IOC Report
GlassWireSetup.exe

loading gif

Files

File Path
Type
Category
Malicious
GlassWireSetup.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
C:\Program Files (x86)\GlassWire\GWCtlSrv.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\GlassWire\GlassWire.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsx9694.tmp\GWInstSt.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
3bd8c0.rbf (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
3bd8c5.rbf (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
3bd8c6.rbf (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
3bd8c7.rbf (copy)
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
3bd8c8.rbf (copy)
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Config.Msi\3bd8bf.rbs
data
dropped
C:\Config.Msi\3bd8c4.rbs
data
modified
C:\Program Files (x86)\GlassWire\GWEventLog.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\GlassWire\GWIdlMon.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\GlassWire\GWUnlock.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\GlassWire\GWUpgradeMonitor.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\GlassWire\Qt5Core.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\GlassWire\Qt5Gui.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\GlassWire\Qt5OpenGL.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\GlassWire\Qt5Svg.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\GlassWire\Qt5Widgets.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\GlassWire\Qt5WinExtras.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\GlassWire\copyrights\ASIO-LICENSE_1_0.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\GlassWire\copyrights\CURL-COPYING.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\GlassWire\copyrights\GEOIP-LICENSE.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\GlassWire\copyrights\GEOLITE2-COPYRIGHT.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\GlassWire\copyrights\GEOLITE2-LICENSE.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\GlassWire\copyrights\LZ4-LICENSE.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\GlassWire\copyrights\OPENSSL-LICENSE.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\GlassWire\copyrights\PROTOBYUF-LICENSE.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\GlassWire\copyrights\QT-LICENSE.GPL3-EXCEPT.txt
ASCII text, with CRLF, CR line terminators
dropped
C:\Program Files (x86)\GlassWire\copyrights\QT-LICENSE.txt
Non-ISO extended-ASCII text, with very long lines (653), with CRLF, CR line terminators
dropped
C:\Program Files (x86)\GlassWire\copyrights\RAPIDJSON-LICENSE.txt
ASCII text, with very long lines (739), with CRLF line terminators
dropped
C:\Program Files (x86)\GlassWire\copyrights\RAPIDXML-LICENSE.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\GlassWire\copyrights\RECOG-COPYING.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\GlassWire\copyrights\RLOTTIE-COPYING.MIT.txt
ASCII text, with very long lines (460), with CRLF line terminators
dropped
C:\Program Files (x86)\GlassWire\copyrights\SQLITE-COPYING.txt
ASCII text, with very long lines (666), with CRLF line terminators
dropped
C:\Program Files (x86)\GlassWire\copyrights\ZLIB-LICENSE.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\GlassWire\driver\legacy-x64\gwdrv.cat
data
dropped
C:\Program Files (x86)\GlassWire\driver\legacy-x64\gwdrv.inf
Windows setup INFormation
dropped
C:\Program Files (x86)\GlassWire\driver\legacy-x64\gwdrv.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Program Files (x86)\GlassWire\driver\legacy-x86\gwdrv.cat
data
dropped
C:\Program Files (x86)\GlassWire\driver\legacy-x86\gwdrv.inf
Windows setup INFormation
dropped
C:\Program Files (x86)\GlassWire\driver\legacy-x86\gwdrv.sys
PE32 executable (native) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\GlassWire\driver\win7-x64\gwdrv.cat
data
dropped
C:\Program Files (x86)\GlassWire\driver\win7-x64\gwdrv.inf
Windows setup INFormation
dropped
C:\Program Files (x86)\GlassWire\driver\win7-x64\gwdrv.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Program Files (x86)\GlassWire\driver\win7-x86\gwdrv.cat
data
dropped
C:\Program Files (x86)\GlassWire\driver\win7-x86\gwdrv.inf
Windows setup INFormation
dropped
C:\Program Files (x86)\GlassWire\driver\win7-x86\gwdrv.sys
PE32 executable (native) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\GlassWire\driver\x64\gwdrv.cat
data
dropped
C:\Program Files (x86)\GlassWire\driver\x64\gwdrv.inf
Windows setup INFormation
dropped
C:\Program Files (x86)\GlassWire\driver\x64\gwdrv.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Program Files (x86)\GlassWire\iconengines\qsvgicon.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\GlassWire\imageformats\qico.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\GlassWire\lang\de_de.qm
Qt Translation file
dropped
C:\Program Files (x86)\GlassWire\lang\en_gb.qm
Qt Translation file
dropped
C:\Program Files (x86)\GlassWire\lang\en_us.qm
Qt Translation file
dropped
C:\Program Files (x86)\GlassWire\lang\es_es.qm
Qt Translation file
dropped
C:\Program Files (x86)\GlassWire\lang\fr_fr.qm
Qt Translation file
dropped
C:\Program Files (x86)\GlassWire\lang\it_it.qm
Qt Translation file
dropped
C:\Program Files (x86)\GlassWire\lang\ja_jp.qm
Qt Translation file
dropped
C:\Program Files (x86)\GlassWire\lang\ko_kr.qm
Qt Translation file
dropped
C:\Program Files (x86)\GlassWire\lang\pl_pl.qm
Qt Translation file
dropped
C:\Program Files (x86)\GlassWire\lang\pt_br.qm
Qt Translation file
dropped
C:\Program Files (x86)\GlassWire\lang\ru_ru.qm
Qt Translation file
dropped
C:\Program Files (x86)\GlassWire\lang\tr_tr.qm
Qt Translation file
dropped
C:\Program Files (x86)\GlassWire\lang\zh_cn.qm
Qt Translation file
dropped
C:\Program Files (x86)\GlassWire\lang\zh_tw.qm
Qt Translation file
dropped
C:\Program Files (x86)\GlassWire\platforms\qwindows.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\GlassWire\plugins\windows.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\GlassWire\uninstall.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x3009ffef, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\GlassWire\GlassWire.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Mon Aug 12 07:19:56 2024, mtime=Mon Oct 7 15:59:36 2024, atime=Mon Aug 12 07:19:56 2024, length=12010624, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\GlassWire\Uninstall.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Mon Aug 12 07:20:50 2024, mtime=Mon Oct 7 15:59:38 2024, atime=Mon Aug 12 07:20:50 2024, length=9394760, window=hide
dropped
C:\ProgramData\Package Cache\.unverified\cab54A5CABBE7274D8A22EB58060AAB7623 (copy)
Microsoft Cabinet archive data, many, 741101 bytes, 10 files, at 0x44 +A "concrt140.dll" +A "msvcp140.dll", flags 0x4, number 1, extra bytes 20 in head, 55 datablocks, 0x1 compression
dropped
C:\ProgramData\Package Cache\.unverified\cabB3E1576D1FEFBB979E13B1A5379E0B16 (copy)
Microsoft Cabinet archive data, many, 5190395 bytes, 14 files, at 0x44 +A "mfc140.dll" +A "mfc140chs.dll", flags 0x4, number 1, extra bytes 20 in head, 326 datablocks, 0x1 compression
dropped
C:\ProgramData\Package Cache\.unverified\vcRuntimeAdditional_x86 (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2019 X86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2019 X86 Additional Runtime - 14.29.30139., Template: Intel;1033, Revision Number: {02910D02-C4AB-4DC8-8CDC-AD5C0F55DDF0}, Create Time/Date: Fri Dec 10 22:31:12 2021, Last Saved Time/Date: Fri Dec 10 22:31:12 2021, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.10.4.4718), Security: 2
dropped
C:\ProgramData\Package Cache\.unverified\vcRuntimeMinimum_x86 (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2019 X86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.29.30139., Template: Intel;1033, Revision Number: {C903B036-1F58-4F43-8CA4-2797FED0F6CC}, Create Time/Date: Fri Dec 10 22:28:10 2021, Last Saved Time/Date: Fri Dec 10 22:28:10 2021, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.10.4.4718), Security: 2
dropped
C:\ProgramData\Package Cache\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}v14.29.30139\packages\vcRuntimeMinimum_x86\cab1.cab (copy)
Microsoft Cabinet archive data, many, 741101 bytes, 10 files, at 0x44 +A "concrt140.dll" +A "msvcp140.dll", flags 0x4, number 1, extra bytes 20 in head, 55 datablocks, 0x1 compression
dropped
C:\ProgramData\Package Cache\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}v14.29.30139\packages\vcRuntimeMinimum_x86\vc_runtimeMinimum_x86.msi (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2019 X86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.29.30139., Template: Intel;1033, Revision Number: {C903B036-1F58-4F43-8CA4-2797FED0F6CC}, Create Time/Date: Fri Dec 10 22:28:10 2021, Last Saved Time/Date: Fri Dec 10 22:28:10 2021, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.10.4.4718), Security: 2
dropped
C:\ProgramData\Package Cache\{1AEA8854-7597-4CD3-948F-8DE364D94E07}v14.29.30139\packages\vcRuntimeAdditional_x86\cab1.cab (copy)
Microsoft Cabinet archive data, many, 5190395 bytes, 14 files, at 0x44 +A "mfc140.dll" +A "mfc140chs.dll", flags 0x4, number 1, extra bytes 20 in head, 326 datablocks, 0x1 compression
dropped
C:\ProgramData\Package Cache\{1AEA8854-7597-4CD3-948F-8DE364D94E07}v14.29.30139\packages\vcRuntimeAdditional_x86\vc_runtimeAdditional_x86.msi (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2019 X86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2019 X86 Additional Runtime - 14.29.30139., Template: Intel;1033, Revision Number: {02910D02-C4AB-4DC8-8CDC-AD5C0F55DDF0}, Create Time/Date: Fri Dec 10 22:31:12 2021, Last Saved Time/Date: Fri Dec 10 22:31:12 2021, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.10.4.4718), Security: 2
dropped
C:\ProgramData\Package Cache\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}\VC_redist.x86.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Package Cache\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}\state.rsm
data
dropped
C:\ProgramData\glasswire\service-full\cloud\cloud.db
SQLite 3.x database, user version 14, last written using SQLite version 3041002, writer version 2, read version 2, file counter 2, database pages 1, cookie 0, schema 0, unknown 0 encoding, version-valid-for 2
dropped
C:\ProgramData\glasswire\service-full\cloud\cloud.db-journal
SQLite Rollback Journal
dropped
C:\ProgramData\glasswire\service-full\cloud\cloud.db-shm
data
dropped
C:\ProgramData\glasswire\service-full\cloud\cloud.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\ProgramData\glasswire\service-full\glasswire.conf
ASCII text, with very long lines (376), with CRLF line terminators
dropped
C:\ProgramData\glasswire\service-full\glasswire.db
SQLite 3.x database, user version 14, last written using SQLite version 3041002, writer version 2, read version 2, file counter 2, database pages 26, cookie 0x17, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\glasswire\service-full\glasswire.db-journal
SQLite Rollback Journal
dropped
C:\ProgramData\glasswire\service-full\glasswire.db-shm
data
dropped
C:\ProgramData\glasswire\service-full\glasswire.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\ProgramData\glasswire\service-full\log\update\20241007.log
ASCII text, with very long lines (527), with CRLF line terminators
modified
C:\ProgramData\glasswire\share\storage.db
SQLite 3.x database, last written using SQLite version 3008011, page size 1024, file counter 1252, database pages 1969, cookie 0x68, schema 4, UTF-16 little endian, version-valid-for 1239
dropped
C:\Users\Public\Desktop\GlassWire.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Mon Aug 12 07:19:56 2024, mtime=Mon Oct 7 16:00:07 2024, atime=Mon Aug 12 07:19:56 2024, length=12010624, window=hide
dropped
C:\Users\user\AppData\Local\GlassWire\client-full\client.conf
data
dropped
C:\Users\user\AppData\Local\GlassWire\client-full\log\20241007.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\ExplorerStartupLog_RunOnce.etl
data
dropped
C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20241007125848.log
ASCII text, with very long lines (321), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20241007125848_000_vcRuntimeMinimum_x86.log
Unicode text, UTF-16, little-endian text, with very long lines (319), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20241007125848_001_vcRuntimeAdditional_x86.log
Unicode text, UTF-16, little-endian text, with very long lines (411), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsx9694.tmp\StartMenu.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsx9694.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsx9694.tmp\eventlog.man
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsx9694.tmp\modern-header.bmp
PC bitmap, Windows 3.x format, 150 x 57 x 24, image size 25766, resolution 2834 x 2834 px/m, cbSize 25820, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\nsx9694.tmp\modern-wizard.bmp
PC bitmap, Windows 3.x format, 164 x 314 x 24, image size 154490, resolution 2834 x 2834 px/m, cbSize 154544, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\nsx9694.tmp\nsDialogs.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsx9694.tmp\nsExec.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsx9694.tmp\nsihelper.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsx9694.tmp\vc_redist.x86.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{1b9ae675-a69a-784f-a0a3-d898132a09ba}\SET898F.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\{1b9ae675-a69a-784f-a0a3-d898132a09ba}\SET899F.tmp
Windows setup INFormation
dropped
C:\Users\user\AppData\Local\Temp\{1b9ae675-a69a-784f-a0a3-d898132a09ba}\SET89B0.tmp
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{1b9ae675-a69a-784f-a0a3-d898132a09ba}\gwdrv.cat (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\{1b9ae675-a69a-784f-a0a3-d898132a09ba}\gwdrv.inf (copy)
Windows setup INFormation
dropped
C:\Users\user\AppData\Local\Temp\{1b9ae675-a69a-784f-a0a3-d898132a09ba}\gwdrv.sys (copy)
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\GlassWire 3.4.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Mon Aug 12 07:19:56 2024, mtime=Mon Oct 7 16:00:07 2024, atime=Mon Aug 12 07:19:56 2024, length=12010624, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\INF\oem4.inf
Windows setup INFormation
dropped
C:\Windows\INF\setupapi.dev.log
Generic INItialization configuration [BeginLog]
dropped
C:\Windows\Installer\$PatchCache$\Managed\56FE97613F5584249BE1B6B31E6AC9FD\14.29.30139\concrt140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\56FE97613F5584249BE1B6B31E6AC9FD\14.29.30139\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\56FE97613F5584249BE1B6B31E6AC9FD\14.29.30139\msvcp140_1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\56FE97613F5584249BE1B6B31E6AC9FD\14.29.30139\msvcp140_2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\56FE97613F5584249BE1B6B31E6AC9FD\14.29.30139\msvcp140_atomic_wait.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\56FE97613F5584249BE1B6B31E6AC9FD\14.29.30139\msvcp140_codecvt_ids.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\56FE97613F5584249BE1B6B31E6AC9FD\14.29.30139\vccorlib140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\56FE97613F5584249BE1B6B31E6AC9FD\14.29.30139\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\3bd8bd.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2019 X86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.29.30139., Template: Intel;1033, Revision Number: {C903B036-1F58-4F43-8CA4-2797FED0F6CC}, Create Time/Date: Fri Dec 10 22:28:10 2021, Last Saved Time/Date: Fri Dec 10 22:28:10 2021, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.10.4.4718), Security: 2
dropped
C:\Windows\Installer\3bd8c1.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2019 X86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.29.30139., Template: Intel;1033, Revision Number: {C903B036-1F58-4F43-8CA4-2797FED0F6CC}, Create Time/Date: Fri Dec 10 22:28:10 2021, Last Saved Time/Date: Fri Dec 10 22:28:10 2021, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.10.4.4718), Security: 2
dropped
C:\Windows\Installer\3bd8c2.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2019 X86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2019 X86 Additional Runtime - 14.29.30139., Template: Intel;1033, Revision Number: {02910D02-C4AB-4DC8-8CDC-AD5C0F55DDF0}, Create Time/Date: Fri Dec 10 22:31:12 2021, Last Saved Time/Date: Fri Dec 10 22:31:12 2021, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.10.4.4718), Security: 2
dropped
C:\Windows\Installer\3bd8c9.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2019 X86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2019 X86 Additional Runtime - 14.29.30139., Template: Intel;1033, Revision Number: {02910D02-C4AB-4DC8-8CDC-AD5C0F55DDF0}, Create Time/Date: Fri Dec 10 22:31:12 2021, Last Saved Time/Date: Fri Dec 10 22:31:12 2021, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.10.4.4718), Security: 2
dropped
C:\Windows\Installer\MSIDD41.tmp
data
dropped
C:\Windows\Installer\MSIE2B1.tmp
data
dropped
C:\Windows\Installer\SourceHash{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\SourceHash{1AEA8854-7597-4CD3-948F-8DE364D94E07}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\SysWOW64\mfc140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc140chs.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc140cht.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc140deu.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc140enu.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc140esn.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc140fra.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc140ita.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc140jpn.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc140kor.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc140rus.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc140u.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfcm140.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\SysWOW64\mfcm140u.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\SysWOW64\vcamp140.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\vcomp140.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{1b774c08-0e2d-f04a-affb-563599d0a20e}\SET8C1F.tmp
data
dropped
C:\Windows\System32\DriverStore\Temp\{1b774c08-0e2d-f04a-affb-563599d0a20e}\SET8C3F.tmp
Windows setup INFormation
dropped
C:\Windows\System32\DriverStore\Temp\{1b774c08-0e2d-f04a-affb-563599d0a20e}\SET8C50.tmp
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{1b774c08-0e2d-f04a-affb-563599d0a20e}\gwdrv.cat (copy)
data
dropped
C:\Windows\System32\DriverStore\Temp\{1b774c08-0e2d-f04a-affb-563599d0a20e}\gwdrv.inf (copy)
Windows setup INFormation
dropped
C:\Windows\System32\DriverStore\Temp\{1b774c08-0e2d-f04a-affb-563599d0a20e}\gwdrv.sys (copy)
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Windows\System32\catroot2\dberr.txt
ASCII text, with CRLF line terminators
modified
C:\Windows\System32\drivers\gwdrv.cat
data
dropped
C:\Windows\System32\drivers\gwdrv.inf
Windows setup INFormation
dropped
C:\Windows\System32\drivers\gwdrv.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Windows\Temp\OLD945C.tmp
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1028\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1028\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1029\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1029\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1031\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1031\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1036\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1036\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1040\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1040\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1041\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1041\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1042\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1042\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1045\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1045\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1046\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1046\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1049\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1049\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1055\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1055\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\2052\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\2052\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\3082\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\3082\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\BootstrapperApplicationData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (558), with CRLF line terminators
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\logo.png
PNG image data, 64 x 64, 8-bit colormap, non-interlaced
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\thm.wxl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\thm.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\wixstdba.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.be\VC_redist.x86.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\cab54A5CABBE7274D8A22EB58060AAB7623
Microsoft Cabinet archive data, many, 741101 bytes, 10 files, at 0x44 +A "concrt140.dll" +A "msvcp140.dll", flags 0x4, number 1, extra bytes 20 in head, 55 datablocks, 0x1 compression
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\cabB3E1576D1FEFBB979E13B1A5379E0B16
Microsoft Cabinet archive data, many, 5190395 bytes, 14 files, at 0x44 +A "mfc140.dll" +A "mfc140chs.dll", flags 0x4, number 1, extra bytes 20 in head, 326 datablocks, 0x1 compression
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\vcRuntimeAdditional_x86
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2019 X86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2019 X86 Additional Runtime - 14.29.30139., Template: Intel;1033, Revision Number: {02910D02-C4AB-4DC8-8CDC-AD5C0F55DDF0}, Create Time/Date: Fri Dec 10 22:31:12 2021, Last Saved Time/Date: Fri Dec 10 22:31:12 2021, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.10.4.4718), Security: 2
dropped
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\vcRuntimeMinimum_x86
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2019 X86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.29.30139., Template: Intel;1033, Revision Number: {C903B036-1F58-4F43-8CA4-2797FED0F6CC}, Create Time/Date: Fri Dec 10 22:28:10 2021, Last Saved Time/Date: Fri Dec 10 22:28:10 2021, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.10.4.4718), Security: 2
dropped
C:\Windows\Temp\{FAC60DB1-A697-45EE-963C-3E79552A0F30}\.cr\vc_redist.x86.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\~DF0538875032E347E0.TMP
data
dropped
C:\Windows\Temp\~DF063AD5405B76E19B.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF2CB328544F637D7B.TMP
data
dropped
C:\Windows\Temp\~DF3C6D1ACF4456307B.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF497FD7286ECDDC32.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF4F6ACF0974D6F467.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF5A2D86795CF83812.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF6AB17DEB3A600A3C.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF728EB49F90B6D81A.TMP
data
dropped
C:\Windows\Temp\~DF7E5C243651EDAC2F.TMP
data
dropped
C:\Windows\Temp\~DF83FE8E8802E13142.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF8BDD8E6D32DF3C51.TMP
data
dropped
C:\Windows\Temp\~DF928F288195A5C8C3.TMP
data
dropped
C:\Windows\Temp\~DFA1E2EDCCBA4B94F5.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFA5DDEDE3239FC6C2.TMP
data
dropped
C:\Windows\Temp\~DFAB84A446354C418B.TMP
data
dropped
C:\Windows\Temp\~DFBDB96B0A699B1268.TMP
data
dropped
C:\Windows\Temp\~DFC1751C8B4A3976B7.TMP
data
dropped
C:\Windows\Temp\~DFCE241A67BA6BDA40.TMP
data
dropped
C:\Windows\Temp\~DFCFF3B4CEDBD2EB36.TMP
data
dropped
C:\Windows\Temp\~DFD425AD7A1DD824A1.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFE1BCB02B54137856.TMP
data
dropped
C:\Windows\Temp\~DFF2800AADAF31D898.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFF5210D750882D8F6.TMP
data
dropped
There are 221 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\GlassWireSetup.exe
"C:\Users\user\Desktop\GlassWireSetup.exe"
malicious
C:\Users\user\AppData\Local\Temp\nsx9694.tmp\GWInstSt.exe
"C:\Users\user\AppData\Local\Temp\nsx9694.tmp\GWInstSt.exe" "https://www.glasswire.com/stat/install.php?v=3.4.694&build_type=full&os=Ten&platform=x64&update=0&install_id=8AC7009D4B52E62F54AD1F4176FBF27962F3EAF3F7DDE916A08729FD64A8AEEE&referrer=https%3A%2F%2Fwww.google.com%2F&user_agent=Mozilla%2F5.0+%28Windows+NT+10.0%3B+Win64%3B+x64%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F129.0.0.0+Safari%2F537.36+Edg%2F129.0.0.0&ga_client_id=1231827075.1728319357" "nsis$$.tmp"
malicious
C:\Windows\System32\rundll32.exe
"C:\Windows\system32\rundll32.exe" setupapi.dll,InstallHinfSection DefaultInstall 128 C:\Windows\system32\drivers\gwdrv.inf
malicious
C:\Windows\System32\drvinst.exe
DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{1b9ae675-a69a-784f-a0a3-d898132a09ba}\gwdrv.inf" "9" "4e7eab47b" "0000000000000144" "WinSta0\Default" "0000000000000170" "208" "C:\Windows\system32\drivers"
malicious
C:\Windows\System32\drvinst.exe
DrvInst.exe "8" "4" "C:\Windows\System32\DriverStore\FileRepository\gwdrv.inf_amd64_54933c59b5293195\gwdrv.inf" "0" "4e7eab47b" "0000000000000170" "WinSta0\Default"
malicious
C:\Program Files (x86)\GlassWire\GWCtlSrv.exe
"C:\Program Files (x86)\GlassWire\GWCtlSrv.exe" "-i"
malicious
C:\Program Files (x86)\GlassWire\GWCtlSrv.exe
"C:\Program Files (x86)\GlassWire\GWCtlSrv.exe" "-s"
malicious
C:\Program Files (x86)\GlassWire\GWCtlSrv.exe
"C:\Program Files (x86)\GlassWire\GWCtlSrv.exe"
malicious
C:\Program Files (x86)\GlassWire\GlassWire.exe
"C:\Program Files (x86)\GlassWire\GlassWire.exe"
malicious
C:\Program Files (x86)\GlassWire\GlassWire.exe
"C:\Program Files (x86)\GlassWire\glasswire.exe" -hide
malicious
C:\Program Files (x86)\GlassWire\GlassWire.exe
"C:\Program Files (x86)\GlassWire\glasswire.exe" -hide
malicious
C:\Users\user\AppData\Local\Temp\nsx9694.tmp\vc_redist.x86.exe
"C:\Users\user\AppData\Local\Temp\nsx9694.tmp\vc_redist.x86.exe" /install /quiet /norestart
C:\Windows\Temp\{FAC60DB1-A697-45EE-963C-3E79552A0F30}\.cr\vc_redist.x86.exe
"C:\Windows\Temp\{FAC60DB1-A697-45EE-963C-3E79552A0F30}\.cr\vc_redist.x86.exe" -burn.clean.room="C:\Users\user\AppData\Local\Temp\nsx9694.tmp\vc_redist.x86.exe" -burn.filehandle.attached=524 -burn.filehandle.self=640 /install /quiet /norestart
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.be\VC_redist.x86.exe
"C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.be\VC_redist.x86.exe" -q -burn.elevated BurnPipe.{4C6967F0-7861-4E5E-A266-A79F91D53451} {8D47B6A8-8425-45E8-BA0B-10ED43630BCC} 1148
C:\Windows\System32\VSSVC.exe
C:\Windows\system32\vssvc.exe
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k swprv
C:\Windows\System32\SrTasks.exe
C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
C:\Windows\System32\runonce.exe
"C:\Windows\system32\runonce.exe" -r
C:\Windows\System32\grpconv.exe
"C:\Windows\System32\grpconv.exe" -o
C:\Windows\System32\net.exe
"C:\Windows\system32\net.exe" start gwdrv
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 start gwdrv
C:\Windows\SysWOW64\wevtutil.exe
"C:\Windows\system32\wevtutil.exe" im "C:\Users\user\AppData\Local\Temp\nsx9694.tmp\eventlog.man" /rf:"C:\Program Files (x86)\GlassWire\GWEventLog.dll" /mf:"C:\Program Files (x86)\GlassWire\GWEventLog.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wevtutil.exe
"C:\Windows\system32\wevtutil.exe" im "C:\Users\user\AppData\Local\Temp\nsx9694.tmp\eventlog.man" /rf:"C:\Program Files (x86)\GlassWire\GWEventLog.dll" /mf:"C:\Program Files (x86)\GlassWire\GWEventLog.dll" /fromwow64
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\explorer.exe
"C:\Windows\explorer.exe" "C:\Program Files (x86)\GlassWire\glasswire.exe"
C:\Windows\explorer.exe
C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
There are 23 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
unknown
http://www.CAcert.org/index.php?id=1004
unknown
http://www.chambersign.orgD
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
unknown
http://www.CAcert.org/index.php?id=10
unknown
https://pivot.protect.glasswire.comj6
unknown
http://crl.chambersign.org/chambersroot.crl0
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://www.e-szigno.hu/SZSZ/
unknown
http://wixtoolset.org/schemas/thmutil/2010
unknown
https://www.cacert.org/revoke.crl
unknown
http://www.startssl.com/policy.pdf04
unknown
http://repository.swisssign.com/I
unknown
http://acedicom.edicomgroup.com/doc
unknown
http://www.certifikat.dk/repository0
unknown
http://www.chambersign.org1
unknown
http://www.quovadisglobal.com/cpsK/
unknown
http://crl.chambersign.org/chambersignroot.crl
unknown
http://policy.camerfirma.com:Dv
unknown
http://www.pkioverheid.nl/policies/root-policy0
unknown
http://www.pkioverheid.nl/policies/root-policy
unknown
https://www.maxmind.com/en/geolite2/eula.
unknown
https://ocsp.quovadisoffshore.com
unknown
http://www.apache.org/licenses/LICENSE-2.0Copyright
unknown
http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
unknown
http://ca.disig.sk/ca/crl/ca_disig.crl0
unknown
http://www.CAcert.org/index.php?id=100P
unknown
https://curl.se/docs/hsts.html
unknown
http://crl.oces.certifikat.dk/oces.crl
unknown
http://www.disig.sk/ca/crl/ca_disig.crl0
unknown
https://www.GlassWire.com/privacy-policy.php
unknown
https://creativecommons.org/licenses/by/4.0/.
unknown
http://www.chambersign.org287
unknown
http://www.startssl.com/policy.pdf0
unknown
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl?
unknown
http://www.sk.ee/cps/0
unknown
http://www.valicert.com/rk
unknown
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFL
unknown
http://www.cacert.org
unknown
https://api-eu-north-1.protect.glasswire.com/api/v1.1/agent/event
16.16.13.164
http://www.CAcert.org/ca.crt
unknown
http://www.apache.org/licenses/LICENSE-2.0Licensed
unknown
https://api-eu-north-1.protect.glasswire.com/api/v1.1/agent/device/register
16.16.13.164
http://acedicom.edicomgroup.com/docF-
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
unknown
http://ocsp.pki.gva.es0
unknown
http://www.startssl.com/policy.pdfB
unknown
https://pivot.protect.glasswire.com
unknown
http://crl.oces.certifikat.dk/oces.crl0
unknown
https://www.glasswire.com/stat/install.php?v=3.4.694&build_type=full&os=
unknown
https://pivot.protect.glasswire.com/api/v1/celld6
unknown
https://api-eu-north-1.protect.glasswire.com/v1/api
unknown
http://www.gnu.org/philosophy/why-not-lgpl.html
unknown
http://www.certicamara.com/dpc/0Z
unknown
http://crl.pki.wellsfargo.com/wsprca.crl0
unknown
http://www.certplus.com/CRL/class2.crl
unknown
https://www.glasswire.com/stat/install.php?v=3.4.694&build_type=full&os=Ten&platform=x64&update=0&install_id=8AC7009D4B52E62F54AD1F4176FBF27962F3EAF3F7DDE916A08729FD64A8AEEE&referrer=https%3A%2F%2Fwww.google.com%2F&user_agent=Mozilla%2F5.0+%28Windows+NT+10.0%3B+Win64%3B+x64%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F129.0.0.0+Safari%2F537.36+Edg%2F129.0.0.0&ga_client_id=1231827075.1728319357
18.244.164.20
http://ca.disig.sk/ca/crl/ca_disig.crl
unknown
http://www.e-szigno.hu/RootCA.crt
unknown
http://www.e-szigno.hu/SZSZ
unknown
http://ocsp.CAcert.org/0(
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://curl.se/docs/alt-svc.html
unknown
http://www.entrust.net/CRL/net1.crl
unknown
http://www.sansoxygen.comhttp://www.sansoxygen.comThis
unknown
http://www.symauth.com/cps0(
unknown
http://www.color.org)
unknown
http://policy.camerfirma.comvDwN
unknown
http://cps.chambersign.org/cps/chambersroot.html
unknown
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLCopyright
unknown
https://api-eu-north-1.protect.glasswire.com/api/v1.1/agent/eventd74z
unknown
http://www.entrust.net/CRL/net1.crl0
unknown
https://www.catcert.net/verarrel
unknown
http://crl.securetrust.com/STCA.crl
unknown
http://ocsp.pki.gva.esT
unknown
http://www.disig.sk/ca0f
unknown
https://api-eu-north-1.protect.glasswire.com/agent-api/v1/license/activatek
unknown
http://www.firmaprofesional.com?
unknown
http://www.e-szigno.hu/RootCA.crl
unknown
http://www.symauth.com/rpa00
unknown
http://www.sk.ee/juur/crl/0
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
unknown
http://crl.chambersign.org/chambersignroot.crl0
unknown
http://crl.xrampsecurity.com/XGCA.crl0
unknown
https://api-eu-north-1.protect.glasswire.com/endpoint-api/v1/endpoint/%s/geoip-db/downloadJZ
unknown
http://www.quovadis.bm0
unknown
http://cps.chambersign.org/cps/chambersroot.htmlUDwm
unknown
http://www.wellsfargo.com/certpolicy
unknown
http://ocsp.pki.gva.es
unknown
http://www.trustdst.com/certificates/policy/ACES-index.html0
unknown
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl
unknown
http://www.firmaprofesional.com0
unknown
http://www.openssl.org/)
unknown
https://api-eu-north-1.protect.glasswire.com/endpoint-api/v1/endpoint/%s/heartbeat/%s
unknown
http://www.pkioverheid.nl/policies/root-policy-G20
unknown
https://www.netlock.net/docs
unknown
http://www.trustcenter.de/crl/v2/tc_class_2_ca_II.crl
unknown
http://appsyndication.org/2006/appsyn
unknown
http://fedir.comsign.co.il/crl/ComSignCA.crl0
unknown
https://pivot.protect.glasswire.com/api/v1/cell?locale=ch
13.50.186.172
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api-eu-north-1.protect.glasswire.com
16.16.13.164
pivot.protect.glasswire.com
13.50.186.172
www.glasswire.com
18.244.164.20

IPs

IP
Domain
Country
Malicious
18.244.164.20
www.glasswire.com
United States
13.50.186.172
pivot.protect.glasswire.com
United States
16.16.13.164
api-eu-north-1.protect.glasswire.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
GlassWire
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
GrpConv
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\GlassWire.exe
DumpFolder
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\GlassWire.exe
DumpType
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\GWCtlSrv.exe
DumpFolder
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\GWCtlSrv.exe
DumpType
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\GWIdlMon.exe
DumpFolder
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\GWIdlMon.exe
DumpType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GlassWire\full
CampaignId
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GlassWire\full
InstallID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GlassWire\full
CloudDeviceId
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GlassWire\full
CloudCurrentServer
HKEY_CURRENT_USER\SOFTWARE\GlassWire
LastInstallationVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GlassWire
LastInstallationDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\GlassWire 3.4
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\GlassWire 3.4
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\GlassWire 3.4
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\GlassWire 3.4
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\GlassWire 3.4
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\GlassWire 3.4
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\GlassWire 3.4
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\GlassWire 3.4
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\GlassWire 3.4
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\GlassWire 3.4
DisplayIcon
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GlassWire\full
CloudDeviceId
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
AoACAPIError
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
AoACAPIResult
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
FirstRun
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
LastIndex
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
NestingLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
StartNesting
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore
SRInitDone
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
SrCreateRp (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
SrCreateRp (Leave)
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
BundleCachePath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
BundleUpgradeCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
BundleAddonCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
BundleDetectCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
BundlePatchCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
BundleVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
BundleProviderKey
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
BundleTag
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
EngineVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
NoElevateOnModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x86,x86,14.29,bundle
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x86,x86,14.29,bundle
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x86,x86,14.29,bundle
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
Resume
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
BundleResumeCommandLine
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
Installed
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
RPSessionInterval
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
LastIndex
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
Resume
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
IDENTIFY (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
IDENTIFY (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer
IDENTIFY (Enter)
HKEY_LOCAL_MACHINE\BCD00000000\Description
FirmwareModified
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
IDENTIFY (Leave)
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001
Element
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\12000002
Element
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{584f4cfd-61ca-11ee-8a62-e43725c6cdb7}\Elements\12000004
Element
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{584f4cfe-61ca-11ee-8a62-e43725c6cdb7}\Elements\12000004
Element
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{a5a30fa2-3d06-4e9f-b5f4-a01df9d1fcba}\Description
Type
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
IDENTIFY (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
IDENTIFY (Enter)
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{a5a30fa2-3d06-4e9f-b5f4-a01df9d1fcba}\Elements\24000001
Element
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{a5a30fa2-3d06-4e9f-b5f4-a01df9d1fcba}\Elements\25000004
Element
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
IDENTIFY (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer
IDENTIFY (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_BEGINPREPARE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_BEGINPREPARE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
PREPAREBACKUP (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
PREPAREBACKUP (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
PREPAREBACKUP (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
PREPAREBACKUP (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
VSS_WS_STABLE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
PREPAREBACKUP (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
VSS_WS_STABLE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
PREPAREBACKUP (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
VSS_WS_STABLE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
GETSTATE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
GETSTATE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
GETSTATE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
GETSTATE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
GETSTATE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
GETSTATE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_ENDPREPARE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_ENDPREPARE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
PREPARESNAPSHOT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
PREPARESNAPSHOT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
PREPARESNAPSHOT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
PREPARESNAPSHOT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
PREPARESNAPSHOT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
VSS_WS_WAITING_FOR_FREEZE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
PREPARESNAPSHOT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
VSS_WS_WAITING_FOR_FREEZE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
PREPARESNAPSHOT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
VSS_WS_WAITING_FOR_FREEZE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
PREPARESNAPSHOT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_FRONT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
FREEZE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
FREEZE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
VSS_WS_WAITING_FOR_THAW (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
BKGND_FREEZE_THREAD (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_FRONT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_BACK (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_BACK (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_SYSTEM (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
FREEZE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
FREEZE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
VSS_WS_WAITING_FOR_THAW (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
BKGND_FREEZE_THREAD (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_SYSTEM (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_KTM (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_KTM (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_RM (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
FREEZE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
FREEZE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
VSS_WS_WAITING_FOR_THAW (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
BKGND_FREEZE_THREAD (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_RM (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_PRECOMMIT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_PRECOMMIT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
OPEN_VOLUME_HANDLE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
OPEN_VOLUME_HANDLE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
OPEN_VOLUME_HANDLE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
OPEN_VOLUME_HANDLE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
IOCTL_FLUSH_AND_HOLD (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
IOCTL_FLUSH_AND_HOLD (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
IOCTL_RELEASE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
IOCTL_RELEASE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
IOCTL_FLUSH_AND_HOLD (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
IOCTL_FLUSH_AND_HOLD (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
IOCTL_RELEASE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
IOCTL_RELEASE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_COMMIT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_COMMIT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_POSTCOMMIT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_POSTCOMMIT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
THAW_KTM (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
THAW_KTM (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
THAW (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
THAW (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
BKGND_FREEZE_THREAD (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
THAW (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
THAW (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
VSS_WS_WAITING_FOR_POST_SNAPSHOT (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
BKGND_FREEZE_THREAD (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
THAW (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
BKGND_FREEZE_THREAD (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
THAW (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
VSS_WS_WAITING_FOR_POST_SNAPSHOT (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
THAW (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
VSS_WS_WAITING_FOR_POST_SNAPSHOT (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
THAW (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_PREFINALCOMMIT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_PREFINALCOMMIT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
POSTSNAPSHOT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
POSTSNAPSHOT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
POSTSNAPSHOT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
POSTSNAPSHOT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
POSTSNAPSHOT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
VSS_WS_WAITING_FOR_BACKUP_COMPLETE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
POSTSNAPSHOT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
VSS_WS_WAITING_FOR_BACKUP_COMPLETE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
POSTSNAPSHOT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
VSS_WS_WAITING_FOR_BACKUP_COMPLETE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
POSTSNAPSHOT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_POSTFINALCOMMIT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_POSTFINALCOMMIT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_ABORTSNAPSHOTS (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_ABORTSNAPSHOTS (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
ABORT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
ABORT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
ABORT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
ABORT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
ABORT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
ABORT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
ABORT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
ABORT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
BACKUPSHUTDOWN (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
BACKUPSHUTDOWN (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
BACKUPSHUTDOWN (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
BACKUPSHUTDOWN (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
BACKUPSHUTDOWN (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
BACKUPSHUTDOWN (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
BACKUPSHUTDOWN (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
BACKUPSHUTDOWN (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\3bd8bf.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\3bd8bf.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\46B9183E65C37DD329D1000B11DA13ED
56FE97613F5584249BE1B6B31E6AC9FD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14
56FE97613F5584249BE1B6B31E6AC9FD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C069AA2AC3DFD6A3DBF641390311FA3B
56FE97613F5584249BE1B6B31E6AC9FD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F3027E2A2C06E7D3A864BDD383A1C26E
56FE97613F5584249BE1B6B31E6AC9FD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA
56FE97613F5584249BE1B6B31E6AC9FD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D2CEC367661A6084E955D760679C2B2C
56FE97613F5584249BE1B6B31E6AC9FD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9512E90A57FAE634AAD4526B0B1AD106
56FE97613F5584249BE1B6B31E6AC9FD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8F139CF91DE936230A1FA8ED33D0E0EC
56FE97613F5584249BE1B6B31E6AC9FD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\97FC00201A9B4EB359A592AFD9B4A1C5
56FE97613F5584249BE1B6B31E6AC9FD
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\vcamp140.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2085E0429CDB18632976C73AF592EEFB
56FE97613F5584249BE1B6B31E6AC9FD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC
56FE97613F5584249BE1B6B31E6AC9FD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1F6CD69CA4980E338A1CE3E93749AF82
56FE97613F5584249BE1B6B31E6AC9FD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB48ECA76FF4B153EA191E89DD8B25EE
56FE97613F5584249BE1B6B31E6AC9FD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F2D616F7941B2083EBC4F079B192B3C6
56FE97613F5584249BE1B6B31E6AC9FD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\56FE97613F5584249BE1B6B31E6AC9FD
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\56FE97613F5584249BE1B6B31E6AC9FD
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\56FE97613F5584249BE1B6B31E6AC9FD
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\56FE97613F5584249BE1B6B31E6AC9FD
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\56FE97613F5584249BE1B6B31E6AC9FD
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\56FE97613F5584249BE1B6B31E6AC9FD
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\56FE97613F5584249BE1B6B31E6AC9FD
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\56FE97613F5584249BE1B6B31E6AC9FD
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\56FE97613F5584249BE1B6B31E6AC9FD
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\56FE97613F5584249BE1B6B31E6AC9FD
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14\56FE97613F5584249BE1B6B31E6AC9FD
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14\56FE97613F5584249BE1B6B31E6AC9FD
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14\56FE97613F5584249BE1B6B31E6AC9FD
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14\56FE97613F5584249BE1B6B31E6AC9FD
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14\56FE97613F5584249BE1B6B31E6AC9FD
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14\56FE97613F5584249BE1B6B31E6AC9FD
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14\56FE97613F5584249BE1B6B31E6AC9FD
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14\56FE97613F5584249BE1B6B31E6AC9FD
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14\56FE97613F5584249BE1B6B31E6AC9FD
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14\56FE97613F5584249BE1B6B31E6AC9FD
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C069AA2AC3DFD6A3DBF641390311FA3B\56FE97613F5584249BE1B6B31E6AC9FD
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F3027E2A2C06E7D3A864BDD383A1C26E\56FE97613F5584249BE1B6B31E6AC9FD
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA\56FE97613F5584249BE1B6B31E6AC9FD
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA\56FE97613F5584249BE1B6B31E6AC9FD
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA\56FE97613F5584249BE1B6B31E6AC9FD
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA\56FE97613F5584249BE1B6B31E6AC9FD
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA\56FE97613F5584249BE1B6B31E6AC9FD
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA\56FE97613F5584249BE1B6B31E6AC9FD
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA\56FE97613F5584249BE1B6B31E6AC9FD
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA\56FE97613F5584249BE1B6B31E6AC9FD
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA\56FE97613F5584249BE1B6B31E6AC9FD
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA\56FE97613F5584249BE1B6B31E6AC9FD
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D2CEC367661A6084E955D760679C2B2C\56FE97613F5584249BE1B6B31E6AC9FD
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9512E90A57FAE634AAD4526B0B1AD106\56FE97613F5584249BE1B6B31E6AC9FD
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8F139CF91DE936230A1FA8ED33D0E0EC\56FE97613F5584249BE1B6B31E6AC9FD
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\97FC00201A9B4EB359A592AFD9B4A1C5\56FE97613F5584249BE1B6B31E6AC9FD
File
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v14
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v14
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v14
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\14.0\VC\Runtimes\X86
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\14.0\VC\Runtimes\X86
Installed
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\14.0\VC\Runtimes\X86
Major
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\14.0\VC\Runtimes\X86
Minor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\14.0\VC\Runtimes\X86
Bld
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\14.0\VC\Runtimes\X86
Rbld
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\60DB5E5629367203C8625813703DFCA1
56FE97613F5584249BE1B6B31E6AC9FD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\56FE97613F5584249BE1B6B31E6AC9FD
VC_Runtime_Minimum
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\Features
VC_Runtime_Minimum
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\56FE97613F5584249BE1B6B31E6AC9FD
Provider
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\Features
Provider
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\56FE97613F5584249BE1B6B31E6AC9FD
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\Features
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\60DB5E5629367203C8625813703DFCA1
56FE97613F5584249BE1B6B31E6AC9FD
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD\SourceList
LastUsedSource
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\3bd8c4.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\3bd8c4.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\46B9183E65C37DD329D1000B11DA13ED
4588AEA179573DC449F8D83E469DE470
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D
4588AEA179573DC449F8D83E469DE470
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6
4588AEA179573DC449F8D83E469DE470
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9
4588AEA179573DC449F8D83E469DE470
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AF6D649BB945143DAD2D436C434C20F
4588AEA179573DC449F8D83E469DE470
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc140chs.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\841B335EA38A88737A36C0C664FCC63C
4588AEA179573DC449F8D83E469DE470
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc140cht.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3A1C53B88CB3F7C33B57D6B5E272B8FF
4588AEA179573DC449F8D83E469DE470
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc140deu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0B76360A9B1D0AC35A81B25B36672275
4588AEA179573DC449F8D83E469DE470
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc140enu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BF427A2B66EB00A3182637A36261AA34
4588AEA179573DC449F8D83E469DE470
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc140esn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BCE00C92AF70C413399B4A50F82E20B5
4588AEA179573DC449F8D83E469DE470
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc140fra.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7FD8D5E49CB105931B840901B2EC77A7
4588AEA179573DC449F8D83E469DE470
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc140ita.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\18E39E9B8AC8A5A3EA358562C997478C
4588AEA179573DC449F8D83E469DE470
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc140jpn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E52BAFB9807F7F32B60B598A4DBB7A7
4588AEA179573DC449F8D83E469DE470
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc140kor.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\52FCE2A887EC8E939BD4BAB1A128F53C
4588AEA179573DC449F8D83E469DE470
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc140rus.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CF1288ED10B63B4328E2F1739AE9A4E2
4588AEA179573DC449F8D83E469DE470
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1F6CD69CA4980E338A1CE3E93749AF82
4588AEA179573DC449F8D83E469DE470
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FD022AE163B598239B970D86144E8188
4588AEA179573DC449F8D83E469DE470
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D119A3F71F2F0B13890895B0C76A267C
4588AEA179573DC449F8D83E469DE470
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\4588AEA179573DC449F8D83E469DE470
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\4588AEA179573DC449F8D83E469DE470
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\4588AEA179573DC449F8D83E469DE470
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\4588AEA179573DC449F8D83E469DE470
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\4588AEA179573DC449F8D83E469DE470
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\4588AEA179573DC449F8D83E469DE470
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\4588AEA179573DC449F8D83E469DE470
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\4588AEA179573DC449F8D83E469DE470
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\4588AEA179573DC449F8D83E469DE470
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\4588AEA179573DC449F8D83E469DE470
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\4588AEA179573DC449F8D83E469DE470
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\4588AEA179573DC449F8D83E469DE470
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\4588AEA179573DC449F8D83E469DE470
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\4588AEA179573DC449F8D83E469DE470
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\4588AEA179573DC449F8D83E469DE470
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\4588AEA179573DC449F8D83E469DE470
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\4588AEA179573DC449F8D83E469DE470
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\4588AEA179573DC449F8D83E469DE470
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\4588AEA179573DC449F8D83E469DE470
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\4588AEA179573DC449F8D83E469DE470
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\4588AEA179573DC449F8D83E469DE470
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\4588AEA179573DC449F8D83E469DE470
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\4588AEA179573DC449F8D83E469DE470
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\4588AEA179573DC449F8D83E469DE470
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\4588AEA179573DC449F8D83E469DE470
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\4588AEA179573DC449F8D83E469DE470
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\4588AEA179573DC449F8D83E469DE470
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\4588AEA179573DC449F8D83E469DE470
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\4588AEA179573DC449F8D83E469DE470
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\4588AEA179573DC449F8D83E469DE470
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AF6D649BB945143DAD2D436C434C20F\4588AEA179573DC449F8D83E469DE470
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AF6D649BB945143DAD2D436C434C20F\4588AEA179573DC449F8D83E469DE470
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AF6D649BB945143DAD2D436C434C20F\4588AEA179573DC449F8D83E469DE470
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AF6D649BB945143DAD2D436C434C20F\4588AEA179573DC449F8D83E469DE470
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AF6D649BB945143DAD2D436C434C20F\4588AEA179573DC449F8D83E469DE470
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AF6D649BB945143DAD2D436C434C20F\4588AEA179573DC449F8D83E469DE470
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AF6D649BB945143DAD2D436C434C20F\4588AEA179573DC449F8D83E469DE470
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AF6D649BB945143DAD2D436C434C20F\4588AEA179573DC449F8D83E469DE470
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AF6D649BB945143DAD2D436C434C20F\4588AEA179573DC449F8D83E469DE470
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AF6D649BB945143DAD2D436C434C20F\4588AEA179573DC449F8D83E469DE470
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v14
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v14
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v14
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\15E8B87C56C0E773581D82F286F95E50
4588AEA179573DC449F8D83E469DE470
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\4588AEA179573DC449F8D83E469DE470
VC_Runtime_Additional
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\Features
VC_Runtime_Additional
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\4588AEA179573DC449F8D83E469DE470
Provider
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\Features
Provider
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\4588AEA179573DC449F8D83E469DE470
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\Features
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\15E8B87C56C0E773581D82F286F95E50
4588AEA179573DC449F8D83E469DE470
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\vcruntime140.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcp140.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcp140_1.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcp140_2.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcp140_atomic_wait.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcp140_codecvt_ids.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\concrt140.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\vccorlib140.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\vcomp140.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\14.0\RuntimeMinimum
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\14.0\RuntimeMinimum
UpdateVersion
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc140.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc140u.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfcm140.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfcm140u.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\14.0\RuntimeAdditional
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\14.0\RuntimeAdditional
UpdateVersion
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\26\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\26\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupapiLogStatus
setupapi.dev.log
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\26\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\26\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\26\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\26\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\26\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\26\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\26\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\26\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\gwdrv
Owners
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup\PnpLockdownFiles\%SystemRoot%/System32/drivers/gwdrv.sys
Owners
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Alerts
OwningPublisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Alerts
Enabled
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Alerts
Isolation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Alerts
ChannelAccess
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Alerts
Type
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e1a51a95-b1b8-45bd-b370-83748b932e1a}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e1a51a95-b1b8-45bd-b370-83748b932e1a}
ResourceFileName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e1a51a95-b1b8-45bd-b370-83748b932e1a}
MessageFileName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e1a51a95-b1b8-45bd-b370-83748b932e1a}\ChannelReferences
Count
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e1a51a95-b1b8-45bd-b370-83748b932e1a}\ChannelReferences\0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e1a51a95-b1b8-45bd-b370-83748b932e1a}\ChannelReferences\0
Id
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e1a51a95-b1b8-45bd-b370-83748b932e1a}\ChannelReferences\0
Flags
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e1a51a95-b1b8-45bd-b370-83748b932e1a}\ChannelReferences
Count
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\GlassWire
Description
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\GlassWire\State
Pid
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\GlassWire\Cookie
GwCookie1
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\GlassWire\Cookie
GwCookie2
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\GlassWire\Cookie
GwCookie3
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\GlassWire\Cookie
GwCookie4
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.AAD.BrokerPlugin_cw5n1h2txyewy%5Cresources.pri\1d5acdde7226641\4b38d458
@{Microsoft.AAD.BrokerPlugin_1000.19041.1023.0_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.AAD.BrokerPlugin/resources/PublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.AccountsControl_cw5n1h2txyewy%5Cresources.pri\1d8c32fd52327f0\4b38d458
@{Microsoft.AccountsControl_10.0.19041.1023_neutral__cw5n1h2txyewy?ms-resource://Microsoft.AccountsControl/Resources/PublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.AsyncTextService_8wekyb3d8bbwe%5Cresources.pri\1d8c32ff4d71c2f\4b38d458
@{Microsoft.AsyncTextService_10.0.19041.1023_neutral__8wekyb3d8bbwe?ms-resource://Microsoft.AsyncTextService/Resources/PublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.BioEnrollment_cw5n1h2txyewy%5Cresources.pri\1d8c330753d842\4b38d458
@{Microsoft.BioEnrollment_10.0.19041.1023_neutral__cw5n1h2txyewy?ms-resource://Microsoft.BioEnrollment/Resources/PublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5Cmicrosoft.creddialoghost_cw5n1h2txyewy%5Cresources.pri\1d5acddee21b7ec\4b38d458
@{Microsoft.CredDialogHost_10.0.19041.1023_neutral__cw5n1h2txyewy?ms-resource://Microsoft.CredDialogHost/Resources/PublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\26\417C44EB
@%systemroot%\system32\FirewallControlPanel.dll,-12122
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.ECApp_8wekyb3d8bbwe%5Cresources.pri\1d8c32fe87ffd7b\4b38d458
@{Microsoft.ECApp_10.0.19041.1023_neutral__8wekyb3d8bbwe?ms-resource://Microsoft.ECApp/Resources/PublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.LockApp_cw5n1h2txyewy%5Cresources.pri\1d8c32ff076865c\4b38d458
@{Microsoft.LockApp_10.0.19041.1023_neutral__cw5n1h2txyewy?ms-resource://Microsoft.LockApp/resources/PublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe%5Cresources.pri\1d5acddd8370c4b\4b38d458
@{Microsoft.MicrosoftEdgeDevToolsClient_1000.19041.1023.0_neutral_neutral_8wekyb3d8bbwe?ms-resource://Microsoft.MicrosoftEdgeDevToolsClient/resources/PublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Win32WebViewHost_cw5n1h2txyewy%5Cresources.pri\1d5acdef0fedca\4b38d458
@{Microsoft.Win32WebViewHost_10.0.19041.1023_neutral_neutral_cw5n1h2txyewy?ms-resource://Windows.Win32WebViewHost/resources/PublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.AppRep.ChxApp_cw5n1h2txyewy%5Cresources.pri\1d5acddee1afafc\4b38d458
@{Microsoft.Windows.Apprep.ChxApp_1000.19041.1023.0_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.Apprep.ChxApp/resources/PublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.AssignedAccessLockApp_cw5n1h2txyewy%5Cresources.pri\1d8c330155cee50\4b38d458
@{Microsoft.Windows.AssignedAccessLockApp_1000.19041.1023.0_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.AssignedAccessLockApp/Resources/PublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.CallingShellApp_cw5n1h2txyewy%5Cresources.pri\1d8c32fd2531136\4b38d458
@{Microsoft.Windows.CallingShellApp_1000.19041.1023.0_neutral_neutral_cw5n1h2txyewy?ms-resource://WindowsInternal.Shell.Experiences.Calling/resources/PublisherDisplayName}
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\GlassWire\State
LocalListeningPort
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.CloudExperienceHost_cw5n1h2txyewy%5Cresources.pri\1d8c32fdff34402\4b38d458
@{Microsoft.Windows.CloudExperienceHost_10.0.19041.1266_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.CloudExperienceHost/resources/PublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.ContentDeliveryManager_cw5n1h2txyewy%5Cresources.pri\1d5acddd82645c0\4b38d458
@{Microsoft.Windows.ContentDeliveryManager_10.0.19041.1023_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.ContentDeliveryManager/resources/PublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5Cmicrosoft.windows.narratorquickstart_8wekyb3d8bbwe%5Cresources.pri\1d5acdded540f4d\4b38d458
@{Microsoft.Windows.NarratorQuickStart_10.0.19041.1023_neutral_neutral_8wekyb3d8bbwe?ms-resource://Microsoft.Windows.NarratorQuickStart/Resources/PublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.OOBENetworkCaptivePortal_cw5n1h2txyewy%5Cresources.pri\1d5acddeb9898a7\4b38d458
@{Microsoft.Windows.OOBENetworkCaptivePortal_10.0.19041.1023_neutral__cw5n1h2txyewy?ms-resource://Microsoft.Windows.OOBENetworkCaptivePortal/Resources/PublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.OOBENetworkConnectionFlow_cw5n1h2txyewy%5Cresources.pri\1d5acddeb9b0f78\4b38d458
@{Microsoft.Windows.OOBENetworkConnectionFlow_10.0.19041.1023_neutral__cw5n1h2txyewy?ms-resource://Microsoft.Windows.OOBENetworkConnectionFlow/Resources/PublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CParentalControls_cw5n1h2txyewy%5Cresources.pri\1d8c32fd30d0ae0\4b38d458
@{Microsoft.Windows.ParentalControls_1000.19041.1023.0_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.ParentalControls/resources/PublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.PeopleExperienceHost_cw5n1h2txyewy%5Cresources.pri\1d8c32fe6e84da4\4b38d458
@{Microsoft.Windows.PeopleExperienceHost_10.0.19041.1023_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.PeopleExperienceHost/resources/PublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy%5Cresources.pri\1d5ad0d6f88fe76\4b38d458
@{Microsoft.Windows.SecureAssessmentBrowser_10.0.19041.1023_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.SecureAssessmentBrowser/Resources/PublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CShellExperienceHost_cw5n1h2txyewy%5Cresources.pri\1d8c3301c13f68d\4b38d458
@{Microsoft.Windows.ShellExperienceHost_10.0.19041.1949_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.ShellExperienceHost/resources/PublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy%5Cresources.pri\1d5acddea4e2414\4b38d458
@{Microsoft.Windows.StartMenuExperienceHost_10.0.19041.1023_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.XboxGameCallableUI_cw5n1h2txyewy%5Cresources.pri\1d5acdddadc1b8f\4b38d458
@{Microsoft.XboxGameCallableUI_1000.19041.1023.0_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.XboxGameCallableUI/resources/PublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoftWindows.Client.CBS_cw5n1h2txyewy%5Cresources.pri\1d8c3301e8968be\4b38d458
@{MicrosoftWindows.Client.CBS_120.2212.4180.0_x64__cw5n1h2txyewy?ms-resource://MicrosoftWindows.Client.CBS/Resources/ProductPublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CWindows.CBSPreview_cw5n1h2txyewy%5Cresources.pri\1d5acdde3e269d3\4b38d458
@{Windows.CBSPreview_10.0.19041.1023_neutral_neutral_cw5n1h2txyewy?ms-resource://Windows.CBSPreview/resources/PublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CImmersiveControlPanel%5Cresources.pri\1d5acde2d018dbc\4b38d458
@{windows.immersivecontrolpanel_10.0.2.1000_neutral_neutral_cw5n1h2txyewy?ms-resource://windows.immersivecontrolpanel/resources/PublisherDisplayName}
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CPrintDialog%5Cresources.pri\1d8c32ff3aab316\4b38d458
@{Windows.PrintDialog_6.2.1.0_neutral_neutral_cw5n1h2txyewy?ms-resource://Windows.PrintDialog/resources/PublisherDisplayName}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 684 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1C9D000
unkown
page execute and read and write
3010000
heap
page read and write
4962000
heap
page read and write
4502CFC000
stack
page read and write
51E1000
heap
page read and write
2A5C9E94000
heap
page read and write
1AA63C79000
heap
page read and write
2A5C7DA3000
heap
page read and write
2A5C90E5000
trusted library allocation
page read and write
2A5CA010000
heap
page read and write
170924D4000
trusted library allocation
page read and write
2A5C8D49000
trusted library allocation
page read and write
662D000
direct allocation
page read and write
51D0000
direct allocation
page read and write
17090693000
heap
page read and write
51E1000
heap
page read and write
170924D5000
trusted library allocation
page read and write
48CE000
stack
page read and write
6A1F000
direct allocation
page read and write
170906BD000
heap
page read and write
6A9F3000
unkown
page execute read
2A5C977D000
heap
page read and write
51E1000
heap
page read and write
775E000
heap
page read and write
51E1000
heap
page read and write
4961000
heap
page read and write
2A5C7D81000
heap
page read and write
51D0000
direct allocation
page read and write
1F733D60000
heap
page read and write
48B0000
direct allocation
page read and write
4B8E000
heap
page read and write
2A5C97C1000
heap
page read and write
69D71000
unkown
page execute read
655000
heap
page read and write
861000
unkown
page execute read
6F4000
heap
page read and write
848E000
heap
page read and write
5B62000
heap
page read and write
2A5C9D06000
heap
page read and write
84FD000
heap
page read and write
5690000
direct allocation
page read and write
170906BF000
heap
page read and write
6B9E1000
unkown
page readonly
1ACF000
unkown
page write copy
170924CC000
trusted library allocation
page read and write
2A5C9D55000
heap
page read and write
1BC0000
unkown
page readonly
655000
heap
page read and write
215061A8000
heap
page read and write
CC0000
direct allocation
page read and write
2A5C8D3B000
trusted library allocation
page read and write
7849000
heap
page read and write
2150622D000
heap
page read and write
2FBE000
stack
page read and write
51E1000
heap
page read and write
76A8000
heap
page read and write
775C000
heap
page read and write
2A5C9D06000
heap
page read and write
2A5C8D63000
trusted library allocation
page read and write
1191000
heap
page read and write
170905A0000
heap
page read and write
170906BE000
heap
page read and write
170924D3000
trusted library allocation
page read and write
51E1000
heap
page read and write
17090677000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
1709067D000
heap
page read and write
3810000
heap
page read and write
557A000
heap
page read and write
6431000
heap
page read and write
9B0000
heap
page read and write
7F46000
heap
page read and write
4A60000
direct allocation
page read and write
8422000
heap
page read and write
51E1000
heap
page read and write
2A5C8CE6000
trusted library allocation
page read and write
51D0000
direct allocation
page read and write
5803000
direct allocation
page read and write
1E88A746000
heap
page read and write
170920B4000
trusted library allocation
page read and write
17090676000
heap
page read and write
1EF000
unkown
page readonly
170906E2000
heap
page read and write
194A12FE000
trusted library allocation
page read and write
17090648000
heap
page read and write
2A5C9FEC000
heap
page read and write
170924CE000
trusted library allocation
page read and write
2A5C8D1A000
trusted library allocation
page read and write
1AFBD3C8000
heap
page read and write
2E9E000
heap
page read and write
170924CC000
trusted library allocation
page read and write
215061D6000
heap
page read and write
2155D7C0000
heap
page read and write
170920B0000
trusted library allocation
page read and write
2155D812000
heap
page read and write
65C1000
heap
page read and write
2A5C8D4C000
trusted library allocation
page read and write
12DD000
heap
page read and write
170924D2000
trusted library allocation
page read and write
215061A6000
heap
page read and write
215061DC000
heap
page read and write
4440000
heap
page read and write
6A0CF000
unkown
page execute read
984000
heap
page read and write
2A5C90E4000
trusted library allocation
page read and write
2A5C8D12000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
40A000
unkown
page read and write
2A5CA1F7000
heap
page read and write
5650000
direct allocation
page read and write
170924D0000
trusted library allocation
page read and write
840C000
heap
page read and write
2A5C8D60000
trusted library allocation
page read and write
2A5CA1E2000
heap
page read and write
2A5CA21A000
heap
page read and write
4962000
heap
page read and write
2A424F60000
heap
page read and write
2418000
unkown
page readonly
6A21000
direct allocation
page read and write
65C1000
heap
page read and write
2A5CA20A000
heap
page read and write
5A80000
direct allocation
page read and write
A20000
unkown
page readonly
1E88A727000
heap
page read and write
293F000
stack
page read and write
2A5C9F36000
heap
page read and write
840D000
heap
page read and write
2150621F000
heap
page read and write
76C5000
heap
page read and write
5511000
heap
page read and write
2247000
unkown
page write copy
69D92000
unkown
page execute read
12A1000
heap
page read and write
170906BE000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
8CE000
unkown
page readonly
EFA000
stack
page read and write
1E8000
unkown
page readonly
57AE000
direct allocation
page read and write
170924D5000
trusted library allocation
page read and write
24BA000
unkown
page readonly
2A5C90DF000
trusted library allocation
page read and write
A5E000
heap
page read and write
847A000
heap
page read and write
2A5C8D41000
trusted library allocation
page read and write
1D501510000
heap
page read and write
6840000
heap
page read and write
61A1000
heap
page read and write
46BC000
heap
page read and write
170924CA000
trusted library allocation
page read and write
21B1000
unkown
page execute read
2155D80C000
heap
page read and write
51E1000
heap
page read and write
85FD77F000
stack
page read and write
1BFD000
unkown
page write copy
1709067C000
heap
page read and write
1F73420B000
heap
page read and write
6EE5000
direct allocation
page read and write
4962000
heap
page read and write
2A5C977E000
heap
page read and write
1429000
unkown
page execute read
2A5C975F000
heap
page read and write
2A5C7DA4000
heap
page read and write
2A5C9E4B000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
6D4000
heap
page read and write
1AB54E08000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
17090693000
heap
page read and write
51E1000
heap
page read and write
3340000
trusted library allocation
page read and write
385F000
stack
page read and write
4962000
heap
page read and write
6B1E000
direct allocation
page read and write
170924CB000
trusted library allocation
page read and write
51E1000
heap
page read and write
4278000
heap
page read and write
8AB000
unkown
page readonly
51E1000
heap
page read and write
2A5C9799000
heap
page read and write
B3C000
stack
page read and write
5593000
heap
page read and write
11C3000
heap
page read and write
769B000
heap
page read and write
17090685000
heap
page read and write
569B000
direct allocation
page read and write
4B96000
heap
page read and write
4A54000
heap
page read and write
2A5C9CE9000
heap
page read and write
49F4000
heap
page read and write
51E1000
heap
page read and write
1BB6000
unkown
page readonly
1D5015F0000
heap
page read and write
170906D1000
heap
page read and write
17090685000
heap
page read and write
170924CB000
trusted library allocation
page read and write
4C23000
heap
page read and write
6AFB000
direct allocation
page read and write
51E1000
heap
page read and write
4962000
heap
page read and write
5620000
direct allocation
page read and write
4962000
heap
page read and write
1709067A000
heap
page read and write
1115000
heap
page read and write
170920B0000
trusted library allocation
page read and write
5424000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
170924D5000
trusted library allocation
page read and write
2A5C8D1D000
trusted library allocation
page read and write
170924D4000
trusted library allocation
page read and write
556C000
heap
page read and write
4962000
heap
page read and write
51E1000
heap
page read and write
170924D4000
trusted library allocation
page read and write
30D0000
heap
page read and write
170924C1000
trusted library allocation
page read and write
8420000
heap
page read and write
6A981000
unkown
page execute read
4BCA000
heap
page read and write
170924D5000
trusted library allocation
page read and write
215060A0000
heap
page read and write
61A1000
heap
page read and write
AE3000
unkown
page execute read
D3D8C7E000
stack
page read and write
170920B4000
trusted library allocation
page read and write
170924CF000
trusted library allocation
page read and write
78F000
heap
page read and write
194A1313000
trusted library allocation
page read and write
2A5C8D15000
trusted library allocation
page read and write
54F8000
heap
page read and write
17090667000
heap
page read and write
2A5C97F6000
trusted library allocation
page read and write
21B1000
unkown
page execute read
170924CB000
trusted library allocation
page read and write
46E3000
heap
page read and write
51E1000
heap
page read and write
2A5C8D15000
trusted library allocation
page read and write
7408000
direct allocation
page read and write
19AC000
unkown
page readonly
170924D1000
trusted library allocation
page read and write
2A5C9CF1000
heap
page read and write
A60000
heap
page read and write
A60000
heap
page read and write
3070000
heap
page read and write
51E1000
heap
page read and write
170924CC000
trusted library allocation
page read and write
51E1000
heap
page read and write
2A5C8CE3000
trusted library allocation
page read and write
65C1000
heap
page read and write
2A5C8D16000
trusted library allocation
page read and write
4698000
heap
page read and write
2155D81D000
heap
page read and write
51E1000
heap
page read and write
496B000
direct allocation
page read and write
2A5C8D38000
trusted library allocation
page read and write
2A5C90DB000
trusted library allocation
page read and write
53EF000
heap
page read and write
17090678000
heap
page read and write
51E1000
heap
page read and write
2A5C9DBA000
heap
page read and write
2FFE000
trusted library allocation
page read and write
6B707000
unkown
page execute read
2150621D000
heap
page read and write
7692000
heap
page read and write
170920B4000
trusted library allocation
page read and write
2A5C97CE000
heap
page read and write
2A5C8D30000
trusted library allocation
page read and write
2A5C9E4B000
heap
page read and write
65C1000
heap
page read and write
12D5000
heap
page read and write
170924D5000
trusted library allocation
page read and write
8508000
heap
page read and write
170924C3000
trusted library allocation
page read and write
6B7E000
direct allocation
page read and write
170924CD000
trusted library allocation
page read and write
2E8C000
heap
page read and write
1F733D0E000
heap
page read and write
6AAD000
direct allocation
page read and write
2A5C8D3A000
trusted library allocation
page read and write
51D0000
direct allocation
page read and write
6D0000
heap
page read and write
3560000
heap
page read and write
5410000
heap
page read and write
1516000
heap
page read and write
8449000
heap
page read and write
7D0000
heap
page read and write
DF1000
unkown
page execute read
2A5C9D06000
heap
page read and write
21506237000
heap
page read and write
CC0000
direct allocation
page read and write
48F0000
direct allocation
page read and write
8467000
heap
page read and write
5418000
heap
page read and write
847F000
heap
page read and write
77E000
heap
page read and write
2150621D000
heap
page read and write
4F5000
heap
page read and write
2CF4000
heap
page read and write
2155D7FA000
heap
page read and write
2A5C96E2000
heap
page read and write
2155D7F5000
heap
page read and write
7792000
heap
page read and write
4962000
heap
page read and write
4962000
heap
page read and write
51E1000
heap
page read and write
170920B4000
trusted library allocation
page read and write
11DA000
heap
page read and write
170924CF000
trusted library allocation
page read and write
3B7000
unkown
page execute and read and write
61A1000
heap
page read and write
3310000
unkown
page read and write
1AA65726000
heap
page read and write
2155D820000
heap
page read and write
2A5C9E13000
heap
page read and write
3002000
trusted library allocation
page read and write
51E1000
heap
page read and write
777E000
heap
page read and write
3827000
trusted library allocation
page read and write
1AB54D00000
heap
page read and write
5F0000
heap
page read and write
5620000
direct allocation
page read and write
7824000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
3869000
direct allocation
page read and write
6431000
heap
page read and write
51E1000
heap
page read and write
2155D806000
heap
page read and write
2A5CA038000
heap
page read and write
215061C2000
heap
page read and write
2F7F000
stack
page read and write
51E1000
heap
page read and write
215061BB000
heap
page read and write
11CF000
heap
page read and write
2FF2000
trusted library allocation
page read and write
51E1000
heap
page read and write
84B1000
heap
page read and write
215061CF000
heap
page read and write
17092440000
heap
page read and write
84AB000
heap
page read and write
2A5C9E2A000
heap
page read and write
170924D5000
trusted library allocation
page read and write
17092140000
heap
page read and write
2A5C8D04000
trusted library allocation
page read and write
2A5C8D27000
trusted library allocation
page read and write
2A5C9799000
heap
page read and write
3305000
direct allocation
page read and write
170906BF000
heap
page read and write
1ACE000
unkown
page readonly
170924D3000
trusted library allocation
page read and write
661000
heap
page read and write
2B40000
heap
page read and write
655000
heap
page read and write
170924D4000
trusted library allocation
page read and write
2CF4000
heap
page read and write
69D71000
unkown
page execute read
2A5C8CE1000
trusted library allocation
page read and write
2A5C8D33000
trusted library allocation
page read and write
170924CB000
trusted library allocation
page read and write
170924CB000
trusted library allocation
page read and write
84F1000
heap
page read and write
2A5C9738000
heap
page read and write
194A12A0000
trusted library allocation
page read and write
2A5C8D32000
trusted library allocation
page read and write
1C9C000
unkown
page readonly
83EB000
heap
page read and write
106F000
stack
page read and write
2751000
heap
page read and write
11E8000
unkown
page execute read
17090580000
heap
page read and write
4AD0000
direct allocation
page read and write
8535000
heap
page read and write
A21000
unkown
page execute read
2A5C8D67000
trusted library allocation
page read and write
61A1000
heap
page read and write
3C7000
unkown
page execute and read and write
51E1000
heap
page read and write
2A5C8D13000
trusted library allocation
page read and write
1EE000
unkown
page write copy
397000
unkown
page execute and read and write
170924CC000
trusted library allocation
page read and write
8456000
heap
page read and write
170924D2000
trusted library allocation
page read and write
170924CC000
trusted library allocation
page read and write
6431000
heap
page read and write
51E1000
heap
page read and write
2A5C9E39000
heap
page read and write
30B0000
heap
page read and write
33E0000
heap
page read and write
170924D1000
trusted library allocation
page read and write
170920B0000
trusted library allocation
page read and write
170906C1000
heap
page read and write
21506234000
heap
page read and write
43A000
unkown
page execute and read and write
49F0000
heap
page read and write
A20000
unkown
page readonly
6E14000
direct allocation
page read and write
2DD0000
heap
page readonly
4EFE000
stack
page read and write
553A000
heap
page read and write
757000
heap
page read and write
3D0000
unkown
page execute and read and write
170906BF000
heap
page read and write
51E1000
heap
page read and write
1802000
unkown
page readonly
2155D7F3000
heap
page read and write
34B807F000
stack
page read and write
5B17000
heap
page read and write
4C10000
heap
page read and write
170924CF000
trusted library allocation
page read and write
275A000
heap
page read and write
CC0000
direct allocation
page read and write
4C24000
heap
page read and write
1E80000
unkown
page execute and read and write
2A5CA031000
heap
page read and write
777F000
heap
page read and write
2A5C8D20000
trusted library allocation
page read and write
51E1000
heap
page read and write
1F73422A000
heap
page read and write
7688000
heap
page read and write
1189000
heap
page read and write
2B00000
heap
page read and write
275C000
heap
page read and write
51E1000
heap
page read and write
A21000
unkown
page execute read
170924D6000
trusted library allocation
page read and write
51E1000
heap
page read and write
8456000
heap
page read and write
215061DE000
heap
page read and write
6C20000
direct allocation
page read and write
1F734200000
heap
page read and write
170906D1000
heap
page read and write
51E1000
heap
page read and write
2A5C975F000
heap
page read and write
840B000
heap
page read and write
54C8000
heap
page read and write
1AA657AB000
heap
page read and write
8423000
heap
page read and write
170924D1000
trusted library allocation
page read and write
46E6000
heap
page read and write
4A60000
direct allocation
page read and write
51E1000
heap
page read and write
90D000
stack
page read and write
1070000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
68AC000
direct allocation
page read and write
5590000
heap
page read and write
2B5A000
heap
page read and write
194A12B4000
trusted library allocation
page read and write
1E88A722000
heap
page read and write
170924D1000
trusted library allocation
page read and write
4960000
direct allocation
page read and write
51E1000
heap
page read and write
1709067C000
heap
page read and write
170920B4000
trusted library allocation
page read and write
A20000
unkown
page readonly
AE3000
unkown
page execute read
170924D5000
trusted library allocation
page read and write
2C50000
heap
page read and write
30C0000
direct allocation
page read and write
17090685000
heap
page read and write
65C1000
heap
page read and write
1F7341F8000
heap
page read and write
8501000
heap
page read and write
1C9A000
unkown
page read and write
11CD000
heap
page read and write
51E1000
heap
page read and write
849C000
heap
page read and write
54F6000
heap
page read and write
2A5C9E4D000
heap
page read and write
2A5C9D2F000
heap
page read and write
6B1E2000
unkown
page readonly
2FF1000
trusted library allocation
page read and write
170906BF000
heap
page read and write
2A5C9E3E000
heap
page read and write
2155D7FF000
heap
page read and write
6431000
heap
page read and write
2A5C90D9000
trusted library allocation
page read and write
170924D4000
trusted library allocation
page read and write
4AE0000
heap
page read and write
8489000
heap
page read and write
2DD0000
direct allocation
page read and write
21506460000
heap
page read and write
38D000
unkown
page execute and read and write
2A5C8D56000
trusted library allocation
page read and write
6530000
direct allocation
page read and write
215061DC000
heap
page read and write
170924CF000
trusted library allocation
page read and write
2A5C8D1C000
trusted library allocation
page read and write
48FC000
stack
page read and write
2A5C97EB000
trusted library allocation
page read and write
170924CC000
trusted library allocation
page read and write
1F733D0A000
heap
page read and write
4A60000
direct allocation
page read and write
2A5C9DDB000
heap
page read and write
51E1000
heap
page read and write
6FB1000
heap
page read and write
51E1000
heap
page read and write
61A1000
heap
page read and write
1709067D000
heap
page read and write
61A1000
heap
page read and write
51E1000
heap
page read and write
2A5C90E1000
trusted library allocation
page read and write
215061CC000
heap
page read and write
1BBF000
unkown
page read and write
83F5000
heap
page read and write
4D1E000
stack
page read and write
53F9000
heap
page read and write
51E1000
heap
page read and write
2A5C9EBF000
heap
page read and write
2FF8000
trusted library allocation
page read and write
2A5C97CC000
heap
page read and write
17090691000
heap
page read and write
170924D1000
trusted library allocation
page read and write
2750000
heap
page read and write
170924CE000
trusted library allocation
page read and write
54C8000
heap
page read and write
84B1000
heap
page read and write
4BE0000
trusted library allocation
page read and write
4962000
heap
page read and write
77A7000
heap
page read and write
2A5C8CE1000
trusted library allocation
page read and write
4962000
heap
page read and write
17090685000
heap
page read and write
17090675000
heap
page read and write
847F000
heap
page read and write
83E5000
heap
page read and write
170924CF000
trusted library allocation
page read and write
51E1000
heap
page read and write
6AA10000
unkown
page execute read
170924D5000
trusted library allocation
page read and write
4962000
heap
page read and write
2A5C9767000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
3834000
trusted library allocation
page read and write
1BB3000
unkown
page read and write
11B6000
heap
page read and write
51E1000
heap
page read and write
6A701000
unkown
page execute read
12DD000
heap
page read and write
2A424E21000
heap
page read and write
2A5C8D7D000
trusted library allocation
page read and write
75F000
heap
page read and write
8430000
heap
page read and write
170906D1000
heap
page read and write
170920B4000
trusted library allocation
page read and write
1F73420C000
heap
page read and write
215061F6000
heap
page read and write
2A5C8D70000
trusted library allocation
page read and write
2A5CA20E000
heap
page read and write
2A5CA010000
heap
page read and write
51E1000
heap
page read and write
170924CE000
trusted library allocation
page read and write
2A5C8D55000
trusted library allocation
page read and write
7760000
heap
page read and write
6A00000
direct allocation
page read and write
51E1000
heap
page read and write
2150621D000
heap
page read and write
1F7341F0000
heap
page read and write
6A26F000
unkown
page readonly
668587F000
stack
page read and write
11A0000
heap
page read and write
7692000
heap
page read and write
3DD000
unkown
page execute and read and write
30C0000
direct allocation
page read and write
2A5C8D74000
trusted library allocation
page read and write
6E9A000
direct allocation
page read and write
4B78000
heap
page read and write
4962000
heap
page read and write
51E1000
heap
page read and write
275E000
heap
page read and write
4A60000
direct allocation
page read and write
2A5C9CDA000
heap
page read and write
2155D7E0000
heap
page read and write
51E1000
heap
page read and write
2FF9000
trusted library allocation
page read and write
170924D0000
trusted library allocation
page read and write
17090685000
heap
page read and write
1F733D05000
heap
page read and write
51E1000
heap
page read and write
1E88A985000
heap
page read and write
84C9000
heap
page read and write
51E1000
heap
page read and write
61A1000
heap
page read and write
1E1000
unkown
page execute read
1EB5000
unkown
page execute and read and write
2A5C7DB7000
heap
page read and write
170924D3000
trusted library allocation
page read and write
2A424D80000
heap
page read and write
471E000
stack
page read and write
5B8A000
heap
page read and write
1F734224000
heap
page read and write
6C6F000
direct allocation
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
7F59000
heap
page read and write
1E88A71B000
heap
page read and write
2A5C97C0000
heap
page read and write
2A5C8D4E000
trusted library allocation
page read and write
24BA000
unkown
page readonly
54C8000
heap
page read and write
1802000
unkown
page readonly
7F75000
heap
page read and write
7F59000
heap
page read and write
4B1E000
stack
page read and write
2A5C97ED000
trusted library allocation
page read and write
6AC2000
direct allocation
page read and write
7692000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
D4145E6000
stack
page read and write
1F733B60000
heap
page read and write
1E8C000
unkown
page execute and read and write
51E1000
heap
page read and write
4C1E000
stack
page read and write
5A80000
direct allocation
page read and write
51D0000
direct allocation
page read and write
2A5C7DB6000
heap
page read and write
1E8000
unkown
page readonly
6D0000
heap
page read and write
170924D1000
trusted library allocation
page read and write
170920B0000
trusted library allocation
page read and write
4820000
heap
page read and write
336E000
stack
page read and write
F29000
heap
page read and write
170906BF000
heap
page read and write
170920B0000
trusted library allocation
page read and write
51E1000
heap
page read and write
19A000
stack
page read and write
12D5000
heap
page read and write
6A64000
direct allocation
page read and write
51E1000
heap
page read and write
53EF000
heap
page read and write
1E88A714000
heap
page read and write
22F5000
unkown
page readonly
6A29B000
unkown
page read and write
2753000
heap
page read and write
3420000
heap
page read and write
65C1000
heap
page read and write
7869000
heap
page read and write
2155D7FA000
heap
page read and write
7F48000
heap
page read and write
84F3000
heap
page read and write
29BE000
stack
page read and write
51E1000
heap
page read and write
1BFE000
unkown
page readonly
51E1000
heap
page read and write
170924CA000
trusted library allocation
page read and write
170924D4000
trusted library allocation
page read and write
D4148FF000
stack
page read and write
6A198000
unkown
page execute read
11E8000
unkown
page execute read
1191000
heap
page read and write
215061C1000
heap
page read and write
65C1000
heap
page read and write
2A5C90D4000
trusted library allocation
page read and write
21506230000
heap
page read and write
3DBBEFF000
stack
page read and write
6530000
direct allocation
page read and write
56CD000
direct allocation
page read and write
170924D3000
trusted library allocation
page read and write
6A00000
direct allocation
page read and write
2155D7E3000
heap
page read and write
559D000
heap
page read and write
1BAF000
unkown
page readonly
170924CE000
trusted library allocation
page read and write
170924D2000
trusted library allocation
page read and write
1F734204000
heap
page read and write
51E1000
heap
page read and write
3833000
trusted library allocation
page read and write
1F7341FE000
heap
page read and write
170906D1000
heap
page read and write
2A5C97ED000
trusted library allocation
page read and write
51E1000
heap
page read and write
170924D6000
trusted library allocation
page read and write
779000
heap
page read and write
7F45000
heap
page read and write
170924CB000
trusted library allocation
page read and write
2155D808000
heap
page read and write
170924D1000
trusted library allocation
page read and write
170924CF000
trusted library allocation
page read and write
215061A9000
heap
page read and write
51D0000
direct allocation
page read and write
12C4000
heap
page read and write
6A2000
heap
page read and write
170924CD000
trusted library allocation
page read and write
2A5C9DDE000
heap
page read and write
2A5C9CF0000
heap
page read and write
2A5C9E4B000
heap
page read and write
31D0000
direct allocation
page read and write
215061A2000
heap
page read and write
A21000
unkown
page execute read
118F000
heap
page read and write
2A5C9E50000
heap
page read and write
7807000
heap
page read and write
2A5C90EA000
trusted library allocation
page read and write
2E4F000
stack
page read and write
17090691000
heap
page read and write
2A5C9F3B000
heap
page read and write
170906D1000
heap
page read and write
1E80000
unkown
page execute and read and write
215061CC000
heap
page read and write
1F733BD9000
heap
page read and write
170924CE000
trusted library allocation
page read and write
3832000
trusted library allocation
page read and write
11B9000
heap
page read and write
8530000
heap
page read and write
2A5C8D35000
trusted library allocation
page read and write
2A5C9749000
heap
page read and write
6A26F000
unkown
page readonly
2155D6D0000
heap
page read and write
51E1000
heap
page read and write
69E000
heap
page read and write
2A5C9FA5000
heap
page read and write
65C1000
heap
page read and write
170924D6000
trusted library allocation
page read and write
2A5C8D1F000
trusted library allocation
page read and write
170924CA000
trusted library allocation
page read and write
170920B0000
trusted library allocation
page read and write
58A5000
direct allocation
page read and write
51E1000
heap
page read and write
215061A6000
heap
page read and write
170924CD000
trusted library allocation
page read and write
194A12DC000
trusted library allocation
page read and write
1C9C000
unkown
page readonly
779C000
heap
page read and write
4962000
heap
page read and write
3390000
heap
page read and write
1BB6000
unkown
page readonly
48AF000
stack
page read and write
65C0000
heap
page read and write
4A50000
heap
page read and write
2A5C7D9B000
heap
page read and write
6E4E000
direct allocation
page read and write
2A5C9CF1000
heap
page read and write
170924CD000
trusted library allocation
page read and write
51E1000
heap
page read and write
170924D6000
trusted library allocation
page read and write
65C1000
heap
page read and write
6B49A000
unkown
page execute and read and write
17091FB0000
heap
page read and write
3340000
trusted library allocation
page read and write
2A5C9D7B000
heap
page read and write
30C0000
direct allocation
page read and write
1F73421A000
heap
page read and write
232E000
unkown
page readonly
4962000
heap
page read and write
B1C000
unkown
page execute read
7787000
heap
page read and write
F41000
heap
page read and write
215061E1000
heap
page read and write
6F4000
heap
page read and write
2A5C8CE3000
trusted library allocation
page read and write
3823000
trusted library allocation
page read and write
1E88A720000
heap
page read and write
777E000
heap
page read and write
2EBE000
stack
page read and write
8417000
heap
page read and write
4962000
heap
page read and write
69D70000
unkown
page readonly
2752000
heap
page read and write
17090693000
heap
page read and write
2150621F000
heap
page read and write
1E88A70B000
heap
page read and write
30D1000
heap
page read and write
5690000
direct allocation
page read and write
2A5CA1A0000
heap
page read and write
170920B0000
trusted library allocation
page read and write
11C8000
heap
page read and write
170924CF000
trusted library allocation
page read and write
2E00000
direct allocation
page read and write
6BEF000
direct allocation
page read and write
4962000
heap
page read and write
51E1000
heap
page read and write
2A5C8D37000
trusted library allocation
page read and write
170924D4000
trusted library allocation
page read and write
21506240000
heap
page read and write
6A2AA000
unkown
page readonly
33B0000
heap
page read and write
232D000
unkown
page write copy
170906D1000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
2A5C8CDF000
trusted library allocation
page read and write
46E4000
heap
page read and write
65C1000
heap
page read and write
1174000
heap
page read and write
194A13C0000
trusted library allocation
page read and write
2155D7F3000
heap
page read and write
215061E1000
heap
page read and write
51E1000
heap
page read and write
170924CA000
trusted library allocation
page read and write
215061B5000
heap
page read and write
2FF3000
trusted library allocation
page read and write
170924D2000
trusted library allocation
page read and write
51E1000
heap
page read and write
2757000
heap
page read and write
2A5C97A9000
heap
page read and write
17090691000
heap
page read and write
61A1000
heap
page read and write
30C0000
direct allocation
page read and write
76F6000
direct allocation
page read and write
51E1000
heap
page read and write
4AD0000
direct allocation
page read and write
6DA7000
direct allocation
page read and write
51E1000
heap
page read and write
2A5C7D90000
heap
page read and write
2A5C9E29000
heap
page read and write
2155D7F9000
heap
page read and write
170924CA000
trusted library allocation
page read and write
4B65000
heap
page read and write
2753000
heap
page read and write
1E5000
unkown
page readonly
83FA000
heap
page read and write
190A000
unkown
page readonly
2A5C9ED1000
heap
page read and write
46AD000
heap
page read and write
170924D0000
trusted library allocation
page read and write
275D000
heap
page read and write
2A5C9FEC000
heap
page read and write
4962000
heap
page read and write
2A5CA258000
heap
page read and write
17090685000
heap
page read and write
6431000
heap
page read and write
2A5C97DC000
trusted library allocation
page read and write
170924CB000
trusted library allocation
page read and write
51E1000
heap
page read and write
8529000
heap
page read and write
61A1000
heap
page read and write
400000
unkown
page readonly
2758000
heap
page read and write
6979000
direct allocation
page read and write
2752000
heap
page read and write
1BC0000
unkown
page readonly
7787000
heap
page read and write
2A5C9D9B000
heap
page read and write
17090693000
heap
page read and write
53E1000
heap
page read and write
2155D7FB000
heap
page read and write
9FF000
stack
page read and write
517F000
stack
page read and write
A63000
heap
page read and write
387000
unkown
page execute and read and write
8429000
heap
page read and write
6A1BF000
unkown
page execute read
170924D3000
trusted library allocation
page read and write
2755000
heap
page read and write
DF1000
unkown
page execute read
2A5C9E4F000
heap
page read and write
6800000
direct allocation
page read and write
51E1000
heap
page read and write
4962000
heap
page read and write
2A5CA206000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
170924CD000
trusted library allocation
page read and write
7787000
heap
page read and write
6F4000
heap
page read and write
4F3E000
stack
page read and write
2A5C9FC4000
heap
page read and write
53EC000
heap
page read and write
170924CB000
trusted library allocation
page read and write
2155D808000
heap
page read and write
5590000
heap
page read and write
2A5C97CA000
heap
page read and write
2DD0000
direct allocation
page read and write
A5E000
heap
page read and write
51E1000
heap
page read and write
170924CB000
trusted library allocation
page read and write
51E1000
heap
page read and write
E00000
heap
page read and write
2A5C8D3C000
trusted library allocation
page read and write
2757000
heap
page read and write
4DE000
stack
page read and write
170924D2000
trusted library allocation
page read and write
3300000
heap
page read and write
2A5C7D8A000
heap
page read and write
83E0000
heap
page read and write
2A5C7D9B000
heap
page read and write
3654000
direct allocation
page read and write
170924CD000
trusted library allocation
page read and write
17090691000
heap
page read and write
170924CF000
trusted library allocation
page read and write
844F000
heap
page read and write
2A5C8D28000
trusted library allocation
page read and write
2155D824000
heap
page read and write
51E1000
heap
page read and write
1F733B80000
heap
page read and write
17090679000
heap
page read and write
6AD8000
direct allocation
page read and write
194A1332000
trusted library allocation
page read and write
170924D4000
trusted library allocation
page read and write
661000
heap
page read and write
5F8000
heap
page read and write
6C68000
direct allocation
page read and write
2A5C97C1000
heap
page read and write
6A4000
heap
page read and write
2A5C9CFC000
heap
page read and write
2A5C90DE000
trusted library allocation
page read and write
51E1000
heap
page read and write
53BE000
stack
page read and write
2A5C96E5000
heap
page read and write
2A5C9D68000
heap
page read and write
17090676000
heap
page read and write
679E000
direct allocation
page read and write
6B1E4000
unkown
page read and write
1802000
unkown
page readonly
2A5C97D7000
trusted library allocation
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
1ACE000
unkown
page readonly
69DEF000
unkown
page execute read
2155D80C000
heap
page read and write
6431000
heap
page read and write
215061D9000
heap
page read and write
51E1000
heap
page read and write
4AD0000
direct allocation
page read and write
2A5C90E7000
trusted library allocation
page read and write
8515000
heap
page read and write
84B1000
heap
page read and write
1C98000
unkown
page readonly
769B000
heap
page read and write
58ED000
direct allocation
page read and write
170924D3000
trusted library allocation
page read and write
583A000
direct allocation
page read and write
2A5C8D62000
trusted library allocation
page read and write
170906BF000
heap
page read and write
2A5C7D69000
heap
page read and write
51E1000
heap
page read and write
17092110000
heap
page read and write
51E1000
heap
page read and write
2A424E23000
heap
page read and write
1C9C000
unkown
page readonly
1F734201000
heap
page read and write
1802000
unkown
page readonly
17090685000
heap
page read and write
170924D1000
trusted library allocation
page read and write
194A127E000
trusted library allocation
page read and write
2E00000
direct allocation
page read and write
170906BF000
heap
page read and write
5B7D000
heap
page read and write
170924D6000
trusted library allocation
page read and write
1E88A755000
heap
page read and write
1AA657B2000
heap
page read and write
7692000
heap
page read and write
1AFBD3D8000
heap
page read and write
51E1000
heap
page read and write
275D000
heap
page read and write
2A5C97AB000
heap
page read and write
775E000
heap
page read and write
17090691000
heap
page read and write
661000
heap
page read and write
2A5C9759000
heap
page read and write
A4E000
heap
page read and write
54F2000
heap
page read and write
8527000
heap
page read and write
4A0E000
stack
page read and write
215061DE000
heap
page read and write
843B000
heap
page read and write
2A5CA1E2000
heap
page read and write
1E57000
unkown
page execute and read and write
7838000
heap
page read and write
170924D2000
trusted library allocation
page read and write
2A5C8D42000
trusted library allocation
page read and write
170924CC000
trusted library allocation
page read and write
8437000
heap
page read and write
65C1000
heap
page read and write
2A5C975C000
heap
page read and write
170924CE000
trusted library allocation
page read and write
3001000
trusted library allocation
page read and write
24BA000
unkown
page readonly
170924CE000
trusted library allocation
page read and write
170924D2000
trusted library allocation
page read and write
51E1000
heap
page read and write
E3B000
unkown
page readonly
2A5C7D80000
heap
page read and write
5B25000
direct allocation
page read and write
48F0000
direct allocation
page read and write
232E000
unkown
page readonly
83ED000
heap
page read and write
2A5C9CFD000
heap
page read and write
194A12B0000
trusted library allocation
page read and write
2A5C9EAE000
heap
page read and write
215061D2000
heap
page read and write
51E1000
heap
page read and write
24BA000
unkown
page readonly
11E6000
heap
page read and write
51E1000
heap
page read and write
170906D1000
heap
page read and write
382E000
trusted library allocation
page read and write
2155D820000
heap
page read and write
5ABF000
direct allocation
page read and write
2A5C97F7000
trusted library allocation
page read and write
12A3000
heap
page read and write
2A5C97E0000
trusted library allocation
page read and write
B3F000
unkown
page execute read
6431000
heap
page read and write
170924D6000
trusted library allocation
page read and write
2A5C7D9B000
heap
page read and write
2A5C9F13000
heap
page read and write
2A5C9D18000
heap
page read and write
2A5C9CD1000
heap
page read and write
51E1000
heap
page read and write
17090685000
heap
page read and write
1F734217000
heap
page read and write
6431000
heap
page read and write
1E5000
unkown
page readonly
215061D2000
heap
page read and write
1C9A000
unkown
page read and write
1E86000
unkown
page execute and read and write
4AD0000
direct allocation
page read and write
2762000
heap
page read and write
6B252000
unkown
page readonly
2155D7F5000
heap
page read and write
3570000
heap
page read and write
170924CD000
trusted library allocation
page read and write
170920B0000
trusted library allocation
page read and write
1191000
heap
page read and write
2A424D60000
heap
page read and write
2155D7EE000
heap
page read and write
6B45B000
unkown
page execute and read and write
51E1000
heap
page read and write
2A5C8CE0000
trusted library allocation
page read and write
170924D3000
trusted library allocation
page read and write
2F3E000
stack
page read and write
2A5C9747000
heap
page read and write
17090693000
heap
page read and write
51E1000
heap
page read and write
49F4000
heap
page read and write
2A5CA206000
heap
page read and write
2A5C8D31000
trusted library allocation
page read and write
5B30000
heap
page read and write
69D70000
unkown
page readonly
2A5C9CEA000
heap
page read and write
1AA63C71000
heap
page read and write
123E000
stack
page read and write
425000
unkown
page execute and read and write
241A000
unkown
page write copy
170906D1000
heap
page read and write
2A5C97B7000
heap
page read and write
51E1000
heap
page read and write
11DA000
heap
page read and write
1E88A727000
heap
page read and write
46EA000
heap
page read and write
551A000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
7840000
heap
page read and write
2A5C97E8000
trusted library allocation
page read and write
170924D3000
trusted library allocation
page read and write
4BC8000
heap
page read and write
2A5C8CE6000
trusted library allocation
page read and write
6530000
direct allocation
page read and write
85FD6FF000
stack
page read and write
2A5C7D9D000
heap
page read and write
83DB000
heap
page read and write
170924CF000
trusted library allocation
page read and write
1F7341F7000
heap
page read and write
51E1000
heap
page read and write
15A6000
heap
page read and write
7F49000
heap
page read and write
2A5C9D66000
heap
page read and write
2A5C97D2000
trusted library allocation
page read and write
984000
heap
page read and write
2A5C90E3000
trusted library allocation
page read and write
6AE05000
unkown
page execute read
61A1000
heap
page read and write
2A5C7DAE000
heap
page read and write
D2E000
unkown
page execute read
170924D2000
trusted library allocation
page read and write
8489000
heap
page read and write
3821000
trusted library allocation
page read and write
984000
heap
page read and write
4962000
heap
page read and write
767000
heap
page read and write
170924D6000
trusted library allocation
page read and write
5A80000
direct allocation
page read and write
2A5C8D40000
trusted library allocation
page read and write
51E1000
heap
page read and write
215061E1000
heap
page read and write
1296000
heap
page read and write
17090685000
heap
page read and write
2758000
heap
page read and write
1E88A71F000
heap
page read and write
170924D0000
trusted library allocation
page read and write
170924D1000
trusted library allocation
page read and write
77A7000
heap
page read and write
984000
heap
page read and write
2155D7FF000
heap
page read and write
2A5C9CD6000
heap
page read and write
275E000
heap
page read and write
51E1000
heap
page read and write
2A5C90D7000
trusted library allocation
page read and write
2155D7E3000
heap
page read and write
1BFF000
unkown
page readonly
2A5C8CE2000
trusted library allocation
page read and write
51E1000
heap
page read and write
777E000
heap
page read and write
425000
unkown
page read and write
8423000
heap
page read and write
51E1000
heap
page read and write
566D000
direct allocation
page read and write
170924CA000
trusted library allocation
page read and write
5B1000
unkown
page execute read
48E0000
heap
page readonly
1090000
heap
page read and write
2EA6000
heap
page read and write
170924D4000
trusted library allocation
page read and write
170924D1000
trusted library allocation
page read and write
170924CC000
trusted library allocation
page read and write
846A000
heap
page read and write
29DA000
stack
page read and write
1F734200000
heap
page read and write
6530000
direct allocation
page read and write
6431000
heap
page read and write
51E1000
heap
page read and write
6A4000
heap
page read and write
1E8A000
unkown
page execute and read and write
2A5C97CA000
heap
page read and write
A50000
heap
page read and write
215061D6000
heap
page read and write
51E1000
heap
page read and write
52BE000
stack
page read and write
2A5C9DE2000
heap
page read and write
2A5C9D3D000
heap
page read and write
51E1000
heap
page read and write
170924D5000
trusted library allocation
page read and write
6B01A000
unkown
page execute read
6B059000
unkown
page execute read
17092240000
heap
page read and write
56AF000
stack
page read and write
5422000
heap
page read and write
51D0000
direct allocation
page read and write
170924CA000
trusted library allocation
page read and write
4B65000
heap
page read and write
51E1000
heap
page read and write
2E00000
direct allocation
page read and write
8449000
heap
page read and write
D3D8F7B000
stack
page read and write
2A5C9D2E000
heap
page read and write
215061D6000
heap
page read and write
8449000
heap
page read and write
2A5C8CE5000
trusted library allocation
page read and write
51E1000
heap
page read and write
A4E000
heap
page read and write
B4E000
stack
page read and write
1F733D65000
heap
page read and write
51E1000
heap
page read and write
6A1D000
direct allocation
page read and write
48F0000
direct allocation
page read and write
194A12DF000
trusted library allocation
page read and write
31D0000
direct allocation
page read and write
780D000
heap
page read and write
170924CE000
trusted library allocation
page read and write
4962000
heap
page read and write
1E88A75C000
heap
page read and write
2A5C7D9D000
heap
page read and write
2A5C97EA000
trusted library allocation
page read and write
51E1000
heap
page read and write
6386000
direct allocation
page read and write
2CF4000
heap
page read and write
2A5C8D78000
trusted library allocation
page read and write
121C000
heap
page read and write
65E0000
direct allocation
page read and write
6431000
heap
page read and write
A21000
unkown
page execute read
5592000
heap
page read and write
5506000
heap
page read and write
7F4D000
heap
page read and write
17090691000
heap
page read and write
1AA65710000
heap
page read and write
170924D1000
trusted library allocation
page read and write
6A198000
unkown
page execute read
51E1000
heap
page read and write
2A5C8D39000
trusted library allocation
page read and write
215061DE000
heap
page read and write
5A80000
direct allocation
page read and write
76A1000
heap
page read and write
7687000
heap
page read and write
51E1000
heap
page read and write
170920B0000
trusted library allocation
page read and write
11FC000
heap
page read and write
4BC0000
heap
page read and write
51E1000
heap
page read and write
4960000
direct allocation
page read and write
17090691000
heap
page read and write
A10000
heap
page read and write
51E1000
heap
page read and write
8449000
heap
page read and write
2150000
heap
page read and write
2A5C8D30000
trusted library allocation
page read and write
170924CC000
trusted library allocation
page read and write
49F4000
heap
page read and write
787000
heap
page read and write
51E1000
heap
page read and write
215061DC000
heap
page read and write
6A00000
direct allocation
page read and write
2755000
heap
page read and write
170924CA000
trusted library allocation
page read and write
2247000
unkown
page write copy
7F41000
heap
page read and write
30C0000
direct allocation
page read and write
2155D828000
heap
page read and write
48F0000
direct allocation
page read and write
170920B4000
trusted library allocation
page read and write
215061C4000
heap
page read and write
74A3000
heap
page read and write
2A5C9DE2000
heap
page read and write
4AD0000
direct allocation
page read and write
3826000
trusted library allocation
page read and write
2759000
heap
page read and write
6A03E000
unkown
page execute read
2A5C8D7E000
trusted library allocation
page read and write
2A5C9D3C000
heap
page read and write
1ACF000
unkown
page write copy
2A5C97C5000
heap
page read and write
655000
heap
page read and write
1EB000
unkown
page readonly
15A9000
heap
page read and write
2A5C97B7000
heap
page read and write
6D0000
heap
page read and write
1285000
heap
page read and write
51E1000
heap
page read and write
465000
unkown
page readonly
5B3B000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
2A5C977D000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
2A5C8D19000
trusted library allocation
page read and write
5536000
heap
page read and write
83F6000
heap
page read and write
4A54000
heap
page read and write
83DE000
heap
page read and write
1802000
unkown
page readonly
681E000
stack
page read and write
2A00000
heap
page read and write
4962000
heap
page read and write
5D8000
unkown
page execute read
2A5C8CE7000
trusted library allocation
page read and write
170906D1000
heap
page read and write
170924CE000
trusted library allocation
page read and write
770D000
heap
page read and write
170924D5000
trusted library allocation
page read and write
2A5CA21A000
heap
page read and write
1C9C000
unkown
page readonly
7810000
heap
page read and write
2A5C97CE000
heap
page read and write
215061D9000
heap
page read and write
7520000
heap
page read and write
2A5C8D18000
trusted library allocation
page read and write
1E88A710000
heap
page read and write
170920B0000
trusted library allocation
page read and write
2C40000
heap
page read and write
2A5C9DB5000
heap
page read and write
51E1000
heap
page read and write
194A12C6000
trusted library allocation
page read and write
51E1000
heap
page read and write
49F4000
heap
page read and write
61A1000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
A21000
unkown
page execute read
6B44F000
unkown
page execute and read and write
28DB000
stack
page read and write
170924CC000
trusted library allocation
page read and write
461F000
stack
page read and write
1E38000
unkown
page execute and read and write
584E000
direct allocation
page read and write
51E1000
heap
page read and write
2A5C9EC9000
heap
page read and write
2757000
heap
page read and write
7CD000
stack
page read and write
2A5C9FEC000
heap
page read and write
51E1000
heap
page read and write
2751000
heap
page read and write
51E1000
heap
page read and write
170906D1000
heap
page read and write
170924D1000
trusted library allocation
page read and write
170924DC000
trusted library allocation
page read and write
1F734212000
heap
page read and write
2A5C978C000
heap
page read and write
56A8000
direct allocation
page read and write
7F47000
heap
page read and write
2A5C8D35000
trusted library allocation
page read and write
170920B0000
trusted library allocation
page read and write
5A80000
direct allocation
page read and write
170920B0000
trusted library allocation
page read and write
84AB000
heap
page read and write
1E8C000
unkown
page execute and read and write
51E1000
heap
page read and write
401000
unkown
page execute read
1178000
heap
page read and write
7F75000
heap
page read and write
215061DC000
heap
page read and write
5B0000
unkown
page readonly
17090693000
heap
page read and write
2A5C9D2E000
heap
page read and write
170924CC000
trusted library allocation
page read and write
2A5C8D71000
trusted library allocation
page read and write
6431000
heap
page read and write
31D0000
direct allocation
page read and write
97A000
heap
page read and write
2AC0000
heap
page read and write
A3E000
heap
page read and write
3DBBF7E000
stack
page read and write
4962000
heap
page read and write
2A5C8D69000
trusted library allocation
page read and write
21506231000
heap
page read and write
170924CA000
trusted library allocation
page read and write
848E000
heap
page read and write
215061F6000
heap
page read and write
1F733BD0000
heap
page read and write
2750000
heap
page read and write
1E88A720000
heap
page read and write
F11000
unkown
page execute read
3570000
trusted library allocation
page read and write
6B08000
direct allocation
page read and write
51E1000
heap
page read and write
5BE1000
heap
page read and write
4AB0000
heap
page read and write
170924CC000
trusted library allocation
page read and write
170924CC000
trusted library allocation
page read and write
2A5C90E0000
trusted library allocation
page read and write
170924D4000
trusted library allocation
page read and write
2A5C8D3B000
trusted library allocation
page read and write
5410000
heap
page read and write
2FF4000
trusted library allocation
page read and write
51E1000
heap
page read and write
2A5CA21A000
heap
page read and write
51E1000
heap
page read and write
4950000
heap
page read and write
215061CF000
heap
page read and write
151A000
heap
page read and write
215061DC000
heap
page read and write
51E1000
heap
page read and write
6B254000
unkown
page read and write
1297000
heap
page read and write
769B000
heap
page read and write
215060C0000
heap
page read and write
170924CC000
trusted library allocation
page read and write
51E1000
heap
page read and write
11F2000
heap
page read and write
51E1000
heap
page read and write
2A5C7DAE000
heap
page read and write
5B75000
heap
page read and write
7F75000
heap
page read and write
51E1000
heap
page read and write
77A0000
heap
page read and write
1E57000
unkown
page execute and read and write
170906BD000
heap
page read and write
A00000
heap
page read and write
47CE000
stack
page read and write
215061CF000
heap
page read and write
6FC0000
heap
page read and write
31F7000
direct allocation
page read and write
51E1000
heap
page read and write
12B1000
heap
page read and write
17090693000
heap
page read and write
1709067C000
heap
page read and write
2A5C7DA3000
heap
page read and write
1BBF000
unkown
page write copy
215061D9000
heap
page read and write
2A5C8D2A000
trusted library allocation
page read and write
7759000
heap
page read and write
2A5C8D1D000
trusted library allocation
page read and write
170924CF000
trusted library allocation
page read and write
847F000
heap
page read and write
1EBB000
unkown
page execute and read and write
19AC000
unkown
page readonly
6431000
heap
page read and write
51E1000
heap
page read and write
170920B4000
trusted library allocation
page read and write
48F0000
direct allocation
page read and write
843D000
heap
page read and write
275E000
heap
page read and write
170924CE000
trusted library allocation
page read and write
65C1000
heap
page read and write
2155D7F3000
heap
page read and write
B9F000
unkown
page execute read
1E88000
unkown
page execute and read and write
382D000
trusted library allocation
page read and write
170924D3000
trusted library allocation
page read and write
A50000
heap
page read and write
170924D2000
trusted library allocation
page read and write
3340000
trusted library allocation
page read and write
E5A000
unkown
page write copy
2A5C7DA7000
heap
page read and write
F10000
unkown
page readonly
6B9000
heap
page read and write
4962000
heap
page read and write
17090600000
heap
page read and write
A21000
unkown
page execute read
215061A9000
heap
page read and write
170906D1000
heap
page read and write
2A5C97F2000
trusted library allocation
page read and write
2155D7FF000
heap
page read and write
17090693000
heap
page read and write
5B32000
heap
page read and write
170924D0000
trusted library allocation
page read and write
4B73000
heap
page read and write
170920B0000
trusted library allocation
page read and write
11D3000
heap
page read and write
170924CC000
trusted library allocation
page read and write
2A5C8D7B000
trusted library allocation
page read and write
4A54000
heap
page read and write
4962000
heap
page read and write
2A5C9F84000
heap
page read and write
D3D8E7E000
stack
page read and write
2A5C97AB000
heap
page read and write
30C0000
direct allocation
page read and write
3298000
direct allocation
page read and write
2A5C8D1A000
trusted library allocation
page read and write
51D0000
direct allocation
page read and write
848E000
heap
page read and write
51E1000
heap
page read and write
194A1288000
trusted library allocation
page read and write
2A5CA00D000
heap
page read and write
170906D1000
heap
page read and write
51E1000
heap
page read and write
170920B0000
trusted library allocation
page read and write
11A0000
heap
page read and write
2A5C90E2000
trusted library allocation
page read and write
1EB5000
unkown
page execute and read and write
194A1377000
trusted library allocation
page read and write
170924D3000
trusted library allocation
page read and write
6F4000
heap
page read and write
6846000
heap
page read and write
6900000
direct allocation
page read and write
6543000
direct allocation
page read and write
2A5C97E7000
trusted library allocation
page read and write
4B29000
heap
page read and write
65C1000
heap
page read and write
1EE000
unkown
page read and write
48F0000
direct allocation
page read and write
2A5C8D47000
trusted library allocation
page read and write
2756000
heap
page read and write
2A5C8D76000
trusted library allocation
page read and write
2A5C8D29000
trusted library allocation
page read and write
152E000
stack
page read and write
2A5C848B000
heap
page read and write
170928C4000
heap
page read and write
3DBBC7A000
stack
page read and write
2A5C8D72000
trusted library allocation
page read and write
12E5000
heap
page read and write
170906BF000
heap
page read and write
2A5C8D25000
trusted library allocation
page read and write
4962000
heap
page read and write
693E000
direct allocation
page read and write
71C7000
direct allocation
page read and write
51E1000
heap
page read and write
65C1000
heap
page read and write
170924CD000
trusted library allocation
page read and write
170924CD000
trusted library allocation
page read and write
6B208000
unkown
page read and write
69E7000
direct allocation
page read and write
170924D6000
trusted library allocation
page read and write
170924CE000
trusted library allocation
page read and write
1717000
unkown
page execute read
170924D3000
trusted library allocation
page read and write
51E1000
heap
page read and write
1AB54D80000
heap
page read and write
3D2000
unkown
page execute and read and write
31D0000
direct allocation
page read and write
170906D1000
heap
page read and write
21506234000
heap
page read and write
170924D0000
trusted library allocation
page read and write
2A5C9767000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
4962000
heap
page read and write
661000
heap
page read and write
2A5C8D51000
trusted library allocation
page read and write
170924D5000
trusted library allocation
page read and write
3AF000
unkown
page execute and read and write
46D4000
heap
page read and write
170924D0000
trusted library allocation
page read and write
6BBD000
direct allocation
page read and write
2150621F000
heap
page read and write
6C92000
direct allocation
page read and write
2A5C8D17000
trusted library allocation
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
215061F7000
heap
page read and write
51E1000
heap
page read and write
655000
heap
page read and write
51D0000
direct allocation
page read and write
2A5C9753000
heap
page read and write
170920B4000
trusted library allocation
page read and write
51E1000
heap
page read and write
12D5000
heap
page read and write
6900000
direct allocation
page read and write
2A5C8D77000
trusted library allocation
page read and write
51E1000
heap
page read and write
6B067000
unkown
page readonly
51E1000
heap
page read and write
170920B4000
trusted library allocation
page read and write
170924CE000
trusted library allocation
page read and write
5564000
heap
page read and write
574E000
direct allocation
page read and write
4A60000
direct allocation
page read and write
6B50000
direct allocation
page read and write
EF0000
heap
page read and write
170924D6000
trusted library allocation
page read and write
170924B0000
heap
page read and write
65E0000
direct allocation
page read and write
A2E000
heap
page read and write
77A0000
heap
page read and write
170924D0000
trusted library allocation
page read and write
170906D1000
heap
page read and write
51E1000
heap
page read and write
170924CB000
trusted library allocation
page read and write
1C98000
unkown
page readonly
6A23D000
unkown
page readonly
6A03E000
unkown
page execute read
777E000
heap
page read and write
6DB1000
direct allocation
page read and write
1BFF000
unkown
page readonly
775D000
heap
page read and write
1F733D03000
heap
page read and write
194A136F000
trusted library allocation
page read and write
A5E000
heap
page read and write
5515000
heap
page read and write
170924CE000
trusted library allocation
page read and write
170924CD000
trusted library allocation
page read and write
3825000
trusted library allocation
page read and write
61E000
unkown
page readonly
51E1000
heap
page read and write
3830000
trusted library allocation
page read and write
55A1000
heap
page read and write
11F2000
heap
page read and write
468E000
stack
page read and write
2A5C7D63000
heap
page read and write
84FE000
heap
page read and write
38B000
unkown
page execute and read and write
2CF4000
heap
page read and write
170924D3000
trusted library allocation
page read and write
215061C2000
heap
page read and write
2A424DF0000
heap
page read and write
170924D5000
trusted library allocation
page read and write
1E0000
unkown
page readonly
2A5C9E3E000
heap
page read and write
51E1000
heap
page read and write
655000
heap
page read and write
170906BF000
heap
page read and write
170924D3000
trusted library allocation
page read and write
2155D7F5000
heap
page read and write
72B000
stack
page read and write
51E1000
heap
page read and write
1EF000
unkown
page readonly
7F5B000
heap
page read and write
170924D0000
trusted library allocation
page read and write
170924D4000
trusted library allocation
page read and write
170924D1000
trusted library allocation
page read and write
55A0000
heap
page read and write
1AFBD3C0000
heap
page read and write
5690000
direct allocation
page read and write
2A5C9D31000
heap
page read and write
170924D3000
trusted library allocation
page read and write
76AF000
heap
page read and write
B3F000
unkown
page execute read
1AFBD360000
heap
page read and write
CC0000
direct allocation
page read and write
3543000
heap
page read and write
2155D820000
heap
page read and write
4B65000
heap
page read and write
2755000
heap
page read and write
8515000
heap
page read and write
2A5C90EB000
trusted library allocation
page read and write
69D2000
direct allocation
page read and write
2A5C97B7000
heap
page read and write
170924D4000
trusted library allocation
page read and write
51E1000
heap
page read and write
6FC0000
heap
page read and write
4B4A000
heap
page read and write
2A5C9E3E000
heap
page read and write
275C000
heap
page read and write
2FFA000
trusted library allocation
page read and write
4E9C000
stack
page read and write
170924D3000
trusted library allocation
page read and write
170920B4000
trusted library allocation
page read and write
2A5C7D94000
heap
page read and write
4A54000
heap
page read and write
2155D7EE000
heap
page read and write
12D6000
heap
page read and write
215061D9000
heap
page read and write
77B000
heap
page read and write
4AD0000
direct allocation
page read and write
2155D7E0000
heap
page read and write
2155D814000
heap
page read and write
84DD000
heap
page read and write
395000
unkown
page execute and read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
17090691000
heap
page read and write
51E1000
heap
page read and write
275E000
heap
page read and write
2A5C90D9000
trusted library allocation
page read and write
6C9E000
direct allocation
page read and write
8CA000
unkown
page read and write
170924D2000
trusted library allocation
page read and write
51E1000
heap
page read and write
694F000
stack
page read and write
76AF000
heap
page read and write
51E1000
heap
page read and write
170920B0000
trusted library allocation
page read and write
51E1000
heap
page read and write
2357000
unkown
page readonly
2A5C8D6D000
trusted library allocation
page read and write
51E1000
heap
page read and write
170924D6000
trusted library allocation
page read and write
2A5C8D39000
trusted library allocation
page read and write
1C9C000
unkown
page readonly
65C1000
heap
page read and write
2A5C8D58000
trusted library allocation
page read and write
22F5000
unkown
page readonly
2750000
heap
page read and write
2A424F65000
heap
page read and write
1E40000
unkown
page execute and read and write
2A5C7D9D000
heap
page read and write
4BCC000
heap
page read and write
5B85000
heap
page read and write
54FF000
stack
page read and write
2A5C90D3000
trusted library allocation
page read and write
51E1000
heap
page read and write
6431000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
170924CF000
trusted library allocation
page read and write
668554F000
stack
page read and write
194A1270000
trusted library allocation
page read and write
2A5CA1E7000
heap
page read and write
46D4000
heap
page read and write
2A5C96D1000
heap
page read and write
2A5C90E4000
trusted library allocation
page read and write
2A5CA2D1000
heap
page read and write
51E1000
heap
page read and write
55AC000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
5591000
heap
page read and write
2A5CA217000
heap
page read and write
4A60000
direct allocation
page read and write
6431000
heap
page read and write
6A2AA000
unkown
page readonly
83C2000
heap
page read and write
170924DE000
trusted library allocation
page read and write
17090620000
heap
page read and write
848E000
heap
page read and write
17090693000
heap
page read and write
128A000
heap
page read and write
275D000
heap
page read and write
2A5C9D31000
heap
page read and write
5A80000
direct allocation
page read and write
170924CA000
trusted library allocation
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
1158000
heap
page read and write
215061E4000
heap
page read and write
7595000
direct allocation
page read and write
1BC0000
unkown
page readonly
11CF000
heap
page read and write
170920B4000
trusted library allocation
page read and write
77EC000
heap
page read and write
51E1000
heap
page read and write
7689000
heap
page read and write
170924CB000
trusted library allocation
page read and write
2A5C97B7000
heap
page read and write
3C5000
unkown
page execute and read and write
170924D2000
trusted library allocation
page read and write
51E1000
heap
page read and write
1E40000
unkown
page execute and read and write
17090679000
heap
page read and write
2A5C7DBB000
heap
page read and write
84AB000
heap
page read and write
847F000
heap
page read and write
2155D7F5000
heap
page read and write
5A80000
direct allocation
page read and write
2FB0000
trusted library allocation
page read and write
4A10000
heap
page read and write
2A5C9DA0000
heap
page read and write
8443000
heap
page read and write
6845000
heap
page read and write
4960000
direct allocation
page read and write
2A5CA034000
heap
page read and write
6D0D000
direct allocation
page read and write
170924D1000
trusted library allocation
page read and write
100E000
stack
page read and write
A20000
unkown
page readonly
51E1000
heap
page read and write
2A5CA0E8000
heap
page read and write
2A5CA011000
heap
page read and write
170924D4000
trusted library allocation
page read and write
12ED000
heap
page read and write
A4E000
heap
page read and write
5424000
heap
page read and write
7686000
heap
page read and write
846C000
heap
page read and write
769D000
heap
page read and write
170920B4000
trusted library allocation
page read and write
170924D7000
trusted library allocation
page read and write
301E000
unkown
page readonly
76E7000
heap
page read and write
3620000
heap
page read and write
34B7DAF000
stack
page read and write
7828000
heap
page read and write
170924D0000
trusted library allocation
page read and write
2A5C977D000
heap
page read and write
6A4CF000
unkown
page execute and read and write
51E1000
heap
page read and write
2155D806000
heap
page read and write
4960000
direct allocation
page read and write
170906D1000
heap
page read and write
4BC0000
heap
page read and write
51E1000
heap
page read and write
2A5C9E1A000
heap
page read and write
1500000
heap
page read and write
5690000
direct allocation
page read and write
2A5C8D4A000
trusted library allocation
page read and write
1F733D0B000
heap
page read and write
1F73422A000
heap
page read and write
CD0000
direct allocation
page read and write
950000
heap
page read and write
847A000
heap
page read and write
51E1000
heap
page read and write
4D1F000
stack
page read and write
2A5C9783000
heap
page read and write
170924D5000
trusted library allocation
page read and write
51E1000
heap
page read and write
4B4B000
heap
page read and write
6A2E7000
unkown
page execute and read and write
3F6000
unkown
page execute and read and write
984000
heap
page read and write
51E1000
heap
page read and write
2757000
heap
page read and write
3242000
direct allocation
page read and write
7712000
heap
page read and write
4962000
heap
page read and write
51E1000
heap
page read and write
2A5C9E95000
heap
page read and write
3540000
heap
page read and write
4962000
heap
page read and write
65C1000
heap
page read and write
6A971000
unkown
page readonly
2A424DF8000
heap
page read and write
170924CA000
trusted library allocation
page read and write
170924CF000
trusted library allocation
page read and write
34AE000
stack
page read and write
2A5C9EC5000
heap
page read and write
4962000
heap
page read and write
170924D4000
trusted library allocation
page read and write
8449000
heap
page read and write
1ACF000
unkown
page write copy
215061B4000
heap
page read and write
2A5C9DDB000
heap
page read and write
5A80000
direct allocation
page read and write
840D000
heap
page read and write
3340000
trusted library allocation
page read and write
51E1000
heap
page read and write
2A424E27000
heap
page read and write
661000
heap
page read and write
A5E000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
2A5C9CE9000
heap
page read and write
170924CB000
trusted library allocation
page read and write
170924CD000
trusted library allocation
page read and write
4F0000
heap
page read and write
6A00000
direct allocation
page read and write
66B000
heap
page read and write
51D0000
direct allocation
page read and write
51E1000
heap
page read and write
1110000
heap
page read and write
2A424E06000
heap
page read and write
2A5C97B7000
heap
page read and write
170924CE000
trusted library allocation
page read and write
170906D1000
heap
page read and write
2FFF000
trusted library allocation
page read and write
4962000
heap
page read and write
2759000
heap
page read and write
51E1000
heap
page read and write
170906D1000
heap
page read and write
170924CE000
trusted library allocation
page read and write
1AFBD775000
heap
page read and write
5E9E000
stack
page read and write
21506235000
heap
page read and write
2A5C8CDC000
trusted library allocation
page read and write
170924D3000
trusted library allocation
page read and write
121B000
heap
page read and write
2A5C90DA000
trusted library allocation
page read and write
A5E000
heap
page read and write
B3F000
unkown
page execute read
675E000
direct allocation
page read and write
170920B0000
trusted library allocation
page read and write
2A5C8CDB000
trusted library allocation
page read and write
53F4000
heap
page read and write
170924CD000
trusted library allocation
page read and write
51E1000
heap
page read and write
11A0000
heap
page read and write
170924D3000
trusted library allocation
page read and write
170924CA000
trusted library allocation
page read and write
6A88000
direct allocation
page read and write
2A5C8D61000
trusted library allocation
page read and write
51E1000
heap
page read and write
170906D1000
heap
page read and write
1E88A71F000
heap
page read and write
51D0000
direct allocation
page read and write
8424000
heap
page read and write
8473000
heap
page read and write
1C9A000
unkown
page write copy
6A1BF000
unkown
page execute read
17090640000
heap
page read and write
1268000
heap
page read and write
170924CD000
trusted library allocation
page read and write
51E1000
heap
page read and write
61E000
unkown
page readonly
51E1000
heap
page read and write
65C1000
heap
page read and write
6B9000
heap
page read and write
A48000
heap
page read and write
3DBBCFE000
stack
page read and write
170924CB000
trusted library allocation
page read and write
215061E1000
heap
page read and write
7798000
heap
page read and write
170924CB000
trusted library allocation
page read and write
2A5C9DDE000
heap
page read and write
1AFBD3CF000
heap
page read and write
3824000
trusted library allocation
page read and write
55AE000
stack
page read and write
85FD67A000
stack
page read and write
A60000
heap
page read and write
2A5CA14A000
heap
page read and write
170924D0000
trusted library allocation
page read and write
7792000
heap
page read and write
170906D1000
heap
page read and write
51E1000
heap
page read and write
170924CF000
trusted library allocation
page read and write
170924D2000
trusted library allocation
page read and write
51E1000
heap
page read and write
17090691000
heap
page read and write
2A5C9CFD000
heap
page read and write
A5E000
heap
page read and write
51E1000
heap
page read and write
54EF000
heap
page read and write
6D82000
direct allocation
page read and write
2A5C8D68000
trusted library allocation
page read and write
2A5C9E4B000
heap
page read and write
2A5C9E3C000
heap
page read and write
6A2E5000
unkown
page read and write
2755000
heap
page read and write
46BC000
heap
page read and write
6A2B2000
unkown
page readonly
7762000
heap
page read and write
1E59000
unkown
page execute and read and write
6EF0000
direct allocation
page read and write
E5A000
unkown
page read and write
2A5C7DAC000
heap
page read and write
2A5C9E3B000
heap
page read and write
17090691000
heap
page read and write
2A5C9CFF000
heap
page read and write
170924D4000
trusted library allocation
page read and write
46D4000
heap
page read and write
6B256000
unkown
page readonly
2150621D000
heap
page read and write
8501000
heap
page read and write
A60000
heap
page read and write
4960000
direct allocation
page read and write
51E1000
heap
page read and write
2A5C97E4000
trusted library allocation
page read and write
4962000
heap
page read and write
7762000
heap
page read and write
4E1E000
stack
page read and write
2A5C7D96000
heap
page read and write
170924CB000
trusted library allocation
page read and write
170920B0000
trusted library allocation
page read and write
11AD000
heap
page read and write
49F4000
heap
page read and write
689000
heap
page read and write
59C000
stack
page read and write
A60000
heap
page read and write
4A54000
heap
page read and write
4962000
heap
page read and write
2A5C8CDB000
trusted library allocation
page read and write
77A0000
heap
page read and write
4B7B000
heap
page read and write
170924CA000
trusted library allocation
page read and write
8421000
heap
page read and write
2A5C9CE0000
heap
page read and write
51E1000
heap
page read and write
4A60000
direct allocation
page read and write
5752000
direct allocation
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
2A5C8D24000
trusted library allocation
page read and write
6B0E9000
unkown
page readonly
8CD000
stack
page read and write
2A5C97DB000
trusted library allocation
page read and write
300F000
stack
page read and write
1AA657A6000
heap
page read and write
5410000
heap
page read and write
127F000
heap
page read and write
7F5A000
heap
page read and write
669E000
direct allocation
page read and write
114E000
stack
page read and write
2C9E000
stack
page read and write
3252000
direct allocation
page read and write
1E90000
unkown
page execute and read and write
2155D7F3000
heap
page read and write
170924D4000
trusted library allocation
page read and write
1E38000
unkown
page execute and read and write
39B000
unkown
page execute and read and write
170920B4000
trusted library allocation
page read and write
194A1358000
trusted library allocation
page read and write
7710000
heap
page read and write
121E000
heap
page read and write
2759000
heap
page read and write
2A5C975F000
heap
page read and write
170924CF000
trusted library allocation
page read and write
1C98000
unkown
page readonly
215061D2000
heap
page read and write
170924D6000
trusted library allocation
page read and write
3340000
trusted library allocation
page read and write
30C0000
direct allocation
page read and write
58B0000
direct allocation
page read and write
1BB3000
unkown
page read and write
55AC000
heap
page read and write
51E1000
heap
page read and write
2A5CA20E000
heap
page read and write
768A000
heap
page read and write
51E1000
heap
page read and write
6431000
heap
page read and write
2752000
heap
page read and write
83D1000
heap
page read and write
170924D6000
trusted library allocation
page read and write
4AD0000
direct allocation
page read and write
DF0000
unkown
page readonly
51E1000
heap
page read and write
170924D0000
trusted library allocation
page read and write
2A5C7D80000
heap
page read and write
2A5C9DE9000
heap
page read and write
2A5CA083000
heap
page read and write
170924CB000
trusted library allocation
page read and write
655000
heap
page read and write
6431000
heap
page read and write
4962000
heap
page read and write
2A5C8D4D000
trusted library allocation
page read and write
49F4000
heap
page read and write
8421000
heap
page read and write
2A5CA21A000
heap
page read and write
51E1000
heap
page read and write
361C000
stack
page read and write
170924CD000
trusted library allocation
page read and write
569E000
direct allocation
page read and write
4962000
heap
page read and write
2D10000
heap
page read and write
2154000
heap
page read and write
6B19C000
unkown
page readonly
170924DD000
trusted library allocation
page read and write
6CCC000
direct allocation
page read and write
170924CF000
trusted library allocation
page read and write
55A0000
heap
page read and write
1C98000
unkown
page readonly
170920B0000
trusted library allocation
page read and write
2A5CA038000
heap
page read and write
17090693000
heap
page read and write
170920B4000
trusted library allocation
page read and write
4D5B000
stack
page read and write
275D000
heap
page read and write
846A000
heap
page read and write
170924D4000
trusted library allocation
page read and write
1E88A727000
heap
page read and write
51E1000
heap
page read and write
53FE000
stack
page read and write
170924D2000
trusted library allocation
page read and write
170906D1000
heap
page read and write
6A23D000
unkown
page readonly
215061E4000
heap
page read and write
170924C8000
trusted library allocation
page read and write
170924DA000
trusted library allocation
page read and write
2756000
heap
page read and write
E3B000
unkown
page readonly
4960000
direct allocation
page read and write
17090693000
heap
page read and write
51D0000
direct allocation
page read and write
170920B4000
trusted library allocation
page read and write
170924CB000
trusted library allocation
page read and write
4962000
heap
page read and write
2A5C8D6F000
trusted library allocation
page read and write
2A5C90DC000
trusted library allocation
page read and write
2155D7F3000
heap
page read and write
860000
unkown
page readonly
1E8A000
unkown
page execute and read and write
2C10000
heap
page read and write
1E88A722000
heap
page read and write
3C20000
trusted library allocation
page read and write
51E1000
heap
page read and write
215061E4000
heap
page read and write
A48000
heap
page read and write
7828000
heap
page read and write
843E000
heap
page read and write
68ED000
direct allocation
page read and write
51E1000
heap
page read and write
2A5C9E4D000
heap
page read and write
83F5000
heap
page read and write
785E000
heap
page read and write
6B73000
direct allocation
page read and write
170924D6000
trusted library allocation
page read and write
170924D1000
trusted library allocation
page read and write
2A5CA14D000
heap
page read and write
51E1000
heap
page read and write
2A5C9EC8000
heap
page read and write
2E10000
heap
page read and write
843A000
heap
page read and write
170924CF000
trusted library allocation
page read and write
8AB000
unkown
page readonly
51E1000
heap
page read and write
6A2000
heap
page read and write
170924CB000
trusted library allocation
page read and write
194A12BD000
trusted library allocation
page read and write
2A5CA15E000
heap
page read and write
51E1000
heap
page read and write
2A5C9E0A000
heap
page read and write
2A5C9CD8000
heap
page read and write
7798000
heap
page read and write
215061D2000
heap
page read and write
1E88A70F000
heap
page read and write
51E1000
heap
page read and write
1F73420A000
heap
page read and write
1E88A980000
heap
page read and write
777000
heap
page read and write
74E3000
heap
page read and write
4C1D000
heap
page read and write
6431000
heap
page read and write
644B000
direct allocation
page read and write
5570000
remote allocation
page read and write
1E90000
unkown
page execute and read and write
8456000
heap
page read and write
215061BB000
heap
page read and write
678A000
direct allocation
page read and write
215061F6000
heap
page read and write
170924D1000
trusted library allocation
page read and write
689000
heap
page read and write
66A2000
direct allocation
page read and write
2A5C7DAE000
heap
page read and write
2A5C8D4F000
trusted library allocation
page read and write
4A60000
direct allocation
page read and write
A62000
heap
page read and write
4962000
heap
page read and write
61A1000
heap
page read and write
170920B0000
trusted library allocation
page read and write
51D0000
direct allocation
page read and write
777000
heap
page read and write
170924D1000
trusted library allocation
page read and write
5620000
direct allocation
page read and write
8449000
heap
page read and write
6A00000
direct allocation
page read and write
1E88A600000
heap
page read and write
2A5C9738000
heap
page read and write
170924CF000
trusted library allocation
page read and write
3831000
trusted library allocation
page read and write
2A5C9FA4000
heap
page read and write
170924CB000
trusted library allocation
page read and write
2A5C9D55000
heap
page read and write
382F000
trusted library allocation
page read and write
2A5C90E8000
trusted library allocation
page read and write
2A5C7D9B000
heap
page read and write
2A5CA010000
heap
page read and write
170924CC000
trusted library allocation
page read and write
2A5C8D2B000
trusted library allocation
page read and write
8449000
heap
page read and write
17090680000
heap
page read and write
215061E4000
heap
page read and write
51E1000
heap
page read and write
43FC000
stack
page read and write
2A5C9DA6000
heap
page read and write
490C000
stack
page read and write
2A424E20000
heap
page read and write
2A5C7D9D000
heap
page read and write
6CD000
heap
page read and write
2A5C97CB000
heap
page read and write
780B000
heap
page read and write
2A5C7DAF000
heap
page read and write
7820000
heap
page read and write
170906BF000
heap
page read and write
2A5C8CE4000
trusted library allocation
page read and write
1E101A2E000
heap
page read and write
2A5C8CE7000
trusted library allocation
page read and write
51E1000
heap
page read and write
69DB5000
unkown
page execute read
12E5000
heap
page read and write
2A5CA082000
heap
page read and write
2A5C9CFD000
heap
page read and write
51E1000
heap
page read and write
840C000
heap
page read and write
843E000
heap
page read and write
2FF7000
trusted library allocation
page read and write
2A5C9CDA000
heap
page read and write
57DF000
stack
page read and write
2A5C9E63000
heap
page read and write
51E1000
heap
page read and write
6D5000
heap
page read and write
12ED000
heap
page read and write
170920B0000
trusted library allocation
page read and write
170924D5000
trusted library allocation
page read and write
51E1000
heap
page read and write
2155D808000
heap
page read and write
170924D1000
trusted library allocation
page read and write
51D0000
direct allocation
page read and write
17DC000
unkown
page execute read
2A5C7DAF000
heap
page read and write
275E000
heap
page read and write
170924D2000
trusted library allocation
page read and write
74CE000
direct allocation
page read and write
51E1000
heap
page read and write
17090693000
heap
page read and write
2A5C8D2C000
trusted library allocation
page read and write
170924D0000
trusted library allocation
page read and write
5570000
remote allocation
page read and write
775E000
heap
page read and write
2A5C90E2000
trusted library allocation
page read and write
441000
unkown
page read and write
6A8000
heap
page read and write
30C0000
direct allocation
page read and write
83E7000
heap
page read and write
2FF5000
trusted library allocation
page read and write
2A5C8D23000
trusted library allocation
page read and write
850B000
heap
page read and write
170920B0000
trusted library allocation
page read and write
2A5C975F000
heap
page read and write
170924D8000
trusted library allocation
page read and write
53E6000
heap
page read and write
2EFF000
stack
page read and write
2A5C977D000
heap
page read and write
77E000
heap
page read and write
5A47000
direct allocation
page read and write
6FB0000
heap
page read and write
11DA000
heap
page read and write
6C15000
direct allocation
page read and write
46D4000
heap
page read and write
51E1000
heap
page read and write
427000
unkown
page read and write
1AB54D20000
heap
page read and write
1E88A726000
heap
page read and write
17090662000
heap
page read and write
170924CA000
trusted library allocation
page read and write
1BFE000
unkown
page readonly
1AA6578E000
heap
page read and write
51E1000
heap
page read and write
4F70000
heap
page read and write
17090693000
heap
page read and write
194A138A000
trusted library allocation
page read and write
24BA000
unkown
page readonly
170924CE000
trusted library allocation
page read and write
78F000
heap
page read and write
83E4000
heap
page read and write
5641000
direct allocation
page read and write
2752000
heap
page read and write
51E1000
heap
page read and write
215061CF000
heap
page read and write
1AA65713000
heap
page read and write
2755000
heap
page read and write
1AA657BE000
heap
page read and write
215061F6000
heap
page read and write
D2E000
unkown
page execute read
5A9B000
direct allocation
page read and write
170906BF000
heap
page read and write
5AF8000
direct allocation
page read and write
2A5C97B8000
heap
page read and write
2A5C90D4000
trusted library allocation
page read and write
84B1000
heap
page read and write
2155D7F5000
heap
page read and write
2A5C8D5F000
trusted library allocation
page read and write
127D000
heap
page read and write
2A5C97F0000
trusted library allocation
page read and write
65C1000
heap
page read and write
595C000
direct allocation
page read and write
17090691000
heap
page read and write
6431000
heap
page read and write
8433000
heap
page read and write
170924CD000
trusted library allocation
page read and write
129B000
heap
page read and write
51E1000
heap
page read and write
76A000
heap
page read and write
51E1000
heap
page read and write
11C7000
heap
page read and write
51E1000
heap
page read and write
170906BD000
heap
page read and write
A21000
unkown
page execute read
1040000
heap
page read and write
840D000
heap
page read and write
51E1000
heap
page read and write
1E88A73E000
heap
page read and write
170924CA000
trusted library allocation
page read and write
8449000
heap
page read and write
D3D8DFD000
stack
page read and write
970000
heap
page read and write
61A1000
heap
page read and write
170924D6000
trusted library allocation
page read and write
301E000
unkown
page readonly
17090693000
heap
page read and write
21506240000
heap
page read and write
77A0000
heap
page read and write
2A5C8D3F000
trusted library allocation
page read and write
1D501630000
heap
page read and write
83FA000
heap
page read and write
170924CE000
trusted library allocation
page read and write
6E50000
heap
page read and write
1EBB000
unkown
page execute and read and write
BEE000
stack
page read and write
49F4000
heap
page read and write
170924CF000
trusted library allocation
page read and write
51E1000
heap
page read and write
72D6000
direct allocation
page read and write
2A5C8D7C000
trusted library allocation
page read and write
770D000
heap
page read and write
156E000
stack
page read and write
5590000
heap
page read and write
83C5000
heap
page read and write
784E000
heap
page read and write
2A5CA15E000
heap
page read and write
2759000
heap
page read and write
51E1000
heap
page read and write
170924CD000
trusted library allocation
page read and write
51E1000
heap
page read and write
597E000
direct allocation
page read and write
69D92000
unkown
page execute read
4962000
heap
page read and write
5414000
heap
page read and write
6431000
heap
page read and write
A21000
unkown
page execute read
2CF4000
heap
page read and write
4B9F000
heap
page read and write
8525000
heap
page read and write
170924D4000
trusted library allocation
page read and write
77BE000
heap
page read and write
A2B000
heap
page read and write
84B2000
heap
page read and write
C28000
heap
page read and write
7762000
heap
page read and write
BF0000
heap
page read and write
2155D7F6000
heap
page read and write
1F73422A000
heap
page read and write
51E1000
heap
page read and write
A20000
unkown
page readonly
1E88A727000
heap
page read and write
5C0E000
heap
page read and write
51E1000
heap
page read and write
170924D0000
trusted library allocation
page read and write
2A5C8D2F000
trusted library allocation
page read and write
551E000
heap
page read and write
2A5C8D45000
trusted library allocation
page read and write
7822000
heap
page read and write
6B40C000
unkown
page execute and read and write
51E1000
heap
page read and write
194A1301000
trusted library allocation
page read and write
170924D3000
trusted library allocation
page read and write
2A5C8CDC000
trusted library allocation
page read and write
51E1000
heap
page read and write
8465000
heap
page read and write
2A5C8D2E000
trusted library allocation
page read and write
6431000
heap
page read and write
2A5C8CE2000
trusted library allocation
page read and write
4C1E000
heap
page read and write
76A1000
heap
page read and write
73F139F000
stack
page read and write
2A5C9D18000
heap
page read and write
194A132A000
trusted library allocation
page read and write
6B12F000
unkown
page readonly
1ACF000
unkown
page read and write
F14000
heap
page read and write
2155D7A0000
heap
page read and write
170924CF000
trusted library allocation
page read and write
2A5C90DD000
trusted library allocation
page read and write
408000
unkown
page readonly
980000
heap
page read and write
1AA65722000
heap
page read and write
1975000
unkown
page readonly
170924D3000
trusted library allocation
page read and write
61A1000
heap
page read and write
2A5C90D6000
trusted library allocation
page read and write
170924D2000
trusted library allocation
page read and write
170924CE000
trusted library allocation
page read and write
4962000
heap
page read and write
170924D3000
trusted library allocation
page read and write
A5E000
heap
page read and write
F41000
heap
page read and write
3770000
trusted library allocation
page read and write
170924D2000
trusted library allocation
page read and write
2A5C9D47000
heap
page read and write
170924D5000
trusted library allocation
page read and write
2A424EF0000
trusted library allocation
page read and write
2A5C9759000
heap
page read and write
689000
heap
page read and write
2A5C9D17000
heap
page read and write
7E0000
heap
page read and write
4B6F000
heap
page read and write
170924CC000
trusted library allocation
page read and write
170924D5000
trusted library allocation
page read and write
2A5C8D1E000
trusted library allocation
page read and write
769B000
heap
page read and write
5E57000
direct allocation
page read and write
2753000
heap
page read and write
8409000
heap
page read and write
2A5C8D14000
trusted library allocation
page read and write
17090676000
heap
page read and write
2A5C9EF0000
heap
page read and write
170924CB000
trusted library allocation
page read and write
170924CF000
trusted library allocation
page read and write
8449000
heap
page read and write
170924CC000
trusted library allocation
page read and write
1F733D07000
heap
page read and write
1AA657B5000
heap
page read and write
2A5C9FC5000
heap
page read and write
8443000
heap
page read and write
5D8000
unkown
page execute read
51E1000
heap
page read and write
65C1000
heap
page read and write
8CA000
unkown
page write copy
4962000
heap
page read and write
1E7E000
unkown
page execute and read and write
2150621F000
heap
page read and write
7870000
heap
page read and write
215061A8000
heap
page read and write
2A5CA041000
heap
page read and write
434000
unkown
page read and write
2A5C8D53000
trusted library allocation
page read and write
51E1000
heap
page read and write
6A2E3000
unkown
page readonly
275B000
heap
page read and write
454C000
stack
page read and write
5410000
heap
page read and write
8436000
heap
page read and write
51E1000
heap
page read and write
53E0000
heap
page read and write
2A5C9FC4000
heap
page read and write
5B85000
heap
page read and write
215061BB000
heap
page read and write
2A5C7D9D000
heap
page read and write
170924CD000
trusted library allocation
page read and write
420000
unkown
page execute and read and write
51E1000
heap
page read and write
215061E1000
heap
page read and write
2A5C8D17000
trusted library allocation
page read and write
170924D5000
trusted library allocation
page read and write
215061F6000
heap
page read and write
51E1000
heap
page read and write
170924CA000
trusted library allocation
page read and write
170920B0000
trusted library allocation
page read and write
1F733A80000
heap
page read and write
8526000
heap
page read and write
55A0000
heap
page read and write
6A2E000
direct allocation
page read and write
4B20000
heap
page read and write
51E1000
heap
page read and write
170924D4000
trusted library allocation
page read and write
83DF000
heap
page read and write
2A5C9EC6000
heap
page read and write
21505FC0000
heap
page read and write
61A1000
heap
page read and write
12A1000
heap
page read and write
558C000
heap
page read and write
1E88A700000
heap
page read and write
170924CB000
trusted library allocation
page read and write
2155D7E3000
heap
page read and write
6B7000
heap
page read and write
7735000
heap
page read and write
5A80000
direct allocation
page read and write
2A5C8D21000
trusted library allocation
page read and write
17090685000
heap
page read and write
170924D4000
trusted library allocation
page read and write
490000
heap
page read and write
6BAA000
direct allocation
page read and write
2A5C97EF000
trusted library allocation
page read and write
4962000
heap
page read and write
A5E000
heap
page read and write
2A5C8D20000
trusted library allocation
page read and write
2DD0000
direct allocation
page read and write
215061D2000
heap
page read and write
499D000
direct allocation
page read and write
170924D2000
trusted library allocation
page read and write
1E88A746000
heap
page read and write
61A1000
heap
page read and write
53E1000
heap
page read and write
2A5C7DA7000
heap
page read and write
FF6000
heap
page read and write
170906D1000
heap
page read and write
4962000
heap
page read and write
1AA63E0B000
heap
page read and write
2CF4000
heap
page read and write
8484000
heap
page read and write
2A5C9752000
heap
page read and write
170924CA000
trusted library allocation
page read and write
8430000
heap
page read and write
6A07000
direct allocation
page read and write
51E1000
heap
page read and write
170924CA000
trusted library allocation
page read and write
6098000
direct allocation
page read and write
2155D7F5000
heap
page read and write
65C1000
heap
page read and write
6A2E7000
unkown
page execute and read and write
6A4D000
direct allocation
page read and write
3480000
trusted library allocation
page read and write
2A5C9CDD000
heap
page read and write
118F000
heap
page read and write
D40000
heap
page read and write
8417000
heap
page read and write
51E1000
heap
page read and write
5520000
heap
page read and write
775E000
heap
page read and write
2DD0000
direct allocation
page read and write
2A424E23000
heap
page read and write
6431000
heap
page read and write
7787000
heap
page read and write
170924CC000
trusted library allocation
page read and write
17090685000
heap
page read and write
170924D5000
trusted library allocation
page read and write
4A40000
direct allocation
page read and write
2A5C7DAC000
heap
page read and write
7692000
heap
page read and write
194A1278000
trusted library allocation
page read and write
17090685000
heap
page read and write
51E1000
heap
page read and write
1717000
unkown
page execute read
51E1000
heap
page read and write
661000
heap
page read and write
6431000
heap
page read and write
2A5C8D36000
trusted library allocation
page read and write
2A5CA1A1000
heap
page read and write
6C1000
heap
page read and write
194A12E2000
trusted library allocation
page read and write
4962000
heap
page read and write
1BAF000
unkown
page readonly
2DE0000
direct allocation
page read and write
8522000
heap
page read and write
6ABE000
direct allocation
page read and write
4962000
heap
page read and write
4920000
direct allocation
page read and write
1BC0000
unkown
page readonly
1F73422A000
heap
page read and write
2155D80C000
heap
page read and write
65E0000
direct allocation
page read and write
5521000
heap
page read and write
1F0000
unkown
page execute and read and write
1709067B000
heap
page read and write
65C1000
heap
page read and write
3820000
trusted library allocation
page read and write
6668000
direct allocation
page read and write
6A2000
heap
page read and write
382B000
trusted library allocation
page read and write
2A5C8D5C000
trusted library allocation
page read and write
215061B4000
heap
page read and write
121D000
heap
page read and write
847A000
heap
page read and write
2A5C8CDF000
trusted library allocation
page read and write
2A5C97B3000
heap
page read and write
61A000
unkown
page read and write
782D000
heap
page read and write
215061D6000
heap
page read and write
215061CF000
heap
page read and write
2A5C8D52000
trusted library allocation
page read and write
48F0000
direct allocation
page read and write
C20000
heap
page read and write
170924CE000
trusted library allocation
page read and write
170906D1000
heap
page read and write
170924CB000
trusted library allocation
page read and write
170924CA000
trusted library allocation
page read and write
170920B0000
trusted library allocation
page read and write
170920B4000
trusted library allocation
page read and write
8484000
heap
page read and write
31D0000
direct allocation
page read and write
170924D6000
trusted library allocation
page read and write
6431000
heap
page read and write
6431000
heap
page read and write
2A5C9DE7000
heap
page read and write
6A7E000
direct allocation
page read and write
76ED000
heap
page read and write
2A5C9E75000
heap
page read and write
68AD000
direct allocation
page read and write
69DF9000
unkown
page execute read
6753000
direct allocation
page read and write
6A29B000
unkown
page read and write
2A5C8D2F000
trusted library allocation
page read and write
6E27000
direct allocation
page read and write
5D9F000
stack
page read and write
2A5C90D3000
trusted library allocation
page read and write
6431000
heap
page read and write
1F733CD0000
heap
page read and write
77BB000
direct allocation
page read and write
6431000
heap
page read and write
215061D9000
heap
page read and write
A50000
heap
page read and write
2CF4000
heap
page read and write
6B257000
unkown
page execute and read and write
170924CE000
trusted library allocation
page read and write
51E1000
heap
page read and write
2155D7F5000
heap
page read and write
4C21000
heap
page read and write
4E5F000
stack
page read and write
507E000
stack
page read and write
54C8000
heap
page read and write
34B0000
heap
page read and write
6BE3000
direct allocation
page read and write
E5E000
unkown
page readonly
353C000
stack
page read and write
2155D803000
heap
page read and write
1F733BA8000
heap
page read and write
170924D2000
trusted library allocation
page read and write
170924D4000
trusted library allocation
page read and write
6A00000
direct allocation
page read and write
7808000
heap
page read and write
170924C4000
trusted library allocation
page read and write
8476000
heap
page read and write
2A5C9ECD000
heap
page read and write
8449000
heap
page read and write
8520000
heap
page read and write
170924CA000
trusted library allocation
page read and write
37BC000
stack
page read and write
4962000
heap
page read and write
A37000
heap
page read and write
51E1000
heap
page read and write
7831000
heap
page read and write
4A60000
direct allocation
page read and write
2A5C90D5000
trusted library allocation
page read and write
2A5C97FC000
trusted library allocation
page read and write
4A60000
direct allocation
page read and write
170920B4000
trusted library allocation
page read and write
18C0000
unkown
page readonly
94456FE000
stack
page read and write
51E1000
heap
page read and write
46DD000
heap
page read and write
2A5C90DE000
trusted library allocation
page read and write
2A5C8D1B000
trusted library allocation
page read and write
51E1000
heap
page read and write
2A5CA14B000
heap
page read and write
170924CA000
trusted library allocation
page read and write
1AB54C20000
heap
page read and write
3004000
trusted library allocation
page read and write
275B000
heap
page read and write
69E000
heap
page read and write
841D000
heap
page read and write
51E1000
heap
page read and write
527F000
stack
page read and write
2A5CA038000
heap
page read and write
51E1000
heap
page read and write
30D1000
heap
page read and write
51E1000
heap
page read and write
7F75000
heap
page read and write
170924D6000
trusted library allocation
page read and write
5B31000
heap
page read and write
49F4000
heap
page read and write
5520000
heap
page read and write
170920B4000
trusted library allocation
page read and write
7819000
heap
page read and write
215061E4000
heap
page read and write
17090693000
heap
page read and write
777E000
heap
page read and write
170924D2000
trusted library allocation
page read and write
4B65000
heap
page read and write
6A4FF000
unkown
page execute and read and write
25DF000
stack
page read and write
232C000
unkown
page readonly
7733000
heap
page read and write
12DD000
heap
page read and write
2A5C8D40000
trusted library allocation
page read and write
2A5C9D55000
heap
page read and write
170906D1000
heap
page read and write
2750000
heap
page read and write
1260000
heap
page read and write
170906D1000
heap
page read and write
51E1000
heap
page read and write
2155D6F0000
heap
page read and write
170924D5000
trusted library allocation
page read and write
699000
heap
page read and write
1E7E000
unkown
page execute and read and write
1AA6576A000
heap
page read and write
170924D0000
trusted library allocation
page read and write
2A5C9E50000
heap
page read and write
4962000
heap
page read and write
51E1000
heap
page read and write
2A5C7D96000
heap
page read and write
2A5CA038000
heap
page read and write
2753000
heap
page read and write
1F73420D000
heap
page read and write
21506190000
heap
page read and write
2A5C97B7000
heap
page read and write
550D000
heap
page read and write
51E1000
heap
page read and write
1D501735000
heap
page read and write
51E1000
heap
page read and write
2A5C9DB9000
heap
page read and write
4962000
heap
page read and write
65E0000
direct allocation
page read and write
1BFD000
unkown
page write copy
7760000
heap
page read and write
51E1000
heap
page read and write
170924CC000
trusted library allocation
page read and write
785E000
heap
page read and write
2A5C8D1B000
trusted library allocation
page read and write
1E88A727000
heap
page read and write
1E88A520000
heap
page read and write
3320000
heap
page read and write
1F733BC1000
heap
page read and write
170906BD000
heap
page read and write
51E1000
heap
page read and write
170924D1000
trusted library allocation
page read and write
4B73000
heap
page read and write
2A5C90E0000
trusted library allocation
page read and write
51E1000
heap
page read and write
2A5CA206000
heap
page read and write
215061E7000
heap
page read and write
2752000
heap
page read and write
CC0000
direct allocation
page read and write
3410000
heap
page read and write
661000
heap
page read and write
1A22000
unkown
page readonly
2357000
unkown
page readonly
17090691000
heap
page read and write
83DF000
heap
page read and write
170924CC000
trusted library allocation
page read and write
2A5C9E3E000
heap
page read and write
779000
heap
page read and write
2758000
heap
page read and write
1AA6576C000
heap
page read and write
1AFBD370000
heap
page read and write
1A22000
unkown
page readonly
170924D2000
trusted library allocation
page read and write
61A1000
heap
page read and write
2A5C90EA000
trusted library allocation
page read and write
2CF4000
heap
page read and write
51E1000
heap
page read and write
271C000
stack
page read and write
2A5C9D3B000
heap
page read and write
170920B4000
trusted library allocation
page read and write
768000
heap
page read and write
7783000
heap
page read and write
5B1000
unkown
page execute read
31E0000
heap
page read and write
7F46000
heap
page read and write
215061E1000
heap
page read and write
51E1000
heap
page read and write
2754000
heap
page read and write
170906D1000
heap
page read and write
4540000
trusted library allocation
page read and write
B71000
unkown
page execute read
51E1000
heap
page read and write
6B20B000
unkown
page readonly
2A5C97DA000
trusted library allocation
page read and write
2A5C7D9D000
heap
page read and write
CC0000
direct allocation
page read and write
51E1000
heap
page read and write
2A5C97F3000
trusted library allocation
page read and write
8489000
heap
page read and write
1F73420D000
heap
page read and write
847A000
heap
page read and write
5664000
direct allocation
page read and write
4962000
heap
page read and write
665E000
direct allocation
page read and write
2A5C9CDC000
heap
page read and write
51E1000
heap
page read and write
12DD000
heap
page read and write
1AA657A2000
heap
page read and write
170906D1000
heap
page read and write
69EC000
direct allocation
page read and write
215061CF000
heap
page read and write
51E1000
heap
page read and write
2A5C97F9000
trusted library allocation
page read and write
194A1310000
trusted library allocation
page read and write
51D0000
direct allocation
page read and write
21B1000
unkown
page execute read
170906D1000
heap
page read and write
51E1000
heap
page read and write
170920B0000
trusted library allocation
page read and write
2EA6000
heap
page read and write
8527000
heap
page read and write
E5E000
unkown
page readonly
78D000
heap
page read and write
2759000
heap
page read and write
215061D6000
heap
page read and write
170924D0000
trusted library allocation
page read and write
65C1000
heap
page read and write
5593000
heap
page read and write
194A1285000
trusted library allocation
page read and write
21506230000
heap
page read and write
17090691000
heap
page read and write
5FB000
unkown
page readonly
4430000
heap
page read and write
215061E1000
heap
page read and write
1F73421D000
heap
page read and write
3770000
trusted library allocation
page read and write
8CE000
unkown
page readonly
4962000
heap
page read and write
2A5C97E9000
trusted library allocation
page read and write
2A5C97B3000
heap
page read and write
37FC000
stack
page read and write
2A5C9CFA000
heap
page read and write
51E1000
heap
page read and write
170906BE000
heap
page read and write
170924D6000
trusted library allocation
page read and write
2A5C8D05000
trusted library allocation
page read and write
170924CB000
trusted library allocation
page read and write
2A5C7DBB000
heap
page read and write
170924CE000
trusted library allocation
page read and write
1F734218000
heap
page read and write
2A90000
trusted library allocation
page read and write
215061DE000
heap
page read and write
53F0000
heap
page read and write
4940000
heap
page read and write
215061F6000
heap
page read and write
51E1000
heap
page read and write
A18000
heap
page read and write
5519000
heap
page read and write
3320000
heap
page read and write
6FBE000
heap
page read and write
2A5C9D83000
heap
page read and write
51E1000
heap
page read and write
2A5C97E2000
trusted library allocation
page read and write
24DE000
stack
page read and write
2A5C9D38000
heap
page read and write
170924D7000
trusted library allocation
page read and write
21506231000
heap
page read and write
77EA000
heap
page read and write
17090679000
heap
page read and write
7F4E000
heap
page read and write
4962000
heap
page read and write
215061F6000
heap
page read and write
2A5C8D48000
trusted library allocation
page read and write
1AA657BB000
heap
page read and write
2A5C97B3000
heap
page read and write
275E000
heap
page read and write
194A1364000
trusted library allocation
page read and write
84BA000
heap
page read and write
2A5C97D4000
trusted library allocation
page read and write
6431000
heap
page read and write
8489000
heap
page read and write
170920B0000
trusted library allocation
page read and write
170920B0000
trusted library allocation
page read and write
F24000
heap
page read and write
65C1000
heap
page read and write
2155D5F0000
heap
page read and write
34B7D2D000
stack
page read and write
48F0000
direct allocation
page read and write
2A5C90DC000
trusted library allocation
page read and write
12B1000
heap
page read and write
2418000
unkown
page readonly
56F8000
direct allocation
page read and write
3FC000
unkown
page execute and read and write
194A13D0000
trusted library allocation
page read and write
51D0000
direct allocation
page read and write
51E1000
heap
page read and write
769B000
heap
page read and write
51E1000
heap
page read and write
944577F000
stack
page read and write
194A1355000
trusted library allocation
page read and write
170928CF000
heap
page read and write
170924CC000
trusted library allocation
page read and write
2A5C7D9D000
heap
page read and write
6A30000
direct allocation
page read and write
51E1000
heap
page read and write
1F733D07000
heap
page read and write
5A6E000
direct allocation
page read and write
2A5C8D26000
trusted library allocation
page read and write
170906E2000
heap
page read and write
2A5C8D50000
trusted library allocation
page read and write
2A5C9D1E000
heap
page read and write
51E1000
heap
page read and write
170906BF000
heap
page read and write
170920B4000
trusted library allocation
page read and write
2A5C97BD000
heap
page read and write
2A5C8D79000
trusted library allocation
page read and write
61A1000
heap
page read and write
17090691000
heap
page read and write
45FD000
stack
page read and write
2CEE000
stack
page read and write
4961000
heap
page read and write
170924CC000
trusted library allocation
page read and write
170924CC000
trusted library allocation
page read and write
51E1000
heap
page read and write
2E70000
heap
page read and write
3A5000
unkown
page execute and read and write
170906BD000
heap
page read and write
2A5C8D6B000
trusted library allocation
page read and write
1F7341FC000
heap
page read and write
A60000
heap
page read and write
8509000
heap
page read and write
6A2E3000
unkown
page readonly
32D0000
trusted library allocation
page read and write
8484000
heap
page read and write
194A12D4000
trusted library allocation
page read and write
51E1000
heap
page read and write
4B65000
heap
page read and write
382C000
trusted library allocation
page read and write
215061BB000
heap
page read and write
51E1000
heap
page read and write
2150623E000
heap
page read and write
51E1000
heap
page read and write
11AE000
heap
page read and write
2A5C8D16000
trusted library allocation
page read and write
350E000
stack
page read and write
51E1000
heap
page read and write
2DE0000
heap
page read and write
2A5C8D1E000
trusted library allocation
page read and write
134E000
stack
page read and write
51E1000
heap
page read and write
841C000
heap
page read and write
170924D2000
trusted library allocation
page read and write
2A5C7DA1000
heap
page read and write
170924D4000
trusted library allocation
page read and write
170924CF000
trusted library allocation
page read and write
84BF000
heap
page read and write
2752000
heap
page read and write
2A5C9CD1000
heap
page read and write
34CD000
stack
page read and write
170924D5000
trusted library allocation
page read and write
170924CA000
trusted library allocation
page read and write
215061A7000
heap
page read and write
170924CB000
trusted library allocation
page read and write
42F000
unkown
page read and write
7803000
heap
page read and write
232C000
unkown
page readonly
1E3A000
unkown
page execute and read and write
2A5C8CE5000
trusted library allocation
page read and write
77BE000
heap
page read and write
61A1000
heap
page read and write
51E1000
heap
page read and write
8489000
heap
page read and write
2A5C8D65000
trusted library allocation
page read and write
170906BF000
heap
page read and write
2A5C8D73000
trusted library allocation
page read and write
2A5C7DA4000
heap
page read and write
6A2B7000
unkown
page readonly
4A60000
direct allocation
page read and write
2A5C8CE0000
trusted library allocation
page read and write
170924D1000
trusted library allocation
page read and write
1ACF000
unkown
page read and write
170924D2000
trusted library allocation
page read and write
2A5C8D64000
trusted library allocation
page read and write
2A5C8CDE000
trusted library allocation
page read and write
51D0000
direct allocation
page read and write
557D000
heap
page read and write
4C3A000
heap
page read and write
170924CE000
trusted library allocation
page read and write
693000
heap
page read and write
1E88000
unkown
page execute and read and write
51E1000
heap
page read and write
84EC000
heap
page read and write
170924CD000
trusted library allocation
page read and write
83C6000
heap
page read and write
6431000
heap
page read and write
2A5C8D6E000
trusted library allocation
page read and write
11CD000
heap
page read and write
2CF0000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
6431000
heap
page read and write
4962000
heap
page read and write
117F000
heap
page read and write
170924D3000
trusted library allocation
page read and write
2A45000
heap
page read and write
2A5C8D46000
trusted library allocation
page read and write
2A5C9D56000
heap
page read and write
2A5C97B7000
heap
page read and write
51E1000
heap
page read and write
3040000
heap
page read and write
1E88A73E000
heap
page read and write
66B000
heap
page read and write
12A1000
heap
page read and write
55A4000
heap
page read and write
2E1A000
heap
page read and write
786D000
heap
page read and write
2A5C8D5D000
trusted library allocation
page read and write
624000
heap
page read and write
170924CC000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
1D501740000
heap
page read and write
2A5C97F5000
trusted library allocation
page read and write
2A5C90EC000
trusted library allocation
page read and write
1F7341FE000
heap
page read and write
2A5C8D31000
trusted library allocation
page read and write
3000000
heap
page read and write
4962000
heap
page read and write
170924D6000
trusted library allocation
page read and write
2A5C8D11000
trusted library allocation
page read and write
2A5C9753000
heap
page read and write
3DBBE7F000
stack
page read and write
170924CF000
trusted library allocation
page read and write
2A5C7D93000
heap
page read and write
2E3D000
heap
page read and write
5AA8000
direct allocation
page read and write
51E1000
heap
page read and write
2A5C97DD000
trusted library allocation
page read and write
A48000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
2A5C97E5000
trusted library allocation
page read and write
17090685000
heap
page read and write
1AFBD390000
heap
page read and write
170924D3000
trusted library allocation
page read and write
6624000
direct allocation
page read and write
2A5C9DE9000
heap
page read and write
1D501730000
heap
page read and write
215061C2000
heap
page read and write
6A4CF000
unkown
page execute and read and write
2A5C8D2D000
trusted library allocation
page read and write
170924CD000
trusted library allocation
page read and write
275B000
heap
page read and write
2A5C90D8000
trusted library allocation
page read and write
4962000
heap
page read and write
2A5CA20D000
heap
page read and write
21B1000
unkown
page execute read
84B2000
heap
page read and write
2A5C9CEE000
heap
page read and write
D2E000
unkown
page execute read
6A2AF000
unkown
page read and write
782D000
heap
page read and write
6A8000
heap
page read and write
2A5C8D1F000
trusted library allocation
page read and write
4B9D000
heap
page read and write
2A5C97B0000
heap
page read and write
3970000
trusted library allocation
page read and write
2A5C9E50000
heap
page read and write
F3C000
heap
page read and write
170924CD000
trusted library allocation
page read and write
215061E7000
heap
page read and write
6431000
heap
page read and write
2A5C97EE000
trusted library allocation
page read and write
494E000
stack
page read and write
2A5C9EC6000
heap
page read and write
69DF9000
unkown
page execute read
170920B4000
trusted library allocation
page read and write
2A5C9DDB000
heap
page read and write
8432000
heap
page read and write
170924D2000
trusted library allocation
page read and write
51E1000
heap
page read and write
6A1F2000
unkown
page readonly
2FFD000
trusted library allocation
page read and write
2A5C97B7000
heap
page read and write
2155D812000
heap
page read and write
414000
unkown
page read and write
170924C6000
trusted library allocation
page read and write
12A1000
heap
page read and write
170924D2000
trusted library allocation
page read and write
6A2E5000
unkown
page read and write
170924D5000
trusted library allocation
page read and write
2A5C97EE000
trusted library allocation
page read and write
1E86000
unkown
page execute and read and write
6431000
heap
page read and write
2A5C8D34000
trusted library allocation
page read and write
2A5C97F8000
trusted library allocation
page read and write
61A1000
heap
page read and write
3E6000
unkown
page execute and read and write
787C000
heap
page read and write
1975000
unkown
page readonly
6F96000
direct allocation
page read and write
51E1000
heap
page read and write
170924D1000
trusted library allocation
page read and write
5B0000
unkown
page readonly
2A424C80000
heap
page read and write
4962000
heap
page read and write
2A5C8D54000
trusted library allocation
page read and write
1BB6000
unkown
page readonly
4AD0000
direct allocation
page read and write
83FD000
heap
page read and write
170924D3000
trusted library allocation
page read and write
6431000
heap
page read and write
66B000
heap
page read and write
5BD4000
heap
page read and write
1429000
unkown
page execute read
170924D3000
trusted library allocation
page read and write
2753000
heap
page read and write
170906D1000
heap
page read and write
84CE000
heap
page read and write
2A5C8CE4000
trusted library allocation
page read and write
5E5E000
direct allocation
page read and write
4B4B000
heap
page read and write
3003000
trusted library allocation
page read and write
93C000
stack
page read and write
2A5C9767000
heap
page read and write
4E0000
heap
page read and write
6F4000
heap
page read and write
7F41000
heap
page read and write
170924D0000
trusted library allocation
page read and write
7804000
heap
page read and write
2A5CA038000
heap
page read and write
51E1000
heap
page read and write
6B471000
unkown
page execute and read and write
2A5C90E1000
trusted library allocation
page read and write
2A5C97B8000
heap
page read and write
8400000
heap
page read and write
7838000
heap
page read and write
170906E2000
heap
page read and write
4962000
heap
page read and write
51E1000
heap
page read and write
194A1340000
trusted library allocation
page read and write
51E1000
heap
page read and write
77EC000
heap
page read and write
2A5C97E3000
trusted library allocation
page read and write
194A1361000
trusted library allocation
page read and write
2A5C8D3E000
trusted library allocation
page read and write
D6E000
stack
page read and write
83E8000
heap
page read and write
2A5C7DAE000
heap
page read and write
12D5000
heap
page read and write
689000
heap
page read and write
2A5C9F13000
heap
page read and write
1AB567B0000
heap
page read and write
241C000
unkown
page readonly
51E1000
heap
page read and write
51D0000
direct allocation
page read and write
5B70000
heap
page read and write
21B1000
unkown
page execute read
2155D820000
heap
page read and write
51E1000
heap
page read and write
170906D1000
heap
page read and write
D41487F000
stack
page read and write
2755000
heap
page read and write
2A5CA15E000
heap
page read and write
170924D0000
trusted library allocation
page read and write
2A5C97B7000
heap
page read and write
69DB5000
unkown
page execute read
51E1000
heap
page read and write
170924CC000
trusted library allocation
page read and write
1F733D04000
heap
page read and write
51E1000
heap
page read and write
1F733D0A000
heap
page read and write
325F000
direct allocation
page read and write
4960000
direct allocation
page read and write
D3D8EFE000
stack
page read and write
3770000
trusted library allocation
page read and write
84B7000
heap
page read and write
6BBE000
direct allocation
page read and write
8522000
heap
page read and write
843E000
heap
page read and write
170924D4000
trusted library allocation
page read and write
1BBF000
unkown
page write copy
170924CA000
trusted library allocation
page read and write
1E88A620000
heap
page read and write
1E7000
unkown
page write copy
83C9000
heap
page read and write
2759000
heap
page read and write
51E1000
heap
page read and write
215061AE000
heap
page read and write
DDB000
stack
page read and write
51E1000
heap
page read and write
170906BD000
heap
page read and write
51E1000
heap
page read and write
6431000
heap
page read and write
170920B0000
trusted library allocation
page read and write
17090676000
heap
page read and write
54FE000
heap
page read and write
2A5C8D19000
trusted library allocation
page read and write
38A8000
direct allocation
page read and write
170920B4000
trusted library allocation
page read and write
2A5C90EE000
trusted library allocation
page read and write
776E000
heap
page read and write
2A5C97E6000
trusted library allocation
page read and write
54E0000
heap
page read and write
51E1000
heap
page read and write
170924C2000
trusted library allocation
page read and write
170924D0000
trusted library allocation
page read and write
2155D81A000
heap
page read and write
2A5CA038000
heap
page read and write
170924D4000
trusted library allocation
page read and write
170924CB000
trusted library allocation
page read and write
76B5000
heap
page read and write
6D32000
direct allocation
page read and write
6A2000
heap
page read and write
215061AB000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
65C1000
heap
page read and write
170924CB000
trusted library allocation
page read and write
5518000
heap
page read and write
22BD000
unkown
page readonly
2A5C977D000
heap
page read and write
215061D6000
heap
page read and write
51E1000
heap
page read and write
1E8E000
unkown
page execute and read and write
170906BF000
heap
page read and write
170924CE000
trusted library allocation
page read and write
170924CB000
trusted library allocation
page read and write
655000
heap
page read and write
4962000
heap
page read and write
4A40000
heap
page readonly
2A5C8D36000
trusted library allocation
page read and write
65C1000
heap
page read and write
51E1000
heap
page read and write
61A1000
heap
page read and write
51E1000
heap
page read and write
170924CA000
trusted library allocation
page read and write
66B000
heap
page read and write
69DBE000
unkown
page execute read
1BB6000
unkown
page readonly
1AA63C71000
heap
page read and write
5521000
heap
page read and write
65C1000
heap
page read and write
3822000
trusted library allocation
page read and write
785E000
heap
page read and write
76EB000
heap
page read and write
170906BF000
heap
page read and write
170906BD000
heap
page read and write
4960000
direct allocation
page read and write
170924C0000
trusted library allocation
page read and write
1F733D0E000
heap
page read and write
2A5C97D5000
trusted library allocation
page read and write
2A5C7DAE000
heap
page read and write
AE3000
unkown
page execute read
170924D4000
trusted library allocation
page read and write
4502DFF000
stack
page read and write
170920B4000
trusted library allocation
page read and write
51E1000
heap
page read and write
2A5C975F000
heap
page read and write
1AA63C79000
heap
page read and write
66E8000
direct allocation
page read and write
11F2000
heap
page read and write
3340000
trusted library allocation
page read and write
3770000
trusted library allocation
page read and write
F10000
unkown
page readonly
48F0000
direct allocation
page read and write
5B8A000
heap
page read and write
3770000
trusted library allocation
page read and write
5AF3000
direct allocation
page read and write
19C0000
unkown
page readonly
2A5C9DE1000
heap
page read and write
51E1000
heap
page read and write
30BF000
stack
page read and write
4962000
heap
page read and write
2750000
heap
page read and write
17090693000
heap
page read and write
2A5C9752000
heap
page read and write
170924CD000
trusted library allocation
page read and write
1BFD000
unkown
page write copy
17090685000
heap
page read and write
2A5C8D7A000
trusted library allocation
page read and write
2150621F000
heap
page read and write
2A5C8D3D000
trusted library allocation
page read and write
66855CE000
stack
page read and write
2A5CA088000
heap
page read and write
848E000
heap
page read and write
170924CB000
trusted library allocation
page read and write
170924CC000
trusted library allocation
page read and write
655000
heap
page read and write
1E88A714000
heap
page read and write
2A5C8D22000
trusted library allocation
page read and write
51E1000
heap
page read and write
4BBA000
heap
page read and write
6431000
heap
page read and write
275C000
heap
page read and write
51E1000
heap
page read and write
4960000
direct allocation
page read and write
51E1000
heap
page read and write
215061F6000
heap
page read and write
12B1000
heap
page read and write
5578000
heap
page read and write
842E000
heap
page read and write
984000
heap
page read and write
849C000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
4690000
heap
page read and write
2A5C97D9000
trusted library allocation
page read and write
215061C1000
heap
page read and write
6B495000
unkown
page execute and read and write
1E0000
unkown
page readonly
5A80000
direct allocation
page read and write
4502D7F000
stack
page read and write
3C0000
unkown
page execute and read and write
3000000
trusted library allocation
page read and write
51E1000
heap
page read and write
2A5C9F80000
heap
page read and write
3340000
trusted library allocation
page read and write
D3D8CFE000
stack
page read and write
2A5C97D3000
trusted library allocation
page read and write
6A971000
unkown
page readonly
2A5C8D5B000
trusted library allocation
page read and write
51E1000
heap
page read and write
2A5C8D4B000
trusted library allocation
page read and write
2CF4000
heap
page read and write
2A5C8D44000
trusted library allocation
page read and write
769B000
heap
page read and write
21506231000
heap
page read and write
613C000
stack
page read and write
4960000
direct allocation
page read and write
465000
unkown
page readonly
61A1000
heap
page read and write
49C8000
direct allocation
page read and write
2155D806000
heap
page read and write
51E1000
heap
page read and write
2A5C97FB000
trusted library allocation
page read and write
51E1000
heap
page read and write
170906D0000
heap
page read and write
739B000
direct allocation
page read and write
661000
heap
page read and write
2A5CA088000
heap
page read and write
12A3000
heap
page read and write
2A5C96D1000
heap
page read and write
2A5C9763000
heap
page read and write
17090693000
heap
page read and write
2750000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
2A5C90DF000
trusted library allocation
page read and write
2A5C9E4D000
heap
page read and write
170924CF000
trusted library allocation
page read and write
17092230000
heap
page read and write
B1C000
unkown
page execute read
170924CD000
trusted library allocation
page read and write
48E0000
direct allocation
page read and write
170924D1000
trusted library allocation
page read and write
11CD000
heap
page read and write
1F734214000
heap
page read and write
785E000
heap
page read and write
8484000
heap
page read and write
61A1000
heap
page read and write
83CF000
heap
page read and write
170924D0000
trusted library allocation
page read and write
2A5C97DE000
trusted library allocation
page read and write
784E000
heap
page read and write
51E1000
heap
page read and write
1E3A000
unkown
page execute and read and write
2A5C9D9F000
heap
page read and write
51D0000
direct allocation
page read and write
2A5C9E52000
heap
page read and write
2A5C9FA4000
heap
page read and write
4AD0000
direct allocation
page read and write
5690000
direct allocation
page read and write
76EC000
heap
page read and write
2A5C90DD000
trusted library allocation
page read and write
E6E000
stack
page read and write
6F4000
heap
page read and write
1E59000
unkown
page execute and read and write
849C000
heap
page read and write
2A5CA0C9000
heap
page read and write
2155D7FF000
heap
page read and write
694A000
direct allocation
page read and write
170924CE000
trusted library allocation
page read and write
6A1C2000
unkown
page readonly
2A5C8D5A000
trusted library allocation
page read and write
12D6000
heap
page read and write
61A1000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
53E7000
heap
page read and write
170924D5000
trusted library allocation
page read and write
65E0000
direct allocation
page read and write
4962000
heap
page read and write
170906BD000
heap
page read and write
4962000
heap
page read and write
7EF000
stack
page read and write
6A00000
direct allocation
page read and write
5538000
heap
page read and write
51E1000
heap
page read and write
2CF4000
heap
page read and write
34FC000
stack
page read and write
77B000
heap
page read and write
5F9E000
stack
page read and write
1E1000
unkown
page execute read
19C0000
unkown
page readonly
2A5C97D6000
trusted library allocation
page read and write
77EC000
heap
page read and write
215061E6000
heap
page read and write
1E88A720000
heap
page read and write
215061DF000
heap
page read and write
1A17000
unkown
page readonly
2DCE000
stack
page read and write
241C000
unkown
page readonly
847F000
heap
page read and write
2A5C7DA7000
heap
page read and write
722D000
stack
page read and write
275D000
heap
page read and write
2FFB000
trusted library allocation
page read and write
4962000
heap
page read and write
780000
heap
page read and write
1A17000
unkown
page readonly
2A5C97B7000
heap
page read and write
11DB000
heap
page read and write
51E1000
heap
page read and write
481E000
stack
page read and write
51E1000
heap
page read and write
1F73420D000
heap
page read and write
4962000
heap
page read and write
61A1000
heap
page read and write
2A5C97E1000
trusted library allocation
page read and write
67F5000
direct allocation
page read and write
51E1000
heap
page read and write
2A5C90D5000
trusted library allocation
page read and write
170906BE000
heap
page read and write
661000
heap
page read and write
69DBE000
unkown
page execute read
51E1000
heap
page read and write
2A5C9E0A000
heap
page read and write
51E1000
heap
page read and write
170924CB000
trusted library allocation
page read and write
2A5C9748000
heap
page read and write
18C0000
unkown
page readonly
83C000
stack
page read and write
21506465000
heap
page read and write
51E1000
heap
page read and write
170924DB000
trusted library allocation
page read and write
170924D0000
trusted library allocation
page read and write
4A60000
direct allocation
page read and write
51E1000
heap
page read and write
170924D3000
trusted library allocation
page read and write
51E1000
heap
page read and write
580E000
direct allocation
page read and write
215061A9000
heap
page read and write
5A80000
direct allocation
page read and write
2A5C97F4000
trusted library allocation
page read and write
66DB000
direct allocation
page read and write
2FF0000
unkown
page read and write
6A00000
direct allocation
page read and write
2A5C8D14000
trusted library allocation
page read and write
2A5C8D3A000
trusted library allocation
page read and write
2155D82F000
heap
page read and write
61A000
unkown
page write copy
17090691000
heap
page read and write
170924D5000
trusted library allocation
page read and write
6AB000
heap
page read and write
2EA6000
heap
page read and write
1E88A71B000
heap
page read and write
118F000
heap
page read and write
51E1000
heap
page read and write
1150000
heap
page read and write
83CA000
heap
page read and write
1F73422A000
heap
page read and write
4BC8000
heap
page read and write
8509000
heap
page read and write
439000
unkown
page read and write
1F733BA0000
heap
page read and write
2A5C9E2C000
heap
page read and write
170906CF000
heap
page read and write
3829000
trusted library allocation
page read and write
170924D1000
trusted library allocation
page read and write
17090680000
heap
page read and write
30C0000
direct allocation
page read and write
2752000
heap
page read and write
66B000
heap
page read and write
2A5C9DB4000
heap
page read and write
57E0000
direct allocation
page read and write
51E1000
heap
page read and write
6CE000
heap
page read and write
170924D4000
trusted library allocation
page read and write
692000
heap
page read and write
17090679000
heap
page read and write
1709067E000
heap
page read and write
65C1000
heap
page read and write
2FF6000
trusted library allocation
page read and write
6A2B2000
unkown
page readonly
170924DF000
trusted library allocation
page read and write
76A000
heap
page read and write
844C000
heap
page read and write
A21000
unkown
page execute read
170920B0000
trusted library allocation
page read and write
51E1000
heap
page read and write
170924CC000
trusted library allocation
page read and write
66FE000
direct allocation
page read and write
241A000
unkown
page write copy
51E1000
heap
page read and write
51E1000
heap
page read and write
17090691000
heap
page read and write
408000
unkown
page readonly
84F2000
heap
page read and write
215061E7000
heap
page read and write
2A5C90EF000
trusted library allocation
page read and write
170924CA000
trusted library allocation
page read and write
51E1000
heap
page read and write
C00000
heap
page read and write
17090676000
heap
page read and write
170924D6000
trusted library allocation
page read and write
1F733D00000
heap
page read and write
777E000
heap
page read and write
275A000
heap
page read and write
558C000
heap
page read and write
6601000
direct allocation
page read and write
170924CC000
trusted library allocation
page read and write
51E1000
heap
page read and write
275C000
heap
page read and write
2A5C7D90000
heap
page read and write
FC0000
heap
page read and write
6A2B7000
unkown
page readonly
215061DE000
heap
page read and write
2155D7FA000
heap
page read and write
51E1000
heap
page read and write
215061D6000
heap
page read and write
2A5C7D92000
heap
page read and write
4AD0000
direct allocation
page read and write
51E1000
heap
page read and write
2A5C9D1C000
heap
page read and write
170924D1000
trusted library allocation
page read and write
170924D0000
trusted library allocation
page read and write
399000
unkown
page execute and read and write
1429000
unkown
page execute read
1291000
heap
page read and write
83FC000
heap
page read and write
849C000
heap
page read and write
170920B4000
trusted library allocation
page read and write
2A5C7D99000
heap
page read and write
51E1000
heap
page read and write
2E1E000
heap
page read and write
7762000
heap
page read and write
2A5C9D46000
heap
page read and write
6B455000
unkown
page execute and read and write
558C000
heap
page read and write
6A29A000
unkown
page readonly
B90000
heap
page read and write
5506000
heap
page read and write
5BB9000
heap
page read and write
6B201000
unkown
page readonly
51E1000
heap
page read and write
12E5000
heap
page read and write
1510000
heap
page read and write
2A5C9E09000
heap
page read and write
11E8000
unkown
page execute read
2A5CA25B000
heap
page read and write
29DC000
stack
page read and write
1F734205000
heap
page read and write
49F4000
heap
page read and write
2150619F000
heap
page read and write
170924CE000
trusted library allocation
page read and write
2A5C90E6000
trusted library allocation
page read and write
54EF000
heap
page read and write
2758000
heap
page read and write
2155D824000
heap
page read and write
17090680000
heap
page read and write
2DE0000
heap
page read and write
3DBBD7E000
stack
page read and write
51E1000
heap
page read and write
4BF6000
heap
page read and write
12A3000
heap
page read and write
51E1000
heap
page read and write
1C9A000
unkown
page write copy
190A000
unkown
page readonly
1D501628000
heap
page read and write
2A5C9D55000
heap
page read and write
170924D3000
trusted library allocation
page read and write
170920B4000
trusted library allocation
page read and write
5B23000
heap
page read and write
51E1000
heap
page read and write
2A5C9D17000
heap
page read and write
389E000
stack
page read and write
2756000
heap
page read and write
9FD000
stack
page read and write
622000
heap
page read and write
215061BB000
heap
page read and write
11C3000
heap
page read and write
2155D7EE000
heap
page read and write
215061CF000
heap
page read and write
170922F0000
heap
page read and write
6A9A8000
unkown
page execute read
6B46E000
unkown
page execute and read and write
556E000
heap
page read and write
21506237000
heap
page read and write
76EB000
heap
page read and write
6A980000
unkown
page readonly
4A54000
heap
page read and write
170924CF000
trusted library allocation
page read and write
11DA000
heap
page read and write
375E000
stack
page read and write
51E1000
heap
page read and write
170906BE000
heap
page read and write
170924CD000
trusted library allocation
page read and write
170924CD000
trusted library allocation
page read and write
51E1000
heap
page read and write
12A1000
heap
page read and write
17DC000
unkown
page execute read
170906BF000
heap
page read and write
6A7B000
direct allocation
page read and write
4962000
heap
page read and write
170924D6000
trusted library allocation
page read and write
170924CA000
trusted library allocation
page read and write
275D000
heap
page read and write
61A1000
heap
page read and write
170920B4000
trusted library allocation
page read and write
170924C9000
trusted library allocation
page read and write
1E8E000
unkown
page execute and read and write
83FD000
heap
page read and write
1BB6000
unkown
page readonly
2A5C90D7000
trusted library allocation
page read and write
4B7D000
heap
page read and write
170924D1000
trusted library allocation
page read and write
2A5C9E3C000
heap
page read and write
2A5C8D6A000
trusted library allocation
page read and write
1BC0000
unkown
page readonly
2A5C9E4D000
heap
page read and write
6A0CF000
unkown
page execute read
2A5C9DBB000
heap
page read and write
4962000
heap
page read and write
787000
heap
page read and write
6A1C2000
unkown
page readonly
2A5C8D5E000
trusted library allocation
page read and write
275E000
heap
page read and write
8416000
heap
page read and write
8433000
heap
page read and write
3010000
heap
page read and write
1F733D0A000
heap
page read and write
2A5C8D32000
trusted library allocation
page read and write
6A29A000
unkown
page readonly
215061D6000
heap
page read and write
6A76000
direct allocation
page read and write
170924CF000
trusted library allocation
page read and write
2A5C9DE7000
heap
page read and write
17090685000
heap
page read and write
215061F6000
heap
page read and write
5570000
remote allocation
page read and write
170924D2000
trusted library allocation
page read and write
30D1000
heap
page read and write
B9F000
unkown
page execute read
83C1000
heap
page read and write
7F64000
heap
page read and write
EF9000
heap
page read and write
51E1000
heap
page read and write
6431000
heap
page read and write
51E1000
heap
page read and write
12E5000
heap
page read and write
51E1000
heap
page read and write
8437000
heap
page read and write
215061DF000
heap
page read and write
334B000
direct allocation
page read and write
2A5C96F1000
heap
page read and write
215061C2000
heap
page read and write
6C5000
heap
page read and write
51E1000
heap
page read and write
2A5C97F1000
trusted library allocation
page read and write
5E40000
direct allocation
page read and write
6FE8000
direct allocation
page read and write
84C4000
heap
page read and write
170924CE000
trusted library allocation
page read and write
4962000
heap
page read and write
7F4C000
heap
page read and write
2A5C9E4D000
heap
page read and write
2155D81A000
heap
page read and write
170924D6000
trusted library allocation
page read and write
77A0000
heap
page read and write
15A0000
heap
page read and write
777E000
heap
page read and write
2A5C8D6C000
trusted library allocation
page read and write
170924CF000
trusted library allocation
page read and write
65C1000
heap
page read and write
170920B4000
trusted library allocation
page read and write
777E000
heap
page read and write
6CCD000
direct allocation
page read and write
2E00000
direct allocation
page read and write
4960000
direct allocation
page read and write
170924CA000
trusted library allocation
page read and write
2BA9000
unkown
page execute read
170924CE000
trusted library allocation
page read and write
4A54000
heap
page read and write
51E1000
heap
page read and write
847A000
heap
page read and write
51E1000
heap
page read and write
215061DE000
heap
page read and write
D4149FE000
stack
page read and write
A38000
heap
page read and write
215061CF000
heap
page read and write
12B1000
heap
page read and write
48F0000
direct allocation
page read and write
5B00000
direct allocation
page read and write
2155D828000
heap
page read and write
6C13000
direct allocation
page read and write
170920B4000
trusted library allocation
page read and write
2A5C9CEE000
heap
page read and write
170906C3000
heap
page read and write
400000
unkown
page readonly
215061C4000
heap
page read and write
30C0000
direct allocation
page read and write
5C0E000
heap
page read and write
2A5CA088000
heap
page read and write
846F000
heap
page read and write
2BA9000
unkown
page execute read
2A5C90E3000
trusted library allocation
page read and write
7686000
heap
page read and write
83D4000
heap
page read and write
5FB000
unkown
page readonly
170924D9000
trusted library allocation
page read and write
655000
heap
page read and write
6A4FF000
unkown
page execute and read and write
2A5C9F32000
heap
page read and write
3CE000
unkown
page execute and read and write
170920B0000
trusted library allocation
page read and write
170924CD000
trusted library allocation
page read and write
4960000
heap
page read and write
51E1000
heap
page read and write
2A5C8D34000
trusted library allocation
page read and write
170906D1000
heap
page read and write
984000
heap
page read and write
8501000
heap
page read and write
170920B4000
trusted library allocation
page read and write
6C9000
heap
page read and write
48F0000
direct allocation
page read and write
4962000
heap
page read and write
4AD0000
direct allocation
page read and write
5A80000
direct allocation
page read and write
73F131F000
stack
page read and write
6A44000
direct allocation
page read and write
3828000
trusted library allocation
page read and write
2A5CA21A000
heap
page read and write
215061E1000
heap
page read and write
1AA63E07000
heap
page read and write
6900000
direct allocation
page read and write
2A5C97BD000
heap
page read and write
232D000
unkown
page write copy
6C20000
direct allocation
page read and write
4C22000
heap
page read and write
51E1000
heap
page read and write
2150619B000
heap
page read and write
45B0000
heap
page read and write
7760000
heap
page read and write
764000
heap
page read and write
2A5C97FA000
trusted library allocation
page read and write
970000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
170924D5000
trusted library allocation
page read and write
7713000
heap
page read and write
1E88A755000
heap
page read and write
1E88A726000
heap
page read and write
5A80000
direct allocation
page read and write
B1C000
unkown
page execute read
51E1000
heap
page read and write
2A5C9CDA000
heap
page read and write
51E1000
heap
page read and write
2A5CA038000
heap
page read and write
170920B0000
trusted library allocation
page read and write
1F734205000
heap
page read and write
6D5E000
direct allocation
page read and write
51E1000
heap
page read and write
2FE0000
heap
page read and write
852D000
heap
page read and write
48F0000
direct allocation
page read and write
8484000
heap
page read and write
4270000
heap
page read and write
51E1000
heap
page read and write
2A5C8D1C000
trusted library allocation
page read and write
2A5C97B8000
heap
page read and write
2A5C9CEA000
heap
page read and write
2155D7A5000
heap
page read and write
2A5C9F3D000
heap
page read and write
A4E000
heap
page read and write
2DD0000
direct allocation
page read and write
401000
unkown
page execute read
170924CF000
trusted library allocation
page read and write
2A5C7D7F000
heap
page read and write
170924D2000
trusted library allocation
page read and write
66B000
heap
page read and write
6B5000
heap
page read and write
D41497F000
stack
page read and write
4C10000
heap
page read and write
51E1000
heap
page read and write
6A1F2000
unkown
page readonly
51E1000
heap
page read and write
51E1000
heap
page read and write
6F4000
heap
page read and write
170924CD000
trusted library allocation
page read and write
51E1000
heap
page read and write
215061A5000
heap
page read and write
3350000
heap
page read and write
1E88A72D000
heap
page read and write
7834000
heap
page read and write
2A5C8D43000
trusted library allocation
page read and write
1F73422A000
heap
page read and write
12C3000
heap
page read and write
17090693000
heap
page read and write
2A5CA0A9000
heap
page read and write
51E1000
heap
page read and write
2A5C8D12000
trusted library allocation
page read and write
83DF000
heap
page read and write
6BD000
heap
page read and write
578B000
direct allocation
page read and write
6431000
heap
page read and write
2155D7C8000
heap
page read and write
170924CD000
trusted library allocation
page read and write
2751000
heap
page read and write
2A5C7D94000
heap
page read and write
2A5C9E4D000
heap
page read and write
170924D0000
trusted library allocation
page read and write
51E1000
heap
page read and write
170924D5000
trusted library allocation
page read and write
2E4F000
stack
page read and write
51E1000
heap
page read and write
2A5C9DE6000
heap
page read and write
170924CF000
trusted library allocation
page read and write
51E1000
heap
page read and write
860000
unkown
page readonly
F6B000
stack
page read and write
4962000
heap
page read and write
4C1E000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
1F734207000
heap
page read and write
2A5C7DBB000
heap
page read and write
51E1000
heap
page read and write
170920B4000
trusted library allocation
page read and write
5B64000
heap
page read and write
2A5C90ED000
trusted library allocation
page read and write
781E000
heap
page read and write
84AB000
heap
page read and write
849C000
heap
page read and write
2A5C9E4E000
heap
page read and write
4C23000
heap
page read and write
275E000
heap
page read and write
51E1000
heap
page read and write
2A5CA108000
heap
page read and write
215061E4000
heap
page read and write
83EF000
heap
page read and write
51E1000
heap
page read and write
6988000
direct allocation
page read and write
2A5C97FD000
trusted library allocation
page read and write
51E1000
heap
page read and write
2A5C9CFF000
heap
page read and write
2A5C9DE7000
heap
page read and write
30C0000
direct allocation
page read and write
17090691000
heap
page read and write
4962000
heap
page read and write
2A5C9E42000
heap
page read and write
843E000
heap
page read and write
687000
heap
page read and write
2A5C97EC000
trusted library allocation
page read and write
17090685000
heap
page read and write
7760000
heap
page read and write
17090685000
heap
page read and write
17090691000
heap
page read and write
61A1000
heap
page read and write
61A1000
heap
page read and write
2DD0000
direct allocation
page read and write
2FFC000
trusted library allocation
page read and write
170924D0000
trusted library allocation
page read and write
215061DC000
heap
page read and write
4962000
heap
page read and write
B71000
unkown
page execute read
2E00000
direct allocation
page read and write
170924CA000
trusted library allocation
page read and write
2A5C9D7B000
heap
page read and write
2A5C9D46000
heap
page read and write
7412000
direct allocation
page read and write
2A5C8D75000
trusted library allocation
page read and write
170924C7000
trusted library allocation
page read and write
51E1000
heap
page read and write
2A5C9F22000
heap
page read and write
69DEF000
unkown
page execute read
170924D6000
trusted library allocation
page read and write
3E8000
unkown
page execute and read and write
61A1000
heap
page read and write
1E88A729000
heap
page read and write
382A000
trusted library allocation
page read and write
69E8000
direct allocation
page read and write
2753000
heap
page read and write
65C1000
heap
page read and write
861000
unkown
page execute read
22BD000
unkown
page readonly
A20000
unkown
page readonly
2756000
heap
page read and write
66858FE000
stack
page read and write
6A701000
unkown
page execute read
2A5C9DBA000
heap
page read and write
BA0000
heap
page read and write
1C9A000
unkown
page write copy
2A5C8D59000
trusted library allocation
page read and write
1F733D02000
heap
page read and write
12B1000
heap
page read and write
11CF000
heap
page read and write
599D000
direct allocation
page read and write
51E1000
heap
page read and write
17090625000
heap
page read and write
2A5C8D37000
trusted library allocation
page read and write
96000
stack
page read and write
689000
heap
page read and write
66854C6000
stack
page read and write
2A5C9E4B000
heap
page read and write
6431000
heap
page read and write
170924D3000
trusted library allocation
page read and write
65C1000
heap
page read and write
4962000
heap
page read and write
F3B000
heap
page read and write
1AFBD770000
heap
page read and write
170924D6000
trusted library allocation
page read and write
170924D0000
trusted library allocation
page read and write
2A5C8D13000
trusted library allocation
page read and write
6F4000
heap
page read and write
BBA000
stack
page read and write
194A136C000
trusted library allocation
page read and write
8527000
heap
page read and write
17090691000
heap
page read and write
170924CE000
trusted library allocation
page read and write
7F4B000
heap
page read and write
552B000
heap
page read and write
DF0000
unkown
page readonly
2155D828000
heap
page read and write
2A5C97AC000
heap
page read and write
170924D4000
trusted library allocation
page read and write
215061F6000
heap
page read and write
51E1000
heap
page read and write
170924CD000
trusted library allocation
page read and write
2A5C9ECA000
heap
page read and write
8460000
heap
page read and write
170924C5000
trusted library allocation
page read and write
F41000
heap
page read and write
2A5C96D3000
heap
page read and write
2A5C9767000
heap
page read and write
170906E2000
heap
page read and write
84B1000
heap
page read and write
73F129D000
stack
page read and write
170924D1000
trusted library allocation
page read and write
215061F6000
heap
page read and write
B9F000
unkown
page execute read
2150621D000
heap
page read and write
2A5C96D1000
heap
page read and write
2A5C8D02000
trusted library allocation
page read and write
5424000
heap
page read and write
275E000
heap
page read and write
7838000
heap
page read and write
83E7000
heap
page read and write
A50000
heap
page read and write
B71000
unkown
page execute read
170924D1000
trusted library allocation
page read and write
7404000
heap
page read and write
6A2AF000
unkown
page read and write
261C000
stack
page read and write
2A5C90E9000
trusted library allocation
page read and write
2A5C9D57000
heap
page read and write
51E1000
heap
page read and write
7F5C000
heap
page read and write
170924D0000
trusted library allocation
page read and write
170924D4000
trusted library allocation
page read and write
170928C0000
heap
page read and write
1BFE000
unkown
page readonly
2155D7F3000
heap
page read and write
CC0000
direct allocation
page read and write
2A5C8D57000
trusted library allocation
page read and write
1AB54E00000
heap
page read and write
4BC0000
heap
page read and write
2A5C97EF000
trusted library allocation
page read and write
2155D81A000
heap
page read and write
4962000
heap
page read and write
1BBF000
unkown
page read and write
2E9E000
heap
page read and write
556F000
heap
page read and write
5798000
direct allocation
page read and write
4962000
heap
page read and write
1F733BBC000
heap
page read and write
11FC000
heap
page read and write
2A5C97A7000
heap
page read and write
170924D0000
trusted library allocation
page read and write
6730000
direct allocation
page read and write
2A5C9CD9000
heap
page read and write
2A5C8CDE000
trusted library allocation
page read and write
9BE000
stack
page read and write
170924D5000
trusted library allocation
page read and write
2A5C8D7F000
trusted library allocation
page read and write
5B3F000
heap
page read and write
712C000
stack
page read and write
51E1000
heap
page read and write
2A5C9D56000
heap
page read and write
11FC000
heap
page read and write
170924D0000
trusted library allocation
page read and write
7681000
heap
page read and write
17090685000
heap
page read and write
170924D5000
trusted library allocation
page read and write
2A5C8D33000
trusted library allocation
page read and write
2A5C8D38000
trusted library allocation
page read and write
661000
heap
page read and write
2DD0000
direct allocation
page read and write
170924CD000
trusted library allocation
page read and write
215061D9000
heap
page read and write
2155F110000
heap
page read and write
51E1000
heap
page read and write
40A000
unkown
page write copy
170924D6000
trusted library allocation
page read and write
A33000
heap
page read and write
2A5C8D66000
trusted library allocation
page read and write
975000
heap
page read and write
61A0000
heap
page read and write
51E1000
heap
page read and write
6431000
heap
page read and write
170924CA000
trusted library allocation
page read and write
2A4268A0000
heap
page read and write
61A1000
heap
page read and write
170924D1000
trusted library allocation
page read and write
170924D2000
trusted library allocation
page read and write
F11000
unkown
page execute read
215061CF000
heap
page read and write
2A5CA21B000
heap
page read and write
170920B0000
trusted library allocation
page read and write
46BB000
heap
page read and write
48F0000
direct allocation
page read and write
11E8000
heap
page read and write
4962000
heap
page read and write
1BBF000
unkown
page write copy
51E1000
heap
page read and write
2A5C9F40000
heap
page read and write
7839000
heap
page read and write
2A5C8D18000
trusted library allocation
page read and write
170924D3000
trusted library allocation
page read and write
2758000
heap
page read and write
170924D2000
trusted library allocation
page read and write
2ECF000
stack
page read and write
4960000
direct allocation
page read and write
2A5C9D7B000
heap
page read and write
8510000
heap
page read and write
1C98000
unkown
page readonly
944567B000
stack
page read and write
83EB000
heap
page read and write
FD0000
heap
page read and write
51E1000
heap
page read and write
2A5C97D8000
trusted library allocation
page read and write
51E1000
heap
page read and write
2A5C9E4D000
heap
page read and write
1C9D000
unkown
page execute and read and write
2A5C9D1B000
heap
page read and write
4960000
direct allocation
page read and write
2A5C9EC5000
heap
page read and write
84AB000
heap
page read and write
8423000
heap
page read and write
17090570000
heap
page read and write
2A5C9767000
heap
page read and write
17090693000
heap
page read and write
FF0000
heap
page read and write
2FB4000
trusted library allocation
page read and write
D3D89A7000
stack
page read and write
1D501620000
heap
page read and write
5BE1000
heap
page read and write
6F1D000
direct allocation
page read and write
2A5C9E39000
heap
page read and write
4B4B000
heap
page read and write
170924D6000
trusted library allocation
page read and write
170924D6000
trusted library allocation
page read and write
51D0000
direct allocation
page read and write
A4E000
heap
page read and write
170906BF000
heap
page read and write
7F44000
heap
page read and write
78D000
heap
page read and write
There are 3932 hidden memdumps, click here to show them.