IOC Report
ScreenConnect.ClientSetup(27).exe

loading gif

Files

File Path
Type
Category
Malicious
ScreenConnect.ClientSetup(27).exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Program Files (x86)\ScreenConnect Client (ce601acb92245386)\ScreenConnect.ClientService.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Config.Msi\5c8b3a.rbs
data
modified
C:\Program Files (x86)\ScreenConnect Client (ce601acb92245386)\Client.en-US.resources
data
dropped
C:\Program Files (x86)\ScreenConnect Client (ce601acb92245386)\Client.resources
data
dropped
C:\Program Files (x86)\ScreenConnect Client (ce601acb92245386)\ScreenConnect.Client.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\ScreenConnect Client (ce601acb92245386)\ScreenConnect.ClientService.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\ScreenConnect Client (ce601acb92245386)\ScreenConnect.Core.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\ScreenConnect Client (ce601acb92245386)\ScreenConnect.Windows.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\ScreenConnect Client (ce601acb92245386)\ScreenConnect.WindowsBackstageShell.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\ScreenConnect Client (ce601acb92245386)\ScreenConnect.WindowsBackstageShell.exe.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\ScreenConnect Client (ce601acb92245386)\ScreenConnect.WindowsClient.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\ScreenConnect Client (ce601acb92245386)\ScreenConnect.WindowsClient.exe.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\ScreenConnect Client (ce601acb92245386)\ScreenConnect.WindowsCredentialProvider.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files (x86)\ScreenConnect Client (ce601acb92245386)\ScreenConnect.WindowsFileManager.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\ScreenConnect Client (ce601acb92245386)\ScreenConnect.WindowsFileManager.exe.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\ScreenConnect Client (ce601acb92245386)\app.config
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\ScreenConnect Client (ce601acb92245386)\system.config
XML 1.0 document, ASCII text, with very long lines (450), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xf7a04dd5, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ScreenConnect.ClientSetup(27).exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\MSI8741.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
C:\Users\user\AppData\Local\Temp\MSI8741.tmp-\CustomAction.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\MSI8741.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI8741.tmp-\ScreenConnect.Core.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI8741.tmp-\ScreenConnect.InstallerActions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI8741.tmp-\ScreenConnect.Windows.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\ScreenConnect\ce601acb92245386\setup.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}, Create Time/Date: Wed Feb 21 19:39:02 2024, Last Saved Time/Date: Wed Feb 21 19:39:02 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
dropped
C:\Windows\Installer\5c8b39.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}, Create Time/Date: Wed Feb 21 19:39:02 2024, Last Saved Time/Date: Wed Feb 21 19:39:02 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
dropped
C:\Windows\Installer\5c8b3b.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}, Create Time/Date: Wed Feb 21 19:39:02 2024, Last Saved Time/Date: Wed Feb 21 19:39:02 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
dropped
C:\Windows\Installer\MSI8E27.tmp
data
dropped
C:\Windows\Installer\MSI8E66.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI91C3.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\SourceHash{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}\DefaultIcon
MS Windows icon resource - 3 icons, 16x16 with PNG image data, 16 x 16, 8-bit colormap, non-interlaced, 4 bits/pixel, 32x32 with PNG image data, 32 x 32, 1-bit colormap, non-interlaced, 4 bits/pixel
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (ce601acb92245386)\user.config (copy)
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (ce601acb92245386)\zehlfngi.newcfg
XML 1.0 document, ASCII text, with CRLF line terminators
modified
C:\Windows\Temp\~DF088A0D4D847346FD.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF11CD5EBDF1E5043E.TMP
data
dropped
C:\Windows\Temp\~DF28DCAAF2AAFC9B9A.TMP
data
dropped
C:\Windows\Temp\~DF32EF17214AD7382D.TMP
data
dropped
C:\Windows\Temp\~DF3FFA85E6750A390B.TMP
data
dropped
C:\Windows\Temp\~DF96B67A5B7F2B4038.TMP
data
dropped
C:\Windows\Temp\~DFA396AF6431A52550.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFB06A89B8A29481E6.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFC2BA8D64232887F6.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFD32AAFFB3FBA3A24.TMP
data
dropped
C:\Windows\Temp\~DFD6CBCACF5BF12D58.TMP
data
dropped
C:\Windows\Temp\~DFE46C777A9F0C7393.TMP
Composite Document File V2 Document, Cannot read section info
dropped
There are 44 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ScreenConnect.ClientSetup(27).exe
"C:\Users\user\Desktop\ScreenConnect.ClientSetup(27).exe"
malicious
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
malicious
C:\Program Files (x86)\ScreenConnect Client (ce601acb92245386)\ScreenConnect.ClientService.exe
"C:\Program Files (x86)\ScreenConnect Client (ce601acb92245386)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=89.43.28.229&p=8041&s=4af472d5-e551-4005-a126-503edb856296&k=BgIAAACkAABSU0ExAAgAAAEAAQC9J11i1IcRkYop2TycAp5K4RRKlLAUx4RuayPuLGq%2b%2bz1SrEkKJu7LSew91XxtbRam8zYNqziS%2b4sMOkWFBGzY%2bAOA9QnsWK6b7ncsPmHeg5jCkSeTC%2betKc4MuK94q5AHJES7CJcRW%2fBNz%2fJA9wvDvINQMMgToVWu%2fqJTsdrl7PJBXyTzuE6Rb0dN8IcSPIqsIjpGSq4uqnnlSAjjOHO503z6UUQCzk9NFWrKRhlmzGM0uvvRCSeMBGadOV%2fZbWQ4MEzf%2fAWw86k%2fYfTBFwW23KZV5BJ08ylr9L9Tz8wJAl4Q6S5eYfVazkM1C9DoFEJssQFe3QmIGp3g5UFhbXut&t=CBR"
malicious
C:\Program Files (x86)\ScreenConnect Client (ce601acb92245386)\ScreenConnect.WindowsClient.exe
"C:\Program Files (x86)\ScreenConnect Client (ce601acb92245386)\ScreenConnect.WindowsClient.exe" "RunRole" "d839c8e7-3c23-47f2-a995-7e4a438c1ad3" "User"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\ce601acb92245386\setup.msi"
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding E49D9630851C51BAAED691195B56D919 C
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI8741.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6064187 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding A9AB1835E8DD19CBED19F580B2093DC7
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding D88DC2B5D696E53B87AC1E4F8F30C031 E Global\MSI0000
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
unknown
http://crl.ver)
unknown
http://www.tiro.com
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
http://www.fontbureau.com/designers
unknown
http://wixtoolset.org/news/
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
https://g.live.com/odclientsettings/Prod.C:
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://wixtoolset.org/releases/
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://g.live.com/odclientsettings/ProdV2
unknown
https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://feedback.screenconnect.com/Feedback.axd
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
unknown
There are 26 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
89.43.28.229
unknown
Turkey
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\5c8b3a.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\5c8b3a.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\4C8A025BFD30BB2D5DDFF4CF2C1AB742
8C0A2C811E2DF6911E33C6E9206FCDAA
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2E55A1E1A5BEDF00EFF00FA74074E297
8C0A2C811E2DF6911E33C6E9206FCDAA
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C3BAAB8C52C8AF0670F0DFED34EF56AF
8C0A2C811E2DF6911E33C6E9206FCDAA
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1E5545BD5BE80E604F4C5179EA17E5A8
8C0A2C811E2DF6911E33C6E9206FCDAA
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E9FDD75A42412199DAAD3F643E8C41F3
8C0A2C811E2DF6911E33C6E9206FCDAA
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D0DDABF1861213F97A1E3B251A5168F7
8C0A2C811E2DF6911E33C6E9206FCDAA
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\ScreenConnect Client (ce601acb92245386)\
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\sc-ce601acb92245386
URL Protocol
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\sc-ce601acb92245386
UseOriginalUrlEncoding
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\sc-ce601acb92245386\shell\open\command
NULL
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Network\ScreenConnect Client (ce601acb92245386)
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-946A-5341B0B949D5}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-946A-5341B0B949D5}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-946A-5341B0B949D5}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers\{6FF59A85-BC37-4CD4-946A-5341B0B949D5}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\616D9C4BAA4A4F09EC06A1BC29423568
8C0A2C811E2DF6911E33C6E9206FCDAA
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\8C0A2C811E2DF6911E33C6E9206FCDAA
Full
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\Features
Full
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Windows\Installer\{18C2A0C8-D2E1-196F-E133-6C9E02F6DCAA}\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8C0A2C811E2DF6911E33C6E9206FCDAA
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8C0A2C811E2DF6911E33C6E9206FCDAA
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8C0A2C811E2DF6911E33C6E9206FCDAA
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8C0A2C811E2DF6911E33C6E9206FCDAA
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8C0A2C811E2DF6911E33C6E9206FCDAA
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8C0A2C811E2DF6911E33C6E9206FCDAA
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8C0A2C811E2DF6911E33C6E9206FCDAA
ProductIcon
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8C0A2C811E2DF6911E33C6E9206FCDAA
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8C0A2C811E2DF6911E33C6E9206FCDAA
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8C0A2C811E2DF6911E33C6E9206FCDAA
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\616D9C4BAA4A4F09EC06A1BC29423568
8C0A2C811E2DF6911E33C6E9206FCDAA
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8C0A2C811E2DF6911E33C6E9206FCDAA
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\8C0A2C811E2DF6911E33C6E9206FCDAA\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
AutoBackupLogFiles
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\ScreenConnect
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (ce601acb92245386)
ImagePath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 88 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
16736690000
trusted library allocation
page read and write
1B768000
unkown
page readonly
764000
unkown
page write copy
8F9000
stack
page read and write
4DBC000
trusted library allocation
page execute and read and write
3DDA000
unkown
page readonly
7FFD9B550000
trusted library allocation
page read and write
1872E5E0000
remote allocation
page read and write
A50000
heap
page read and write
7B7B000
trusted library allocation
page read and write
A26E000
stack
page read and write
10F5000
heap
page read and write
6A22000
trusted library allocation
page read and write
3AFA000
unkown
page readonly
4AE1000
heap
page read and write
18728EB6000
heap
page read and write
8C0000
heap
page read and write
1B7AA000
unkown
page readonly
18728DA0000
trusted library section
page read and write
1670000
trusted library allocation
page read and write
7FFD9B3D6000
trusted library allocation
page execute and read and write
3D2F000
unkown
page readonly
A3D000
trusted library allocation
page execute and read and write
7FFD9B530000
trusted library allocation
page read and write
3D2B000
unkown
page readonly
3AD8000
unkown
page readonly
1872E2E2000
heap
page read and write
3D86000
unkown
page readonly
1080000
trusted library allocation
page read and write
1B788000
unkown
page readonly
1AE537C000
stack
page read and write
A40000
unkown
page readonly
71A0000
trusted library allocation
page execute and read and write
911000
stack
page read and write
7FFD9B700000
trusted library allocation
page read and write
3DC3000
unkown
page readonly
CD0000
trusted library allocation
page read and write
12FB000
heap
page read and write
12B0000
trusted library allocation
page read and write
1872E525000
trusted library allocation
page read and write
7FFD9B588000
trusted library allocation
page read and write
3E08000
unkown
page readonly
18728E22000
heap
page read and write
7FFD9B5C0000
trusted library allocation
page read and write
4BED000
heap
page read and write
16735F20000
heap
page read and write
1B843000
unkown
page readonly
2780000
heap
page read and write
A22F000
stack
page read and write
18729602000
heap
page read and write
4D90000
trusted library allocation
page read and write
5D51000
trusted library allocation
page read and write
71F0000
trusted library allocation
page read and write
6CDD000
trusted library allocation
page read and write
12791000
trusted library allocation
page read and write
7FFD9B67B000
trusted library allocation
page read and write
8FA000
heap
page read and write
6BB9000
trusted library allocation
page read and write
7FFD9B490000
trusted library allocation
page read and write
3A31000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9B3B0000
trusted library allocation
page execute and read and write
700000
heap
page read and write
18728E73000
heap
page read and write
5DE000
stack
page read and write
2848000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
1AE517E000
stack
page read and write
440D000
stack
page read and write
16736102000
heap
page read and write
7235000
trusted library allocation
page read and write
1B7D1000
unkown
page readonly
7FFD9B2FD000
trusted library allocation
page execute and read and write
A82C000
stack
page read and write
18728F13000
heap
page read and write
7FFD9B510000
trusted library allocation
page read and write
BBF000
stack
page read and write
6D0000
heap
page read and write
18729E20000
trusted library section
page readonly
7FFD9B720000
trusted library allocation
page execute and read and write
4AB0000
trusted library allocation
page read and write
14F0000
heap
page read and write
1B5BC000
heap
page read and write
3E50000
unkown
page readonly
1872E470000
trusted library allocation
page read and write
18729E40000
trusted library section
page readonly
7224000
trusted library allocation
page read and write
1B808000
unkown
page readonly
71F2000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
E00000
heap
page read and write
3AC7000
unkown
page readonly
3D5A000
unkown
page readonly
7FFD9B4B0000
trusted library allocation
page read and write
1B743000
unkown
page readonly
1872E4AC000
trusted library allocation
page read and write
3D12000
unkown
page readonly
1872E2F9000
heap
page read and write
5310000
trusted library allocation
page read and write
1B745000
unkown
page readonly
3DDE000
unkown
page readonly
75D000
unkown
page readonly
1872E2C2000
heap
page read and write
7FFD9B4D8000
trusted library allocation
page read and write
18728E13000
heap
page read and write
5D72000
trusted library allocation
page read and write
A4D000
unkown
page readonly
4B75B7E000
unkown
page readonly
4B754FE000
stack
page read and write
26BF000
stack
page read and write
3E2A000
unkown
page readonly
7FFD9B4E5000
trusted library allocation
page read and write
CF0000
trusted library allocation
page read and write
2720000
unkown
page readonly
4B74F7E000
unkown
page readonly
3E54000
unkown
page readonly
4B751FE000
stack
page read and write
7220000
trusted library allocation
page read and write
3FAE000
stack
page read and write
3D5C000
unkown
page readonly
12E7000
heap
page read and write
1B670000
heap
page read and write
121A000
heap
page read and write
3AB4000
unkown
page readonly
545D000
stack
page read and write
1085000
trusted library allocation
page execute and read and write
1AE567E000
unkown
page readonly
1AE547E000
unkown
page readonly
1B472000
unkown
page readonly
C30000
heap
page read and write
5EDC000
trusted library allocation
page read and write
1A38000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page read and write
12C7000
trusted library allocation
page execute and read and write
1B71E000
unkown
page readonly
3E61000
trusted library allocation
page read and write
3270000
heap
page read and write
1B4D8000
unkown
page readonly
E38000
unkown
page readonly
1872E4A4000
trusted library allocation
page read and write
9E70000
heap
page read and write
3CC2000
unkown
page readonly
1872E460000
trusted library allocation
page read and write
B58000
heap
page read and write
51C000
stack
page read and write
3D93000
unkown
page readonly
32A8000
heap
page read and write
1B716000
unkown
page readonly
7FFD9B7F4000
trusted library allocation
page read and write
146E000
stack
page read and write
1B4A3000
unkown
page readonly
18729600000
heap
page read and write
7FFD9B51E000
trusted library allocation
page read and write
1AD1D000
stack
page read and write
A20000
trusted library allocation
page read and write
2AE9000
trusted library allocation
page read and write
1872E44E000
trusted library allocation
page read and write
5400000
trusted library section
page read and write
163E000
stack
page read and write
1C099000
heap
page read and write
1872E1C0000
trusted library allocation
page read and write
7FFD9B7E0000
trusted library allocation
page read and write
1872E53F000
trusted library allocation
page read and write
71B0000
trusted library allocation
page read and write
2E50000
heap
page execute and read and write
3E06000
unkown
page readonly
3DBF000
unkown
page readonly
1B3DE000
stack
page read and write
40EE000
stack
page read and write
1072000
trusted library allocation
page read and write
7FFD9B564000
trusted library allocation
page read and write
7FFD9B581000
trusted library allocation
page read and write
559E000
stack
page read and write
5360000
heap
page execute and read and write
7FF425750000
trusted library allocation
page execute and read and write
7FFD9B6F0000
trusted library allocation
page read and write
7220000
trusted library allocation
page read and write
3A80000
unkown
page readonly
1B799000
unkown
page readonly
1B7C9000
unkown
page readonly
18729C50000
trusted library allocation
page read and write
1360000
heap
page read and write
1872F000000
heap
page read and write
18728EFF000
heap
page read and write
1872E441000
trusted library allocation
page read and write
B4B000
stack
page read and write
1B72E000
unkown
page readonly
16736002000
heap
page read and write
302E000
stack
page read and write
1872E2F7000
heap
page read and write
7FFD9B5B0000
trusted library allocation
page read and write
7FFD9B310000
trusted library allocation
page read and write
3E56000
unkown
page readonly
D10000
heap
page read and write
7190000
trusted library allocation
page read and write
8F0000
heap
page read and write
A80000
heap
page read and write
3A00000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
18728E7A000
heap
page read and write
1B4B6000
unkown
page readonly
18728E9F000
heap
page read and write
1B786000
unkown
page readonly
3D34000
unkown
page readonly
1AE507E000
unkown
page readonly
1872E528000
trusted library allocation
page read and write
14BE000
stack
page read and write
3D8F000
unkown
page readonly
18728EA1000
heap
page read and write
3B30000
trusted library allocation
page read and write
1650000
heap
page execute and read and write
718E000
stack
page read and write
7230000
trusted library allocation
page read and write
42C0000
trusted library allocation
page read and write
7224000
trusted library allocation
page read and write
4AE0000
heap
page read and write
4B760FE000
stack
page read and write
42B0000
trusted library allocation
page read and write
4D20000
heap
page read and write
10EE000
stack
page read and write
1C06D000
stack
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
5050000
trusted library allocation
page read and write
7FFD9B524000
trusted library allocation
page read and write
1872E242000
heap
page read and write
18728E78000
heap
page read and write
1350000
trusted library allocation
page read and write
A4D000
unkown
page readonly
7FFD9B650000
trusted library allocation
page read and write
1B77E000
unkown
page readonly
1B7B8000
unkown
page readonly
18728C80000
heap
page read and write
57EB000
trusted library section
page read and write
74E000
stack
page read and write
4370000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
7FFD9B303000
trusted library allocation
page read and write
30B5000
heap
page read and write
14C0000
trusted library allocation
page read and write
12D5000
heap
page read and write
1AE4D7D000
stack
page read and write
1872E24F000
heap
page read and write
2E3E000
stack
page read and write
2E81000
trusted library allocation
page read and write
1872E260000
heap
page read and write
18728E94000
heap
page read and write
3AC5000
unkown
page readonly
1872E420000
trusted library allocation
page read and write
4C7E000
stack
page read and write
3AE9000
unkown
page readonly
1B83F000
unkown
page readonly
4DC0000
heap
page read and write
2FEF000
stack
page read and write
5EC4000
trusted library allocation
page read and write
B31000
heap
page read and write
39D2000
unkown
page readonly
7FFD9B5D0000
trusted library allocation
page read and write
1B50A000
heap
page read and write
1BD76000
stack
page read and write
2722000
unkown
page readonly
A30000
heap
page read and write
1070000
trusted library allocation
page read and write
1872E455000
trusted library allocation
page read and write
7FFD9B7DD000
trusted library allocation
page read and write
4280000
trusted library allocation
page read and write
8B0000
heap
page read and write
18729E30000
trusted library section
page readonly
7FFD9B6C0000
trusted library allocation
page read and write
121E000
heap
page read and write
1B74D000
unkown
page readonly
540000
unkown
page readonly
306F000
stack
page read and write
1872E4CE000
trusted library allocation
page read and write
3A60000
trusted library allocation
page read and write
16735F00000
heap
page read and write
1872E484000
trusted library allocation
page read and write
B1F000
heap
page read and write
1B50F000
heap
page read and write
4DB9000
trusted library allocation
page execute and read and write
3D23000
unkown
page readonly
9F8E000
stack
page read and write
1B59F000
heap
page read and write
55A0000
trusted library allocation
page read and write
4B16000
heap
page read and write
A0E000
stack
page read and write
4DA0000
trusted library allocation
page read and write
3E02000
unkown
page readonly
1872E4B2000
trusted library allocation
page read and write
1872E440000
trusted library allocation
page read and write
2E61000
trusted library allocation
page read and write
3A5B000
trusted library allocation
page read and write
3D3F000
unkown
page readonly
1B4A5000
unkown
page readonly
7220000
trusted library allocation
page read and write
4B74D7E000
unkown
page readonly
C20000
trusted library allocation
page read and write
A4B0000
heap
page read and write
AFE000
heap
page read and write
4CBE000
stack
page read and write
7FFD9B600000
trusted library allocation
page read and write
1B819000
unkown
page readonly
1872E440000
trusted library allocation
page read and write
4C00000
trusted library allocation
page read and write
1B83B000
unkown
page readonly
45F0000
trusted library allocation
page read and write
5A21000
trusted library allocation
page read and write
4B7507E000
unkown
page readonly
504D000
stack
page read and write
3D3D000
unkown
page readonly
B11000
heap
page read and write
7FFD9B520000
trusted library allocation
page read and write
4B74C7B000
stack
page read and write
7FFD9B820000
trusted library allocation
page read and write
1200000
trusted library allocation
page execute and read and write
7FFD9B410000
trusted library allocation
page execute and read and write
4B7477E000
unkown
page readonly
1B160000
unkown
page readonly
2791000
trusted library allocation
page read and write
5A1F000
stack
page read and write
12C0000
trusted library allocation
page read and write
1872E4FA000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
1B15E000
stack
page read and write
1872E48D000
trusted library allocation
page read and write
4B7587E000
stack
page read and write
51CC000
stack
page read and write
9C2000
heap
page read and write
7FFD9B710000
trusted library allocation
page execute and read and write
535E000
stack
page read and write
3DC1000
unkown
page readonly
1B518000
heap
page read and write
1872E55A000
trusted library allocation
page read and write
1275000
heap
page read and write
BFC000
stack
page read and write
1872E2C0000
heap
page read and write
1B782000
unkown
page readonly
4AD3000
heap
page read and write
3D97000
unkown
page readonly
4B7527E000
unkown
page readonly
18729B40000
trusted library allocation
page read and write
A3AE000
stack
page read and write
3D91000
unkown
page readonly
1B54A000
heap
page read and write
1AE527E000
unkown
page readonly
7FFD9B540000
trusted library allocation
page read and write
7FFD9B7F9000
trusted library allocation
page read and write
1B492000
unkown
page readonly
7B70000
trusted library allocation
page read and write
275B000
trusted library allocation
page read and write
3A50000
trusted library allocation
page read and write
4B7557E000
unkown
page readonly
18728E8F000
heap
page read and write
41D5000
trusted library allocation
page read and write
51DE000
stack
page read and write
4B40000
heap
page read and write
1872E200000
heap
page read and write
3DA8000
unkown
page readonly
7FFD9B64C000
trusted library allocation
page read and write
7FFD9B500000
trusted library allocation
page read and write
7220000
trusted library allocation
page read and write
590000
heap
page read and write
18729713000
heap
page read and write
4B74B7E000
unkown
page readonly
1B730000
unkown
page readonly
1D2A2000
trusted library allocation
page read and write
3CB0000
trusted library allocation
page read and write
32B6000
heap
page read and write
1872E580000
trusted library allocation
page read and write
A08F000
stack
page read and write
3A2E000
trusted library allocation
page read and write
1872E2C7000
heap
page read and write
412E000
stack
page read and write
A5EE000
stack
page read and write
3E52000
unkown
page readonly
E38000
stack
page read and write
1872E28D000
heap
page read and write
BA1000
heap
page read and write
1B757000
unkown
page readonly
7FFD9B566000
trusted library allocation
page read and write
1872E21F000
heap
page read and write
4B7467C000
stack
page read and write
6BC0000
trusted library allocation
page read and write
18728E7D000
heap
page read and write
1872E590000
trusted library allocation
page read and write
1872E534000
trusted library allocation
page read and write
1B725000
unkown
page readonly
16736022000
heap
page read and write
2691000
trusted library allocation
page read and write
3D27000
unkown
page readonly
B17000
heap
page read and write
4290000
trusted library allocation
page read and write
1B747000
unkown
page readonly
16736802000
trusted library allocation
page read and write
1872E502000
trusted library allocation
page read and write
75D000
unkown
page readonly
3AA1000
unkown
page readonly
40D5000
trusted library allocation
page read and write
422E000
stack
page read and write
66D000
stack
page read and write
1254000
heap
page read and write
5DD1000
trusted library allocation
page read and write
1257000
heap
page read and write
624C000
trusted library allocation
page read and write
4B67000
heap
page read and write
18728E40000
heap
page read and write
55B0000
trusted library allocation
page execute and read and write
1872E30A000
heap
page read and write
3D58000
unkown
page readonly
1872E4D1000
trusted library allocation
page read and write
1872E520000
trusted library allocation
page read and write
14DC000
trusted library allocation
page read and write
A54000
unkown
page read and write
18729700000
heap
page read and write
2697000
trusted library allocation
page read and write
5070000
trusted library allocation
page read and write
1872E5E0000
remote allocation
page read and write
142F000
stack
page read and write
18729615000
heap
page read and write
4B7597E000
unkown
page readonly
1872E458000
trusted library allocation
page read and write
52DE000
stack
page read and write
C24000
trusted library allocation
page read and write
AD0000
heap
page read and write
7230000
trusted library allocation
page read and write
1B7CB000
unkown
page readonly
4D6E000
stack
page read and write
563E000
stack
page read and write
1B7F5000
unkown
page readonly
7220000
trusted library allocation
page read and write
1872E2F0000
heap
page read and write
1AE478C000
stack
page read and write
3D41000
unkown
page readonly
1B7B2000
unkown
page readonly
1B1A0000
heap
page execute and read and write
7FFD9B7F0000
trusted library allocation
page read and write
436C000
trusted library allocation
page read and write
26D3000
heap
page execute and read and write
1B7AC000
unkown
page readonly
766000
unkown
page readonly
12AD000
trusted library allocation
page execute and read and write
4B0A000
heap
page read and write
1B7CD000
unkown
page readonly
4055000
trusted library allocation
page read and write
950000
heap
page read and write
1B650000
heap
page read and write
7220000
trusted library allocation
page read and write
2BDE000
trusted library allocation
page read and write
1D280000
trusted library allocation
page read and write
10A0000
trusted library allocation
page read and write
106D000
trusted library allocation
page execute and read and write
426E000
stack
page read and write
1680000
heap
page execute and read and write
3BF1000
trusted library allocation
page read and write
1872E531000
trusted library allocation
page read and write
1B5A9000
heap
page read and write
3DDC000
unkown
page readonly
4B74277000
stack
page read and write
4AA0000
heap
page read and write
4B0E000
heap
page read and write
327A000
heap
page read and write
57DD000
stack
page read and write
4B7497E000
unkown
page readonly
1D680000
heap
page read and write
1872E5A0000
trusted library allocation
page read and write
3D95000
unkown
page readonly
187295E1000
trusted library allocation
page read and write
4B74E7E000
unkown
page readonly
1B4C7000
unkown
page readonly
4D70000
heap
page execute and read and write
6E0000
heap
page read and write
1872E5E0000
remote allocation
page read and write
1673602B000
heap
page read and write
12B6000
trusted library allocation
page execute and read and write
12E1000
heap
page read and write
7FFD9B5A0000
trusted library allocation
page read and write
1BC78000
stack
page read and write
1B6B0000
unkown
page readonly
174E000
trusted library allocation
page read and write
1B856000
unkown
page readonly
1087000
trusted library allocation
page execute and read and write
7220000
trusted library allocation
page read and write
7FFD9B30D000
trusted library allocation
page execute and read and write
1872971B000
heap
page read and write
5430000
trusted library allocation
page execute and read and write
7220000
trusted library allocation
page read and write
3D77000
unkown
page readonly
130E000
heap
page read and write
107A000
trusted library allocation
page execute and read and write
7FFD9B7BC000
trusted library allocation
page read and write
16736200000
heap
page read and write
4373000
trusted library allocation
page read and write
750000
unkown
page readonly
7210000
trusted library allocation
page read and write
A41000
unkown
page execute read
E8E000
stack
page read and write
3D88000
unkown
page readonly
1B2DF000
stack
page read and write
1082000
trusted library allocation
page read and write
520E000
stack
page read and write
18728C60000
heap
page read and write
5D4E000
trusted library allocation
page read and write
1836000
trusted library allocation
page read and write
8FE000
heap
page read and write
18729E50000
trusted library section
page readonly
3E3B000
unkown
page readonly
1B82A000
unkown
page readonly
C2D000
trusted library allocation
page execute and read and write
12E0000
trusted library allocation
page read and write
4015000
trusted library allocation
page read and write
7FFD9B4A0000
trusted library allocation
page read and write
1A32000
trusted library allocation
page read and write
1872971A000
heap
page read and write
7220000
trusted library allocation
page read and write
7FFD9B670000
trusted library allocation
page read and write
18B4000
trusted library allocation
page read and write
127D000
heap
page read and write
1C108000
heap
page read and write
5650000
trusted library section
page read and write
1B723000
unkown
page readonly
4B73CCB000
stack
page read and write
16736013000
heap
page read and write
2710000
heap
page execute and read and write
57F2000
trusted library section
page read and write
ADC000
heap
page read and write
39E2000
unkown
page readonly
1470000
trusted library allocation
page execute and read and write
4A80000
trusted library allocation
page read and write
14D0000
trusted library allocation
page read and write
A34000
trusted library allocation
page read and write
3EAE000
stack
page read and write
319F000
trusted library allocation
page read and write
108B000
trusted library allocation
page execute and read and write
1872E496000
trusted library allocation
page read and write
3CC0000
unkown
page readonly
1AE4E7E000
unkown
page readonly
7FFD9B4C0000
trusted library allocation
page read and write
4B74DFE000
stack
page read and write
7FFD9B4E0000
trusted library allocation
page read and write
7FFD9B6E0000
trusted library allocation
page execute and read and write
18728E59000
heap
page read and write
18729702000
heap
page read and write
18728E5B000
heap
page read and write
E31000
unkown
page readonly
3E19000
unkown
page readonly
134D000
stack
page read and write
4C20000
trusted library allocation
page execute and read and write
18728EAE000
heap
page read and write
18728E00000
heap
page read and write
1872E22C000
heap
page read and write
4D94000
trusted library allocation
page read and write
1872E590000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
D03000
trusted library allocation
page read and write
2752000
unkown
page readonly
7230000
trusted library allocation
page read and write
7FFD9B2F3000
trusted library allocation
page execute and read and write
1B714000
unkown
page readonly
4B753FE000
stack
page read and write
1691000
trusted library allocation
page read and write
1872E24D000
heap
page read and write
1872E430000
trusted library allocation
page read and write
5060000
trusted library allocation
page execute and read and write
5370000
trusted library section
page read and write
16736040000
heap
page read and write
18729891000
trusted library allocation
page read and write
7FFD9B620000
trusted library allocation
page read and write
1490000
heap
page read and write
1B564000
heap
page read and write
3D52000
unkown
page readonly
18729D40000
trusted library allocation
page read and write
A30000
trusted library allocation
page read and write
11FF000
stack
page read and write
7FFD9B3AC000
trusted library allocation
page execute and read and write
4B7577E000
unkown
page readonly
32A0000
heap
page read and write
1076000
trusted library allocation
page execute and read and write
39F0000
trusted library allocation
page read and write
A90000
heap
page read and write
10F0000
heap
page read and write
1872E4E3000
trusted library allocation
page read and write
3DC7000
unkown
page readonly
1B1D0000
heap
page read and write
30B0000
heap
page read and write
2E40000
trusted library allocation
page read and write
1B7AE000
unkown
page readonly
7226000
trusted library allocation
page read and write
7FFD9B680000
trusted library allocation
page read and write
B21000
heap
page read and write
3250000
heap
page read and write
3D66000
unkown
page readonly
4B7457E000
unkown
page readonly
18728D90000
trusted library allocation
page read and write
1B57B000
heap
page read and write
4ACE000
stack
page read and write
1C0E5000
heap
page read and write
623B000
trusted library allocation
page read and write
3D2D000
unkown
page readonly
1B74B000
unkown
page readonly
1BE76000
stack
page read and write
3E4E000
unkown
page readonly
105E000
stack
page read and write
7FFD9B3A0000
trusted library allocation
page read and write
18728E2B000
heap
page read and write
1872E4E0000
trusted library allocation
page read and write
55FE000
stack
page read and write
4F4D000
stack
page read and write
3BBB000
trusted library allocation
page read and write
1B588000
heap
page read and write
1064000
trusted library allocation
page read and write
CCE000
stack
page read and write
12CB000
trusted library allocation
page execute and read and write
7230000
trusted library allocation
page read and write
714E000
stack
page read and write
3DBD000
unkown
page readonly
1872E570000
trusted library allocation
page read and write
1AE4F7E000
stack
page read and write
1210000
heap
page read and write
1872E53C000
trusted library allocation
page read and write
3D54000
unkown
page readonly
4A90000
trusted library allocation
page read and write
5D6B000
trusted library allocation
page read and write
1B777000
unkown
page readonly
751000
unkown
page execute read
AF0000
heap
page read and write
85A1000
trusted library allocation
page read and write
530B000
stack
page read and write
7FFD9B2F4000
trusted library allocation
page read and write
E20000
heap
page read and write
7FFD9B34C000
trusted library allocation
page execute and read and write
7FFD9B7A0000
trusted library allocation
page read and write
1B841000
unkown
page readonly
50CE000
stack
page read and write
7FFD9B7B9000
trusted library allocation
page read and write
8E0000
trusted library section
page read and write
4270000
trusted library allocation
page read and write
32F7000
heap
page read and write
1872E302000
heap
page read and write
A72C000
stack
page read and write
7230000
trusted library allocation
page read and write
7FFD9B610000
trusted library allocation
page read and write
A85000
heap
page read and write
7220000
trusted library allocation
page read and write
7FFD9B4F0000
trusted library allocation
page read and write
4AD0000
heap
page read and write
3DB9000
unkown
page readonly
7FB40000
trusted library allocation
page execute and read and write
7240000
trusted library allocation
page read and write
9E6E000
stack
page read and write
A36F000
stack
page read and write
1A36000
trusted library allocation
page read and write
7FFD9B2F0000
trusted library allocation
page read and write
1872E257000
heap
page read and write
1B7B6000
unkown
page readonly
540000
unkown
page readonly
18D6000
trusted library allocation
page read and write
A4AE000
stack
page read and write
4376000
trusted library allocation
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
4380000
trusted library allocation
page execute and read and write
1C0A0000
heap
page read and write
4D1E000
stack
page read and write
D15000
heap
page read and write
A54000
unkown
page write copy
1B701000
unkown
page readonly
7FFD9B506000
trusted library allocation
page read and write
B13000
heap
page read and write
5EBB000
trusted library allocation
page read and write
18729E60000
trusted library section
page readonly
16736000000
heap
page read and write
1B500000
heap
page read and write
5DD5000
trusted library allocation
page read and write
1480000
trusted library allocation
page read and write
B88000
stack
page read and write
3C70000
unkown
page readonly
1872E2E6000
heap
page read and write
1B460000
trusted library section
page readonly
5426000
trusted library allocation
page read and write
569A000
stack
page read and write
1B1D3000
heap
page read and write
7FFD9B6A0000
trusted library allocation
page read and write
7FB58000
trusted library allocation
page execute and read and write
4D80000
trusted library allocation
page read and write
26D0000
heap
page execute and read and write
4BEB000
trusted library allocation
page execute and read and write
18728D60000
heap
page read and write
39D0000
unkown
page readonly
5460000
heap
page read and write
1B470000
unkown
page readonly
5D0000
unkown
page readonly
2700000
trusted library section
page read and write
1872E547000
trusted library allocation
page read and write
4DB6000
trusted library allocation
page execute and read and write
4A94000
trusted library allocation
page read and write
9DDE000
stack
page read and write
7FFD9B6B0000
trusted library allocation
page read and write
3E4C000
unkown
page readonly
1B741000
unkown
page readonly
1B57F000
heap
page read and write
1B4E9000
unkown
page readonly
7FFD9B64A000
trusted library allocation
page read and write
1872E448000
trusted library allocation
page read and write
4B7617E000
unkown
page readonly
A6EF000
stack
page read and write
3BB0000
trusted library allocation
page read and write
14E0000
trusted library allocation
page read and write
A33000
trusted library allocation
page execute and read and write
93C000
heap
page read and write
1872E4AF000
trusted library allocation
page read and write
4A93000
trusted library allocation
page execute and read and write
18728F02000
heap
page read and write
7FFD9B630000
trusted library allocation
page read and write
1AE557E000
stack
page read and write
56DE000
stack
page read and write
1247000
heap
page read and write
13B0000
heap
page read and write
3BC0000
trusted library allocation
page execute and read and write
C10000
trusted library allocation
page read and write
4410000
trusted library allocation
page read and write
1B7F7000
unkown
page readonly
3A45000
trusted library allocation
page read and write
7220000
trusted library allocation
page read and write
1C090000
heap
page read and write
1B703000
unkown
page readonly
4A9D000
trusted library allocation
page execute and read and write
3FF5000
trusted library allocation
page read and write
4B7487A000
stack
page read and write
3AB2000
unkown
page readonly
1872E510000
trusted library allocation
page read and write
4B74A7B000
stack
page read and write
7FFD9B640000
trusted library allocation
page read and write
13A0000
trusted library section
page read and write
4B7447E000
stack
page read and write
2BB2000
trusted library allocation
page read and write
A56000
unkown
page readonly
1872E510000
trusted library allocation
page read and write
4DD1000
trusted library allocation
page read and write
7FFD9B5E0000
trusted library allocation
page read and write
1C0B1000
heap
page read and write
1872A1C0000
trusted library allocation
page read and write
7220000
trusted library allocation
page read and write
7FFD9B3A6000
trusted library allocation
page read and write
B1D000
heap
page read and write
4E0B000
stack
page read and write
7FFD9B5F0000
trusted library allocation
page read and write
542000
unkown
page readonly
3A16000
trusted library allocation
page read and write
C23000
trusted library allocation
page execute and read and write
1B7F3000
unkown
page readonly
4AD0000
heap
page read and write
1B83D000
unkown
page readonly
7FFD9B690000
trusted library allocation
page read and write
42A0000
trusted library allocation
page execute and read and write
580000
heap
page read and write
1B71C000
unkown
page readonly
1B7CF000
unkown
page readonly
3DE0000
unkown
page readonly
1B7E2000
unkown
page readonly
12B2000
trusted library allocation
page read and write
7FFD9B314000
trusted library allocation
page read and write
86D000
stack
page read and write
1B845000
unkown
page readonly
92A000
heap
page read and write
4B752FE000
stack
page read and write
1390000
heap
page read and write
4C30000
heap
page execute and read and write
1872E470000
trusted library allocation
page read and write
4BE7000
trusted library allocation
page execute and read and write
12BC000
heap
page read and write
1B71A000
unkown
page readonly
1893000
trusted library allocation
page read and write
4B7537E000
unkown
page readonly
5ECC000
trusted library allocation
page read and write
7FFD9B31B000
trusted library allocation
page execute and read and write
7224000
trusted library allocation
page read and write
5590000
trusted library allocation
page read and write
BF0000
heap
page read and write
43CD000
stack
page read and write
3A12000
trusted library allocation
page read and write
3A70000
trusted library allocation
page read and write
7FFD9B7C0000
trusted library allocation
page read and write
1872E480000
trusted library allocation
page read and write
4B7547E000
unkown
page readonly
3C10000
trusted library allocation
page read and write
4B75A7B000
stack
page read and write
3E04000
unkown
page readonly
9E80000
heap
page read and write
706000
heap
page read and write
3BD0000
trusted library allocation
page read and write
1B784000
unkown
page readonly
3BE7000
trusted library allocation
page read and write
12C2000
trusted library allocation
page read and write
3DBB000
unkown
page readonly
1872E2FB000
heap
page read and write
18BE000
trusted library allocation
page read and write
3D56000
unkown
page readonly
7230000
trusted library allocation
page read and write
764000
unkown
page read and write
1B780000
unkown
page readonly
1A22000
trusted library allocation
page read and write
3DF1000
unkown
page readonly
1B7B4000
unkown
page readonly
7FFD9B660000
trusted library allocation
page read and write
3A59000
trusted library allocation
page read and write
4B75679000
stack
page read and write
1B749000
unkown
page readonly
7FFD9B560000
trusted library allocation
page read and write
7FFD9B7D0000
trusted library allocation
page read and write
3DC9000
unkown
page readonly
4C10000
heap
page readonly
12E9000
heap
page read and write
5350000
trusted library allocation
page read and write
3D25000
unkown
page readonly
5EC0000
trusted library allocation
page read and write
7FFD9B64E000
trusted library allocation
page read and write
12C5000
trusted library allocation
page execute and read and write
5580000
trusted library allocation
page read and write
7FFD9B590000
trusted library allocation
page read and write
4F0B000
stack
page read and write
4B7437E000
unkown
page readonly
4B74EFE000
stack
page read and write
12C9000
heap
page read and write
1B7B0000
unkown
page readonly
18729E70000
trusted library section
page readonly
132E000
stack
page read and write
5EBE000
trusted library allocation
page read and write
3DC5000
unkown
page readonly
3FEE000
stack
page read and write
71F0000
trusted library allocation
page read and write
AFB000
heap
page read and write
18E4000
trusted library allocation
page read and write
1B450000
trusted library allocation
page read and write
4B74FFE000
stack
page read and write
There are 823 hidden memdumps, click here to show them.