Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
3coxOaV92n.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_3coxOaV92n.exe_13c990b719c88e7e398da3cbdb8fa19db9e9438_1be62bd4_4fcf22e5-136c-4a5c-bcb6-45c782844a7b\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x5da598e5, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4FB7.tmp.dmp
|
Mini DuMP crash report, 14 streams, Fri Oct 25 17:29:16 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER50C2.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5101.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER510F.tmp.csv
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER516E.tmp.txt
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 4770 bytes, 1 file, at 0x2c +A "disallowedcert.stl", number 1, 1 datablock,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
Certificate, Version=3
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
|
Certificate, Version=3
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\manifests\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\manifests\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (10073), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\manifests\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\manifests\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\manifests\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\manifests\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\manifests\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\manifests\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\manifests\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\manifests\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\manifests\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\manifests\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (63849), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\manifests\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\manifests\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.ClientService.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.WindowsBackstageShell.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.WindowsBackstageShell.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.WindowsClient.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.WindowsFileManager.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.WindowsFileManager.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f\ScreenConnect.Core.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af\ScreenConnect.Windows.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c\ScreenConnect.WindowsClient.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883\ScreenConnect.Client.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\Client.Override.en-US.resources
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\Client.Override.resources
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\Client.en-US.resources
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\Client.resources
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\app.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\fy1ftoo0.newcfg
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\user.config
(copy)
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea\ScreenConnect.ClientService.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dfsvc.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ScreenConnect.ClientService.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\76GEJ2UX.log
|
Unicode text, UTF-16, little-endian text, with very long lines (618), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\1A8JLAL6.KO1\RZBMYN0L.REL.application
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (63849), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\22ZD2V4C.0O4\NY35KDR3.BNV\ScreenConnect.Client.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\22ZD2V4C.0O4\NY35KDR3.BNV\ScreenConnect.Client.dll.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\22ZD2V4C.0O4\NY35KDR3.BNV\ScreenConnect.ClientService.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\22ZD2V4C.0O4\NY35KDR3.BNV\ScreenConnect.ClientService.dll.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\22ZD2V4C.0O4\NY35KDR3.BNV\ScreenConnect.ClientService.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\22ZD2V4C.0O4\NY35KDR3.BNV\ScreenConnect.Core.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\22ZD2V4C.0O4\NY35KDR3.BNV\ScreenConnect.Core.dll.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\22ZD2V4C.0O4\NY35KDR3.BNV\ScreenConnect.Windows.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\22ZD2V4C.0O4\NY35KDR3.BNV\ScreenConnect.Windows.dll.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\22ZD2V4C.0O4\NY35KDR3.BNV\ScreenConnect.WindowsBackstageShell.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\22ZD2V4C.0O4\NY35KDR3.BNV\ScreenConnect.WindowsBackstageShell.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\22ZD2V4C.0O4\NY35KDR3.BNV\ScreenConnect.WindowsClient.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\22ZD2V4C.0O4\NY35KDR3.BNV\ScreenConnect.WindowsClient.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\22ZD2V4C.0O4\NY35KDR3.BNV\ScreenConnect.WindowsClient.exe.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\22ZD2V4C.0O4\NY35KDR3.BNV\ScreenConnect.WindowsClient.exe.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (10073), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\22ZD2V4C.0O4\NY35KDR3.BNV\ScreenConnect.WindowsFileManager.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\22ZD2V4C.0O4\NY35KDR3.BNV\ScreenConnect.WindowsFileManager.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\932a2db58c237abd381d22df4c63a04a_9e146be9-c76a-4720-bcdb-53011b87bd06
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
data
|
modified
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\System32\user.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 70 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\3coxOaV92n.exe
|
"C:\Users\user\Desktop\3coxOaV92n.exe"
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe"
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe"
"?e=Support&y=Guest&h=kjh231a.zapto.org&p=8041&s=a7ee4b85-96fb-4d9a-b419-6636f94d66aa&k=BgIAAACkAABSU0ExAAgAAAEAAQAFiJkYSsHWAiMLqCRmzzktgQckyG3TGgm6yPTLawNtNX6q1gr57JH4PrLfClMTmwPp16%2ftpUu72MJPhrP9Fe%2fDAOLI7IxssEnqHo0cK7GF8605xW1%2b29YYv7Gp%2f%2bRVnS8EXpyfNuusFYa%2bCoXawQboJM2Gi1VXFl4XcMGGJmYswsgo9qU%2fBqW3jX3LRGSRskHQDuJYQ8zNUvX1ZvvvtewO8gfRa7Z6WeC1pOnkHykQZ7ux8aNy9iCaTKjcx7FnTu1T7GRag6eNtt4weTuPK2uLu2HYzL%2fVKjjkmkP1xXy2lhSPvloy810giaMzeQQElR11NNJ7O%2bcRI%2b4xi9%2bIANXb&r=&i=Untitled%20Session"
"1"
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe"
"?e=Support&y=Guest&h=kjh231a.zapto.org&p=8041&s=a7ee4b85-96fb-4d9a-b419-6636f94d66aa&k=BgIAAACkAABSU0ExAAgAAAEAAQAFiJkYSsHWAiMLqCRmzzktgQckyG3TGgm6yPTLawNtNX6q1gr57JH4PrLfClMTmwPp16%2ftpUu72MJPhrP9Fe%2fDAOLI7IxssEnqHo0cK7GF8605xW1%2b29YYv7Gp%2f%2bRVnS8EXpyfNuusFYa%2bCoXawQboJM2Gi1VXFl4XcMGGJmYswsgo9qU%2fBqW3jX3LRGSRskHQDuJYQ8zNUvX1ZvvvtewO8gfRa7Z6WeC1pOnkHykQZ7ux8aNy9iCaTKjcx7FnTu1T7GRag6eNtt4weTuPK2uLu2HYzL%2fVKjjkmkP1xXy2lhSPvloy810giaMzeQQElR11NNJ7O%2bcRI%2b4xi9%2bIANXb&r=&i=Untitled%20Session"
"1"
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe"
"RunRole" "b058094b-2ee9-42ec-a616-548c8b8c83a4" "User"
|
||
C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\NP1Y8XRR.MXL\JZ9QEWOK.6WB\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe"
"RunRole" "a9f9cad7-92f3-4145-a572-df5ab2869f06" "System"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k WerSvcGroup
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5508 -ip 5508
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5508 -s 748
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd2001
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.application#ScreenConnec
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.application?
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdng
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.applicationft
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.application9
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.applicationH
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsFileManager.exe.confign
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsBackstageShell.exe
|
79.110.49.185
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsClient.exeC
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV2.C:
|
unknown
|
||
https://secure.staPB
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsBackstageShell.exe.config
|
79.110.49.185
|
||
https://login.microsoftonline.com/ppsecure/ResolveUser.srf
|
unknown
|
||
https://secure.stansup.com
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.application1
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsClient.exe8
|
unknown
|
||
http://Passport.NET/STS</ds:KeyName></ds:KeyInfo><Ciph
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
|
unknown
|
||
https://account.live.
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.applicationh
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdAAAAA
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/devicechangecredential.srf
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.applicationP
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdnc#
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/EnumerateDevices.srf
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.application
|
unknown
|
||
https://account.live.com/InlineSignup.aspx?iww=1&id=80502
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80600ssuer
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.application34e089
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.applicationX
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.C
|
unknown
|
||
http://Passport.NET/tb_
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdst=
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.applicationKy
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsClient.exe.configL
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/DeviceQuery.srfsuer
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsClient.exe.config
|
79.110.49.185
|
||
https://account.live.com/msangcwam
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsFileManager.exe.config
|
79.110.49.185
|
||
http://www.w3.or
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.applicationn
|
unknown
|
||
http://passport.net/tb
|
unknown
|
||
https://secure.staP
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srf
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.applicationx
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsds/www
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdxmlns:
|
unknown
|
||
https://secure.staPx
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Windo
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.ClientService.exe
|
79.110.49.185
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsFileManager.exe
|
79.110.49.185
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.application?e=Support&y=Guest&h=kjh231a.zapto.or
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.ClientService.dll
|
79.110.49.185
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80601ssuer
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/scR
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/ResolveUser.srfsuer
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsFileManager.exX
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trustm
|
unknown
|
||
https://secure.stansup.com/Bn
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.application#ScreenConnect.Window
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/scicy
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.dll
|
79.110.49.185
|
||
https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srf:CLSID
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/deviceremovecredential.srf
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.ClientService.exe0
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdAAAA
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/DeviceQuery.srf
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsBackstageShell.exex
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust
|
unknown
|
||
https://login.microsoftonline.com/MSARST2.srf
|
unknown
|
||
http://Passport.NET/STS
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd4/xml
|
unknown
|
||
http://www.xrml.org/schema/2001/11/xrml2coreS
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.dll#
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Issue502
|
unknown
|
||
https://account.live.com/InlineSignup.aspx?iww=1&id=80502ssuer
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.applicat
|
unknown
|
||
http://www.w3.o
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Windows.dll
|
79.110.49.185
|
||
https://account.live.co
|
unknown
|
||
http://Passport.NET/tb
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.manifest
|
79.110.49.185
|
||
http://Passport.NET/STS09/xmldsig#ripledes-cbcices/SOAPFaultcurity-utility-1.0.xsd
|
unknown
|
||
https://signup.live.com/signup.aspx
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.WindowsClient.exe
|
79.110.49.185
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdOAPF
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80601
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80600
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80603
|
unknown
|
||
https://login.microsoftonline.com/MSARST2.srfH
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/09/policy
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Client.application899
|
unknown
|
||
https://secure.stansup.com/Bin/ScreenConnect.Core.dll
|
79.110.49.185
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bg.microsoft.map.fastly.net
|
199.232.210.172
|
||
secure.stansup.com
|
79.110.49.185
|
||
kjh231a.zapto.org
|
79.110.49.185
|
||
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
|
84.201.210.18
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
127.0.0.1
|
unknown
|
unknown
|
||
79.110.49.185
|
secure.stansup.com
|
Germany
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
|
Blob
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\4C2272FBA7A7380F55E2A424E9E624AEE1C14579
|
Blob
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
|
ComponentStore_RandomString
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
|
ComponentStore_RandomString
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager
|
StateStore_RandomString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
|
Blob
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{60051b8f-4f12-400a-8e50-dd05ebd438d1}
|
NonCanonicalData
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{60051b8f-4f12-400a-8e50-dd05ebd438d1}\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{60051b8f-4f12-400a-8e50-dd05ebd438d1}\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
{c989bb7a-8385-4715-98cf-a741a8edb823}!ApplicationTrust
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
lock!010000007104d90af00b0000580100000000000000000000f3bd47179b28db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}
|
NonCanonicalData
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!DeploymentSourceUri
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!ApplicationSourceUri
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!IsFullTrust
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!IsShellVisible
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!PreviousBind
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!PendingBind
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!ExcludedDeployment
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!PendingDeployment
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!DeploymentProviderUri
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!MinimumRequiredVersion
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!LastCheckTime
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!UpdateSkippedDeployment
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!UpdateSkipTime
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!AppType
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!CurrentBind
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
pin!S_{3f471841-eef2-47d6-89c0-d028f03a4ad5}
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.ClientService.exe_e781b1ee36f7c0e0
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.ClientService.exe_e781b1ee36f7c0e0
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsBackstageShell.exe_898f6d085da479bc
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsBackstageShell.exe_898f6d085da479bc
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsFileManager.exe.config_ceab8affc7343daa
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsClient.exe.config_f7f106a5cc529540
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsClient.exe.config_f7f106a5cc529540
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsBackstageShell.exe.config_61230ac9d37a71e2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsBackstageShell.exe.config_61230ac9d37a71e2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_12d9d3044e990931\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsFileManager.exe_0e21f87bfcff26be
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsFileManager.exe_0e21f87bfcff26be
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883\Files
|
ScreenConnect.Client.dll_fc1d7bd48553fcab
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af\Files
|
ScreenConnect.Windows.dll_fc0d83aff7df0b5b
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af\Files
|
ScreenConnect.Windows.dll_fc0d83aff7df0b5b
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea\Files
|
ScreenConnect.ClientService.dll_e781b1c636f7bfae
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea\Files
|
ScreenConnect.ClientService.dll_e781b1c636f7bfae
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f\Files
|
ScreenConnect.Core.dll_b96889d378047e27
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f\Files
|
ScreenConnect.Core.dll_b96889d378047e27
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c\Files
|
ScreenConnect.WindowsClient.exe_6492277df2db17d2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c\Files
|
ScreenConnect.WindowsClient.exe_6492277df2db17d2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment
|
OnlineAppQuotaUsageEstimate
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f
|
lock!10000000e303040bf00b00005801000000000000000000004611eaa6a128db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
lock!0e000000e303040bf00b00005801000000000000000000004611eaa6a128db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
lock!0c000000e303040bf00b00005801000000000000000000004611eaa6a128db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
lock!0a000000e303040bf00b00005801000000000000000000004611eaa6a128db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
lock!08000000e303040bf00b00005801000000000000000000004611eaa6a128db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
lock!06000000e303040bf00b00005801000000000000000000004611eaa6a128db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee
|
lock!04000000e303040bf00b00005801000000000000000000004611eaa6a128db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Applications\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Applications\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
PreparedForExecution
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
lock!110000000204040bf00b000058010000000000000000000023d7eea6a128db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.ClientService.exe_5e8c1e841cd8db20
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsBackstageShell.exe_89b7a517a15abfdc
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsFileManager.exe.config_5db10293a642be8a
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsClient.exe.config_432322067acab5c0
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsBackstageShell.exe.config_bc78256f1e952942
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\Files
|
ScreenConnect.WindowsFileManager.exe_74b82db4db38179e
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea\Files
|
ScreenConnect.ClientService.dll_5e8c1e5c1cd8d9ee
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c\Files
|
ScreenConnect.WindowsClient.exe_fd0fcfe1fd1a6cd2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f\Files
|
ScreenConnect.Core.dll_963930cc5ced28c7
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883\Files
|
ScreenConnect.Client.dll_7b0ea606092ddbcb
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af\Files
|
ScreenConnect.Windows.dll_fa5f7fd8f7c108bb
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
SubstructureCreated
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
|
Blob
|
||
\REGISTRY\A\{9968a857-d146-8027-1e0d-feef210fbf26}\Root\InventoryApplicationFile\3coxoav92n.exe|a65d7328996b89bd
|
ProgramId
|
||
\REGISTRY\A\{9968a857-d146-8027-1e0d-feef210fbf26}\Root\InventoryApplicationFile\3coxoav92n.exe|a65d7328996b89bd
|
FileId
|
||
\REGISTRY\A\{9968a857-d146-8027-1e0d-feef210fbf26}\Root\InventoryApplicationFile\3coxoav92n.exe|a65d7328996b89bd
|
LowerCaseLongPath
|
||
\REGISTRY\A\{9968a857-d146-8027-1e0d-feef210fbf26}\Root\InventoryApplicationFile\3coxoav92n.exe|a65d7328996b89bd
|
LongPathHash
|
||
\REGISTRY\A\{9968a857-d146-8027-1e0d-feef210fbf26}\Root\InventoryApplicationFile\3coxoav92n.exe|a65d7328996b89bd
|
Name
|
||
\REGISTRY\A\{9968a857-d146-8027-1e0d-feef210fbf26}\Root\InventoryApplicationFile\3coxoav92n.exe|a65d7328996b89bd
|
OriginalFileName
|
||
\REGISTRY\A\{9968a857-d146-8027-1e0d-feef210fbf26}\Root\InventoryApplicationFile\3coxoav92n.exe|a65d7328996b89bd
|
Publisher
|
||
\REGISTRY\A\{9968a857-d146-8027-1e0d-feef210fbf26}\Root\InventoryApplicationFile\3coxoav92n.exe|a65d7328996b89bd
|
Version
|
||
\REGISTRY\A\{9968a857-d146-8027-1e0d-feef210fbf26}\Root\InventoryApplicationFile\3coxoav92n.exe|a65d7328996b89bd
|
BinFileVersion
|
||
\REGISTRY\A\{9968a857-d146-8027-1e0d-feef210fbf26}\Root\InventoryApplicationFile\3coxoav92n.exe|a65d7328996b89bd
|
BinaryType
|
||
\REGISTRY\A\{9968a857-d146-8027-1e0d-feef210fbf26}\Root\InventoryApplicationFile\3coxoav92n.exe|a65d7328996b89bd
|
ProductName
|
||
\REGISTRY\A\{9968a857-d146-8027-1e0d-feef210fbf26}\Root\InventoryApplicationFile\3coxoav92n.exe|a65d7328996b89bd
|
ProductVersion
|
||
\REGISTRY\A\{9968a857-d146-8027-1e0d-feef210fbf26}\Root\InventoryApplicationFile\3coxoav92n.exe|a65d7328996b89bd
|
LinkDate
|
||
\REGISTRY\A\{9968a857-d146-8027-1e0d-feef210fbf26}\Root\InventoryApplicationFile\3coxoav92n.exe|a65d7328996b89bd
|
BinProductVersion
|
||
\REGISTRY\A\{9968a857-d146-8027-1e0d-feef210fbf26}\Root\InventoryApplicationFile\3coxoav92n.exe|a65d7328996b89bd
|
AppxPackageFullName
|
||
\REGISTRY\A\{9968a857-d146-8027-1e0d-feef210fbf26}\Root\InventoryApplicationFile\3coxoav92n.exe|a65d7328996b89bd
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{9968a857-d146-8027-1e0d-feef210fbf26}\Root\InventoryApplicationFile\3coxoav92n.exe|a65d7328996b89bd
|
Size
|
||
\REGISTRY\A\{9968a857-d146-8027-1e0d-feef210fbf26}\Root\InventoryApplicationFile\3coxoav92n.exe|a65d7328996b89bd
|
Language
|
||
\REGISTRY\A\{9968a857-d146-8027-1e0d-feef210fbf26}\Root\InventoryApplicationFile\3coxoav92n.exe|a65d7328996b89bd
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates\2C85006A1A028BCC349DF23C474724C055FDE8B6
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates\B68D8F953E551914324E557E6164D68B9926650C
|
Blob
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02vnquskfpppcivc
|
Reason
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02bahbskipsopkqs
|
DeviceId
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02bahbskipsopkqs
|
Provision Friday, October 25, 2024 13:29:27
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02bahbskipsopkqs
|
AppIdList
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02gfcilbgfbgtour
|
Request Friday, October 25, 2024 13:29:32
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02gfcilbgfbgtour
|
Response Friday, October 25, 2024 13:29:32
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02gfcilbgfbgtour
|
Reason
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02hfxbgqzlxleami
|
DeviceId
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02hfxbgqzlxleami
|
AppIdList
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02vnquskfpppcivc
|
AppIdList
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18
|
ValidDeviceId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL
|
GlobalDeviceUpdateTime
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02bahbskipsopkqs
|
DeviceId
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18
|
ValidDeviceId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02bahbskipsopkqs
|
DeviceId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC
|
Data
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003
|
ValidDeviceId
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02gfcilbgfbgtour
|
AppIdList
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
|
Data
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02hfxbgqzlxleami
|
DeviceId
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003
|
ValidDeviceId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
|
Data
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02hfxbgqzlxleami
|
DeviceId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
|
Data
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02hfxbgqzlxleami
|
DeviceId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\ExtendedProperties
|
LID
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f
|
lock!0e00000002d8690018070000cc0c00000000000000000000a0131b7f0327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
lock!0c00000002d8690018070000cc0c00000000000000000000a0131b7f0327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
lock!0a00000002d8690018070000cc0c00000000000000000000a0131b7f0327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
lock!0800000002d8690018070000cc0c00000000000000000000a0131b7f0327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
lock!0600000002d8690018070000cc0c00000000000000000000a0131b7f0327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
lock!0400000002d8690018070000cc0c00000000000000000000a0131b7f0327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee
|
lock!0200000002d8690018070000cc0c00000000000000000000a0131b7f0327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f
|
lock!1c00000031d8690018070000cc0c00000000000000000000703b227f0327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c
|
lock!1a00000031d8690018070000cc0c00000000000000000000703b227f0327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea
|
lock!1800000031d8690018070000cc0c00000000000000000000703b227f0327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af
|
lock!1600000031d8690018070000cc0c00000000000000000000703b227f0327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883
|
lock!1400000031d8690018070000cc0c00000000000000000000703b227f0327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b
|
lock!1200000031d8690018070000cc0c00000000000000000000703b227f0327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_none_394ffef6a8000aee
|
lock!1000000031d8690018070000cc0c00000000000000000000703b227f0327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
lock!1d00000050d8690018070000cc0c0000000000000000000025ff267f0327db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Families\F_scre..tion_25b0fbb6ef7eb094_98134c89f0fa827c
|
LastRunVersion
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Families\Gc_scre..tion_503889a8656f441d
|
LastRunVersion
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Families\Gi_scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
LastRunVersion
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Applications\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42
|
HasRunBefore
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Network\ScreenConnect Client (a7ee4b85-96fb-4d9a-b419-6636f94d66aa)
|
NULL
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
|
AutoBackupLogFiles
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\ScreenConnect
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (a7ee4b85-96fb-4d9a-b419-6636f94d66aa)
|
ImagePath
|
There are 212 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FF848D4D000
|
trusted library allocation
|
page execute and read and write
|
||
DC87DFE000
|
stack
|
page read and write
|
||
86860FE000
|
unkown
|
page readonly
|
||
2A1101D6000
|
trusted library allocation
|
page read and write
|
||
2487BC56000
|
heap
|
page read and write
|
||
DCA000
|
heap
|
page read and write
|
||
2487B50E000
|
heap
|
page read and write
|
||
2A1737E0000
|
heap
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
1C680000
|
heap
|
page read and write
|
||
1BD10000
|
heap
|
page read and write
|
||
246CA902000
|
heap
|
page read and write
|
||
1782000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
1BC50000
|
unkown
|
page readonly
|
||
569000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
50EE000
|
stack
|
page read and write
|
||
2A171DB5000
|
heap
|
page read and write
|
||
2487AC97000
|
heap
|
page read and write
|
||
BBEC2FD000
|
stack
|
page read and write
|
||
1C696000
|
heap
|
page read and write
|
||
582E000
|
stack
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
BBEC1FE000
|
stack
|
page read and write
|
||
2487B552000
|
heap
|
page read and write
|
||
11C6000
|
heap
|
page read and write
|
||
2487B556000
|
heap
|
page read and write
|
||
1B795000
|
heap
|
page read and write
|
||
1B44000
|
trusted library allocation
|
page read and write
|
||
2487B57C000
|
heap
|
page read and write
|
||
2A17579D000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
2487B55B000
|
heap
|
page read and write
|
||
246CA000000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
AC0000
|
unkown
|
page readonly
|
||
59F000
|
heap
|
page read and write
|
||
8686EFE000
|
unkown
|
page readonly
|
||
51F0000
|
unkown
|
page readonly
|
||
2A1002BA000
|
trusted library allocation
|
page read and write
|
||
2487B530000
|
heap
|
page read and write
|
||
12B3000
|
heap
|
page read and write
|
||
13FE5A00000
|
heap
|
page read and write
|
||
8686AFE000
|
unkown
|
page readonly
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page execute and read and write
|
||
246CA2D0000
|
heap
|
page read and write
|
||
2487BCD3000
|
heap
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
44A0000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
2487AD2C000
|
heap
|
page read and write
|
||
7FF848D84000
|
trusted library allocation
|
page read and write
|
||
2A175A99000
|
heap
|
page read and write
|
||
2A175AA9000
|
heap
|
page read and write
|
||
5160000
|
trusted library allocation
|
page read and write
|
||
86871FE000
|
unkown
|
page readonly
|
||
3802279000
|
stack
|
page read and write
|
||
1B1D7000
|
heap
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
2D80000
|
heap
|
page execute and read and write
|
||
44EF000
|
trusted library allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
7FF8490D6000
|
trusted library allocation
|
page read and write
|
||
2487B52A000
|
heap
|
page read and write
|
||
2A177C9F000
|
heap
|
page read and write
|
||
7FF848D63000
|
trusted library allocation
|
page execute and read and write
|
||
1390000
|
heap
|
page read and write
|
||
2EBF000
|
trusted library allocation
|
page read and write
|
||
2487B57D000
|
heap
|
page read and write
|
||
2487B55B000
|
heap
|
page read and write
|
||
2AEE000
|
stack
|
page read and write
|
||
44B0000
|
trusted library allocation
|
page execute and read and write
|
||
2487AD2D000
|
heap
|
page read and write
|
||
2487BD29000
|
heap
|
page read and write
|
||
246CF623000
|
trusted library allocation
|
page read and write
|
||
3CA1000
|
trusted library allocation
|
page read and write
|
||
2487BD39000
|
heap
|
page read and write
|
||
2487B532000
|
heap
|
page read and write
|
||
2487AD02000
|
heap
|
page read and write
|
||
DFA000
|
heap
|
page read and write
|
||
AD3000
|
unkown
|
page readonly
|
||
7FF848D8D000
|
trusted library allocation
|
page execute and read and write
|
||
2487AC5F000
|
heap
|
page read and write
|
||
2A174030000
|
heap
|
page read and write
|
||
2487B533000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
1B7B2000
|
heap
|
page read and write
|
||
2A171E84000
|
heap
|
page read and write
|
||
2487B54D000
|
heap
|
page read and write
|
||
1976000
|
trusted library allocation
|
page read and write
|
||
7CD000
|
stack
|
page read and write
|
||
BBECEFA000
|
stack
|
page read and write
|
||
2E20000
|
heap
|
page execute and read and write
|
||
246CA91A000
|
heap
|
page read and write
|
||
531000
|
stack
|
page read and write
|
||
2A30000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
7FF848E1C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D8C000
|
trusted library allocation
|
page execute and read and write
|
||
2A177DAB000
|
heap
|
page read and write
|
||
7FF848D54000
|
trusted library allocation
|
page read and write
|
||
AC1000
|
unkown
|
page execute read
|
||
246CB501000
|
trusted library allocation
|
page read and write
|
||
2487BCE4000
|
heap
|
page read and write
|
||
2A171E44000
|
heap
|
page read and write
|
||
1966000
|
trusted library allocation
|
page read and write
|
||
2A171E3C000
|
heap
|
page read and write
|
||
2487AD2B000
|
heap
|
page read and write
|
||
532D000
|
stack
|
page read and write
|
||
2487B52E000
|
heap
|
page read and write
|
||
2487B53B000
|
heap
|
page read and write
|
||
2487B533000
|
heap
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page execute and read and write
|
||
2487B533000
|
heap
|
page read and write
|
||
2411000
|
trusted library allocation
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
C5D000
|
trusted library allocation
|
page execute and read and write
|
||
D8D000
|
trusted library allocation
|
page execute and read and write
|
||
246CA770000
|
trusted library section
|
page read and write
|
||
2A100244000
|
trusted library allocation
|
page read and write
|
||
1390000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
2A177C98000
|
heap
|
page read and write
|
||
2487ACAB000
|
heap
|
page read and write
|
||
2487BCB2000
|
heap
|
page read and write
|
||
2A100628000
|
trusted library allocation
|
page read and write
|
||
8685FFE000
|
stack
|
page read and write
|
||
7FF848D33000
|
trusted library allocation
|
page execute and read and write
|
||
86E000
|
stack
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
2487B579000
|
heap
|
page read and write
|
||
8686E7E000
|
stack
|
page read and write
|
||
7FF848EF0000
|
trusted library allocation
|
page read and write
|
||
2D6F000
|
stack
|
page read and write
|
||
2487AC3F000
|
heap
|
page read and write
|
||
2487AD2B000
|
heap
|
page read and write
|
||
12B6000
|
heap
|
page read and write
|
||
2A45000
|
trusted library allocation
|
page execute and read and write
|
||
DC0000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
12D9E000
|
trusted library allocation
|
page read and write
|
||
246CF8F5000
|
heap
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E06000
|
trusted library allocation
|
page read and write
|
||
2A177D5B000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
1C1F0000
|
heap
|
page execute and read and write
|
||
2A173770000
|
heap
|
page read and write
|
||
2487B52E000
|
heap
|
page read and write
|
||
2A175BE0000
|
heap
|
page read and write
|
||
7FF848EF0000
|
trusted library allocation
|
page read and write
|
||
ABE000
|
stack
|
page read and write
|
||
2A1101C4000
|
trusted library allocation
|
page read and write
|
||
DC884FC000
|
stack
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
246CF915000
|
heap
|
page read and write
|
||
2487ACC3000
|
heap
|
page read and write
|
||
2487B533000
|
heap
|
page read and write
|
||
2487BD02000
|
heap
|
page read and write
|
||
2487BCB8000
|
heap
|
page read and write
|
||
1B956000
|
stack
|
page read and write
|
||
1B52000
|
trusted library allocation
|
page read and write
|
||
AD1000
|
unkown
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
7FF848D74000
|
trusted library allocation
|
page read and write
|
||
2A1720B0000
|
heap
|
page read and write
|
||
2487BCB5000
|
heap
|
page read and write
|
||
2487B52A000
|
heap
|
page read and write
|
||
246CB0E0000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
2487BD36000
|
heap
|
page read and write
|
||
E01000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
2A171E46000
|
heap
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
2487BD06000
|
heap
|
page read and write
|
||
2A177D9B000
|
heap
|
page read and write
|
||
2E30000
|
unkown
|
page readonly
|
||
246CF6F0000
|
trusted library allocation
|
page read and write
|
||
7FF848F25000
|
trusted library allocation
|
page read and write
|
||
DC879F9000
|
stack
|
page read and write
|
||
2A173850000
|
heap
|
page execute and read and write
|
||
2A175A9C000
|
heap
|
page read and write
|
||
7FF848DE6000
|
trusted library allocation
|
page read and write
|
||
C53000
|
trusted library allocation
|
page execute and read and write
|
||
246CF5F4000
|
trusted library allocation
|
page read and write
|
||
2487B55B000
|
heap
|
page read and write
|
||
246CA95A000
|
heap
|
page read and write
|
||
2487B533000
|
heap
|
page read and write
|
||
2A10051A000
|
trusted library allocation
|
page read and write
|
||
2487ACF7000
|
heap
|
page read and write
|
||
1B81E000
|
stack
|
page read and write
|
||
2A174688000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
246CF8F3000
|
heap
|
page read and write
|
||
2CA1000
|
trusted library allocation
|
page read and write
|
||
DC87AFE000
|
unkown
|
page readonly
|
||
438E000
|
stack
|
page read and write
|
||
246CF700000
|
trusted library allocation
|
page read and write
|
||
11AE000
|
stack
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
2A175BEE000
|
heap
|
page read and write
|
||
C20000
|
trusted library section
|
page read and write
|
||
149E000
|
stack
|
page read and write
|
||
13FE5B02000
|
heap
|
page read and write
|
||
4500000
|
trusted library allocation
|
page execute and read and write
|
||
2487B510000
|
heap
|
page read and write
|
||
2487BD3C000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
5370000
|
heap
|
page read and write
|
||
1B853000
|
heap
|
page read and write
|
||
2487B535000
|
heap
|
page read and write
|
||
17C0000
|
heap
|
page read and write
|
||
2487B507000
|
heap
|
page read and write
|
||
4520000
|
heap
|
page read and write
|
||
2A32000
|
trusted library allocation
|
page read and write
|
||
13FE5B13000
|
heap
|
page read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
7FF848D4A000
|
trusted library allocation
|
page read and write
|
||
BBEBFFE000
|
stack
|
page read and write
|
||
DC873FE000
|
unkown
|
page readonly
|
||
1BBA4000
|
heap
|
page read and write
|
||
1B6F0000
|
heap
|
page execute and read and write
|
||
E39000
|
heap
|
page read and write
|
||
2487B53B000
|
heap
|
page read and write
|
||
2A100268000
|
trusted library allocation
|
page read and write
|
||
2487ACBB000
|
heap
|
page read and write
|
||
5A3000
|
heap
|
page read and write
|
||
117F000
|
heap
|
page read and write
|
||
46CE000
|
stack
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
246CA0A1000
|
heap
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
246CF750000
|
remote allocation
|
page read and write
|
||
246CA09B000
|
heap
|
page read and write
|
||
DC874FE000
|
unkown
|
page readonly
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
1B7CB000
|
heap
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
2A177D92000
|
heap
|
page read and write
|
||
2487B56B000
|
heap
|
page read and write
|
||
1B0EE000
|
stack
|
page read and write
|
||
2487BD55000
|
heap
|
page read and write
|
||
2A10084A000
|
trusted library allocation
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
2A175ADC000
|
heap
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
2487B402000
|
heap
|
page read and write
|
||
2487BCE0000
|
heap
|
page read and write
|
||
8686FFC000
|
stack
|
page read and write
|
||
139B000
|
trusted library allocation
|
page read and write
|
||
7FF848D63000
|
trusted library allocation
|
page read and write
|
||
2A174645000
|
heap
|
page read and write
|
||
2F21000
|
trusted library allocation
|
page read and write
|
||
13FE5B02000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
2487B500000
|
heap
|
page read and write
|
||
12DA0000
|
trusted library allocation
|
page read and write
|
||
1241E000
|
trusted library allocation
|
page read and write
|
||
2487B540000
|
heap
|
page read and write
|
||
246CF6E0000
|
trusted library allocation
|
page read and write
|
||
246CA0AB000
|
heap
|
page read and write
|
||
1B1C3000
|
heap
|
page read and write
|
||
246CA08B000
|
heap
|
page read and write
|
||
2A171DF0000
|
trusted library allocation
|
page read and write
|
||
7FF848EEF000
|
trusted library allocation
|
page read and write
|
||
DAB000
|
trusted library allocation
|
page execute and read and write
|
||
EEB000
|
heap
|
page read and write
|
||
2487B530000
|
heap
|
page read and write
|
||
246CF750000
|
remote allocation
|
page read and write
|
||
1BE92000
|
unkown
|
page readonly
|
||
2A42000
|
trusted library allocation
|
page read and write
|
||
2A1005A4000
|
trusted library allocation
|
page read and write
|
||
3D00000
|
trusted library allocation
|
page read and write
|
||
BBEC0FA000
|
stack
|
page read and write
|
||
7FF848E46000
|
trusted library allocation
|
page execute and read and write
|
||
12B0000
|
heap
|
page read and write
|
||
2487AD02000
|
heap
|
page read and write
|
||
246CA800000
|
heap
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
2487BCC2000
|
heap
|
page read and write
|
||
2D91000
|
trusted library allocation
|
page read and write
|
||
246CF8BB000
|
heap
|
page read and write
|
||
246C9FD0000
|
heap
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
3EA0000
|
trusted library allocation
|
page read and write
|
||
DC87BFE000
|
stack
|
page read and write
|
||
2487B510000
|
heap
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
2A110001000
|
trusted library allocation
|
page read and write
|
||
5130000
|
trusted library allocation
|
page read and write
|
||
DC878FE000
|
unkown
|
page readonly
|
||
7FF848D84000
|
trusted library allocation
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
2487BD3C000
|
heap
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
2A175750000
|
heap
|
page read and write
|
||
1BA1F000
|
stack
|
page read and write
|
||
2A171EFE000
|
heap
|
page read and write
|
||
2A175A5E000
|
heap
|
page read and write
|
||
2487B52A000
|
heap
|
page read and write
|
||
2487BD02000
|
heap
|
page read and write
|
||
1B66000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
2487B50E000
|
heap
|
page read and write
|
||
DD0000
|
trusted library allocation
|
page execute and read and write
|
||
2D4F000
|
trusted library allocation
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
DA2000
|
trusted library allocation
|
page read and write
|
||
3117000
|
trusted library allocation
|
page read and write
|
||
4DAA000
|
stack
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
C10000
|
unkown
|
page readonly
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
ACB000
|
unkown
|
page readonly
|
||
2487BCC0000
|
heap
|
page read and write
|
||
3801A9D000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
7FF848FC9000
|
trusted library allocation
|
page read and write
|
||
44E0000
|
trusted library allocation
|
page read and write
|
||
50AC000
|
stack
|
page read and write
|
||
1BC4D000
|
stack
|
page read and write
|
||
1181000
|
heap
|
page read and write
|
||
5340000
|
trusted library allocation
|
page read and write
|
||
7FF848FC1000
|
trusted library allocation
|
page read and write
|
||
2487B52E000
|
heap
|
page read and write
|
||
7FF848EE3000
|
trusted library allocation
|
page read and write
|
||
1B9B0000
|
heap
|
page read and write
|
||
7FF848F64000
|
trusted library allocation
|
page read and write
|
||
2A20000
|
trusted library allocation
|
page read and write
|
||
246CAFB0000
|
trusted library section
|
page readonly
|
||
2A1003C1000
|
trusted library allocation
|
page read and write
|
||
2A175C12000
|
heap
|
page read and write
|
||
2487B510000
|
heap
|
page read and write
|
||
2487BCFD000
|
heap
|
page read and write
|
||
2A36000
|
trusted library allocation
|
page execute and read and write
|
||
177E000
|
stack
|
page read and write
|
||
246CA91A000
|
heap
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page read and write
|
||
1206000
|
heap
|
page read and write
|
||
86877F9000
|
stack
|
page read and write
|
||
2487ACF7000
|
heap
|
page read and write
|
||
1B91E000
|
stack
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
86874FE000
|
unkown
|
page readonly
|
||
2487BCFF000
|
heap
|
page read and write
|
||
DF7000
|
heap
|
page read and write
|
||
7FF848D54000
|
trusted library allocation
|
page read and write
|
||
2487B57D000
|
heap
|
page read and write
|
||
246CF700000
|
trusted library allocation
|
page read and write
|
||
2A173860000
|
trusted library allocation
|
page read and write
|
||
1AE70000
|
trusted library allocation
|
page read and write
|
||
12EBD000
|
trusted library allocation
|
page read and write
|
||
9EC000
|
stack
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
7FF8490D2000
|
trusted library allocation
|
page read and write
|
||
7FF848F05000
|
trusted library allocation
|
page read and write
|
||
246CA760000
|
trusted library allocation
|
page read and write
|
||
2A4B000
|
trusted library allocation
|
page execute and read and write
|
||
86867FB000
|
stack
|
page read and write
|
||
D78000
|
stack
|
page read and write
|
||
2487ACEF000
|
heap
|
page read and write
|
||
3F90000
|
trusted library allocation
|
page read and write
|
||
AC0000
|
unkown
|
page readonly
|
||
2A10073A000
|
trusted library allocation
|
page read and write
|
||
7FF848F13000
|
trusted library allocation
|
page read and write
|
||
197A000
|
trusted library allocation
|
page read and write
|
||
C6D000
|
unkown
|
page readonly
|
||
246CAE40000
|
trusted library allocation
|
page read and write
|
||
C12000
|
unkown
|
page readonly
|
||
2487BCDE000
|
heap
|
page read and write
|
||
118D000
|
heap
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page execute and read and write
|
||
DC880FE000
|
unkown
|
page readonly
|
||
246CAFF0000
|
trusted library section
|
page readonly
|
||
592A000
|
stack
|
page read and write
|
||
1B4C000
|
trusted library allocation
|
page read and write
|
||
7FF848E1C000
|
trusted library allocation
|
page execute and read and write
|
||
2487B581000
|
heap
|
page read and write
|
||
2A1740E5000
|
heap
|
page read and write
|
||
1786000
|
trusted library allocation
|
page read and write
|
||
1370000
|
trusted library allocation
|
page read and write
|
||
2487B530000
|
heap
|
page read and write
|
||
2487B557000
|
heap
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
2A10001A000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
868737E000
|
stack
|
page read and write
|
||
2822000
|
trusted library allocation
|
page read and write
|
||
1B710000
|
heap
|
page read and write
|
||
1B83A000
|
heap
|
page read and write
|
||
246CF5F0000
|
trusted library allocation
|
page read and write
|
||
2487B530000
|
heap
|
page read and write
|
||
5140000
|
unkown
|
page readonly
|
||
3D0A000
|
trusted library allocation
|
page read and write
|
||
3112000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page execute and read and write
|
||
E5B000
|
heap
|
page read and write
|
||
51F2000
|
unkown
|
page readonly
|
||
2A17467D000
|
heap
|
page read and write
|
||
BD6000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
2487B553000
|
heap
|
page read and write
|
||
31A3000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
2A10053D000
|
trusted library allocation
|
page read and write
|
||
2487B585000
|
heap
|
page read and write
|
||
DC877FC000
|
stack
|
page read and write
|
||
246CF5B0000
|
trusted library allocation
|
page read and write
|
||
8686A7E000
|
stack
|
page read and write
|
||
7FF848EE5000
|
trusted library allocation
|
page read and write
|
||
2A171E00000
|
heap
|
page read and write
|
||
2A175C0C000
|
heap
|
page read and write
|
||
86872FE000
|
stack
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
1290000
|
trusted library section
|
page read and write
|
||
2487BD65000
|
heap
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
7FF8491E0000
|
trusted library allocation
|
page read and write
|
||
2A10008D000
|
trusted library allocation
|
page read and write
|
||
7FF848F1E000
|
trusted library allocation
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page execute and read and write
|
||
2487B530000
|
heap
|
page read and write
|
||
246CF854000
|
heap
|
page read and write
|
||
3801EFE000
|
stack
|
page read and write
|
||
2487B3C0000
|
remote allocation
|
page read and write
|
||
2A60000
|
trusted library allocation
|
page read and write
|
||
19B9000
|
trusted library allocation
|
page read and write
|
||
2487BCCC000
|
heap
|
page read and write
|
||
26B5000
|
trusted library allocation
|
page read and write
|
||
2487BD12000
|
heap
|
page read and write
|
||
8687EFE000
|
unkown
|
page readonly
|
||
7FF848F84000
|
trusted library allocation
|
page read and write
|
||
2A1101D0000
|
trusted library allocation
|
page read and write
|
||
1399000
|
trusted library allocation
|
page read and write
|
||
424F000
|
stack
|
page read and write
|
||
DC875FA000
|
stack
|
page read and write
|
||
2487B510000
|
heap
|
page read and write
|
||
C05000
|
heap
|
page read and write
|
||
7FF848F49000
|
trusted library allocation
|
page read and write
|
||
2487B585000
|
heap
|
page read and write
|
||
2A100757000
|
trusted library allocation
|
page read and write
|
||
246CF690000
|
trusted library allocation
|
page read and write
|
||
119B000
|
heap
|
page read and write
|
||
2487B532000
|
heap
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
12B5000
|
heap
|
page read and write
|
||
2487AC22000
|
heap
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
2487BD1B000
|
heap
|
page read and write
|
||
2487BCB8000
|
heap
|
page read and write
|
||
396E000
|
stack
|
page read and write
|
||
2A171DD0000
|
trusted library allocation
|
page read and write
|
||
2A1736F0000
|
trusted library allocation
|
page read and write
|
||
13A6000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page execute and read and write
|
||
2A175A30000
|
heap
|
page read and write
|
||
7FF848FD5000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
246CF8F6000
|
heap
|
page read and write
|
||
7FF848F11000
|
trusted library allocation
|
page read and write
|
||
5154000
|
unkown
|
page readonly
|
||
2A174660000
|
heap
|
page read and write
|
||
14D0000
|
trusted library allocation
|
page read and write
|
||
7FF848D8D000
|
trusted library allocation
|
page execute and read and write
|
||
246CF911000
|
heap
|
page read and write
|
||
468D000
|
stack
|
page read and write
|
||
2A175A82000
|
heap
|
page read and write
|
||
7FF4A7670000
|
trusted library allocation
|
page execute and read and write
|
||
2A1D000
|
trusted library allocation
|
page execute and read and write
|
||
2487B529000
|
heap
|
page read and write
|
||
13FE582B000
|
heap
|
page read and write
|
||
DC872F9000
|
stack
|
page read and write
|
||
13FE5640000
|
heap
|
page read and write
|
||
1ADEF000
|
stack
|
page read and write
|
||
2487BCE4000
|
heap
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
2487B533000
|
heap
|
page read and write
|
||
2487BC00000
|
heap
|
page read and write
|
||
4FAC000
|
stack
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
8B5000
|
heap
|
page read and write
|
||
DC8747E000
|
stack
|
page read and write
|
||
2A171ED1000
|
heap
|
page read and write
|
||
1B81B000
|
heap
|
page read and write
|
||
AC1000
|
unkown
|
page execute read
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
246CF861000
|
heap
|
page read and write
|
||
DA5000
|
trusted library allocation
|
page execute and read and write
|
||
246CF8C1000
|
heap
|
page read and write
|
||
2487BD1B000
|
heap
|
page read and write
|
||
246CF902000
|
heap
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page execute and read and write
|
||
1C12E000
|
stack
|
page read and write
|
||
2A1102C6000
|
trusted library allocation
|
page read and write
|
||
2FEF000
|
stack
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
86869FE000
|
unkown
|
page readonly
|
||
8685A7B000
|
stack
|
page read and write
|
||
7FF848FE9000
|
trusted library allocation
|
page read and write
|
||
246CF800000
|
heap
|
page read and write
|
||
13FE5A02000
|
heap
|
page read and write
|
||
246CA0BA000
|
heap
|
page read and write
|
||
86878FE000
|
unkown
|
page readonly
|
||
12A0000
|
trusted library allocation
|
page read and write
|
||
2487B52F000
|
heap
|
page read and write
|
||
ACB000
|
unkown
|
page readonly
|
||
1566000
|
heap
|
page read and write
|
||
1BB6D000
|
heap
|
page read and write
|
||
2487B579000
|
heap
|
page read and write
|
||
2A177D62000
|
heap
|
page read and write
|
||
246CAFA0000
|
trusted library section
|
page readonly
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
246CAFD0000
|
trusted library section
|
page readonly
|
||
2487AD3A000
|
heap
|
page read and write
|
||
2400000
|
heap
|
page execute and read and write
|
||
4DDE000
|
stack
|
page read and write
|
||
7FF848F86000
|
trusted library allocation
|
page read and write
|
||
2A174650000
|
heap
|
page read and write
|
||
B05000
|
heap
|
page read and write
|
||
12D9C000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
1241C000
|
trusted library allocation
|
page read and write
|
||
5330000
|
trusted library allocation
|
page read and write
|
||
2487AC9E000
|
heap
|
page read and write
|
||
BBECAFD000
|
stack
|
page read and write
|
||
7FF848D62000
|
trusted library allocation
|
page read and write
|
||
2A171C50000
|
heap
|
page read and write
|
||
2A100085000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
2487B529000
|
heap
|
page read and write
|
||
17D1000
|
trusted library allocation
|
page read and write
|
||
2487AC13000
|
heap
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
2487B533000
|
heap
|
page read and write
|
||
7FF848D5B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E36000
|
trusted library allocation
|
page execute and read and write
|
||
2A175B7C000
|
heap
|
page read and write
|
||
2487BCC6000
|
heap
|
page read and write
|
||
7FF848D43000
|
trusted library allocation
|
page read and write
|
||
2487B52E000
|
heap
|
page read and write
|
||
51EB000
|
stack
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
12EB1000
|
trusted library allocation
|
page read and write
|
||
F17000
|
heap
|
page read and write
|
||
C60000
|
unkown
|
page readonly
|
||
7FF848ED8000
|
trusted library allocation
|
page read and write
|
||
246CA900000
|
heap
|
page read and write
|
||
13FE5813000
|
unkown
|
page read and write
|
||
2487AC29000
|
heap
|
page read and write
|
||
24CF000
|
trusted library allocation
|
page read and write
|
||
7FF848E46000
|
trusted library allocation
|
page execute and read and write
|
||
2A174126000
|
heap
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
246CF8E1000
|
heap
|
page read and write
|
||
7FF848FCE000
|
trusted library allocation
|
page read and write
|
||
1B7ED000
|
heap
|
page read and write
|
||
14BF000
|
stack
|
page read and write
|
||
7FF849113000
|
trusted library allocation
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
56AB000
|
stack
|
page read and write
|
||
2487BC3C000
|
heap
|
page read and write
|
||
522E000
|
stack
|
page read and write
|
||
2487B532000
|
heap
|
page read and write
|
||
2A13000
|
trusted library allocation
|
page execute and read and write
|
||
B4E000
|
stack
|
page read and write
|
||
2A10007C000
|
trusted library allocation
|
page read and write
|
||
2487B50E000
|
heap
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
178C000
|
trusted library allocation
|
page read and write
|
||
1B98F000
|
stack
|
page read and write
|
||
246CF821000
|
heap
|
page read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
5E2000
|
heap
|
page read and write
|
||
8685EFE000
|
unkown
|
page readonly
|
||
5170000
|
trusted library allocation
|
page read and write
|
||
7FF8490D4000
|
trusted library allocation
|
page read and write
|
||
2A100240000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
7FF848F56000
|
trusted library allocation
|
page read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
2A1720B5000
|
heap
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
7FF848F4C000
|
trusted library allocation
|
page read and write
|
||
2487B510000
|
heap
|
page read and write
|
||
2487BCB6000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
3F00000
|
unkown
|
page readonly
|
||
7FF848FE1000
|
trusted library allocation
|
page read and write
|
||
2487AD2C000
|
heap
|
page read and write
|
||
2487ACAF000
|
heap
|
page read and write
|
||
1159000
|
heap
|
page read and write
|
||
7FF848F57000
|
trusted library allocation
|
page read and write
|
||
460D000
|
stack
|
page read and write
|
||
44D0000
|
trusted library allocation
|
page read and write
|
||
7FF848F17000
|
trusted library allocation
|
page read and write
|
||
1B853000
|
heap
|
page execute and read and write
|
||
5BB0000
|
heap
|
page read and write
|
||
7FF848D53000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849130000
|
trusted library allocation
|
page execute and read and write
|
||
2487BCB1000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
246CAB91000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
3D40000
|
trusted library allocation
|
page read and write
|
||
2A3A000
|
trusted library allocation
|
page execute and read and write
|
||
119F000
|
heap
|
page read and write
|
||
2487BCBB000
|
heap
|
page read and write
|
||
246CA041000
|
heap
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
23AE000
|
stack
|
page read and write
|
||
D96000
|
trusted library allocation
|
page execute and read and write
|
||
12D91000
|
trusted library allocation
|
page read and write
|
||
5360000
|
trusted library allocation
|
page execute and read and write
|
||
C61000
|
unkown
|
page execute read
|
||
DA0000
|
trusted library allocation
|
page read and write
|
||
2487BCE7000
|
heap
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
1B1B3000
|
heap
|
page read and write
|
||
86862FE000
|
unkown
|
page readonly
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
1BB40000
|
heap
|
page read and write
|
||
8686BFE000
|
unkown
|
page readonly
|
||
1AEE0000
|
heap
|
page read and write
|
||
2A1101D3000
|
trusted library allocation
|
page read and write
|
||
7FF848F45000
|
trusted library allocation
|
page read and write
|
||
13FE5B00000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
2487B583000
|
heap
|
page read and write
|
||
7FF848E0C000
|
trusted library allocation
|
page execute and read and write
|
||
2487AD13000
|
heap
|
page read and write
|
||
7FF848D8B000
|
trusted library allocation
|
page execute and read and write
|
||
DC882FC000
|
stack
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
1B680000
|
unkown
|
page readonly
|
||
17B5000
|
trusted library allocation
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
2487AD19000
|
heap
|
page read and write
|
||
1B43D000
|
stack
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
DC885FE000
|
unkown
|
page readonly
|
||
46E0000
|
trusted library allocation
|
page read and write
|
||
1B7C4000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
DE4000
|
stack
|
page read and write
|
||
246CF590000
|
trusted library allocation
|
page read and write
|
||
2EB1000
|
trusted library allocation
|
page read and write
|
||
19DF000
|
trusted library allocation
|
page read and write
|
||
7FF848F87000
|
trusted library allocation
|
page read and write
|
||
246CF817000
|
heap
|
page read and write
|
||
1B768000
|
stack
|
page read and write
|
||
2487BC7D000
|
heap
|
page read and write
|
||
2A173840000
|
trusted library section
|
page readonly
|
||
1B31D000
|
stack
|
page read and write
|
||
2487B52F000
|
heap
|
page read and write
|
||
13FE5B00000
|
heap
|
page read and write
|
||
2A175784000
|
heap
|
page read and write
|
||
2A175B1D000
|
heap
|
page read and write
|
||
246CA02B000
|
heap
|
page read and write
|
||
246CA079000
|
heap
|
page read and write
|
||
2487B552000
|
heap
|
page read and write
|
||
2A175AEF000
|
heap
|
page read and write
|
||
2487B572000
|
heap
|
page read and write
|
||
246CA113000
|
heap
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
2A1101A0000
|
trusted library allocation
|
page read and write
|
||
2487AC00000
|
heap
|
page read and write
|
||
2487ACC6000
|
heap
|
page read and write
|
||
2487BCB9000
|
heap
|
page read and write
|
||
11B7000
|
heap
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
7FF8490B4000
|
trusted library allocation
|
page read and write
|
||
117D000
|
heap
|
page read and write
|
||
A20000
|
trusted library allocation
|
page read and write
|
||
13FE5924000
|
heap
|
page read and write
|
||
2A173890000
|
trusted library allocation
|
page read and write
|
||
246CF82E000
|
heap
|
page read and write
|
||
2487B532000
|
heap
|
page read and write
|
||
13FE5B13000
|
heap
|
page read and write
|
||
2A17405B000
|
heap
|
page read and write
|
||
BBEB903000
|
stack
|
page read and write
|
||
13FE5802000
|
unkown
|
page read and write
|
||
246CF710000
|
trusted library allocation
|
page read and write
|
||
7FF8490B6000
|
trusted library allocation
|
page read and write
|
||
2A171E40000
|
heap
|
page read and write
|
||
2A100569000
|
trusted library allocation
|
page read and write
|
||
2487B529000
|
heap
|
page read and write
|
||
D92000
|
trusted library allocation
|
page read and write
|
||
13FE5837000
|
heap
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
1B880000
|
heap
|
page read and write
|
||
7FF848FF5000
|
trusted library allocation
|
page read and write
|
||
2487BCA3000
|
heap
|
page read and write
|
||
1380000
|
trusted library allocation
|
page read and write
|
||
2487B563000
|
heap
|
page read and write
|
||
2487B579000
|
heap
|
page read and write
|
||
1C5ED000
|
stack
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
12BE000
|
heap
|
page read and write
|
||
2487B585000
|
heap
|
page read and write
|
||
5470000
|
heap
|
page read and write
|
||
2487B555000
|
heap
|
page read and write
|
||
2A1746AA000
|
heap
|
page read and write
|
||
246CA913000
|
heap
|
page read and write
|
||
3D37000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
2E32000
|
unkown
|
page readonly
|
||
2537000
|
trusted library allocation
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
246CF5E0000
|
trusted library allocation
|
page read and write
|
||
2A171E26000
|
heap
|
page read and write
|
||
2A175E52000
|
trusted library allocation
|
page read and write
|
||
246CA090000
|
heap
|
page read and write
|
||
2A174130000
|
heap
|
page execute and read and write
|
||
11DB000
|
heap
|
page read and write
|
||
1C1F3000
|
heap
|
page execute and read and write
|
||
2487BCBB000
|
heap
|
page read and write
|
||
2A1740BA000
|
heap
|
page read and write
|
||
A23000
|
trusted library allocation
|
page read and write
|
||
2487B532000
|
heap
|
page read and write
|
||
1B7FA000
|
heap
|
page read and write
|
||
2A80000
|
trusted library allocation
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page execute and read and write
|
||
2A10024C000
|
trusted library allocation
|
page read and write
|
||
2487BCCD000
|
heap
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
13FE5900000
|
trusted library allocation
|
page read and write
|
||
4CDE000
|
stack
|
page read and write
|
||
2487B530000
|
heap
|
page read and write
|
||
2487BCB5000
|
heap
|
page read and write
|
||
AD3000
|
unkown
|
page readonly
|
||
2A1737F0000
|
heap
|
page read and write
|
||
246CA05B000
|
heap
|
page read and write
|
||
2A70000
|
trusted library allocation
|
page execute and read and write
|
||
3241000
|
trusted library allocation
|
page read and write
|
||
7FF848D8B000
|
trusted library allocation
|
page execute and read and write
|
||
2487B529000
|
heap
|
page read and write
|
||
2487B532000
|
heap
|
page read and write
|
||
27D1000
|
trusted library allocation
|
page read and write
|
||
3F80000
|
trusted library allocation
|
page read and write
|
||
1B1EB000
|
heap
|
page read and write
|
||
7FF848D63000
|
trusted library allocation
|
page execute and read and write
|
||
2487AC81000
|
heap
|
page read and write
|
||
246CF5B1000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
51A0000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
2487B533000
|
heap
|
page read and write
|
||
246CB520000
|
trusted library allocation
|
page read and write
|
||
246CF5D0000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
1BB9E000
|
heap
|
page read and write
|
||
2A171E86000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
2487BCB4000
|
heap
|
page read and write
|
||
2487B530000
|
heap
|
page read and write
|
||
2A1740B4000
|
heap
|
page read and write
|
||
BBECBFD000
|
stack
|
page read and write
|
||
DCE000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
2A171E5C000
|
heap
|
page read and write
|
||
2791000
|
trusted library allocation
|
page read and write
|
||
7FF848FC3000
|
trusted library allocation
|
page read and write
|
||
2A171E20000
|
heap
|
page read and write
|
||
27E1000
|
trusted library allocation
|
page read and write
|
||
246CA802000
|
heap
|
page read and write
|
||
2A174640000
|
heap
|
page read and write
|
||
BBEB94E000
|
stack
|
page read and write
|
||
86875FB000
|
stack
|
page read and write
|
||
3CF0000
|
trusted library allocation
|
page read and write
|
||
1AFEF000
|
stack
|
page read and write
|
||
13FE5800000
|
unkown
|
page read and write
|
||
246CA0FF000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
7FF848F05000
|
trusted library allocation
|
page read and write
|
||
2A175AE2000
|
heap
|
page read and write
|
||
12C5000
|
heap
|
page read and write
|
||
9F0000
|
trusted library allocation
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
246CF811000
|
heap
|
page read and write
|
||
246C9FF0000
|
heap
|
page read and write
|
||
17A1000
|
trusted library allocation
|
page read and write
|
||
7FF848F09000
|
trusted library allocation
|
page read and write
|
||
2487AC71000
|
heap
|
page read and write
|
||
C76000
|
unkown
|
page readonly
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
1B1E4000
|
heap
|
page read and write
|
||
86865FE000
|
stack
|
page read and write
|
||
1185000
|
heap
|
page read and write
|
||
6CD000
|
stack
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
13FE5876000
|
heap
|
page read and write
|
||
2A110191000
|
trusted library allocation
|
page read and write
|
||
2A171D50000
|
heap
|
page read and write
|
||
2487B400000
|
heap
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
246CF520000
|
trusted library allocation
|
page read and write
|
||
1BBBE000
|
stack
|
page read and write
|
||
2A1737A0000
|
heap
|
page execute and read and write
|
||
1B1CC000
|
heap
|
page read and write
|
||
BBECCFD000
|
stack
|
page read and write
|
||
2487AD3A000
|
heap
|
page read and write
|
||
1D687000
|
heap
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
7FF848DBC000
|
trusted library allocation
|
page execute and read and write
|
||
246CA815000
|
heap
|
page read and write
|
||
2487BD2B000
|
heap
|
page read and write
|
||
246CA074000
|
heap
|
page read and write
|
||
246CA043000
|
heap
|
page read and write
|
||
868747E000
|
unkown
|
page readonly
|
||
2A174160000
|
heap
|
page read and write
|
||
7FF848F77000
|
trusted library allocation
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
2487BC92000
|
heap
|
page read and write
|
||
2A100089000
|
trusted library allocation
|
page read and write
|
||
2487B50E000
|
heap
|
page read and write
|
||
246CF884000
|
heap
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
27D7000
|
trusted library allocation
|
page read and write
|
||
2A17468C000
|
heap
|
page read and write
|
||
3D20000
|
trusted library allocation
|
page read and write
|
||
2487B533000
|
heap
|
page read and write
|
||
2487AC74000
|
heap
|
page read and write
|
||
26A6000
|
trusted library allocation
|
page read and write
|
||
86861FC000
|
stack
|
page read and write
|
||
2A1740A9000
|
heap
|
page read and write
|
||
15CF000
|
stack
|
page read and write
|
||
7FF848F5E000
|
trusted library allocation
|
page read and write
|
||
2487AD02000
|
heap
|
page read and write
|
||
2487BC6D000
|
heap
|
page read and write
|
||
2487AD2C000
|
heap
|
page read and write
|
||
7FF848D34000
|
trusted library allocation
|
page read and write
|
||
2A1001FA000
|
trusted library allocation
|
page read and write
|
||
2A110228000
|
trusted library allocation
|
page read and write
|
||
13FE5902000
|
trusted library allocation
|
page read and write
|
||
3CB0000
|
trusted library allocation
|
page read and write
|
||
13FE5620000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
2A175B6F000
|
heap
|
page read and write
|
||
1B180000
|
heap
|
page read and write
|
||
C1C000
|
stack
|
page read and write
|
||
7FF848DBC000
|
trusted library allocation
|
page execute and read and write
|
||
1BD00000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
2487B52E000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
2A177D59000
|
heap
|
page read and write
|
||
2A10067D000
|
trusted library allocation
|
page read and write
|
||
2487B552000
|
heap
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
246CF620000
|
trusted library allocation
|
page read and write
|
||
12EBF000
|
trusted library allocation
|
page read and write
|
||
DC87EFE000
|
unkown
|
page readonly
|
||
2A175A71000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F3D000
|
trusted library allocation
|
page read and write
|
||
2487BCBB000
|
heap
|
page read and write
|
||
251F000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
2487ACF8000
|
heap
|
page read and write
|
||
2487B529000
|
heap
|
page read and write
|
||
2487ACB5000
|
heap
|
page read and write
|
||
2A110094000
|
trusted library allocation
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page execute and read and write
|
||
8686D7E000
|
stack
|
page read and write
|
||
2A174053000
|
heap
|
page read and write
|
||
2487B50E000
|
heap
|
page read and write
|
||
2A175777000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
BBEC9FC000
|
stack
|
page read and write
|
||
2487B572000
|
heap
|
page read and write
|
||
2487BD12000
|
heap
|
page read and write
|
||
2487BCCE000
|
heap
|
page read and write
|
||
2487ABB0000
|
heap
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
13FE5720000
|
trusted library allocation
|
page read and write
|
||
246CF5B0000
|
trusted library allocation
|
page read and write
|
||
246CA076000
|
heap
|
page read and write
|
||
2487B585000
|
heap
|
page read and write
|
||
4490000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
2A171D30000
|
heap
|
page read and write
|
||
2A175C18000
|
heap
|
page read and write
|
||
2487BCB8000
|
heap
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
868697E000
|
stack
|
page read and write
|
||
2487B529000
|
heap
|
page read and write
|
||
26AD000
|
trusted library allocation
|
page read and write
|
||
246CF8B0000
|
heap
|
page read and write
|
||
D51000
|
stack
|
page read and write
|
||
1B780000
|
heap
|
page read and write
|
||
1B40000
|
trusted library allocation
|
page read and write
|
||
6BB000
|
stack
|
page read and write
|
||
C6D000
|
unkown
|
page readonly
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
D0E000
|
stack
|
page read and write
|
||
2A10023D000
|
trusted library allocation
|
page read and write
|
||
AD1000
|
unkown
|
page write copy
|
||
2487ABF0000
|
trusted library allocation
|
page read and write
|
||
3E9E000
|
stack
|
page read and write
|
||
BBEC7FE000
|
stack
|
page read and write
|
||
DC86D0B000
|
stack
|
page read and write
|
||
1BB80000
|
heap
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
stack
|
page read and write
|
||
2487B50E000
|
heap
|
page read and write
|
||
2487AD2C000
|
heap
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
DC87CFE000
|
unkown
|
page readonly
|
||
BBEC3F8000
|
stack
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
2A24000
|
trusted library allocation
|
page read and write
|
||
246CA013000
|
heap
|
page read and write
|
||
1189000
|
heap
|
page read and write
|
||
246CF680000
|
trusted library allocation
|
page read and write
|
||
1128000
|
stack
|
page read and write
|
||
586000
|
heap
|
page read and write
|
||
2487BD17000
|
heap
|
page read and write
|
||
DBB000
|
heap
|
page read and write
|
||
2487B529000
|
heap
|
page read and write
|
||
2A100255000
|
trusted library allocation
|
page read and write
|
||
2487B55B000
|
heap
|
page read and write
|
||
868717E000
|
stack
|
page read and write
|
||
DBE000
|
heap
|
page read and write
|
||
C74000
|
unkown
|
page read and write
|
||
7FF848F01000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
23E0000
|
heap
|
page execute and read and write
|
||
246CF902000
|
heap
|
page read and write
|
||
1A9AD000
|
stack
|
page read and write
|
||
2A175A8E000
|
heap
|
page read and write
|
||
2487BCFC000
|
heap
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
246CF8E4000
|
heap
|
page read and write
|
||
7FF848EE7000
|
trusted library allocation
|
page read and write
|
||
2487B55F000
|
heap
|
page read and write
|
||
2487BD02000
|
heap
|
page read and write
|
||
246CF90B000
|
heap
|
page read and write
|
||
BBEC4F4000
|
stack
|
page read and write
|
||
2487B537000
|
heap
|
page read and write
|
||
5142000
|
unkown
|
page readonly
|
||
7FF848D5D000
|
trusted library allocation
|
page execute and read and write
|
||
7BC000
|
stack
|
page read and write
|
||
2A100001000
|
trusted library allocation
|
page read and write
|
||
5350000
|
trusted library allocation
|
page execute and read and write
|
||
2487ACDA000
|
heap
|
page read and write
|
||
179E000
|
trusted library allocation
|
page read and write
|
||
2487B533000
|
heap
|
page read and write
|
||
11FF000
|
stack
|
page read and write
|
||
7FF848F66000
|
trusted library allocation
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page read and write
|
||
1B7DA000
|
heap
|
page read and write
|
||
12411000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page execute and read and write
|
||
2A175A6B000
|
heap
|
page read and write
|
||
26BE000
|
trusted library allocation
|
page read and write
|
||
59B000
|
heap
|
page read and write
|
||
2487AD2C000
|
heap
|
page read and write
|
||
2A14000
|
trusted library allocation
|
page read and write
|
||
DC87FFB000
|
stack
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
448F000
|
stack
|
page read and write
|
||
2487BD06000
|
heap
|
page read and write
|
||
2487AB90000
|
heap
|
page read and write
|
||
246CA102000
|
heap
|
page read and write
|
||
BBEC5FE000
|
stack
|
page read and write
|
||
246CF8FA000
|
heap
|
page read and write
|
||
2487B553000
|
heap
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
1BE90000
|
unkown
|
page readonly
|
||
7FF848F7E000
|
trusted library allocation
|
page read and write
|
||
E6F000
|
heap
|
page read and write
|
||
2487B533000
|
heap
|
page read and write
|
||
2487B535000
|
heap
|
page read and write
|
||
2A174674000
|
heap
|
page read and write
|
||
7FF848D3D000
|
trusted library allocation
|
page execute and read and write
|
||
3FA0000
|
unkown
|
page readonly
|
||
2487AD1B000
|
heap
|
page read and write
|
||
2487BC7E000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
2487BCD3000
|
heap
|
page read and write
|
||
1BAA0000
|
trusted library allocation
|
page read and write
|
||
246D0000000
|
heap
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
2487B513000
|
heap
|
page read and write
|
||
44F0000
|
trusted library allocation
|
page read and write
|
||
7FF8490CA000
|
trusted library allocation
|
page read and write
|
||
3CC0000
|
trusted library allocation
|
page read and write
|
||
2487BD25000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
8685DF7000
|
stack
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
2487BCF5000
|
heap
|
page read and write
|
||
2487B556000
|
heap
|
page read and write
|
||
246CF8FA000
|
heap
|
page read and write
|
||
7FF848EF8000
|
trusted library allocation
|
page read and write
|
||
246CA129000
|
heap
|
page read and write
|
||
28A1000
|
trusted library allocation
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
C36000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
1BABF000
|
stack
|
page read and write
|
||
D87000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
2A173BE9000
|
heap
|
page read and write
|
||
5BB000
|
heap
|
page read and write
|
||
2A1101DC000
|
trusted library allocation
|
page read and write
|
||
2487B569000
|
heap
|
page read and write
|
||
1B850000
|
heap
|
page execute and read and write
|
||
2A173743000
|
heap
|
page read and write
|
||
2487B535000
|
heap
|
page read and write
|
||
2487B415000
|
heap
|
page read and write
|
||
86870FE000
|
unkown
|
page readonly
|
||
10FE000
|
stack
|
page read and write
|
||
1B831000
|
heap
|
page read and write
|
||
116E000
|
stack
|
page read and write
|
||
86863FB000
|
stack
|
page read and write
|
||
26BC000
|
trusted library allocation
|
page read and write
|
||
1171000
|
heap
|
page read and write
|
||
2487B552000
|
heap
|
page read and write
|
||
2487BC8D000
|
heap
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
11B3000
|
heap
|
page read and write
|
||
2487BCC2000
|
heap
|
page read and write
|
||
2A2D000
|
trusted library allocation
|
page execute and read and write
|
||
E63000
|
heap
|
page read and write
|
||
C74000
|
unkown
|
page write copy
|
||
12B0000
|
heap
|
page read and write
|
||
2487BC09000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page execute and read and write
|
||
2487B55B000
|
heap
|
page read and write
|
||
A10000
|
trusted library allocation
|
page read and write
|
||
86866FE000
|
unkown
|
page readonly
|
||
2A1002EB000
|
trusted library allocation
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
2487B52F000
|
heap
|
page read and write
|
||
DEA000
|
heap
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
7FF8490B2000
|
trusted library allocation
|
page read and write
|
||
246CF8BD000
|
heap
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
2487BCBE000
|
heap
|
page read and write
|
||
2487BA80000
|
remote allocation
|
page read and write
|
||
1B849000
|
heap
|
page read and write
|
||
1229000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
2487B3C0000
|
remote allocation
|
page read and write
|
||
2A100694000
|
trusted library allocation
|
page read and write
|
||
2A100250000
|
trusted library allocation
|
page read and write
|
||
1BE10000
|
heap
|
page execute and read and write
|
||
A30000
|
heap
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
2487B55B000
|
heap
|
page read and write
|
||
2487BD12000
|
heap
|
page read and write
|
||
7FF848F0C000
|
trusted library allocation
|
page read and write
|
||
2487BD04000
|
heap
|
page read and write
|
||
13FF000
|
stack
|
page read and write
|
||
2A1100F2000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
DA7000
|
trusted library allocation
|
page execute and read and write
|
||
323B000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page execute and read and write
|
||
BBECDFE000
|
stack
|
page read and write
|
||
C40000
|
trusted library allocation
|
page read and write
|
||
DC883FE000
|
unkown
|
page readonly
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
BBEB98E000
|
stack
|
page read and write
|
||
2487BAA0000
|
remote allocation
|
page read and write
|
||
246CF84F000
|
heap
|
page read and write
|
||
10BE000
|
stack
|
page read and write
|
||
1BA56000
|
stack
|
page read and write
|
||
2487BCD3000
|
heap
|
page read and write
|
||
8686B7E000
|
stack
|
page read and write
|
||
246CAFE0000
|
trusted library section
|
page readonly
|
||
DC876FE000
|
unkown
|
page readonly
|
||
7FF848DEC000
|
trusted library allocation
|
page execute and read and write
|
||
86876FE000
|
unkown
|
page readonly
|
||
2EAE000
|
stack
|
page read and write
|
||
246CF750000
|
remote allocation
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
2A177C90000
|
heap
|
page read and write
|
||
2487BD02000
|
heap
|
page read and write
|
||
2487B55B000
|
heap
|
page read and write
|
||
7FF848F37000
|
trusted library allocation
|
page read and write
|
||
7FF848DAC000
|
trusted library allocation
|
page execute and read and write
|
||
2487B3C0000
|
remote allocation
|
page read and write
|
||
2487B559000
|
heap
|
page read and write
|
||
2487AC82000
|
heap
|
page read and write
|
||
2487BCFA000
|
heap
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
2487B50E000
|
heap
|
page read and write
|
||
2A173750000
|
heap
|
page read and write
|
||
2C90000
|
heap
|
page execute and read and write
|
||
7FF8490EA000
|
trusted library allocation
|
page read and write
|
||
BEE000
|
stack
|
page read and write
|
||
2487BCFF000
|
heap
|
page read and write
|
||
D80000
|
trusted library allocation
|
page read and write
|
||
246CA06F000
|
heap
|
page read and write
|
||
2487BC0A000
|
heap
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
8687E7E000
|
stack
|
page read and write
|
||
7FF848F7B000
|
trusted library allocation
|
page read and write
|
||
8686DFE000
|
unkown
|
page readonly
|
||
1150000
|
heap
|
page read and write
|
||
2A1005F8000
|
trusted library allocation
|
page read and write
|
||
55AE000
|
stack
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
2487BC9C000
|
heap
|
page read and write
|
||
2487BD0A000
|
heap
|
page read and write
|
||
44C0000
|
trusted library allocation
|
page read and write
|
||
2A173740000
|
heap
|
page read and write
|
||
1195000
|
heap
|
page read and write
|
||
246CF530000
|
trusted library allocation
|
page read and write
|
||
246CF5A0000
|
trusted library allocation
|
page read and write
|
||
2487AD2B000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
3F7E000
|
stack
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
246CF680000
|
trusted library allocation
|
page read and write
|
||
2A175A6E000
|
heap
|
page read and write
|
||
86864FE000
|
unkown
|
page readonly
|
||
2487B583000
|
heap
|
page read and write
|
||
2487B55A000
|
heap
|
page read and write
|
||
5300000
|
heap
|
page execute and read and write
|
||
7FF848F07000
|
trusted library allocation
|
page read and write
|
||
464D000
|
stack
|
page read and write
|
||
2487AC2B000
|
heap
|
page read and write
|
||
2A171D70000
|
heap
|
page read and write
|
||
2487B556000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
E1B000
|
heap
|
page read and write
|
||
246CF8EF000
|
heap
|
page read and write
|
||
2487BD2C000
|
heap
|
page read and write
|
||
2A171DB0000
|
heap
|
page read and write
|
||
C50000
|
trusted library allocation
|
page read and write
|
||
2487B55A000
|
heap
|
page read and write
|
||
2A1005CE000
|
trusted library allocation
|
page read and write
|
||
7FF848D73000
|
trusted library allocation
|
page read and write
|
||
2A175B12000
|
heap
|
page read and write
|
||
2A175AC0000
|
heap
|
page read and write
|
||
2A40000
|
trusted library allocation
|
page read and write
|
||
2E0E000
|
stack
|
page read and write
|
||
EC7000
|
heap
|
page read and write
|
||
3D50000
|
heap
|
page execute and read and write
|
||
1BB93000
|
heap
|
page read and write
|
||
2A100248000
|
trusted library allocation
|
page read and write
|
||
2487ABC0000
|
heap
|
page read and write
|
||
2487B52C000
|
heap
|
page read and write
|
||
246CAFC0000
|
trusted library section
|
page readonly
|
||
246CF8D2000
|
heap
|
page read and write
|
||
2487BD34000
|
heap
|
page read and write
|
||
2851000
|
trusted library allocation
|
page read and write
|
||
1193000
|
heap
|
page read and write
|
||
2A174133000
|
heap
|
page execute and read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
115B000
|
heap
|
page read and write
|
||
2487ACE5000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
246CF5E0000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
143E000
|
stack
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
2487B55B000
|
heap
|
page read and write
|
||
2487B52C000
|
heap
|
page read and write
|
||
1BDDE000
|
stack
|
page read and write
|
||
C54000
|
trusted library allocation
|
page read and write
|
||
2487B55A000
|
heap
|
page read and write
|
||
3D10000
|
trusted library allocation
|
page execute and read and write
|
||
13BF000
|
stack
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
C74000
|
unkown
|
page read and write
|
||
12420000
|
trusted library allocation
|
page read and write
|
||
13FE5A13000
|
heap
|
page read and write
|
||
2A175B31000
|
heap
|
page read and write
|
||
434E000
|
stack
|
page read and write
|
||
2A10007A000
|
trusted library allocation
|
page read and write
|
||
7FF848FA3000
|
trusted library allocation
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
7FF848D72000
|
trusted library allocation
|
page read and write
|
||
86868FE000
|
unkown
|
page readonly
|
||
13FE5915000
|
trusted library allocation
|
page read and write
|
||
5A1000
|
heap
|
page read and write
|
||
2487B532000
|
heap
|
page read and write
|
||
2A177D1F000
|
heap
|
page read and write
|
||
C10000
|
unkown
|
page readonly
|
||
1185000
|
heap
|
page read and write
|
||
2A47000
|
trusted library allocation
|
page execute and read and write
|
||
2A175C20000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
BBEC8FE000
|
stack
|
page read and write
|
||
1243000
|
heap
|
page read and write
|
||
2487B510000
|
heap
|
page read and write
|
||
7FF848D7B000
|
trusted library allocation
|
page execute and read and write
|
||
1C670000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
1B7A2000
|
heap
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
1157000
|
heap
|
page read and write
|
||
2487BC5B000
|
heap
|
page read and write
|
||
2487AD2B000
|
heap
|
page read and write
|
||
4510000
|
trusted library allocation
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
246CF842000
|
heap
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page execute and read and write
|
||
1199000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
There are 1231 hidden memdumps, click here to show them.