IOC Report
XDA_CDS v6.8.54_SE.exe

loading gif

Files

File Path
Type
Category
Malicious
XDA_CDS v6.8.54_SE.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\DbCreate.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\DbCreate.exe.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\DSC\XDA_CDS v6.8.54.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Config.Msi\6834c4.rbs
data
dropped
C:\Program Files (x86)\CDS\XDA_CDS\Images\logo.png
PNG image data, 300 x 48, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\Interop.IWshRuntimeLibrary.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\ServiceRecoveryCommand.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\ShortcutXDA.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\ApplyBranding-XDAPE.sql
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\BrandingTask.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\Microsoft.VC90.CRT.64\Microsoft.VC90.CRT.manifest
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (1506), with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\Microsoft.VC90.CRT.64\msvcr90.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\Microsoft.VC90.CRT\Microsoft.VC90.CRT.manifest
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (1506), with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\Microsoft.VC90.CRT\msvcr90.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\SetDatabaseOptions.sql
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\System.Data.SqlServerCe.64.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\System.Data.SqlServerCe.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\Xerox.Security.Cryptography.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\XrxXDADBDelta.sql
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\createProcedures.sql
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\createTables.sql
Unicode text, UTF-16, little-endian text, with CRLF, CR line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\dropProcedures.sql
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\insertDefaults.sql
Unicode text, UTF-16, little-endian text, with very long lines (390), with CRLF, CR line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\langins.sql
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\sqlceca40.64.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\sqlceca40.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\sqlcecompact40.64.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\sqlcecompact40.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\sqlceer40EN.64.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\sqlceer40EN.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\sqlceme40.64.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\sqlceme40.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\sqlceqp40.64.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\sqlceqp40.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\sqlcese40.64.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\sqlcese40.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\ReadMe.txt
Unicode text, UTF-16, little-endian text, with very long lines (803), with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\basedata\DSCDiscovery.sdf
data
dropped
C:\Program Files (x86)\CDS\XDA_CDS\basedata\DSCMain.sdf
data
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\0ijfyv1d.newcfg
XML 1.0 document, ASCII text, with very long lines (566), with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\AgentUtilities.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\AxInterop.SHDocVw.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\BouncyCastle.Crypto.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\CWWLibDb.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\ChilkatDotNet4.64.dll
PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\ChilkatDotNet4.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\DiagnosticFileRepository.xsd
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\DirectPrinterDiscoveryHelper.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\DocumentFormat.OpenXml.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\DotNetLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\EmailSettings.xsd
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\HtmlAgilityPack.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\ICSharpCode.SharpZipLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\ICSharpCode.SharpZipLib.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\IWSLicenseChecker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\IWSLicenseChecker.exe.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\IWSLicenseChecker.pdb
MSVC program database ver 7.00, 512*295 bytes
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infragistics2.Shared.v8.3.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infragistics2.Win.Misc.v8.3.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infragistics2.Win.UltraWinGrid.v8.3.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infragistics2.Win.UltraWinTabControl.v8.3.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infragistics2.Win.v8.3.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infrastructure.EIP.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infrastructure.EIP.dll.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infrastructure.EIP.pdb
MSVC program database ver 7.00, 512*79 bytes
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infrastructure.Interface.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infrastructure.Interface.pdb
MSVC program database ver 7.00, 512*255 bytes
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infrastructure.Layout.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infrastructure.Layout.dll.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infrastructure.Layout.pdb
MSVC program database ver 7.00, 512*2671 bytes
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infrastructure.Library.ScheduledTasks.CommandHandler.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infrastructure.Library.ScheduledTasks.CommandHandler.dll.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infrastructure.Library.ScheduledTasks.CommandHandler.pdb
MSVC program database ver 7.00, 512*47 bytes
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infrastructure.Library.Synchronization.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infrastructure.Library.Synchronization.dll.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infrastructure.Library.Synchronization.pdb
MSVC program database ver 7.00, 512*47 bytes
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infrastructure.Library.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infrastructure.Library.dll.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infrastructure.Library.pdb
MSVC program database ver 7.00, 512*2439 bytes
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infrastructure.Module.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infrastructure.Module.dll.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Infrastructure.Module.pdb
MSVC program database ver 7.00, 512*27 bytes
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Interop.CREOACCOUNTINGSERVICELib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Interop.DTS.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Interop.NetFwPublicTypeLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Interop.XEROXGETCONFIGLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Interop.XEROXSETCONFIGLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Interop.XRXCINSTALLPRINTERST3Lib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Interop.XRXCNETPARAMIPIPXLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Interop.XRXPAREMOTEINSTALLERLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Interop.XrxDesCrypt.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Interop.XrxcDos.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\LogCopier.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\LogCopier.exe.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\LogCopier.pdb
MSVC program database ver 7.00, 512*43 bytes
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\LogcollatorFlag.xsd
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\MSIConfig.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Azure.KeyVault.Core.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Azure.Storage.Blob.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Azure.Storage.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Data.Edm.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Data.Edm.xml
XML 1.0 document, ASCII text, with very long lines (301), with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Data.OData.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Data.OData.xml
XML 1.0 document, ASCII text, with very long lines (406), with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Data.Services.Client.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Data.Services.Client.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Practices.CompositeUI.WinForms.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Practices.CompositeUI.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Practices.EnterpriseLibrary.Caching.Cryptography.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Practices.EnterpriseLibrary.Caching.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Practices.EnterpriseLibrary.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Practices.EnterpriseLibrary.Data.SqlCe.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Practices.EnterpriseLibrary.Data.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Practices.EnterpriseLibrary.ExceptionHandling.Logging.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Practices.EnterpriseLibrary.ExceptionHandling.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Practices.EnterpriseLibrary.Logging.Database.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Practices.EnterpriseLibrary.Logging.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Practices.EnterpriseLibrary.Security.Cryptography.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Practices.EnterpriseLibrary.Security.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Practices.ObjectBuilder.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Practices.ObjectBuilder2.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Practices.Unity.Configuration.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Practices.Unity.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Rest.ClientRuntime.Azure.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Rest.ClientRuntime.Azure.xml
XML 1.0 document, ASCII text, with very long lines (358), with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Rest.ClientRuntime.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.VC90.CRT.64\Microsoft.VC90.CRT.manifest
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (1506), with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.VC90.CRT.64\msvcm90.dll
PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.VC90.CRT.64\msvcp90.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.VC90.CRT.64\msvcr90.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.VC90.CRT\Microsoft.VC90.CRT.manifest
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (1506), with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.VC90.CRT\msvcm90.dll
PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.VC90.CRT\msvcp90.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.VC90.CRT\msvcr90.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.Web.Services3.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.WindowsAzure.Storage.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.WindowsAzure.Storage.pdb
MSVC program database ver 7.00, 512*4747 bytes
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.WindowsAzure.Storage.xml
XML 1.0 document, ASCII text, with very long lines (621), with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.mshtml.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Modules.Identity.Dsc.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Modules.Identity.Dsc.dll.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Modules.Identity.Dsc.pdb
MSVC program database ver 7.00, 512*83 bytes
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Modules.Printers.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Modules.Printers.dll.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Modules.Printers.pdb
MSVC program database ver 7.00, 512*1415 bytes
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Modules.Settings.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Modules.Settings.dll.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Modules.Settings.pdb
MSVC program database ver 7.00, 512*967 bytes
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Modules.Synchronization.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Modules.Synchronization.dll.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Modules.Synchronization.pdb
MSVC program database ver 7.00, 512*203 bytes
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Modules.Wizard.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Modules.Wizard.dll.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Modules.Wizard.pdb
MSVC program database ver 7.00, 512*35 bytes
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Newtonsoft.Json.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Offeringtemplate.xsd
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\PeripheralsInfoSchema.xsd
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\PinCapableSysObjectIDsList.xml
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\PinCapableSysObjectIDsList.xml.old
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\PinCapableSysObjectIDsList.xsd
ASCII text, with very long lines (343), with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\ProfileCatalog.xml
exported SGML document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\ProxyAuthValidator.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Repackager.Utilities.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\RootCertForDeviceToXDMCWWCommunication.cert.pem
PEM certificate
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\RulesEngine.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\SNMPSupport.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\System.Buffers.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\System.Data.SqlServerCe.64.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\System.Data.SqlServerCe.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\System.Memory.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\System.Numerics.Vectors.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\System.Runtime.CompilerServices.Unsafe.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\System.Spatial.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\System.Spatial.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\System.Threading.Tasks.Dataflow.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\System.Threading.Tasks.Extensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\UnitTestInterface.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Workspaces.OutlookBar.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Workspaces.OutlookBar.dll.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Workspaces.OutlookBar.pdb
MSVC program database ver 7.00, 512*107 bytes
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XDALogCollator.bat
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XDALogCollator.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XDALogCollator.exe.config
XML 1.0 document, ASCII text, with very long lines (566), with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XDALogCollator.pdb
MSVC program database ver 7.00, 512*155 bytes
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XDAWorksheet.xsd
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XDMDOCS.CREOUTIL.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XDMDOCS.EFIUtil.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XDMExpress.ContstantsLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XDMExpress.Process.ADFF.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XDMExpress.Process.DDFF.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XDMExpress.Utilities.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XLMAUClient.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XLMClient.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XPATypeDefLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xda.Service.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xda.Service.exe.config
XML 1.0 document, ASCII text, with very long lines (474), with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xda.Service.pdb
MSVC program database ver 7.00, 512*71 bytes
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xda.Shell.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xda.Shell.exe.config
XML 1.0 document, ASCII text, with very long lines (542), with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xda.Shell.pdb
MSVC program database ver 7.00, 512*123 bytes
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XdaConfigTool.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XdaConfigTool.exe.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XdaConfigTool.pdb
MSVC program database ver 7.00, 512*487 bytes
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.CWW.AssemblyLoader.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.CWW.CWWLib.Common.dll.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.CWW.CWWLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.CWW.CWWLib.dll.config
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.CWW.Data.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.CWW.Discovery.DeviceStatus.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.CWW.Discovery.Meters.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.CWW.Discovery.ModelCapabilities.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.CWW.Discovery.WebProxyService.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.CWW.Discovery.XrxDiscovery.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.CWW.Discovery.XrxDiscovery.dll.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (459), with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.CWW.DiscoveryDb.Data.GenericClient.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.CWW.DiscoveryDb.Data.SqlCeClient.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.CWW.DiscoveryDb.Data.SqlClient.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.CWW.DiscoveryDb.Data.VistaDbClient.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.CWW.DiscoveryDb.Data.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.CWW.DiscoveryDb.Entities.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.CWW.DiscoveryDb.Services.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.CWW.Infra.ThreadModel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.Cdp.Unity.Production35.config
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.Cdp.Unity.Test35.config
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.DM.ApplicationEntitlement.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.DM.Business.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.DM.CALaw.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.DM.CertManagement.Entity.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.DM.CertManagement.IProvider.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.DM.CertManagement.Provider.Factory.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.DM.CertManagement.Provider.MSNDES.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.DM.CertManagement.Provider.Venafi.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.DM.Data.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.DM.Discovery.CommunicationProtocol.Entities.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.DM.Discovery.CommunicationProtocol.Http.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.DM.Entities.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.DM.FeatureLicensing.Lib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.DM.Logging.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.DM.SecurityProvider.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.DMFeatureToggle.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.Data.Conversion.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.DotNetServiced.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.DotNetServiced.dll.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.Exceptions35.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.FeatureToggle.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.LexmarkWebServices.Utility.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.Net.Address.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.Net.Ipp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.Net.Mdt.MdtClient35.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.Net.Mdt.MdtClientInterfaces35.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.Net.Mdt.MdtServiceProxy35.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.Net.Mdt.MdtServiceProxyCdp35.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.Net.Mdt.MdtServiceProxyInterfaces35.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.Net.Mdt.MdtUtilities35.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.Net.Protocol.Http.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.Net.Utilities.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.SDI.TypeDefLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.SDI.XDM.Utils.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.SchedulerDB.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.Security.Cryptography.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.Security35.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.SmartClientExportUtility.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.SmartClientExportUtility.exe.config
XML 1.0 document, ASCII text, with very long lines (615), with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.SmartClientExportUtility.pdb
MSVC program database ver 7.00, 512*95 bytes
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.Text.Ascii.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.Text.Unicode.Scsu.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.Text35.Core35.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.WebBrowser.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.XDAMonitorService.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.XDAMonitorService.exe.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\Xerox.XDAMonitorService.pdb
MSVC program database ver 7.00, 512*107 bytes
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XrxCPrnClone2.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XrxDiscoveryConst.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XrxFxSdk.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XrxScheduler.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XrxSnmpCollection.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XrxWmiNetAPI.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XrxcDesCrypt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XrxcDos.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XrxcInstallPrinterst3.64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XrxcInstallPrinterst3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XrxcNetParamIPIPX.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\XrxcPaRemoteInstaller.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\azatksh2.newcfg
XML 1.0 document, ASCII text, with very long lines (542), with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\de\Microsoft.Data.Edm.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\de\Microsoft.Data.OData.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\de\Microsoft.Data.Services.Client.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\de\System.Spatial.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\es\Microsoft.Data.Edm.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\es\Microsoft.Data.OData.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\es\Microsoft.Data.Services.Client.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\es\System.Spatial.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\fr\Microsoft.Data.Edm.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\fr\Microsoft.Data.OData.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\fr\Microsoft.Data.Services.Client.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\fr\System.Spatial.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\hphqn1mm.newcfg
XML 1.0 document, ASCII text, with very long lines (459), with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\it\Microsoft.Data.Edm.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\it\Microsoft.Data.OData.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\it\Microsoft.Data.Services.Client.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\it\System.Spatial.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\j0ov3lgc.newcfg
XML 1.0 document, ASCII text, with very long lines (474), with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\ja\Microsoft.Data.Edm.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\ja\Microsoft.Data.OData.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\ja\Microsoft.Data.Services.Client.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\ja\System.Spatial.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\ko\Microsoft.Data.Edm.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\ko\Microsoft.Data.OData.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\ko\Microsoft.Data.Services.Client.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\ko\System.Spatial.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\microsoft.web.services.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\msvcr100.64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\msvcr100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\odnhkbga.newcfg
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\retiredxrs.val
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\ru\Microsoft.Data.Edm.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\ru\Microsoft.Data.OData.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\ru\Microsoft.Data.Services.Client.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\ru\System.Spatial.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\sqlceca40.64.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\sqlceca40.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\sqlcecompact40.64.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\sqlcecompact40.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\sqlceer40EN.64.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\sqlceer40EN.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\sqlceme40.64.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\sqlceme40.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\sqlceqp40.64.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\sqlceqp40.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\sqlcese40.64.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\sqlcese40.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\stdole.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\xda.service.InstallLog
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\xrs2110.p12
data
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\zh-Hans\Microsoft.Data.Edm.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\zh-Hans\Microsoft.Data.OData.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\zh-Hans\Microsoft.Data.Services.Client.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\zh-Hans\System.Spatial.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\zh-Hant\Microsoft.Data.Edm.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\zh-Hant\Microsoft.Data.OData.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\zh-Hant\Microsoft.Data.Services.Client.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\bin\zh-Hant\System.Spatial.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\CDS\XDA_CDS\data\DSCDiscovery.log
ASCII text, with CRLF, LF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\data\DSCDiscovery.sdf
data
dropped
C:\Program Files (x86)\CDS\XDA_CDS\data\DSCDiscovery.sdf.backup
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\data\DSCDiscovery.sdf_Upgrade.Backup
data
dropped
C:\Program Files (x86)\CDS\XDA_CDS\data\DSCMain.log
ASCII text, with CRLF, LF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\data\DSCMain.sdf
data
modified
C:\Program Files (x86)\CDS\XDA_CDS\data\DSCMain.sdf.backup
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\data\DSCMain.sdf_Upgrade.Backup
data
dropped
C:\Program Files (x86)\CDS\XDA_CDS\data\ReadMeData.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\CDS\XDA_CDS\data\SchedulerDelta.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft.SqlServer.Compact.400.64.bc
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Xerox\InstallLogs\DatabaseVersionDetect6.8.54.html
HTML document, ASCII text, with very long lines (429), with CRLF line terminators
modified
C:\ProgramData\Xerox\InstallLogs\Xerox_XDA_6.8.54.html
HTML document, ASCII text, with CRLF line terminators
modified
C:\ProgramData\Xerox\InstallLogs\Xerox_XDA_6.8.54.ldhtml
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Xerox\InstallLogs\Xerox_XDA_6.8.54_08_10_2024_1728410229.txt
ASCII text, with CRLF line terminators
modified
C:\ProgramData\Xerox\Installer\XDA\{FDA5FE52-B510-4cfa-97AA-443F0D0E69B1}.prp
ASCII text, with very long lines (57216), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\5623ad71-e234-47e3-948a-e0032b908372.exe
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\C62BCD12-CEDF-448E-ACEE-31D7748E3F75\Setup.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\DSC\11c27bc5-ae02-43fe-93a0-af3015e8a46c.zip (copy)
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\DSC\XDA_MetaData.xml
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\DSC\Xerox Device Agent Partner Edition (XDA PE) v6.8.54.exe (copy)
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\DSC\logo.png
PNG image data, 527 x 60, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\DSC\xrs.val
ASCII text, with very long lines (50401), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\CultureIndependentSupport.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-15clpdrb.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-1q3qns3a.tmp
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (1506), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-1tvdvqva.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-3bs3rbix.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-400bjbqb.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-ajgiex4m.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-bc3j0yvu.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-c2a3eezk.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-ctp1fcj2.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-dhzvydj3.tmp
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-epzoghya.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-f0wwtvlh.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-j5r5ej54.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-jngw5bdn.tmp
PC bitmap, Windows 3.x format, 602 x 452 x 24, image size 817218, resolution 2834 x 2834 px/m, cbSize 817272, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-k2hbywmz.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-k3tcwu20.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-nc5oqybz.tmp
PC bitmap, Windows 3.x format, 208 x 368 x 24, image size 229634, resolution 2834 x 2834 px/m, cbSize 229688, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-nhkoeko1.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-phsjhbso.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1054
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-pmx3nkns.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-q5xs0dya.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-sfkgjugq.tmp
PC bitmap, Windows 3.x format, 180 x 30 x 24, image size 16202, resolution 2834 x 2834 px/m, cbSize 16256, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-uy335h0z.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-xvewlywz.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-z13hthfc.tmp
MS Windows icon resource - 12 icons, 256x256, 16 colors with PNG image data, 256 x 256, 8-bit colormap, non-interlaced, 4 bits/pixel, 48x48, 16 colors, 4 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\DotNetZip-zsgczx5e.tmp
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\EULA.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1054
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\Microsoft.VC90.CRT.manifest (copy)
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (1506), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\SETUP.ICO (copy)
MS Windows icon resource - 12 icons, 256x256, 16 colors with PNG image data, 256 x 256, 8-bit colormap, non-interlaced, 4 bits/pixel, 48x48, 16 colors, 4 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\Splash.bmp (copy)
PC bitmap, Windows 3.x format, 602 x 452 x 24, image size 817218, resolution 2834 x 2834 px/m, cbSize 817272, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\System.Data.SqlServerCe.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\System.Data.SqlServerCe35.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\WelcomePanel.bmp (copy)
PC bitmap, Windows 3.x format, 208 x 368 x 24, image size 229634, resolution 2834 x 2834 px/m, cbSize 229688, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\bannerlogo.bmp (copy)
PC bitmap, Windows 3.x format, 180 x 30 x 24, image size 16202, resolution 2834 x 2834 px/m, cbSize 16256, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\dbVersionDetect.exe (copy)
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\dbVersionDetect.exe.config (copy)
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\msvcr90.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\mycredentials.spc (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\mypfx.pfx (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\myprivatekey.pvk (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\sqlceca35.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\sqlceca40.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\sqlcecompact35.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\sqlcecompact40.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\sqlceer35EN.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\sqlceer40EN.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\sqlceme35.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\sqlceme40.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\sqlceqp35.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\sqlceqp40.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\sqlcese35.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\sqlcese40.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\tmp1CB.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\Users\user\AppData\Local\Temp\tmp2BD9.tmp
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Xerox Device Agent Partner Edition (XDA PE) v6.8.54, Author: Xerox Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Xerox Device Agent Partner Edition (XDA PE) v6.8.54., Template: Intel;1033, Revision Number: {CED43277-424C-4888-9A61-25A992AC427A}, Create Time/Date: Wed Apr 17 06:44:32 2024, Last Saved Time/Date: Wed Apr 17 06:44:32 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.1.2318), Security: 2
dropped
C:\Windows\Installer\6834c2.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Xerox Device Agent Partner Edition (XDA PE) v6.8.54, Author: Xerox Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Xerox Device Agent Partner Edition (XDA PE) v6.8.54., Template: Intel;1033, Revision Number: {CED43277-424C-4888-9A61-25A992AC427A}, Create Time/Date: Wed Apr 17 06:44:32 2024, Last Saved Time/Date: Wed Apr 17 06:44:32 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.1.2318), Security: 2
dropped
C:\Windows\Installer\6834c5.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Xerox Device Agent Partner Edition (XDA PE) v6.8.54, Author: Xerox Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Xerox Device Agent Partner Edition (XDA PE) v6.8.54., Template: Intel;1033, Revision Number: {CED43277-424C-4888-9A61-25A992AC427A}, Create Time/Date: Wed Apr 17 06:44:32 2024, Last Saved Time/Date: Wed Apr 17 06:44:32 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.1.2318), Security: 2
dropped
C:\Windows\Installer\MSI387B.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
C:\Windows\Installer\MSI387B.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI387B.tmp-\CustomAction.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI387B.tmp-\InstallerResources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI387B.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI387B.tmp-\Microsoft.Web.Administration.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI387B.tmp-\Xerox.Installer.Platform.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI48B8.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
C:\Windows\Installer\MSI48B8.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI48B8.tmp-\CustomAction.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI48B8.tmp-\InstallerResources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI48B8.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI48B8.tmp-\Microsoft.Web.Administration.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI48B8.tmp-\Xerox.Installer.Platform.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI55E8.tmp
data
dropped
C:\Windows\Installer\MSI55F9.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
C:\Windows\Installer\MSI55F9.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI55F9.tmp-\CustomAction.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI55F9.tmp-\InstallerResources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI55F9.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI55F9.tmp-\Microsoft.Web.Administration.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI55F9.tmp-\Xerox.Installer.Platform.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI9053.tmp
data
dropped
C:\Windows\Installer\MSI90D1.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
modified
C:\Windows\Installer\MSI90D1.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI90D1.tmp-\CustomAction.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI90D1.tmp-\InstallerResources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI90D1.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI90D1.tmp-\Microsoft.Web.Administration.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI90D1.tmp-\Xerox.Installer.Platform.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}\appicon.ico
MS Windows icon resource - 12 icons, 256x256, 16 colors with PNG image data, 256 x 256, 8-bit colormap, non-interlaced, 4 bits/pixel, 48x48, 16 colors, 4 bits/pixel
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\~DFB47293606D36202F.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFC46B4C69BFDC47F3.TMP
data
dropped
C:\Windows\Temp\~DFEE39B5F8C1F37A9B.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFF6947341AFB668FF.TMP
data
dropped
There are 451 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\Temp\DSC\XDA_CDS v6.8.54.exe
"C:\Users\user\AppData\Local\Temp\DSC\XDA_CDS v6.8.54.exe"
malicious
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\DbCreate.exe
"C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\DBCreate.exe" SQLCE
malicious
C:\Users\user\Desktop\XDA_CDS v6.8.54_SE.exe
"C:\Users\user\Desktop\XDA_CDS v6.8.54_SE.exe"
C:\Users\user\AppData\Local\Temp\DSC\Xerox Device Agent Partner Edition (XDA PE) v6.8.54.exe
"C:\Users\user\AppData\Local\Temp\DSC\Xerox Device Agent Partner Edition (XDA PE) v6.8.54.exe" /L1033 /v"XMLLocation=\"C:\Users\user\AppData\Local\Temp\DSC\xrs.val\"" SKIPLC=false
C:\Users\user\AppData\Local\Temp\C62BCD12-CEDF-448E-ACEE-31D7748E3F75\Setup.exe
/prereqcheck /L1033 LOG="C:\ProgramData\Xerox\InstallLogs\Xerox_XDA_6.8.54_08_10_2024_1728410229.txt" /bootstrapped
C:\Users\user\AppData\Local\Temp\C62BCD12-CEDF-448E-ACEE-31D7748E3F75\Setup.exe
/v"XMLLocation=\"C:\Users\user\AppData\Local\Temp\DSC\xrs.val\"" SKIPLC=false /L1033 LOG="C:\ProgramData\Xerox\InstallLogs\Xerox_XDA_6.8.54_08_10_2024_1728410229.txt" /bootstrapped
C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\dbVersionDetect.exe
"C:\Users\user\AppData\Local\Temp\bfcc5xtj.2w0\lq2brwcq.eam\dbVersionDetect.exe" SQLCE
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 398AEE39D053096B8B7CCBB4A051E035
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI387B.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6830312 2 CustomAction!CustomActionsShared.ExecuteSequence.ExecuteInitialize
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI48B8.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6834390 8 CustomAction!CustomActionsShared.ExecuteSequence.ExecuteBegin
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI55F9.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6837765 14 CustomAction!CustomActionsShared.ExecuteSequence.SilentExecuteValidations
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI90D1.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6852843 20 CustomAction!CustomActionsShared.ExecuteSequence.InstallExecuteSeq
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://transactions.services.xerox.com/XeroxAutoUpdate/DownloadFile.aspx?DownLoadID=1bb4b441-967b-455b-8874-10a3a6ff206e
13.14.0.17
malicious
https://transactions.services.xerox.com/XeroxAutoUpdate/DownloadFile.aspx?DownLoadID=11c27bc5-ae02-43fe-93a0-af3015e8a46c
13.14.0.17
malicious
https://transactions.services.xerox.com/
13.14.0.17
malicious
http://www.xerox.com/about-xerox/privacy-policy
unknown
http://www.fontbureau.com/designersG
unknown
HTTPS://TRANSACTIONS.SERVICES.XEROX.COM
unknown
https://transactions.services.xerox.com/XeroxAutoUpdate/DownloadFile.aspx?DownLoadID=1bb4b441-967b-4
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://transactions.services.xerox.com/XeroxAutoUpdate/
unknown
https://transactions.services.xerox.com/XeroxAutoUpdate/DownloadFile.aspx?DownLoadID=11c27bc5-ae02-4
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://www.fontbureau.com/designers?
unknown
http://www.xerox.com/
unknown
http://www.tiro.com
unknown
http://tempuri.org/
unknown
http://tempuri.org/UpdateDownloadCounter
unknown
http://www.fontbureau.com/designers
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://www.goodfont.co.kr
unknown
https://office.services.xerox.com/XeroxServicesManager/
unknown
http://www.chilkatsoft.com/
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://fontfabrik.com
unknown
http://tempuri.org/checkForUpdate
unknown
https://transactions.services.xerox.com/XeroxAutoUpdate
unknown
http://tempuri.org/TU
unknown
http://transactions.services.xerox.com
unknown
http://tempuri.org/TestLog
unknown
https://transactions.services
unknown
http://transactions-services.idns-ext.xerox.comH
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://tempuri.org/CheckForOfferingChange
unknown
https://dcs.support.xerox.comString
unknown
https://office.services.xerox.com/GDOSupport
unknown
http://vyaskn.tripod.com
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://opensource.org/licenses/MIT).
unknown
http://www.urwpp.deDPlease
unknown
http://www.support.xerox.com/support/smart-esolutions/support
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.icsharpcode.net/OpenSource/SharpZipLib/).
unknown
http://www.sakkal.com
unknown
https://transactions.services.xerox.com
unknown
https://transactions.services.xerox.com/XeroxAP
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
https://sectigo.com/CPS0
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/
unknown
https://transactions.services.xerox.com/p
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
http://www.w3.or
unknown
https://transactions.services.xerox.com/X
unknown
http://transactions-services.idns-ext.xerox.com
unknown
http://www.xerox.com/String
unknown
http://www.carterandcone.coml
unknown
http://www.xerox.comT
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.xerox.com/about-
unknown
http://www.xerox.com/about-xero
unknown
http://tempuri.org/GetLatestDSCBrandingInfo
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-jones.html
unknown
https://transactions.services.xerox.com/xeroxautoupdateString
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
http://www.bouncycastle.org).
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://tempuri.org/T
unknown
http://localhost:1767/XLMAUWebSite/XLMAUWebService.asmx
unknown
http://www.fontbureau.com/designers8
unknown
https://home.lcatterton.com
unknown
http://tempuri.org/GetLatestDSCBrandingInfoTestPage
unknown
http://test.support.xerox.com/String
unknown
http://www.xerox.comString
unknown
There are 72 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
transactions-services.idns-ext.xerox.com
13.14.0.17
malicious
transactions.services.xerox.com
unknown

IPs

IP
Domain
Country
Malicious
13.14.0.17
transactions-services.idns-ext.xerox.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A43489159A520F0D93D032CCAF37E7FE20A8B419
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A43489159A520F0D93D032CCAF37E7FE20A8B419
Blob
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Xerox DM (Device Management)
MaxSize
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Xerox DM (Device Management)
AutoBackupLogFiles
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Xerox DM (Device Management)\Xerox DM (Device Management)
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Xerox DM (Device Management)\DSC Download Manager Log
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XDA_CDS v6_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XDA_CDS v6_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XDA_CDS v6_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XDA_CDS v6_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XDA_CDS v6_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XDA_CDS v6_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XDA_CDS v6_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XDA_CDS v6_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XDA_CDS v6_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XDA_CDS v6_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XDA_CDS v6_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XDA_CDS v6_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XDA_CDS v6_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XDA_CDS v6_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XDA
Params
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6834c4.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6834c4.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F90EC59093F332C4CAD3949B9FBEA648
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A4539360235C80748AD796B9707F29CF
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DCE55338E49136F4FB8CA6CDAED2C973
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9EDD361AFD9BE62439C3319A9A5B5027
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0E0CFB9049717B94BA07857BD059834D
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\ED1D0F49626D37C47B2EE08D4E35F339
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\38C952F1A121DD546B02BAB055D4D9F6
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84BD49EF6548E4F4E823BB18970B0CEF
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B304FBEAC8B24374CAD9C99CADB4AD49
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6E2A39751613CD34DB1B993BF5904C31
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\580C76237FB29744A8FCB12C655DCA43
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F8E2887EFE7EC1744AEFD9DC971FFD9B
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\40CAFC127AD4C3945B413CB000A53B8E
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C088C11ACF99DE7469AB4A6E47C6EF18
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AB8535816ABFE942B4E719F7AD6734F
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9C114D52BAD2464CAFBD11131342BF3
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\748FE9CF55DE4AB469767517F02DE1C8
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1656F5B026854454F82F64FA3CC9C9CB
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5BBF54BEB04BF13469542D707A2AAFF7
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D04F3A495E0B39F4F8EF3139668FA464
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D7AF21E7CB1C0644491BF5459B87DBED
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0B41145832F114E4D98F103BD39234E6
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7A86E1A026C986E42B174B0A7F72EA82
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\50294A8DDFFEAFF4594DDCCC276035D4
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\CDS\XDA_CDS\data\exportlogs\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\CDS\XDA_CDS\data\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\CDS\XDA_CDS\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\CDS\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\CDS\XDA_CDS\data\help\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\CDS\XDA_CDS\bin\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\CDS\XDA_CDS\bin\de\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.VC90.CRT.64\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\CDS\XDA_CDS\bin\it\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\CDS\XDA_CDS\bin\es\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\CDS\XDA_CDS\bin\zh-Hant\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\CDS\XDA_CDS\bin\Microsoft.VC90.CRT\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\Microsoft.VC90.CRT.64\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\CDS\XDA_CDS\Images\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\CDS\XDA_CDS\bin\zh-Hans\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\CDS\XDA_CDS\bin\ja\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\CDS\XDA_CDS\bin\ko\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\CDS\XDA_CDS\bin\fr\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\CDS\XDA_CDS\basedata\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\CDS\XDA_CDS\bin\ru\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\CDS\XDA_CDS\InstallerSupport\database\Microsoft.VC90.CRT\
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxSchedServ
Verbose
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID7
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID5
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID4
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID3
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID2
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID12
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID23
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID22
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID21
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID20
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID19
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID18
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID17
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID15
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID14
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID13
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID11
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID6
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID9
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID25
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID8
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID26
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID10
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\UnSupported SysObjectIDs
OID24
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr
Upgrade
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr
CompXrxPrinterAgentData
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr
SweepDelay
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr
GetTableSweepDelay
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr
MaxChunkSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr
SweepDelayIncrementor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr
errorLog
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr
BroadCastDelay
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr
CompDomAdDnsTest
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr
CompDetailData
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr
CompDnsForwardRevMustMatch
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr
CompNBTData
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr
IPXBlockSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr
IPXNetscanDelay
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr
TrapPollIntervalInSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr
DnsAndWebServerCheckEnabled
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr
CompChunkSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient
ProductLanguage
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient
SchedulerDSN
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient
ShowPopupsNoFade
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient
UseIEProxy
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient
DSN
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient
ShowPopups
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\Supported SysObjectIDs
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\Logging
CompDisc
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\Logging
CompDomDisc
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\Logging
CompDiscADO
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\Logging
CompAsyncJobProc
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\Logging
TrapListener
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\Logging
FindDevices
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\Logging
StatusPolling
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\Logging
SNMP
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\Remoting
ServiceName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\Remoting
Port
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\Remoting
HostAddress
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.8.1.1.0
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.18.2.7.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.18.2.6.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.5.1.1.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.5.3.1.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.5.6.1.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.5.2.1.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.5.5.1.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.5.4.1.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.17.2.1.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.17.1.1.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.17.3.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.18.2.19.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.18.2.18.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.18.2.17.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.18.2.9.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.18.2.5.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.18.2.4.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.18.2.3.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.18.2.2.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.18.2.1.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.21.2.6.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.21.2.5.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.21.2.3.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.21.2.2.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.17.1.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.5.1.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.5.3.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.5.2
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.17.2.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.8.1.1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\XeroxDeviceSmartClient\XrxcDiscSvr\TrapUnSupportedOids
1.3.6.1.4.1.253.8.62.1.21.2.1.1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25EF5ADF015BAFC479AA44F3D0E0961B
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\0EA8A1B2D3F5CB74A98444677E13DE44
ProductFeature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\Features
ProductFeature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Windows\Installer\{2B1A8AE0-5F3D-47BC-9A48-4476E731ED44}\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0EA8A1B2D3F5CB74A98444677E13DE44\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\0EA8A1B2D3F5CB74A98444677E13DE44
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\0EA8A1B2D3F5CB74A98444677E13DE44
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\0EA8A1B2D3F5CB74A98444677E13DE44
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\0EA8A1B2D3F5CB74A98444677E13DE44
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\0EA8A1B2D3F5CB74A98444677E13DE44
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\0EA8A1B2D3F5CB74A98444677E13DE44
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\0EA8A1B2D3F5CB74A98444677E13DE44
ProductIcon
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\0EA8A1B2D3F5CB74A98444677E13DE44
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\0EA8A1B2D3F5CB74A98444677E13DE44
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\0EA8A1B2D3F5CB74A98444677E13DE44
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25EF5ADF015BAFC479AA44F3D0E0961B
0EA8A1B2D3F5CB74A98444677E13DE44
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\0EA8A1B2D3F5CB74A98444677E13DE44\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\0EA8A1B2D3F5CB74A98444677E13DE44\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\0EA8A1B2D3F5CB74A98444677E13DE44\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\0EA8A1B2D3F5CB74A98444677E13DE44
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\0EA8A1B2D3F5CB74A98444677E13DE44\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6834c6.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6834c6.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CCBBF9E1485AF63CE47ABF8E9E648C2504FC319D
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CCBBF9E1485AF63CE47ABF8E9E648C2504FC319D
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349
Blob
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\{FDA5FE52-B510-4cfa-97AA-443F0D0E69B1}
INSTALLDIR
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\{FDA5FE52-B510-4cfa-97AA-443F0D0E69B1}
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\{FDA5FE52-B510-4cfa-97AA-443F0D0E69B1}
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\{FDA5FE52-B510-4cfa-97AA-443F0D0E69B1}
UpgradeCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\{FDA5FE52-B510-4cfa-97AA-443F0D0E69B1}
CompanyName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\{FDA5FE52-B510-4cfa-97AA-443F0D0E69B1}
TranslatedReadme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\{FDA5FE52-B510-4cfa-97AA-443F0D0E69B1}
AppKillName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Xerox\{FDA5FE52-B510-4cfa-97AA-443F0D0E69B1}
LCID
HKEY_LOCAL_MACHINE\SOFTWARE\Xerox\InstallRuntimeParams\XDMLite
DBParams
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
There are 249 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
75A000
trusted library allocation
page execute and read and write
7F058000
trusted library allocation
page execute and read and write
451000
unkown
page read and write
7FFEC82D6000
trusted library allocation
page read and write
21D2EB81000
trusted library allocation
page read and write
7920000
heap
page read and write
21D2EBAD000
trusted library allocation
page read and write
51F03000
unkown
page write copy
500E000
stack
page read and write
21D46E94000
heap
page read and write
15291000
trusted library allocation
page read and write
76C000
heap
page read and write
28D7000
heap
page read and write
76F0000
trusted library allocation
page read and write
6FE9000
heap
page read and write
6AA000
heap
page read and write
6FCC000
heap
page read and write
CCA000
unkown
page readonly
1D5A3600000
unkown
page readonly
4FE8000
trusted library allocation
page read and write
410000
heap
page read and write
736E000
stack
page read and write
6FD5000
trusted library allocation
page read and write
7FFEC8437000
trusted library allocation
page read and write
3206000
heap
page read and write
4D70000
trusted library allocation
page read and write
4D6C000
stack
page read and write
1DCAE000
stack
page read and write
5140000
trusted library allocation
page read and write
7650000
heap
page read and write
32E3000
heap
page read and write
6C8000
heap
page read and write
1D5B6E72000
trusted library allocation
page read and write
2F90000
heap
page read and write
316E000
stack
page read and write
21D2CA70000
heap
page read and write
76F0000
trusted library allocation
page read and write
4F0B000
trusted library allocation
page execute and read and write
4F00000
trusted library allocation
page read and write
7FFEC827C000
trusted library allocation
page execute and read and write
79A000
heap
page read and write
4CA0000
trusted library allocation
page read and write
50F0000
trusted library allocation
page read and write
934E6FE000
stack
page read and write
4E0D000
trusted library allocation
page execute and read and write
4F28000
trusted library allocation
page read and write
21D467F0000
trusted library allocation
page read and write
21D2E844000
trusted library allocation
page read and write
934E5FE000
stack
page read and write
21D2C8D0000
unkown
page readonly
7FFEC8470000
trusted library allocation
page execute and read and write
7FFEC816C000
trusted library allocation
page execute and read and write
1D5B8E64000
trusted library allocation
page read and write
21D46E97000
heap
page read and write
2680000
heap
page read and write
22DD000
trusted library allocation
page read and write
7FFEC83FE000
trusted library allocation
page read and write
1D5BF948000
heap
page read and write
1D5A51A0000
heap
page read and write
3255000
heap
page read and write
6FD0000
trusted library allocation
page read and write
1802000
unkown
page readonly
22E8000
trusted library allocation
page read and write
44DC000
stack
page read and write
21D48A58000
heap
page read and write
5100000
trusted library allocation
page read and write
50F0000
trusted library allocation
page read and write
21D2CDF5000
heap
page read and write
7710000
trusted library allocation
page read and write
934E8FE000
stack
page read and write
15286000
trusted library allocation
page read and write
76F4000
trusted library allocation
page read and write
1D5A55B0000
heap
page read and write
4E03000
trusted library allocation
page execute and read and write
22E3000
trusted library allocation
page read and write
2A79000
heap
page read and write
702A000
heap
page read and write
21D2E84F000
trusted library allocation
page read and write
7FFEC82D0000
trusted library allocation
page read and write
1D5BF954000
heap
page read and write
4C87000
trusted library allocation
page read and write
29BA000
heap
page read and write
7FFEC83C0000
trusted library allocation
page read and write
2ADC000
heap
page read and write
7520000
trusted library allocation
page read and write
76F0000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
21D2EB8E000
trusted library allocation
page read and write
6FBB000
heap
page read and write
6FCD000
heap
page read and write
73B0000
trusted library allocation
page read and write
314D000
stack
page read and write
1D5A4002000
unkown
page readonly
6FE1000
heap
page read and write
2011BFE000
stack
page read and write
7FFEC8240000
trusted library allocation
page read and write
700C000
heap
page read and write
21D3E85A000
trusted library allocation
page read and write
740000
trusted library allocation
page read and write
21D2CB38000
heap
page read and write
21D2E874000
trusted library allocation
page read and write
6E1000
heap
page read and write
7FFEC8490000
trusted library allocation
page read and write
31F3000
heap
page read and write
4ED3000
trusted library allocation
page execute and read and write
2797000
heap
page read and write
3370000
heap
page read and write
3290000
heap
page read and write
A9E000
stack
page read and write
320D000
trusted library allocation
page execute and read and write
4EA0000
trusted library allocation
page read and write
5200000
trusted library allocation
page read and write
767000
trusted library allocation
page execute and read and write
4EE4000
trusted library allocation
page read and write
734000
trusted library allocation
page read and write
7FFEC82CA000
trusted library allocation
page read and write
2011101000
stack
page read and write
4ED0000
trusted library allocation
page read and write
73AF000
stack
page read and write
7FFEC8340000
trusted library allocation
page execute and read and write
703B000
heap
page read and write
327A000
heap
page read and write
7FFEC8430000
trusted library allocation
page read and write
4D0E000
stack
page read and write
6FF000
heap
page read and write
73B0000
trusted library allocation
page read and write
4C4E000
stack
page read and write
21D2EECE000
trusted library allocation
page read and write
21D471D0000
heap
page execute and read and write
46A0000
trusted library allocation
page read and write
21D47316000
heap
page read and write
21D2EADB000
trusted library allocation
page read and write
50B1000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page read and write
7FFEC810C000
trusted library allocation
page execute and read and write
1D5A51B0000
heap
page read and write
21D46ECF000
heap
page read and write
21D2EAE2000
trusted library allocation
page read and write
7AA000
heap
page read and write
749E000
stack
page read and write
73F0000
trusted library allocation
page read and write
3050000
heap
page read and write
4E39000
trusted library allocation
page read and write
CE0000
unkown
page readonly
7700000
trusted library allocation
page read and write
3171000
heap
page read and write
7FFEC8263000
trusted library allocation
page read and write
319C000
heap
page read and write
6BD0000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
4BCE000
stack
page read and write
76F0000
trusted library allocation
page read and write
7FFEC83E0000
trusted library allocation
page read and write
4FBF000
stack
page read and write
4E3B000
trusted library allocation
page execute and read and write
4ECE000
stack
page read and write
29F7000
heap
page read and write
7040000
heap
page read and write
726E000
stack
page read and write
4DEE000
stack
page read and write
717000
heap
page read and write
934F4FE000
stack
page read and write
797000
heap
page read and write
1D5A3602000
unkown
page readonly
29D3000
heap
page read and write
28D0000
heap
page read and write
7FFEC8306000
trusted library allocation
page read and write
7FFEC8170000
trusted library allocation
page execute and read and write
75BE000
stack
page read and write
4E37000
trusted library allocation
page execute and read and write
7FFEC826D000
trusted library allocation
page execute and read and write
63E000
stack
page read and write
7FFEC81D0000
trusted library allocation
page execute and read and write
1D5BF7C0000
heap
page read and write
5ED1000
trusted library allocation
page read and write
2ADB000
heap
page read and write
73B0000
trusted library allocation
page read and write
934EDFB000
stack
page read and write
C90000
unkown
page readonly
5102000
trusted library allocation
page read and write
2401000
trusted library allocation
page read and write
7FFEC8260000
trusted library allocation
page read and write
7FFEC8230000
trusted library allocation
page read and write
1D5A52C6000
heap
page read and write
6A20000
trusted library allocation
page read and write
4E14000
trusted library allocation
page read and write
7FFEC80DB000
trusted library allocation
page execute and read and write
4C60000
heap
page read and write
1D5A3600000
unkown
page readonly
46A0000
trusted library allocation
page read and write
7FFEC83F0000
trusted library allocation
page read and write
34B0000
heap
page read and write
4EA0000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
4C8E000
stack
page read and write
2202000
unkown
page readonly
22DF000
trusted library allocation
page read and write
21D3EA42000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page read and write
21D2EDDE000
trusted library allocation
page read and write
934EAFE000
stack
page read and write
3420000
trusted library allocation
page read and write
850000
heap
page read and write
46A0000
trusted library allocation
page read and write
1A8000
stack
page read and write
21D47003000
heap
page read and write
707000
heap
page read and write
7FFEC8410000
trusted library allocation
page execute and read and write
7046000
heap
page read and write
7FFEC8440000
trusted library allocation
page read and write
99E000
stack
page read and write
934EEFB000
stack
page read and write
934F53E000
stack
page read and write
7065000
heap
page read and write
21D2CFD5000
heap
page read and write
1F0000
heap
page read and write
1D5A51D0000
heap
page read and write
6F70000
heap
page read and write
30DE000
stack
page read and write
2770000
heap
page read and write
445000
unkown
page readonly
1D5A8871000
trusted library allocation
page read and write
4E70000
heap
page read and write
2EAF000
stack
page read and write
7FFEC8499000
trusted library allocation
page read and write
51FE000
stack
page read and write
4E90000
trusted library allocation
page read and write
22B4000
heap
page read and write
6FC6000
heap
page read and write
21D2EEDF000
trusted library allocation
page read and write
507E000
stack
page read and write
4CD0000
heap
page execute and read and write
21D2EAEA000
trusted library allocation
page read and write
7FFEC8270000
trusted library allocation
page read and write
6D3000
heap
page read and write
21D47251000
heap
page read and write
6FB4000
heap
page read and write
3201000
heap
page read and write
934E7FE000
stack
page read and write
1D5A5513000
heap
page read and write
4B00000
heap
page readonly
21D47000000
heap
page read and write
1DDAE000
stack
page read and write
46A0000
trusted library allocation
page read and write
1D5A5440000
trusted library allocation
page read and write
5090000
trusted library allocation
page read and write
21D47310000
heap
page read and write
327C000
heap
page read and write
1D5BF7A8000
heap
page read and write
5200000
trusted library allocation
page read and write
325B000
heap
page read and write
1D5A88D7000
trusted library allocation
page read and write
21D2EAA4000
trusted library allocation
page read and write
5230000
heap
page read and write
5366000
trusted library allocation
page read and write
2110000
unkown
page readonly
6FCA000
heap
page read and write
6D1000
heap
page read and write
7A0000
heap
page read and write
4FCE000
stack
page read and write
4EDE000
stack
page read and write
3273000
heap
page read and write
3D0000
heap
page read and write
21D2EDC2000
trusted library allocation
page read and write
2F67000
stack
page read and write
2A7E000
heap
page read and write
21D2CFD0000
heap
page read and write
21D2CB6C000
heap
page read and write
776000
heap
page read and write
73E000
heap
page read and write
1D5BF926000
heap
page read and write
3775000
heap
page read and write
319E000
heap
page read and write
4CCE000
stack
page read and write
33FE000
stack
page read and write
4AD0000
trusted library allocation
page read and write
7770000
heap
page execute and read and write
323A000
heap
page read and write
C2E000
stack
page read and write
46A0000
trusted library allocation
page read and write
21D2CB77000
heap
page read and write
3130000
heap
page read and write
4C0E000
stack
page read and write
401000
unkown
page execute read
7FFEC80B0000
trusted library allocation
page read and write
4CA4000
heap
page read and write
22B0000
heap
page read and write
4E8C000
heap
page read and write
74D000
trusted library allocation
page execute and read and write
4660000
trusted library allocation
page read and write
21D483E2000
trusted library allocation
page read and write
7FFEC8480000
trusted library allocation
page read and write
6FDC000
heap
page read and write
21D2EB91000
trusted library allocation
page read and write
46A0000
trusted library allocation
page read and write
4D9C000
trusted library allocation
page execute and read and write
20115FE000
stack
page read and write
3150000
heap
page read and write
733000
trusted library allocation
page execute and read and write
2A8E000
heap
page read and write
7FFEC8410000
trusted library allocation
page read and write
5AE000
stack
page read and write
21D2EDE5000
trusted library allocation
page read and write
5050000
heap
page read and write
46A0000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
21D483C0000
trusted library allocation
page read and write
312F000
stack
page read and write
6BE0000
trusted library allocation
page read and write
2DA0000
heap
page read and write
22B9000
heap
page read and write
21D47221000
heap
page read and write
1D5BF860000
unkown
page readonly
50E000
stack
page read and write
711000
heap
page read and write
1D5A52CD000
heap
page read and write
7530000
trusted library allocation
page read and write
20117FE000
stack
page read and write
3163000
heap
page read and write
21D2EA6C000
trusted library allocation
page read and write
89F000
stack
page read and write
302E000
stack
page read and write
3203000
trusted library allocation
page execute and read and write
73B0000
trusted library allocation
page read and write
1D5A8724000
trusted library allocation
page read and write
21D2E860000
trusted library allocation
page read and write
4D73000
trusted library allocation
page read and write
1D5A529F000
heap
page read and write
3204000
trusted library allocation
page read and write
460000
unkown
page read and write
29B0000
heap
page read and write
1D5A5530000
heap
page execute and read and write
7FFEC8409000
trusted library allocation
page read and write
1D5BFB60000
unkown
page readonly
D10000
unkown
page readonly
2DC0000
heap
page read and write
21D2E8B2000
trusted library allocation
page read and write
21D471F0000
heap
page read and write
7FFEC8239000
trusted library allocation
page read and write
3055000
unkown
page readonly
1DFAE000
stack
page read and write
6FAB000
heap
page read and write
21D2EADE000
trusted library allocation
page read and write
7003000
heap
page read and write
5040000
trusted library allocation
page execute and read and write
21D46EE9000
heap
page read and write
CE2000
unkown
page readonly
7FFEC8222000
trusted library allocation
page read and write
400000
unkown
page readonly
50A0000
trusted library allocation
page execute and read and write
32E5000
heap
page read and write
22F0000
heap
page read and write
21D2CCD0000
trusted library allocation
page read and write
46A0000
trusted library allocation
page read and write
4ED1000
trusted library allocation
page read and write
76EE000
stack
page read and write
934EBFD000
stack
page read and write
3375000
heap
page read and write
4D90000
trusted library allocation
page read and write
934F73B000
stack
page read and write
6FA2000
heap
page read and write
4EC0000
trusted library allocation
page read and write
762000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
32C2000
heap
page read and write
2011AFE000
stack
page read and write
7FF42A040000
trusted library allocation
page execute and read and write
6EE000
heap
page read and write
7E3000
heap
page read and write
4F7E000
stack
page read and write
4E90000
trusted library allocation
page read and write
21D46EC5000
heap
page read and write
743000
trusted library allocation
page read and write
4DA0000
heap
page execute and read and write
5200000
trusted library allocation
page read and write
7FFEC8220000
trusted library allocation
page read and write
1D5BF760000
heap
page read and write
76F0000
trusted library allocation
page read and write
74A0000
trusted library allocation
page read and write
7FFEC82B0000
trusted library allocation
page execute and read and write
21D2EEBC000
trusted library allocation
page read and write
21D2E85C000
trusted library allocation
page read and write
5013000
trusted library allocation
page read and write
2825000
heap
page read and write
12000
unkown
page readonly
7FFEC80BD000
trusted library allocation
page execute and read and write
309E000
stack
page read and write
6FD0000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
7640000
heap
page read and write
4680000
trusted library allocation
page read and write
1D5A5510000
heap
page read and write
7FFEC82DC000
trusted library allocation
page execute and read and write
1D5C0050000
heap
page read and write
4C9E000
stack
page read and write
20119FF000
stack
page read and write
21D2C9AA000
unkown
page readonly
1D5A52A2000
heap
page read and write
21D2E7B0000
heap
page execute and read and write
305B000
stack
page read and write
4E50000
trusted library allocation
page read and write
7532000
trusted library allocation
page read and write
240C000
heap
page read and write
402000
unkown
page readonly
325E000
heap
page read and write
7FFEC8270000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
771000
heap
page read and write
5100000
trusted library allocation
page read and write
934E9FD000
stack
page read and write
510E000
stack
page read and write
21D3E7C1000
trusted library allocation
page read and write
791000
heap
page read and write
5080000
trusted library allocation
page read and write
501E000
stack
page read and write
31A3000
heap
page read and write
21D2C8D0000
unkown
page readonly
7FFEC80CD000
trusted library allocation
page execute and read and write
72EE000
stack
page read and write
50B0000
trusted library allocation
page read and write
51F01000
unkown
page read and write
3200000
trusted library allocation
page read and write
1D5A51F0000
heap
page read and write
517E000
stack
page read and write
22D0000
trusted library allocation
page read and write
21D2CB71000
heap
page read and write
32C9000
heap
page read and write
46A0000
trusted library allocation
page read and write
21D2CDF0000
heap
page read and write
6A0000
heap
page read and write
2798000
heap
page read and write
3166000
heap
page read and write
35F0000
heap
page read and write
7FFEC8450000
trusted library allocation
page read and write
400000
unkown
page readonly
21D2CAD9000
heap
page read and write
2280000
heap
page read and write
22A0000
trusted library allocation
page read and write
21D46E80000
heap
page read and write
73D000
trusted library allocation
page execute and read and write
934F0F8000
stack
page read and write
1D5BF8E0000
heap
page read and write
4F07000
trusted library allocation
page execute and read and write
22F0000
heap
page read and write
6FB7000
heap
page read and write
56E000
stack
page read and write
2D6E000
stack
page read and write
50F0000
trusted library allocation
page read and write
3262000
heap
page read and write
3155000
heap
page read and write
6FF0000
heap
page read and write
4B4E000
stack
page read and write
1D5A88E7000
trusted library allocation
page read and write
7FFEC83D4000
trusted library allocation
page read and write
7FFEC8224000
trusted library allocation
page read and write
7FFEC8401000
trusted library allocation
page read and write
7FFEC8306000
trusted library allocation
page execute and read and write
3400000
trusted library allocation
page read and write
D0C000
unkown
page readonly
1D5A52C8000
heap
page read and write
2DAE000
stack
page read and write
4AD7000
trusted library allocation
page execute and read and write
6FD0000
trusted library allocation
page read and write
50A0000
heap
page read and write
74BC000
trusted library allocation
page execute and read and write
1D5B7A64000
trusted library allocation
page read and write
6FD9000
heap
page read and write
43AA000
heap
page read and write
5200000
trusted library allocation
page read and write
317A000
heap
page read and write
46A0000
trusted library allocation
page read and write
7D4000
heap
page read and write
36BE000
stack
page read and write
5200000
trusted library allocation
page read and write
60B1000
trusted library allocation
page read and write
21D46EA0000
heap
page read and write
7FFEC8253000
trusted library allocation
page execute and read and write
7930000
heap
page read and write
3098000
stack
page read and write
3190000
heap
page read and write
71E000
stack
page read and write
E02000
unkown
page readonly
4680000
trusted library allocation
page read and write
1D5A5490000
heap
page read and write
7F120000
trusted library allocation
page execute and read and write
2011EFD000
stack
page read and write
524F000
stack
page read and write
2300000
direct allocation
page read and write
6F8C000
heap
page read and write
7FFEC841B000
trusted library allocation
page read and write
3280000
heap
page read and write
520000
heap
page read and write
711000
heap
page read and write
10000
unkown
page readonly
7FFEC80B4000
trusted library allocation
page read and write
4FBC000
stack
page read and write
1D5BF7C2000
heap
page read and write
46A0000
trusted library allocation
page read and write
1D6FB000
stack
page read and write
6F6F000
heap
page read and write
1D5A87C2000
trusted library allocation
page read and write
2A75000
heap
page read and write
2742000
unkown
page readonly
4F7C000
stack
page read and write
934ECFE000
stack
page read and write
1D5A87CB000
trusted library allocation
page read and write
21D2C8D2000
unkown
page readonly
21D2CDB0000
heap
page read and write
6F7E000
heap
page read and write
7024000
heap
page read and write
73C0000
trusted library allocation
page read and write
934F3FD000
stack
page read and write
7FFEC8336000
trusted library allocation
page execute and read and write
7AE000
heap
page read and write
CDE000
unkown
page write copy
5204000
trusted library allocation
page read and write
326F000
stack
page read and write
7530000
trusted library allocation
page read and write
445000
unkown
page readonly
7FFEC82E0000
trusted library allocation
page execute and read and write
45DD000
stack
page read and write
6F74000
heap
page read and write
15289000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
1D5BB097000
trusted library allocation
page read and write
2A46000
heap
page read and write
5241000
trusted library allocation
page read and write
21D2CA90000
heap
page read and write
A9F000
stack
page read and write
2FD0000
heap
page read and write
46A5000
trusted library allocation
page read and write
4EDD000
trusted library allocation
page execute and read and write
99F000
stack
page read and write
4AF0000
trusted library allocation
page read and write
74C9000
trusted library allocation
page read and write
1D5A6E51000
trusted library allocation
page read and write
6FD4000
heap
page read and write
7FFEC830C000
trusted library allocation
page execute and read and write
1D5BEE80000
trusted library allocation
page read and write
21D2CF90000
heap
page read and write
5347000
trusted library allocation
page read and write
5089000
trusted library allocation
page execute and read and write
4FC0000
trusted library allocation
page read and write
7FFEC8280000
trusted library allocation
page execute and read and write
267E000
stack
page read and write
7400000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page read and write
4D1C000
stack
page read and write
300D000
stack
page read and write
2E3B000
stack
page read and write
1D5A87C5000
trusted library allocation
page read and write
73B0000
trusted library allocation
page read and write
6EB000
heap
page read and write
706D000
heap
page read and write
2FE0000
heap
page read and write
4EE0000
trusted library allocation
page read and write
4E04000
trusted library allocation
page read and write
1D5BFE30000
heap
page read and write
46AE000
trusted library allocation
page read and write
4F0000
heap
page read and write
4C80000
trusted library allocation
page read and write
76AE000
stack
page read and write
29E0000
heap
page read and write
46A0000
trusted library allocation
page read and write
1D5C0177000
heap
page read and write
7FFEC8166000
trusted library allocation
page read and write
4D20000
heap
page read and write
7FFEC8441000
trusted library allocation
page read and write
730000
heap
page read and write
29DC000
heap
page read and write
21D2CFC0000
trusted library allocation
page read and write
21D2CCB0000
trusted library allocation
page read and write
934F2FE000
stack
page read and write
22B0000
heap
page execute and read and write
4F1E000
stack
page read and write
7FFEC824D000
trusted library allocation
page execute and read and write
784000
heap
page read and write
2A89000
heap
page read and write
1DB3E000
stack
page read and write
729000
heap
page read and write
21D2E750000
trusted library section
page readonly
856000
heap
page read and write
2CFC000
unkown
page readonly
6FC0000
heap
page read and write
934F63D000
stack
page read and write
6FAF000
heap
page read and write
2DE0000
heap
page read and write
503C000
stack
page read and write
72AE000
stack
page read and write
46A5000
trusted library allocation
page read and write
7FFEC8233000
trusted library allocation
page read and write
21D46E8C000
heap
page read and write
6FF6000
heap
page read and write
720000
trusted library allocation
page read and write
21D46F63000
heap
page read and write
1D5A8819000
trusted library allocation
page read and write
46A0000
trusted library allocation
page read and write
4ADB000
trusted library allocation
page execute and read and write
703000
heap
page read and write
2A79000
heap
page read and write
15283000
trusted library allocation
page read and write
1D5B8464000
trusted library allocation
page read and write
6FC4000
heap
page read and write
7230000
trusted library allocation
page read and write
6241000
trusted library allocation
page read and write
1DDB0000
heap
page read and write
4E60000
heap
page readonly
4B60000
heap
page read and write
934EFFD000
stack
page read and write
763E000
stack
page read and write
2A77000
heap
page read and write
6FD3000
heap
page read and write
4B40000
trusted library allocation
page execute and read and write
304B000
unkown
page readonly
7520000
trusted library allocation
page read and write
74D0000
trusted library allocation
page execute and read and write
5D0000
heap
page read and write
51EFE000
unkown
page write copy
2011CFE000
stack
page read and write
7410000
heap
page execute and read and write
4E40000
trusted library allocation
page execute and read and write
5099000
trusted library allocation
page read and write
7FFEC83F7000
trusted library allocation
page read and write
7570000
trusted library allocation
page read and write
21D487C0000
heap
page read and write
44F000
unkown
page write copy
5086000
trusted library allocation
page execute and read and write
4E2E000
stack
page read and write
31A9000
heap
page read and write
4B30000
heap
page read and write
21D2EBBF000
trusted library allocation
page read and write
60B5000
trusted library allocation
page read and write
1D5A5260000
heap
page read and write
3770000
heap
page read and write
CFD000
unkown
page readonly
1DBA0000
heap
page execute and read and write
465000
unkown
page read and write
21D2E760000
heap
page read and write
51F04000
unkown
page read and write
21D2EAFB000
trusted library allocation
page read and write
7FFEC8370000
trusted library allocation
page execute and read and write
1D5A88DB000
trusted library allocation
page read and write
AC000
stack
page read and write
21D471E0000
heap
page read and write
21D2EACF000
trusted library allocation
page read and write
7FFEC8290000
trusted library allocation
page execute and read and write
4D99000
trusted library allocation
page execute and read and write
1D5B7064000
trusted library allocation
page read and write
46A0000
trusted library allocation
page read and write
7FFEC822D000
trusted library allocation
page execute and read and write
3296000
heap
page read and write
4680000
trusted library allocation
page read and write
7FFEC82D0000
trusted library allocation
page read and write
1D5A527D000
heap
page read and write
22D8000
trusted library allocation
page read and write
5010000
trusted library allocation
page read and write
31A8000
heap
page read and write
757000
trusted library allocation
page execute and read and write
7700000
trusted library allocation
page read and write
1D5B6E51000
trusted library allocation
page read and write
6FB000
stack
page read and write
21D47100000
heap
page execute and read and write
732E000
stack
page read and write
4E80000
heap
page read and write
78B000
heap
page read and write
31A0000
heap
page read and write
D07000
unkown
page readonly
7FFEC8420000
trusted library allocation
page read and write
6F5000
heap
page read and write
5210000
trusted library allocation
page read and write
7FFEC80D4000
trusted library allocation
page read and write
6FA6000
heap
page read and write
7FFEC827D000
trusted library allocation
page execute and read and write
21D2E7C1000
trusted library allocation
page read and write
701D000
heap
page read and write
21D48A13000
heap
page read and write
4C8E000
stack
page read and write
22EC000
trusted library allocation
page read and write
32C7000
heap
page read and write
4CE000
stack
page read and write
23FF000
stack
page read and write
6FA8000
heap
page read and write
2EB0000
heap
page read and write
21D2CA50000
heap
page read and write
4B50000
trusted library allocation
page read and write
23EB000
stack
page read and write
C91000
unkown
page execute read
6FD0000
trusted library allocation
page read and write
73B4000
trusted library allocation
page read and write
766E000
stack
page read and write
3214000
trusted library allocation
page read and write
934F1FE000
stack
page read and write
6FB9000
heap
page read and write
3230000
heap
page read and write
21D48A00000
heap
page read and write
4CDE000
stack
page read and write
1D5A8823000
trusted library allocation
page read and write
7FFEC826C000
trusted library allocation
page read and write
934E1EF000
stack
page read and write
2EEE000
stack
page read and write
2690000
heap
page read and write
3193000
heap
page read and write
5220000
trusted library allocation
page read and write
500E000
stack
page read and write
3174000
heap
page read and write
1D5A4A02000
unkown
page readonly
7FFEC8430000
trusted library allocation
page execute and read and write
1D5A54C0000
heap
page read and write
1D5A881D000
trusted library allocation
page read and write
5200000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
6FC3000
heap
page read and write
730000
trusted library allocation
page read and write
75AE000
stack
page read and write
29E8000
heap
page read and write
3170000
heap
page read and write
77D000
heap
page read and write
6DE000
heap
page read and write
790000
trusted library allocation
page execute and read and write
6FC0000
heap
page read and write
7FFEC8310000
trusted library allocation
page execute and read and write
1D5BFB62000
unkown
page readonly
7FF453CE0000
trusted library allocation
page execute and read and write
21D47201000
heap
page read and write
19C000
stack
page read and write
7403000
trusted library allocation
page read and write
21D473B0000
heap
page read and write
7FFEC83D0000
trusted library allocation
page read and write
82F000
heap
page read and write
2011DFE000
stack
page read and write
22D5000
trusted library allocation
page read and write
46A0000
trusted library allocation
page read and write
21D2CAD0000
heap
page read and write
3740000
heap
page read and write
1D5B6E5D000
trusted library allocation
page read and write
35BE000
stack
page read and write
46A0000
trusted library allocation
page read and write
4EC0000
heap
page execute and read and write
3100000
heap
page read and write
73B0000
trusted library allocation
page read and write
73A000
heap
page read and write
3210000
trusted library allocation
page read and write
7FFEC82AC000
trusted library allocation
page execute and read and write
6245000
trusted library allocation
page read and write
709000
heap
page read and write
1D5C0182000
heap
page read and write
6FD0000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
4E80000
trusted library allocation
page execute and read and write
7FFEC83C8000
trusted library allocation
page read and write
7FFEC8196000
trusted library allocation
page execute and read and write
3268000
heap
page read and write
1D5BF862000
unkown
page readonly
318E000
stack
page read and write
2E78000
stack
page read and write
7FFEC82A0000
trusted library allocation
page execute and read and write
7FFEC8252000
trusted library allocation
page read and write
1710000
unkown
page readonly
2D90000
heap
page read and write
1D5A6E10000
heap
page execute and read and write
9B000
stack
page read and write
2A7B000
heap
page read and write
774000
heap
page read and write
7C8000
heap
page read and write
5D5000
heap
page read and write
315F000
heap
page read and write
5100000
trusted library allocation
page read and write
3250000
heap
page read and write
6FDF000
heap
page read and write
21D2EB0C000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
4F37000
heap
page read and write
6AE000
heap
page read and write
75FE000
stack
page read and write
6FD6000
trusted library allocation
page read and write
762E000
stack
page read and write
6F7B000
heap
page read and write
1D5BFBE0000
heap
page read and write
365000
stack
page read and write
7F448000
trusted library allocation
page execute and read and write
1D5A5250000
trusted library allocation
page read and write
3401000
trusted library allocation
page read and write
5281000
trusted library allocation
page read and write
1D5BF8D4000
unkown
page readonly
2738000
unkown
page readonly
500000
heap
page read and write
4EA2000
trusted library allocation
page read and write
7FFEC825D000
trusted library allocation
page execute and read and write
7F430000
trusted library allocation
page execute and read and write
745E000
stack
page read and write
5080000
heap
page read and write
1D5A7851000
trusted library allocation
page read and write
1D5A872F000
trusted library allocation
page read and write
46A5000
trusted library allocation
page read and write
34B5000
heap
page read and write
21D2CAF8000
heap
page read and write
31A0000
heap
page read and write
21D2CAF1000
heap
page read and write
934E4F2000
stack
page read and write
5305000
trusted library allocation
page read and write
21D2E8B6000
trusted library allocation
page read and write
1D5A6E40000
heap
page execute and read and write
5030000
heap
page read and write
1D5BF1D4000
heap
page read and write
7F138000
trusted library allocation
page execute and read and write
4D96000
trusted library allocation
page execute and read and write
5270000
heap
page execute and read and write
2F2B000
stack
page read and write
520000
heap
page read and write
4ED4000
trusted library allocation
page read and write
1D5A5268000
heap
page read and write
1D5A5235000
heap
page read and write
4C4D000
stack
page read and write
21D46F61000
heap
page read and write
1D5BF942000
heap
page read and write
21D2EDF3000
trusted library allocation
page read and write
7FFEC80B3000
trusted library allocation
page execute and read and write
15281000
trusted library allocation
page read and write
7FFEC80DD000
trusted library allocation
page execute and read and write
6CB000
heap
page read and write
4DB0000
heap
page read and write
4FC0000
heap
page readonly
7FFEC8254000
trusted library allocation
page read and write
3295000
heap
page read and write
21D3EC2A000
trusted library allocation
page read and write
710000
heap
page read and write
6F87000
heap
page read and write
78D000
heap
page read and write
325A000
heap
page read and write
467000
unkown
page readonly
51EFD000
unkown
page read and write
7037000
heap
page read and write
4D4E000
stack
page read and write
21D47212000
heap
page read and write
7FFEC80D0000
trusted library allocation
page read and write
30F3000
stack
page read and write
4F30000
trusted library allocation
page read and write
227E000
stack
page read and write
4B18000
trusted library allocation
page read and write
6FE0000
trusted library allocation
page read and write
7FFEC8445000
trusted library allocation
page read and write
2A7E000
heap
page read and write
21D471D3000
heap
page execute and read and write
3288000
heap
page read and write
7FFEC8223000
trusted library allocation
page execute and read and write
6FD0000
trusted library allocation
page read and write
21D2CB3B000
heap
page read and write
2B10000
unkown
page readonly
7FFEC83F0000
trusted library allocation
page read and write
6DE000
stack
page read and write
21D2EB9D000
trusted library allocation
page read and write
83F000
heap
page read and write
2637000
stack
page read and write
6FF000
heap
page read and write
509C000
stack
page read and write
51BE000
stack
page read and write
21D4A2E0000
trusted library allocation
page read and write
21D3E822000
trusted library allocation
page read and write
1D5A887D000
trusted library allocation
page read and write
3110000
heap
page read and write
1D5A5230000
heap
page read and write
400000
unkown
page readonly
20118FA000
stack
page read and write
934F83F000
stack
page read and write
6FB4000
heap
page read and write
4D80000
trusted library allocation
page read and write
21D4722A000
heap
page read and write
21D2E858000
trusted library allocation
page read and write
6D8000
heap
page read and write
7F040000
trusted library allocation
page execute and read and write
74E0000
trusted library allocation
page read and write
21D2EDE1000
trusted library allocation
page read and write
1D5A5535000
heap
page execute and read and write
46A0000
trusted library allocation
page read and write
1D5A529B000
heap
page read and write
54FB000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
21D48A2A000
heap
page read and write
1D5B6F20000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page read and write
7FFEC80C3000
trusted library allocation
page read and write
2FEF000
stack
page read and write
7007000
heap
page read and write
4FD0000
heap
page execute and read and write
508C000
trusted library allocation
page execute and read and write
4F20000
heap
page read and write
7FFEC8400000
trusted library allocation
page execute and read and write
4EA0000
trusted library allocation
page read and write
21D487DF000
heap
page read and write
7520000
trusted library allocation
page read and write
21D46ECB000
heap
page read and write
6F8B000
heap
page read and write
31A4000
heap
page read and write
798000
heap
page read and write
31F1000
heap
page read and write
20116FE000
stack
page read and write
1D5A8250000
trusted library allocation
page read and write
21D2CA40000
heap
page read and write
21D2EDED000
trusted library allocation
page read and write
51E30000
unkown
page readonly
6FDC000
heap
page read and write
6D5000
heap
page read and write
6F7A000
heap
page read and write
776000
heap
page read and write
785000
heap
page read and write
3E0000
heap
page read and write
73D0000
trusted library allocation
page read and write
4D8E000
stack
page read and write
51F06000
unkown
page readonly
7FFEC845A000
trusted library allocation
page read and write
76B000
trusted library allocation
page execute and read and write
46A0000
trusted library allocation
page read and write
76F0000
trusted library allocation
page read and write
21D2CB0E000
heap
page read and write
7FFEC8420000
trusted library allocation
page read and write
32DE000
heap
page read and write
21D2EB95000
trusted library allocation
page read and write
6F90000
heap
page read and write
5ED5000
trusted library allocation
page read and write
77A000
heap
page read and write
7FFEC824B000
trusted library allocation
page execute and read and write
7FFEC8160000
trusted library allocation
page read and write
4E90000
heap
page execute and read and write
7FFEC8244000
trusted library allocation
page read and write
514E000
stack
page read and write
31B6000
heap
page read and write
6FD0000
heap
page read and write
56A1000
trusted library allocation
page read and write
4B8D000
stack
page read and write
2A7E000
heap
page read and write
21D467C0000
trusted library allocation
page read and write
21D46F01000
heap
page read and write
2690000
heap
page read and write
51E31000
unkown
page execute read
7FFEC8460000
trusted library allocation
page execute and read and write
3283000
heap
page read and write
7FFEC82C0000
trusted library allocation
page read and write
1D5B6F58000
trusted library allocation
page read and write
6F89000
heap
page read and write
20114FE000
stack
page read and write
4E50000
trusted library allocation
page read and write
21D2CB11000
heap
page read and write
7FFEC8300000
trusted library allocation
page read and write
480000
heap
page read and write
304E000
stack
page read and write
2A88000
heap
page read and write
7FFEC8250000
trusted library allocation
page read and write
7FFEC823D000
trusted library allocation
page execute and read and write
21D2E5F4000
heap
page read and write
1D5A55B5000
heap
page read and write
75EE000
stack
page read and write
2A7C000
heap
page read and write
21D48A70000
heap
page read and write
2820000
heap
page read and write
There are 946 hidden memdumps, click here to show them.