heap
|
page read and write
|
||
1CEA36BC000
|
heap
|
page read and write
|
||
1CEA2FB0000
|
remote allocation
|
page read and write
|
||
CC27BF8000
|
stack
|
page read and write
|
||
E9A067E000
|
unkown
|
page readonly
|
||
276A236D000
|
heap
|
page read and write
|
||
1CEA3158000
|
heap
|
page read and write
|
||
37C0000
|
trusted library allocation
|
page read and write
|
||
E9A1C7B000
|
stack
|
page read and write
|
||
2604D513000
|
heap
|
page read and write
|
||
36E6000
|
trusted library allocation
|
page read and write
|
||
1CEA3178000
|
heap
|
page read and write
|
||
276A5FA0000
|
heap
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
1AD09000
|
heap
|
page read and write
|
||
1B87F000
|
stack
|
page read and write
|
||
11B0000
|
trusted library allocation
|
page read and write
|
||
8C3000
|
heap
|
page read and write
|
||
157A000
|
trusted library allocation
|
page read and write
|
||
1CEA369C000
|
heap
|
page read and write
|
||
3F5F000
|
trusted library allocation
|
page read and write
|
||
5E1000
|
heap
|
page read and write
|
||
276A2850000
|
heap
|
page read and write
|
||
CC27DFA000
|
stack
|
page read and write
|
||
25CF37D0000
|
trusted library allocation
|
page read and write
|
||
25CF3420000
|
trusted library section
|
page readonly
|
||
276A2F20000
|
heap
|
page read and write
|
||
817000
|
trusted library allocation
|
page execute and read and write
|
||
1CEA3130000
|
heap
|
page read and write
|
||
1CEA294C000
|
heap
|
page read and write
|
||
6E6000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
1CEA283A000
|
heap
|
page read and write
|
||
7FFE7E170000
|
trusted library allocation
|
page read and write
|
||
25CF2473000
|
heap
|
page read and write
|
||
7FFE7DC73000
|
trusted library allocation
|
page read and write
|
||
3E0E000
|
stack
|
page read and write
|
||
2604D413000
|
heap
|
page read and write
|
||
5680000
|
heap
|
page execute and read and write
|
||
1CEA2902000
|
heap
|
page read and write
|
||
1CEA3130000
|
heap
|
page read and write
|
||
E9A24FE000
|
stack
|
page read and write
|
||
276A1FE0000
|
trusted library allocation
|
page read and write
|
||
757000
|
heap
|
page read and write
|
||
521E000
|
stack
|
page read and write
|
||
7FFE7DE57000
|
trusted library allocation
|
page read and write
|
||
87E000
|
stack
|
page read and write
|
||
7FFE7DE94000
|
trusted library allocation
|
page read and write
|
||
1CEA28A8000
|
heap
|
page read and write
|
||
40B0000
|
trusted library allocation
|
page read and write
|
||
25CF7AEB000
|
heap
|
page read and write
|
||
7FFE7E142000
|
trusted library allocation
|
page read and write
|
||
1CEA3716000
|
heap
|
page read and write
|
||
4C80000
|
heap
|
page read and write
|
||
1CEA3685000
|
heap
|
page read and write
|
||
7FFE7DCEC000
|
trusted library allocation
|
page execute and read and write
|
||
56EE000
|
stack
|
page read and write
|
||
25CF2490000
|
heap
|
page read and write
|
||
11E9000
|
trusted library allocation
|
page read and write
|
||
276884C0000
|
heap
|
page read and write
|
||
1CEA3135000
|
heap
|
page read and write
|
||
E9A1F7E000
|
unkown
|
page readonly
|
||
276A2BBC000
|
heap
|
page read and write
|
||
E9A0B7C000
|
stack
|
page read and write
|
||
25CF79A0000
|
trusted library allocation
|
page read and write
|
||
7FFE7DE0D000
|
trusted library allocation
|
page read and write
|
||
E9A16FE000
|
stack
|
page read and write
|
||
CDBC77E000
|
unkown
|
page readonly
|
||
11EB000
|
trusted library allocation
|
page read and write
|
||
166D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7DD16000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7DE70000
|
trusted library allocation
|
page read and write
|
||
2604D500000
|
heap
|
page read and write
|
||
1CEA3110000
|
heap
|
page read and write
|
||
1CEA3184000
|
heap
|
page read and write
|
||
25CF3140000
|
trusted library allocation
|
page read and write
|
||
25CF7A4E000
|
heap
|
page read and write
|
||
1CEA3183000
|
heap
|
page read and write
|
||
3AB000
|
stack
|
page read and write
|
||
10F1000
|
stack
|
page read and write
|
||
CDBC37E000
|
stack
|
page read and write
|
||
276886CC000
|
heap
|
page read and write
|
||
812000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
276886B6000
|
heap
|
page read and write
|
||
2768A05D000
|
trusted library allocation
|
page read and write
|
||
57EE000
|
stack
|
page read and write
|
||
1CEA3184000
|
heap
|
page read and write
|
||
7FFE7DFA0000
|
trusted library allocation
|
page read and write
|
||
1CEA36AE000
|
heap
|
page read and write
|
||
25CF23B0000
|
trusted library allocation
|
page read and write
|
||
1BD80000
|
trusted library section
|
page readonly
|
||
1CEA315F000
|
heap
|
page read and write
|
||
E9A1A7C000
|
stack
|
page read and write
|
||
1CEA28D3000
|
heap
|
page read and write
|
||
1CEA312F000
|
heap
|
page read and write
|
||
25CF7A00000
|
heap
|
page read and write
|
||
276A2F3B000
|
heap
|
page read and write
|
||
1CEA317C000
|
heap
|
page read and write
|
||
25CF7ABF000
|
heap
|
page read and write
|
||
3F0E000
|
stack
|
page read and write
|
||
1CEA36DD000
|
heap
|
page read and write
|
||
1CEA36C1000
|
heap
|
page read and write
|
||
1B880000
|
trusted library section
|
page read and write
|
||
1CEA2790000
|
trusted library allocation
|
page read and write
|
||
1CEA36E3000
|
heap
|
page read and write
|
||
13DF000
|
trusted library allocation
|
page read and write
|
||
27688690000
|
heap
|
page read and write
|
||
7FFE7E14A000
|
trusted library allocation
|
page read and write
|
||
CC27CF4000
|
stack
|
page read and write
|
||
276A2810000
|
heap
|
page read and write
|
||
1CEA3110000
|
heap
|
page read and write
|
||
1434000
|
trusted library allocation
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
1CEA3133000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
276A2B4B000
|
heap
|
page read and write
|
||
276A4168000
|
heap
|
page read and write
|
||
1CEA28C6000
|
heap
|
page read and write
|
||
3FA0000
|
trusted library allocation
|
page read and write
|
||
1CEA28CC000
|
heap
|
page read and write
|
||
168A000
|
trusted library allocation
|
page execute and read and write
|
||
1CEA3712000
|
heap
|
page read and write
|
||
1AD01000
|
heap
|
page read and write
|
||
276A4125000
|
heap
|
page read and write
|
||
1ADA8000
|
heap
|
page read and write
|
||
1CEA36CF000
|
heap
|
page read and write
|
||
2769A1B3000
|
trusted library allocation
|
page read and write
|
||
7FFE7DEF9000
|
trusted library allocation
|
page read and write
|
||
7FFE7DC32000
|
trusted library allocation
|
page read and write
|
||
8B6000
|
unkown
|
page readonly
|
||
3740000
|
heap
|
page execute and read and write
|
||
1CEA3130000
|
heap
|
page read and write
|
||
1CEA3130000
|
heap
|
page read and write
|
||
25CF24FF000
|
heap
|
page read and write
|
||
E9A13FE000
|
stack
|
page read and write
|
||
65D000
|
heap
|
page read and write
|
||
1CEA28B4000
|
heap
|
page read and write
|
||
1CEA369B000
|
heap
|
page read and write
|
||
8B4000
|
unkown
|
page write copy
|
||
BC1000
|
unkown
|
page read and write
|
||
3F70000
|
trusted library allocation
|
page execute and read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
1CEA293B000
|
heap
|
page read and write
|
||
1CEA2760000
|
heap
|
page read and write
|
||
1CEA2FC0000
|
remote allocation
|
page read and write
|
||
1CEA294C000
|
heap
|
page read and write
|
||
1CEA3153000
|
heap
|
page read and write
|
||
2421000
|
trusted library allocation
|
page read and write
|
||
802000
|
trusted library allocation
|
page read and write
|
||
1697000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7DFE2000
|
trusted library allocation
|
page read and write
|
||
7FFE7DC8B000
|
trusted library allocation
|
page execute and read and write
|
||
68A000
|
heap
|
page read and write
|
||
1CEA36B6000
|
heap
|
page read and write
|
||
1CEA36D5000
|
heap
|
page read and write
|
||
2604D013000
|
unkown
|
page read and write
|
||
A6F000
|
heap
|
page read and write
|
||
1CEA317D000
|
heap
|
page read and write
|
||
4F4000
|
stack
|
page read and write
|
||
1CEA36DF000
|
heap
|
page read and write
|
||
1BC82000
|
heap
|
page read and write
|
||
7FFE7DE80000
|
trusted library allocation
|
page read and write
|
||
E9A10FE000
|
stack
|
page read and write
|
||
7FFE7DC43000
|
trusted library allocation
|
page read and write
|
||
1276000
|
heap
|
page read and write
|
||
25CF7940000
|
trusted library allocation
|
page read and write
|
||
7FFE7DC5D000
|
trusted library allocation
|
page execute and read and write
|
||
1CEA3570000
|
remote allocation
|
page read and write
|
||
7FFE7E050000
|
trusted library allocation
|
page read and write
|
||
7FFE7DC63000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7DC3D000
|
trusted library allocation
|
page execute and read and write
|
||
276A41C8000
|
heap
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
1CEA2861000
|
heap
|
page read and write
|
||
143E000
|
heap
|
page read and write
|
||
276A4110000
|
heap
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
7FFE7DC30000
|
trusted library allocation
|
page read and write
|
||
2769A1A4000
|
trusted library allocation
|
page read and write
|
||
13D000
|
stack
|
page read and write
|
||
276A5F72000
|
heap
|
page read and write
|
||
276A4156000
|
heap
|
page read and write
|
||
7FFE7DE10000
|
trusted library allocation
|
page read and write
|
||
2768A222000
|
trusted library allocation
|
page read and write
|
||
1CEA3133000
|
heap
|
page read and write
|
||
25CF2C15000
|
heap
|
page read and write
|
||
7FFE7DD16000
|
trusted library allocation
|
page read and write
|
||
E9A1B7E000
|
unkown
|
page readonly
|
||
2BF0000
|
heap
|
page execute and read and write
|
||
1476000
|
heap
|
page read and write
|
||
1BC85000
|
heap
|
page read and write
|
||
7EA000
|
heap
|
page read and write
|
||
1CEA3132000
|
heap
|
page read and write
|
||
1CEA2898000
|
heap
|
page read and write
|
||
7E3000
|
trusted library allocation
|
page execute and read and write
|
||
1BC4E000
|
heap
|
page read and write
|
||
A0000
|
unkown
|
page readonly
|
||
120F000
|
stack
|
page read and write
|
||
A2000
|
unkown
|
page readonly
|
||
7FFE7E040000
|
trusted library allocation
|
page read and write
|
||
1CEA3135000
|
heap
|
page read and write
|
||
1CEA310E000
|
heap
|
page read and write
|
||
1CEA368B000
|
heap
|
page read and write
|
||
1CEA3712000
|
heap
|
page read and write
|
||
25CF79B0000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
1AD19000
|
heap
|
page read and write
|
||
E9A257E000
|
unkown
|
page readonly
|
||
276A2F05000
|
heap
|
page read and write
|
||
7FFE7DFFC000
|
trusted library allocation
|
page read and write
|
||
1CEA3129000
|
heap
|
page read and write
|
||
2242000
|
unkown
|
page readonly
|
||
25CF2495000
|
heap
|
page read and write
|
||
7FFE7E1A0000
|
trusted library allocation
|
page read and write
|
||
2768A535000
|
trusted library allocation
|
page read and write
|
||
8AD000
|
unkown
|
page readonly
|
||
1B0BF000
|
stack
|
page read and write
|
||
7FFE7DFD0000
|
trusted library allocation
|
page read and write
|
||
1BC6C000
|
heap
|
page read and write
|
||
124E000
|
stack
|
page read and write
|
||
1CEA3132000
|
heap
|
page read and write
|
||
7FFE7DC8C000
|
trusted library allocation
|
page execute and read and write
|
||
1ADB9000
|
heap
|
page read and write
|
||
E9A197E000
|
unkown
|
page readonly
|
||
7FFE7DEB0000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
unkown
|
page readonly
|
||
1CEA315D000
|
heap
|
page read and write
|
||
900000
|
heap
|
page execute and read and write
|
||
1CEA36EC000
|
heap
|
page read and write
|
||
1CEA294C000
|
heap
|
page read and write
|
||
1664000
|
trusted library allocation
|
page read and write
|
||
1CEA312E000
|
heap
|
page read and write
|
||
1CEA36A9000
|
heap
|
page read and write
|
||
1242F000
|
trusted library allocation
|
page read and write
|
||
2769A171000
|
trusted library allocation
|
page read and write
|
||
11C1000
|
heap
|
page read and write
|
||
1CEA2883000
|
heap
|
page read and write
|
||
276886D0000
|
heap
|
page read and write
|
||
79E000
|
heap
|
page read and write
|
||
1CEA3156000
|
heap
|
page read and write
|
||
1C5ED000
|
stack
|
page read and write
|
||
1CEA3133000
|
heap
|
page read and write
|
||
25CF7990000
|
trusted library allocation
|
page read and write
|
||
1CEA3179000
|
heap
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
1CEA2898000
|
heap
|
page read and write
|
||
1CEA3697000
|
heap
|
page read and write
|
||
1242D000
|
trusted library allocation
|
page read and write
|
||
E9A117E000
|
unkown
|
page readonly
|
||
1CEA3132000
|
heap
|
page read and write
|
||
1CEA3107000
|
heap
|
page read and write
|
||
2604D100000
|
trusted library allocation
|
page read and write
|
||
140F000
|
stack
|
page read and write
|
||
2769A180000
|
trusted library allocation
|
page read and write
|
||
CDBB7FE000
|
stack
|
page read and write
|
||
2768A236000
|
trusted library allocation
|
page read and write
|
||
CDBB679000
|
stack
|
page read and write
|
||
1CEA315B000
|
heap
|
page read and write
|
||
27688715000
|
heap
|
page read and write
|
||
378A000
|
trusted library allocation
|
page read and write
|
||
1CEA315D000
|
heap
|
page read and write
|
||
1CEA291A000
|
heap
|
page read and write
|
||
3A20000
|
unkown
|
page readonly
|
||
3F50000
|
trusted library allocation
|
page read and write
|
||
1CEA2884000
|
heap
|
page read and write
|
||
7FFE7DF70000
|
trusted library allocation
|
page read and write
|
||
996000
|
heap
|
page read and write
|
||
1CEA36CD000
|
heap
|
page read and write
|
||
1686000
|
trusted library allocation
|
page execute and read and write
|
||
1AEB0000
|
heap
|
page read and write
|
||
1CEA291A000
|
heap
|
page read and write
|
||
2201000
|
trusted library allocation
|
page read and write
|
||
CC277FE000
|
stack
|
page read and write
|
||
CC282FD000
|
stack
|
page read and write
|
||
103C000
|
stack
|
page read and write
|
||
1CEA317D000
|
heap
|
page read and write
|
||
25CF7AF1000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
27688835000
|
heap
|
page read and write
|
||
890000
|
trusted library allocation
|
page read and write
|
||
2768A06C000
|
trusted library allocation
|
page read and write
|
||
1CEA2660000
|
heap
|
page read and write
|
||
25CF7930000
|
trusted library allocation
|
page read and write
|
||
25CF7890000
|
trusted library allocation
|
page read and write
|
||
2768A4A1000
|
trusted library allocation
|
page read and write
|
||
8B4000
|
unkown
|
page read and write
|
||
2C20000
|
heap
|
page read and write
|
||
560000
|
trusted library allocation
|
page read and write
|
||
551D000
|
stack
|
page read and write
|
||
2768A561000
|
trusted library allocation
|
page read and write
|
||
1C180000
|
heap
|
page read and write
|
||
2604D02B000
|
heap
|
page read and write
|
||
25CF2413000
|
heap
|
page read and write
|
||
E9A1D7E000
|
unkown
|
page readonly
|
||
7FFE7DE76000
|
trusted library allocation
|
page read and write
|
||
1650000
|
trusted library allocation
|
page read and write
|
||
1CEA315D000
|
heap
|
page read and write
|
||
276A2D13000
|
heap
|
page read and write
|
||
9FC000
|
stack
|
page read and write
|
||
4C7C000
|
heap
|
page read and write
|
||
7FFE7DF90000
|
trusted library allocation
|
page read and write
|
||
25CF22A0000
|
heap
|
page read and write
|
||
1CEA3135000
|
heap
|
page read and write
|
||
25CF247A000
|
heap
|
page read and write
|
||
1CEA28D9000
|
heap
|
page read and write
|
||
7FFE7DE60000
|
trusted library allocation
|
page read and write
|
||
276A41F6000
|
heap
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
2768A232000
|
trusted library allocation
|
page read and write
|
||
276A2D10000
|
heap
|
page read and write
|
||
1CEA3159000
|
heap
|
page read and write
|
||
1ADF0000
|
unkown
|
page readonly
|
||
276A41A4000
|
heap
|
page read and write
|
||
2768A61B000
|
trusted library allocation
|
page read and write
|
||
1CEA2892000
|
heap
|
page read and write
|
||
1CEA3135000
|
heap
|
page read and write
|
||
1CEA291A000
|
heap
|
page read and write
|
||
25CF37A1000
|
trusted library allocation
|
page read and write
|
||
1CEA36AA000
|
heap
|
page read and write
|
||
25CF7850000
|
trusted library allocation
|
page read and write
|
||
1CEA36ED000
|
heap
|
page read and write
|
||
A38000
|
heap
|
page read and write
|
||
1CEA315D000
|
heap
|
page read and write
|
||
2768A69B000
|
trusted library allocation
|
page read and write
|
||
1CEA3642000
|
heap
|
page read and write
|
||
2604D513000
|
heap
|
page read and write
|
||
7FFE7DD50000
|
trusted library allocation
|
page execute and read and write
|
||
1CEA310F000
|
heap
|
page read and write
|
||
7FFE7E020000
|
trusted library allocation
|
page read and write
|
||
2207000
|
trusted library allocation
|
page read and write
|
||
7FFE7DE36000
|
trusted library allocation
|
page read and write
|
||
1CEA28A8000
|
heap
|
page read and write
|
||
25CF7AF5000
|
heap
|
page read and write
|
||
806000
|
trusted library allocation
|
page execute and read and write
|
||
25CF7AF5000
|
heap
|
page read and write
|
||
6CF000
|
stack
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
61B000
|
heap
|
page read and write
|
||
1CEA36E8000
|
heap
|
page read and write
|
||
276885A0000
|
heap
|
page read and write
|
||
1CEA317D000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
2768A070000
|
trusted library allocation
|
page read and write
|
||
4EB0000
|
heap
|
page read and write
|
||
56A0000
|
heap
|
page read and write
|
||
2768A22E000
|
trusted library allocation
|
page read and write
|
||
1CEA3152000
|
heap
|
page read and write
|
||
8B5000
|
heap
|
page read and write
|
||
1CEA3002000
|
heap
|
page read and write
|
||
162E000
|
stack
|
page read and write
|
||
25CF7A57000
|
heap
|
page read and write
|
||
7FFE7E16E000
|
trusted library allocation
|
page read and write
|
||
7FFE7DDC0000
|
trusted library allocation
|
page read and write
|
||
E9A0F7B000
|
stack
|
page read and write
|
||
880000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7DFE6000
|
trusted library allocation
|
page read and write
|
||
2768A3A3000
|
trusted library allocation
|
page read and write
|
||
5D9000
|
heap
|
page read and write
|
||
1CEA3712000
|
heap
|
page read and write
|
||
7FFE7E110000
|
trusted library allocation
|
page read and write
|
||
276A42D1000
|
heap
|
page read and write
|
||
25CF7861000
|
trusted library allocation
|
page read and write
|
||
1CEA3135000
|
heap
|
page read and write
|
||
3715000
|
trusted library allocation
|
page read and write
|
||
7FFE7E193000
|
trusted library allocation
|
page read and write
|
||
1CEA3135000
|
heap
|
page read and write
|
||
1CEA3159000
|
heap
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
CC280FE000
|
stack
|
page read and write
|
||
2604D502000
|
heap
|
page read and write
|
||
1CEA310E000
|
heap
|
page read and write
|
||
16D0000
|
trusted library allocation
|
page read and write
|
||
1CEA3174000
|
heap
|
page read and write
|
||
1CEA316D000
|
heap
|
page read and write
|
||
7FF4B7EB0000
|
trusted library allocation
|
page execute and read and write
|
||
1CEA36E5000
|
heap
|
page read and write
|
||
1CEA310E000
|
heap
|
page read and write
|
||
7FFE7DC7C000
|
trusted library allocation
|
page execute and read and write
|
||
2DEF000
|
trusted library allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
1CEA3617000
|
heap
|
page read and write
|
||
E9A137E000
|
unkown
|
page readonly
|
||
25CF7B02000
|
heap
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
7FFE7E030000
|
trusted library allocation
|
page read and write
|
||
25CF7A84000
|
heap
|
page read and write
|
||
7FFE7DCF0000
|
trusted library allocation
|
page execute and read and write
|
||
1CEA293B000
|
heap
|
page read and write
|
||
37B7000
|
trusted library allocation
|
page read and write
|
||
1CEA36C1000
|
heap
|
page read and write
|
||
1405000
|
trusted library allocation
|
page read and write
|
||
CDBC27E000
|
unkown
|
page readonly
|
||
117D000
|
heap
|
page read and write
|
||
950000
|
heap
|
page execute and read and write
|
||
7FFE7DC24000
|
trusted library allocation
|
page read and write
|
||
2768A22A000
|
trusted library allocation
|
page read and write
|
||
7FFE7DC7D000
|
trusted library allocation
|
page execute and read and write
|
||
30AD000
|
trusted library allocation
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
1CEA3132000
|
heap
|
page read and write
|
||
1CEA3135000
|
heap
|
page read and write
|
||
1574000
|
trusted library allocation
|
page read and write
|
||
25CF7AF0000
|
heap
|
page read and write
|
||
2768A717000
|
trusted library allocation
|
page read and write
|
||
1CEA3685000
|
heap
|
page read and write
|
||
2768878E000
|
heap
|
page read and write
|
||
1CEA3182000
|
heap
|
page read and write
|
||
13FD000
|
stack
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
7FFE7DE50000
|
trusted library allocation
|
page read and write
|
||
12D40000
|
trusted library allocation
|
page read and write
|
||
1B2BD000
|
stack
|
page read and write
|
||
BBB000
|
unkown
|
page readonly
|
||
11C3000
|
heap
|
page read and write
|
||
5F3000
|
heap
|
page read and write
|
||
13BE000
|
stack
|
page read and write
|
||
1CEA2902000
|
heap
|
page read and write
|
||
7FFE7DE90000
|
trusted library allocation
|
page read and write
|
||
599000
|
heap
|
page read and write
|
||
1CEA3153000
|
heap
|
page read and write
|
||
1CEA3133000
|
heap
|
page read and write
|
||
CDBBC7E000
|
unkown
|
page readonly
|
||
DC0000
|
heap
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
1CEA3132000
|
heap
|
page read and write
|
||
7FFE7DED0000
|
trusted library allocation
|
page read and write
|
||
276A4010000
|
heap
|
page read and write
|
||
7FFE7E1B0000
|
trusted library allocation
|
page read and write
|
||
CDBBA7E000
|
unkown
|
page readonly
|
||
7FFE7DEC0000
|
trusted library allocation
|
page read and write
|
||
1138000
|
stack
|
page read and write
|
||
27688800000
|
heap
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
55B0000
|
trusted library allocation
|
page read and write
|
||
7FFE7DE30000
|
trusted library allocation
|
page read and write
|
||
1CEA3135000
|
heap
|
page read and write
|
||
276A2BB9000
|
heap
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
1BD10000
|
heap
|
page execute and read and write
|
||
167D000
|
trusted library allocation
|
page execute and read and write
|
||
590000
|
heap
|
page read and write
|
||
8A1000
|
unkown
|
page execute read
|
||
27688830000
|
heap
|
page read and write
|
||
1CEA3186000
|
heap
|
page read and write
|
||
1CEA316B000
|
heap
|
page read and write
|
||
1CEA282B000
|
heap
|
page read and write
|
||
25CF2529000
|
heap
|
page read and write
|
||
7FFE7DD1C000
|
trusted library allocation
|
page execute and read and write
|
||
E9A087E000
|
unkown
|
page readonly
|
||
1CEA367E000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
25CF242B000
|
heap
|
page read and write
|
||
25CF7A41000
|
heap
|
page read and write
|
||
1CEA3135000
|
heap
|
page read and write
|
||
7FFE7DCDC000
|
trusted library allocation
|
page execute and read and write
|
||
1CEA312E000
|
heap
|
page read and write
|
||
7FFE7DCBC000
|
trusted library allocation
|
page execute and read and write
|
||
2604D402000
|
heap
|
page read and write
|
||
1CEA3682000
|
heap
|
page read and write
|
||
4C83000
|
heap
|
page read and write
|
||
1682000
|
trusted library allocation
|
page read and write
|
||
7FFE7DC20000
|
trusted library allocation
|
page read and write
|
||
1CEA3713000
|
heap
|
page read and write
|
||
7FFE7DEF1000
|
trusted library allocation
|
page read and write
|
||
3780000
|
trusted library allocation
|
page read and write
|
||
7FFE7DDD9000
|
trusted library allocation
|
page read and write
|
||
1CEA310E000
|
heap
|
page read and write
|
||
25CF7B00000
|
heap
|
page read and write
|
||
25CF7C00000
|
remote allocation
|
page read and write
|
||
1B8C0000
|
unkown
|
page readonly
|
||
25CF2D1A000
|
heap
|
page read and write
|
||
2604D400000
|
heap
|
page read and write
|
||
2768A226000
|
trusted library allocation
|
page read and write
|
||
1CEA360F000
|
heap
|
page read and write
|
||
1CEA3734000
|
heap
|
page read and write
|
||
7FFE7DE9E000
|
trusted library allocation
|
page read and write
|
||
2604D115000
|
trusted library allocation
|
page read and write
|
||
1C5F0000
|
heap
|
page read and write
|
||
25CF78C9000
|
trusted library allocation
|
page read and write
|
||
276A4224000
|
heap
|
page read and write
|
||
1CEA36F6000
|
heap
|
page read and write
|
||
25CF79C0000
|
trusted library allocation
|
page read and write
|
||
1CEA3132000
|
heap
|
page read and write
|
||
39F0000
|
trusted library allocation
|
page read and write
|
||
4CB2000
|
heap
|
page read and write
|
||
1CEA3135000
|
heap
|
page read and write
|
||
7FFE7E150000
|
trusted library allocation
|
page read and write
|
||
1CEA3178000
|
heap
|
page read and write
|
||
1CEA36EC000
|
heap
|
page read and write
|
||
276A2F4D000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
85F000
|
stack
|
page read and write
|
||
A0000
|
unkown
|
page readonly
|
||
2769A1BC000
|
trusted library allocation
|
page read and write
|
||
276A2F67000
|
heap
|
page read and write
|
||
1B2BE000
|
stack
|
page read and write
|
||
1479000
|
heap
|
page read and write
|
||
1CEA3140000
|
heap
|
page read and write
|
||
1AD9C000
|
heap
|
page read and write
|
||
4121000
|
trusted library allocation
|
page read and write
|
||
1CEA36EC000
|
heap
|
page read and write
|
||
8AD000
|
unkown
|
page readonly
|
||
25CF77E0000
|
trusted library allocation
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
1CEA36C3000
|
heap
|
page read and write
|
||
CC279FE000
|
stack
|
page read and write
|
||
276A4121000
|
heap
|
page read and write
|
||
6EB8EF9000
|
stack
|
page read and write
|
||
1CEA3133000
|
heap
|
page read and write
|
||
3730000
|
trusted library allocation
|
page read and write
|
||
7FFE7DC30000
|
trusted library allocation
|
page read and write
|
||
CDBC67C000
|
stack
|
page read and write
|
||
2768A1D7000
|
trusted library allocation
|
page read and write
|
||
276A4180000
|
heap
|
page read and write
|
||
1CEA360D000
|
heap
|
page read and write
|
||
25CF7ADE000
|
heap
|
page read and write
|
||
C9E000
|
stack
|
page read and write
|
||
CDBB77E000
|
unkown
|
page readonly
|
||
3121000
|
trusted library allocation
|
page read and write
|
||
276A4309000
|
heap
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
1580000
|
trusted library allocation
|
page read and write
|
||
1B6FF000
|
stack
|
page read and write
|
||
1CEA310E000
|
heap
|
page read and write
|
||
1428000
|
trusted library allocation
|
page read and write
|
||
1CEA3130000
|
heap
|
page read and write
|
||
276A413C000
|
heap
|
page read and write
|
||
7FFE7DD20000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7DC50000
|
trusted library allocation
|
page read and write
|
||
1CEA310E000
|
heap
|
page read and write
|
||
1CEA3133000
|
heap
|
page read and write
|
||
1CEA3174000
|
heap
|
page read and write
|
||
1750000
|
trusted library allocation
|
page read and write
|
||
2769A0D2000
|
trusted library allocation
|
page read and write
|
||
1CEA3133000
|
heap
|
page read and write
|
||
7FFE7DD10000
|
trusted library allocation
|
page read and write
|
||
7FFE7DE20000
|
trusted library allocation
|
page read and write
|
||
1C611000
|
heap
|
page read and write
|
||
7FFE7DE00000
|
trusted library allocation
|
page read and write
|
||
CDBB87E000
|
unkown
|
page readonly
|
||
1CEA3129000
|
heap
|
page read and write
|
||
1770000
|
trusted library allocation
|
page read and write
|
||
27688762000
|
heap
|
page read and write
|
||
7D7000
|
heap
|
page read and write
|
||
25CF2478000
|
heap
|
page read and write
|
||
1AD5C000
|
heap
|
page read and write
|
||
25CF7C00000
|
remote allocation
|
page read and write
|
||
1CEA2FC0000
|
remote allocation
|
page read and write
|
||
79A000
|
heap
|
page read and write
|
||
7FFE7DFE4000
|
trusted library allocation
|
page read and write
|
||
1CEA3133000
|
heap
|
page read and write
|
||
1CEA294C000
|
heap
|
page read and write
|
||
27688660000
|
trusted library allocation
|
page read and write
|
||
36E2000
|
trusted library allocation
|
page read and write
|
||
1CEA369A000
|
heap
|
page read and write
|
||
276A4174000
|
heap
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
7FFE7DC4D000
|
trusted library allocation
|
page execute and read and write
|
||
25CF2D13000
|
heap
|
page read and write
|
||
276A414D000
|
heap
|
page read and write
|
||
6EB8BFF000
|
stack
|
page read and write
|
||
276A2AD0000
|
heap
|
page read and write
|
||
AEC000
|
heap
|
page read and write
|
||
25CF3320000
|
trusted library allocation
|
page read and write
|
||
40A0000
|
trusted library allocation
|
page read and write
|
||
7FFE7DE30000
|
trusted library allocation
|
page read and write
|
||
3F90000
|
trusted library allocation
|
page execute and read and write
|
||
1CEA2822000
|
heap
|
page read and write
|
||
7FFE7DDE3000
|
trusted library allocation
|
page read and write
|
||
25CF3400000
|
trusted library section
|
page readonly
|
||
7FFE7DF80000
|
trusted library allocation
|
page read and write
|
||
2604D500000
|
heap
|
page read and write
|
||
1CEA3130000
|
heap
|
page read and write
|
||
1CEA36E5000
|
heap
|
page read and write
|
||
1CEA3133000
|
heap
|
page read and write
|
||
143A000
|
trusted library allocation
|
page read and write
|
||
1C3EE000
|
stack
|
page read and write
|
||
1CEA3129000
|
heap
|
page read and write
|
||
1CEA3179000
|
heap
|
page read and write
|
||
1CEA3132000
|
heap
|
page read and write
|
||
8C6000
|
heap
|
page read and write
|
||
7FFE7E14C000
|
trusted library allocation
|
page read and write
|
||
2768A2CB000
|
trusted library allocation
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
276A2F3E000
|
heap
|
page read and write
|
||
36FE000
|
trusted library allocation
|
page read and write
|
||
1CEA3133000
|
heap
|
page read and write
|
||
1B372000
|
unkown
|
page readonly
|
||
25CF2E01000
|
trusted library allocation
|
page read and write
|
||
994000
|
heap
|
page read and write
|
||
E9A18FE000
|
stack
|
page read and write
|
||
7FFE7DC4D000
|
trusted library allocation
|
page execute and read and write
|
||
1CEA3135000
|
heap
|
page read and write
|
||
313E000
|
trusted library allocation
|
page read and write
|
||
1CEA28F8000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page execute and read and write
|
||
7FFE7DE00000
|
trusted library allocation
|
page read and write
|
||
7FFE7DE60000
|
trusted library allocation
|
page read and write
|
||
1CEA3133000
|
heap
|
page read and write
|
||
1CEA3184000
|
heap
|
page read and write
|
||
1CEA315C000
|
heap
|
page read and write
|
||
1CEA3015000
|
heap
|
page read and write
|
||
1CEA3130000
|
heap
|
page read and write
|
||
1CEA3113000
|
heap
|
page read and write
|
||
1CEA3133000
|
heap
|
page read and write
|
||
7FFE7DFB0000
|
trusted library allocation
|
page read and write
|
||
25CF79B0000
|
trusted library allocation
|
page read and write
|
||
143B000
|
heap
|
page read and write
|
||
7FFE7DE26000
|
trusted library allocation
|
page read and write
|
||
1CEA313B000
|
heap
|
page read and write
|
||
276A4048000
|
heap
|
page read and write
|
||
1CEA2800000
|
heap
|
page read and write
|
||
679000
|
heap
|
page read and write
|
||
4FD000
|
stack
|
page read and write
|
||
BC3000
|
unkown
|
page readonly
|
||
7E0000
|
trusted library allocation
|
page read and write
|
||
1CEA3110000
|
heap
|
page read and write
|
||
1CEA3702000
|
heap
|
page read and write
|
||
1CEA28AA000
|
heap
|
page read and write
|
||
CDBBE7E000
|
unkown
|
page readonly
|
||
1CEA294C000
|
heap
|
page read and write
|
||
1CEA36E9000
|
heap
|
page read and write
|
||
27688640000
|
trusted library allocation
|
page read and write
|
||
25CF245B000
|
heap
|
page read and write
|
||
1CEA291E000
|
heap
|
page read and write
|
||
1CEA28E6000
|
heap
|
page read and write
|
||
12421000
|
trusted library allocation
|
page read and write
|
||
1ADAD000
|
heap
|
page read and write
|
||
276A2F51000
|
heap
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
BB0000
|
unkown
|
page readonly
|
||
37A0000
|
trusted library allocation
|
page read and write
|
||
276886EC000
|
heap
|
page read and write
|
||
1CEA2913000
|
heap
|
page read and write
|
||
7C0000
|
trusted library allocation
|
page read and write
|
||
1CEA3723000
|
heap
|
page read and write
|
||
7FFE7DF40000
|
trusted library allocation
|
page read and write
|
||
1CEA310E000
|
heap
|
page read and write
|
||
66B000
|
heap
|
page read and write
|
||
1CEA3130000
|
heap
|
page read and write
|
||
7FFE7DC32000
|
trusted library allocation
|
page read and write
|
||
1CEA3135000
|
heap
|
page read and write
|
||
7FFE7DE50000
|
trusted library allocation
|
page read and write
|
||
7FFE7E160000
|
trusted library allocation
|
page read and write
|
||
CDBB978000
|
stack
|
page read and write
|
||
1CEA310E000
|
heap
|
page read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
2604D002000
|
unkown
|
page read and write
|
||
CDBB0AB000
|
stack
|
page read and write
|
||
1CEA316E000
|
heap
|
page read and write
|
||
276886D2000
|
heap
|
page read and write
|
||
1CEA3184000
|
heap
|
page read and write
|
||
7FFE7DE70000
|
trusted library allocation
|
page read and write
|
||
242F000
|
trusted library allocation
|
page read and write
|
||
1CEA3137000
|
heap
|
page read and write
|
||
B18000
|
heap
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
1B8E0000
|
heap
|
page read and write
|
||
5692000
|
unkown
|
page readonly
|
||
1AD05000
|
heap
|
page read and write
|
||
276A27E0000
|
heap
|
page execute and read and write
|
||
1C1A0000
|
heap
|
page read and write
|
||
2CEE000
|
stack
|
page read and write
|
||
276A41FB000
|
heap
|
page read and write
|
||
25CF7930000
|
trusted library allocation
|
page read and write
|
||
1680000
|
trusted library allocation
|
page read and write
|
||
7FFE7DC34000
|
trusted library allocation
|
page read and write
|
||
3DCE000
|
stack
|
page read and write
|
||
1CEA312A000
|
heap
|
page read and write
|
||
1CEA3135000
|
heap
|
page read and write
|
||
3701000
|
trusted library allocation
|
page read and write
|
||
7FFE7DE90000
|
trusted library allocation
|
page read and write
|
||
2604CFB0000
|
heap
|
page read and write
|
||
276A2B46000
|
heap
|
page read and write
|
||
E9A0979000
|
stack
|
page read and write
|
||
7FFE7E080000
|
trusted library allocation
|
page read and write
|
||
2604D010000
|
unkown
|
page read and write
|
||
E9A127E000
|
unkown
|
page readonly
|
||
1CEA312E000
|
heap
|
page read and write
|
||
1ACF0000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
3F40000
|
trusted library allocation
|
page read and write
|
||
1AFBF000
|
stack
|
page read and write
|
||
1CEA3129000
|
heap
|
page read and write
|
||
1CEA36BC000
|
heap
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7DE30000
|
trusted library allocation
|
page read and write
|
||
1B723000
|
heap
|
page execute and read and write
|
||
E9A107E000
|
unkown
|
page readonly
|
||
7FFE7DF30000
|
trusted library allocation
|
page read and write
|
||
3F80000
|
trusted library allocation
|
page read and write
|
||
1CEA3100000
|
heap
|
page read and write
|
||
7FFE7DCE0000
|
trusted library allocation
|
page execute and read and write
|
||
1CEA3159000
|
heap
|
page read and write
|
||
7FFE7DC3D000
|
trusted library allocation
|
page execute and read and write
|
||
1CEA28A3000
|
heap
|
page read and write
|
||
1CEA3130000
|
heap
|
page read and write
|
||
2769A1B0000
|
trusted library allocation
|
page read and write
|
||
1ADB1000
|
heap
|
page read and write
|
||
1CEA316D000
|
heap
|
page read and write
|
||
5560000
|
unkown
|
page readonly
|
||
276A5F59000
|
heap
|
page read and write
|
||
1CEA3702000
|
heap
|
page read and write
|
||
CC283FD000
|
stack
|
page read and write
|
||
CC285FE000
|
stack
|
page read and write
|
||
1CEA2680000
|
heap
|
page read and write
|
||
2604D102000
|
trusted library allocation
|
page read and write
|
||
7FFE7DEA0000
|
trusted library allocation
|
page read and write
|
||
7FFE7E140000
|
trusted library allocation
|
page read and write
|
||
1CEA315A000
|
heap
|
page read and write
|
||
276A5F36000
|
heap
|
page read and write
|
||
1EF60000
|
trusted library allocation
|
page read and write
|
||
1CEA3726000
|
heap
|
page read and write
|
||
25CF77D0000
|
trusted library allocation
|
page read and write
|
||
1CEA3180000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
1CEA36F2000
|
heap
|
page read and write
|
||
7FFE7DE07000
|
trusted library allocation
|
page read and write
|
||
7FFE7DCE0000
|
trusted library allocation
|
page read and write
|
||
CC278FB000
|
stack
|
page read and write
|
||
1CEA293B000
|
heap
|
page read and write
|
||
2768A249000
|
trusted library allocation
|
page read and write
|
||
E9A0C7E000
|
unkown
|
page readonly
|
||
1CEA3132000
|
heap
|
page read and write
|
||
276A2BB7000
|
heap
|
page read and write
|
||
4090000
|
trusted library allocation
|
page read and write
|
||
3790000
|
trusted library allocation
|
page execute and read and write
|
||
1CEA3130000
|
heap
|
page read and write
|
||
1CEA3110000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
1CEA3130000
|
heap
|
page read and write
|
||
276A4133000
|
heap
|
page read and write
|
||
1189000
|
heap
|
page read and write
|
||
7FFE7DC44000
|
trusted library allocation
|
page read and write
|
||
7FFE7DFC0000
|
trusted library allocation
|
page read and write
|
||
1663000
|
trusted library allocation
|
page execute and read and write
|
||
710000
|
heap
|
page read and write
|
||
3720000
|
trusted library allocation
|
page read and write
|
||
276A419F000
|
heap
|
page read and write
|
||
25CF2C00000
|
heap
|
page read and write
|
||
1CEA3152000
|
heap
|
page read and write
|
||
7FFE7DE19000
|
trusted library allocation
|
page read and write
|
||
25CF23C0000
|
trusted library section
|
page read and write
|
||
7FFE7DC54000
|
trusted library allocation
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
CC27153000
|
stack
|
page read and write
|
||
7FFE7DE40000
|
trusted library allocation
|
page read and write
|
||
815000
|
trusted library allocation
|
page execute and read and write
|
||
25CF7C00000
|
remote allocation
|
page read and write
|
||
1BC10000
|
heap
|
page read and write
|
||
1CEA2FC0000
|
remote allocation
|
page read and write
|
||
1CEA315C000
|
heap
|
page read and write
|
||
E9A0577000
|
stack
|
page read and write
|
||
1CEA36D8000
|
heap
|
page read and write
|
||
7FFE7DD46000
|
trusted library allocation
|
page execute and read and write
|
||
1670000
|
trusted library allocation
|
page read and write
|
||
81B000
|
trusted library allocation
|
page execute and read and write
|
||
25CF2440000
|
heap
|
page read and write
|
||
1760000
|
heap
|
page read and write
|
||
1CEA3712000
|
heap
|
page read and write
|
||
1CEA3133000
|
heap
|
page read and write
|
||
25CF7ABD000
|
heap
|
page read and write
|
||
1B370000
|
unkown
|
page readonly
|
||
1CEA315C000
|
heap
|
page read and write
|
||
1CEA3182000
|
heap
|
page read and write
|
||
1CEA293B000
|
heap
|
page read and write
|
||
25CF2D00000
|
heap
|
page read and write
|
||
1CEA3129000
|
heap
|
page read and write
|
||
118E000
|
stack
|
page read and write
|
||
CC271DE000
|
stack
|
page read and write
|
||
276A4261000
|
heap
|
page read and write
|
||
7FFE7DE87000
|
trusted library allocation
|
page read and write
|
||
276A4151000
|
heap
|
page read and write
|
||
1CEA3185000
|
heap
|
page read and write
|
||
1EE000
|
stack
|
page read and write
|
||
CDBBB7B000
|
stack
|
page read and write
|
||
7FFE7DE50000
|
trusted library allocation
|
page read and write
|
||
2768A21A000
|
trusted library allocation
|
page read and write
|
||
276A2AF7000
|
heap
|
page read and write
|
||
2211000
|
trusted library allocation
|
page read and write
|
||
276A4037000
|
heap
|
page read and write
|
||
5574000
|
unkown
|
page readonly
|
||
1CEA3713000
|
heap
|
page read and write
|
||
276886D8000
|
heap
|
page read and write
|
||
1CEA287A000
|
heap
|
page read and write
|
||
7FFE7DE20000
|
trusted library allocation
|
page execute and read and write
|
||
25CF3440000
|
trusted library section
|
page readonly
|
||
1CEA36DF000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
2240000
|
unkown
|
page readonly
|
||
2BC0000
|
trusted library allocation
|
page read and write
|
||
2BE0000
|
trusted library allocation
|
page read and write
|
||
1CEA3705000
|
heap
|
page read and write
|
||
2768A068000
|
trusted library allocation
|
page read and write
|
||
CDBBF7E000
|
stack
|
page read and write
|
||
25CF8000000
|
heap
|
page read and write
|
||
2768A5EB000
|
trusted library allocation
|
page read and write
|
||
276A405D000
|
heap
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
128E000
|
stack
|
page read and write
|
||
276A2893000
|
heap
|
page execute and read and write
|
||
25CF7890000
|
trusted library allocation
|
page read and write
|
||
276A41BD000
|
heap
|
page read and write
|
||
276A2B34000
|
heap
|
page read and write
|
||
1CEA36CA000
|
heap
|
page read and write
|
||
1CEA315B000
|
heap
|
page read and write
|
||
25CF7A53000
|
heap
|
page read and write
|
||
12D31000
|
trusted library allocation
|
page read and write
|
||
276A425D000
|
heap
|
page read and write
|
||
3A10000
|
trusted library allocation
|
page read and write
|
||
7FFE7DC4B000
|
trusted library allocation
|
page execute and read and write
|
||
1695000
|
trusted library allocation
|
page execute and read and write
|
||
1CEA293B000
|
heap
|
page read and write
|
||
1CEA3000000
|
heap
|
page read and write
|
||
1CEA36F6000
|
heap
|
page read and write
|
||
25CF7880000
|
trusted library allocation
|
page read and write
|
||
31CF000
|
trusted library allocation
|
page read and write
|
||
7FFE7DF60000
|
trusted library allocation
|
page read and write
|
||
1CEA2813000
|
heap
|
page read and write
|
||
BC1000
|
unkown
|
page write copy
|
||
2604CFD0000
|
heap
|
page read and write
|
||
1CEA3135000
|
heap
|
page read and write
|
||
7FFE7E090000
|
trusted library allocation
|
page execute and read and write
|
||
25CF7B1B000
|
heap
|
page read and write
|
||
7FFE7DC33000
|
trusted library allocation
|
page execute and read and write
|
||
6EB87DD000
|
stack
|
page read and write
|
||
1CEA3109000
|
heap
|
page read and write
|
||
276A27B0000
|
heap
|
page read and write
|
||
7FFE7DF20000
|
trusted library allocation
|
page read and write
|
||
7FFE7DE0C000
|
trusted library allocation
|
page read and write
|
||
3F10000
|
trusted library allocation
|
page read and write
|
||
1CEA2873000
|
heap
|
page read and write
|
||
12D3E000
|
trusted library allocation
|
page read and write
|
||
7FFE7DDD1000
|
trusted library allocation
|
page read and write
|
||
8B4000
|
unkown
|
page read and write
|
||
2769A2A6000
|
trusted library allocation
|
page read and write
|
||
1CEA3132000
|
heap
|
page read and write
|
||
1CEA3133000
|
heap
|
page read and write
|
||
7FFE7DD40000
|
trusted library allocation
|
page execute and read and write
|
||
79D000
|
stack
|
page read and write
|
||
300E000
|
stack
|
page read and write
|
||
7FFE7E180000
|
trusted library allocation
|
page read and write
|
||
1CEA3644000
|
heap
|
page read and write
|
||
1692000
|
trusted library allocation
|
page read and write
|
||
276A2F45000
|
heap
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
1CEA315B000
|
heap
|
page read and write
|
||
25CF78A4000
|
trusted library allocation
|
page read and write
|
||
7FFE7DF50000
|
trusted library allocation
|
page read and write
|
||
7FFE7DDF0000
|
trusted library allocation
|
page read and write
|
||
1BC95000
|
heap
|
page read and write
|
||
311F000
|
stack
|
page read and write
|
||
7FFE7DCE6000
|
trusted library allocation
|
page read and write
|
||
E9A077E000
|
stack
|
page read and write
|
||
27688600000
|
heap
|
page read and write
|
||
1CEA3180000
|
heap
|
page read and write
|
||
11C0000
|
trusted library allocation
|
page read and write
|
||
7FFE7DCD6000
|
trusted library allocation
|
page read and write
|
||
1C62A000
|
heap
|
page read and write
|
||
7FFE7DC40000
|
trusted library allocation
|
page read and write
|
||
7FFE7DCD0000
|
trusted library allocation
|
page read and write
|
||
7FFE7DC5B000
|
trusted library allocation
|
page execute and read and write
|
||
1B1BE000
|
stack
|
page read and write
|
||
1CEA3133000
|
heap
|
page read and write
|
||
1BAEF000
|
stack
|
page read and write
|
||
7FFE7DEA0000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
7FFE7DED3000
|
trusted library allocation
|
page read and write
|
||
E9A12FE000
|
stack
|
page read and write
|
||
67F000
|
heap
|
page read and write
|
||
2604CFE0000
|
trusted library allocation
|
page read and write
|
||
25CF2D02000
|
heap
|
page read and write
|
||
1CEA315C000
|
heap
|
page read and write
|
||
25CF7A0D000
|
heap
|
page read and write
|
||
1CEA3163000
|
heap
|
page read and write
|
||
3010000
|
heap
|
page execute and read and write
|
||
1CEA3133000
|
heap
|
page read and write
|
||
7FFE7DE00000
|
trusted library allocation
|
page read and write
|
||
3CCE000
|
stack
|
page read and write
|
||
25CF2400000
|
heap
|
page read and write
|
||
A20000
|
trusted library allocation
|
page read and write
|
||
1CEA3130000
|
heap
|
page read and write
|
||
1CEA36B7000
|
heap
|
page read and write
|
||
25CF7860000
|
trusted library allocation
|
page read and write
|
||
1CEA294C000
|
heap
|
page read and write
|
||
12BE000
|
stack
|
page read and write
|
||
1CEA3129000
|
heap
|
page read and write
|
||
E9A0E7E000
|
unkown
|
page readonly
|
||
31BF000
|
trusted library allocation
|
page read and write
|
||
16C0000
|
trusted library allocation
|
page execute and read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
C2E000
|
stack
|
page read and write
|
||
E9A0D7C000
|
stack
|
page read and write
|
||
1CEA3107000
|
heap
|
page read and write
|
||
25CF2513000
|
heap
|
page read and write
|
||
E9A17FE000
|
stack
|
page read and write
|
||
1CEA3135000
|
heap
|
page read and write
|
||
3F30000
|
trusted library allocation
|
page read and write
|
||
25CF24B2000
|
heap
|
page read and write
|
||
1780000
|
heap
|
page read and write
|
||
1CEA310E000
|
heap
|
page read and write
|
||
7F0000
|
trusted library allocation
|
page read and write
|
||
3A00000
|
trusted library allocation
|
page read and write
|
||
1CEA315D000
|
heap
|
page read and write
|
||
276A2920000
|
heap
|
page read and write
|
||
1CEA310E000
|
heap
|
page read and write
|
||
1CEA315C000
|
heap
|
page read and write
|
||
BBB000
|
unkown
|
page readonly
|
||
25CF7A2A000
|
heap
|
page read and write
|
||
1B9EF000
|
stack
|
page read and write
|
||
1CEA3133000
|
heap
|
page read and write
|
||
31DF000
|
trusted library allocation
|
page read and write
|
||
276A2840000
|
trusted library section
|
page readonly
|
||
7FFE7DDD5000
|
trusted library allocation
|
page read and write
|
||
5BD000
|
heap
|
page read and write
|
||
1166000
|
heap
|
page read and write
|
||
276A2F10000
|
heap
|
page read and write
|
||
276A42EC000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
B0C000
|
heap
|
page read and write
|
||
276A2B61000
|
heap
|
page read and write
|
||
25CF2380000
|
heap
|
page read and write
|
||
3F60000
|
trusted library allocation
|
page read and write
|
||
2768A59C000
|
trusted library allocation
|
page read and write
|
||
25CF3450000
|
trusted library section
|
page readonly
|
||
169B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7DE55000
|
trusted library allocation
|
page read and write
|
||
1CEA3135000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
7E4000
|
trusted library allocation
|
page read and write
|
||
16B0000
|
trusted library allocation
|
page read and write
|
||
241F000
|
stack
|
page read and write
|
||
25CF7860000
|
trusted library allocation
|
page read and write
|
||
147B000
|
heap
|
page read and write
|
||
580000
|
trusted library allocation
|
page read and write
|
||
276A5F3D000
|
heap
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
7FFE7E000000
|
trusted library allocation
|
page read and write
|
||
7FFE7DC23000
|
trusted library allocation
|
page execute and read and write
|
||
1CEA3157000
|
heap
|
page read and write
|
||
7FFE7DE90000
|
trusted library allocation
|
page read and write
|
||
276A41D4000
|
heap
|
page read and write
|
||
1CEA293B000
|
heap
|
page read and write
|
||
25CF248E000
|
heap
|
page read and write
|
||
25CF24A0000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
2604D000000
|
unkown
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
117A000
|
heap
|
page read and write
|
||
CC281FD000
|
stack
|
page read and write
|
||
1AD15000
|
heap
|
page read and write
|
||
1CEA3185000
|
heap
|
page read and write
|
||
25CF2C02000
|
heap
|
page read and write
|
||
7FFE7DF10000
|
trusted library allocation
|
page read and write
|
||
1CEA36B8000
|
heap
|
page read and write
|
||
1CEA3713000
|
heap
|
page read and write
|
||
1CEA366F000
|
heap
|
page read and write
|
||
25CF7840000
|
trusted library allocation
|
page read and write
|
||
100F000
|
stack
|
page read and write
|
||
7FFE7DE20000
|
trusted library allocation
|
page read and write
|
||
7FFE7DE40000
|
trusted library allocation
|
page read and write
|
||
CC27AFD000
|
stack
|
page read and write
|
||
3F20000
|
trusted library allocation
|
page execute and read and write
|
||
2769A074000
|
trusted library allocation
|
page read and write
|
||
1CEA3129000
|
heap
|
page read and write
|
||
1CEA3130000
|
heap
|
page read and write
|
||
1660000
|
trusted library allocation
|
page read and write
|
||
1BCAA000
|
heap
|
page read and write
|
||
276A4251000
|
heap
|
page read and write
|
||
7FD000
|
trusted library allocation
|
page execute and read and write
|
||
25CF2428000
|
heap
|
page read and write
|
||
1CEA3156000
|
heap
|
page read and write
|
||
7FFE7E190000
|
trusted library allocation
|
page read and write
|
||
25CF3430000
|
trusted library section
|
page readonly
|
||
BB1000
|
unkown
|
page execute read
|
||
1CEA3700000
|
heap
|
page read and write
|
||
7FFE7DE80000
|
trusted library allocation
|
page read and write
|
||
276A41AE000
|
heap
|
page read and write
|
||
ACE000
|
stack
|
page read and write
|
||
7FFE7DDD0000
|
trusted library allocation
|
page read and write
|
||
1CEA2825000
|
heap
|
page read and write
|
||
CC286FE000
|
stack
|
page read and write
|
||
1CEA3133000
|
heap
|
page read and write
|
||
6FC000
|
stack
|
page read and write
|
||
110E000
|
stack
|
page read and write
|
||
1CEA2847000
|
heap
|
page read and write
|
||
276A5F69000
|
heap
|
page read and write
|
||
669000
|
heap
|
page read and write
|
||
7FFE7DE4B000
|
trusted library allocation
|
page read and write
|
||
1BDA0000
|
heap
|
page read and write
|
||
1CEA316D000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
25CF2D5B000
|
heap
|
page read and write
|
||
1CEA36C1000
|
heap
|
page read and write
|
||
7FFE7DE70000
|
trusted library allocation
|
page read and write
|
||
ACF000
|
heap
|
page read and write
|
||
119B000
|
heap
|
page read and write
|
||
7FFE7DE8E000
|
trusted library allocation
|
page read and write
|
||
1CEA36EF000
|
heap
|
page read and write
|
||
31BD000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
heap
|
page read and write
|
||
7F7000
|
trusted library allocation
|
page read and write
|
||
E9A167E000
|
unkown
|
page readonly
|
||
A49000
|
heap
|
page read and write
|
||
1CEA3156000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
1CEA3133000
|
heap
|
page read and write
|
||
1CEA312A000
|
heap
|
page read and write
|
||
1CEA3184000
|
heap
|
page read and write
|
||
1CEA312E000
|
heap
|
page read and write
|
||
7FFE7DDF0000
|
trusted library allocation
|
page read and write
|
||
1CEA3133000
|
heap
|
page read and write
|
||
1CEA3153000
|
heap
|
page read and write
|
||
27699FE1000
|
trusted library allocation
|
page read and write
|
||
1CEA3153000
|
heap
|
page read and write
|
||
E99FFDB000
|
stack
|
page read and write
|
||
7FFE7DC64000
|
trusted library allocation
|
page read and write
|
||
1396000
|
trusted library allocation
|
page read and write
|
||
1CEA36B2000
|
heap
|
page read and write
|
||
5D3000
|
heap
|
page read and write
|
||
1BD30000
|
trusted library allocation
|
page read and write
|
||
7FFE7DDDC000
|
trusted library allocation
|
page read and write
|
||
E9A11FE000
|
stack
|
page read and write
|
||
7FFE7E130000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7DFF0000
|
trusted library allocation
|
page read and write
|
||
5562000
|
unkown
|
page readonly
|
||
7FFE7DE17000
|
trusted library allocation
|
page read and write
|
||
27689FE1000
|
trusted library allocation
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
CDBC17B000
|
stack
|
page read and write
|
||
CDBC07E000
|
unkown
|
page readonly
|
||
1CEA36EE000
|
heap
|
page read and write
|
||
1CEA3724000
|
heap
|
page read and write
|
||
276885C0000
|
heap
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
7FFE7DDEE000
|
trusted library allocation
|
page read and write
|
||
1CEA36DD000
|
heap
|
page read and write
|
||
1CEA3130000
|
heap
|
page read and write
|
||
7FFE7DDE7000
|
trusted library allocation
|
page read and write
|
||
25CF7B0B000
|
heap
|
page read and write
|
||
25CF2502000
|
heap
|
page read and write
|
||
1CEA312E000
|
heap
|
page read and write
|
||
1C5F9000
|
heap
|
page read and write
|
||
7FFE7DC2D000
|
trusted library allocation
|
page execute and read and write
|
||
1AD4C000
|
heap
|
page read and write
|
||
276A2F00000
|
heap
|
page read and write
|
||
1CEA3159000
|
heap
|
page read and write
|
||
7FFE7DE10000
|
trusted library allocation
|
page execute and read and write
|
||
1CEA3152000
|
heap
|
page read and write
|
||
1CEA36BC000
|
heap
|
page read and write
|
||
7FFE7DC84000
|
trusted library allocation
|
page read and write
|
||
7FFE7DE80000
|
trusted library allocation
|
page read and write
|
||
2768A05F000
|
trusted library allocation
|
page read and write
|
||
7FFE7DD80000
|
trusted library allocation
|
page execute and read and write
|
||
2769A1B6000
|
trusted library allocation
|
page read and write
|
||
157C000
|
trusted library allocation
|
page read and write
|
||
CDBBD7B000
|
stack
|
page read and write
|
||
276A2010000
|
trusted library allocation
|
page read and write
|
||
1CEA3135000
|
heap
|
page read and write
|
||
7FFE7E060000
|
trusted library allocation
|
page execute and read and write
|
||
E9A1E7E000
|
stack
|
page read and write
|
||
7FFE7E120000
|
trusted library allocation
|
page read and write
|
||
276A42C2000
|
heap
|
page read and write
|
||
1CEA3110000
|
heap
|
page read and write
|
||
1CEA287E000
|
heap
|
page read and write
|
||
36EC000
|
trusted library allocation
|
page read and write
|
||
2604D502000
|
heap
|
page read and write
|
||
1CEA3155000
|
heap
|
page read and write
|
There are 1164 hidden memdumps, click here to show them.