Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
GlassWireSetup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Program Files (x86)\GlassWire\GWCtlSrv.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\GlassWire\GlassWire.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsx9694.tmp\GWInstSt.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
3bd8c0.rbf (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
3bd8c5.rbf (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
3bd8c6.rbf (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
3bd8c7.rbf (copy)
|
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
3bd8c8.rbf (copy)
|
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Config.Msi\3bd8bf.rbs
|
data
|
dropped
|
||
C:\Config.Msi\3bd8c4.rbs
|
data
|
modified
|
||
C:\Program Files (x86)\GlassWire\GWEventLog.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\GlassWire\GWIdlMon.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\GlassWire\GWUnlock.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\GlassWire\GWUpgradeMonitor.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\GlassWire\Qt5Core.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\GlassWire\Qt5Gui.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\GlassWire\Qt5OpenGL.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\GlassWire\Qt5Svg.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\GlassWire\Qt5Widgets.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\GlassWire\Qt5WinExtras.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\GlassWire\copyrights\ASIO-LICENSE_1_0.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\GlassWire\copyrights\CURL-COPYING.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\GlassWire\copyrights\GEOIP-LICENSE.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\GlassWire\copyrights\GEOLITE2-COPYRIGHT.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\GlassWire\copyrights\GEOLITE2-LICENSE.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\GlassWire\copyrights\LZ4-LICENSE.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\GlassWire\copyrights\OPENSSL-LICENSE.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\GlassWire\copyrights\PROTOBYUF-LICENSE.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\GlassWire\copyrights\QT-LICENSE.GPL3-EXCEPT.txt
|
ASCII text, with CRLF, CR line terminators
|
dropped
|
||
C:\Program Files (x86)\GlassWire\copyrights\QT-LICENSE.txt
|
Non-ISO extended-ASCII text, with very long lines (653), with CRLF, CR line terminators
|
dropped
|
||
C:\Program Files (x86)\GlassWire\copyrights\RAPIDJSON-LICENSE.txt
|
ASCII text, with very long lines (739), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\GlassWire\copyrights\RAPIDXML-LICENSE.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\GlassWire\copyrights\RECOG-COPYING.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\GlassWire\copyrights\RLOTTIE-COPYING.MIT.txt
|
ASCII text, with very long lines (460), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\GlassWire\copyrights\SQLITE-COPYING.txt
|
ASCII text, with very long lines (666), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\GlassWire\copyrights\ZLIB-LICENSE.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\GlassWire\driver\legacy-x64\gwdrv.cat
|
data
|
dropped
|
||
C:\Program Files (x86)\GlassWire\driver\legacy-x64\gwdrv.inf
|
Windows setup INFormation
|
dropped
|
||
C:\Program Files (x86)\GlassWire\driver\legacy-x64\gwdrv.sys
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\GlassWire\driver\legacy-x86\gwdrv.cat
|
data
|
dropped
|
||
C:\Program Files (x86)\GlassWire\driver\legacy-x86\gwdrv.inf
|
Windows setup INFormation
|
dropped
|
||
C:\Program Files (x86)\GlassWire\driver\legacy-x86\gwdrv.sys
|
PE32 executable (native) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\GlassWire\driver\win7-x64\gwdrv.cat
|
data
|
dropped
|
||
C:\Program Files (x86)\GlassWire\driver\win7-x64\gwdrv.inf
|
Windows setup INFormation
|
dropped
|
||
C:\Program Files (x86)\GlassWire\driver\win7-x64\gwdrv.sys
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\GlassWire\driver\win7-x86\gwdrv.cat
|
data
|
dropped
|
||
C:\Program Files (x86)\GlassWire\driver\win7-x86\gwdrv.inf
|
Windows setup INFormation
|
dropped
|
||
C:\Program Files (x86)\GlassWire\driver\win7-x86\gwdrv.sys
|
PE32 executable (native) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\GlassWire\driver\x64\gwdrv.cat
|
data
|
dropped
|
||
C:\Program Files (x86)\GlassWire\driver\x64\gwdrv.inf
|
Windows setup INFormation
|
dropped
|
||
C:\Program Files (x86)\GlassWire\driver\x64\gwdrv.sys
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\GlassWire\iconengines\qsvgicon.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\GlassWire\imageformats\qico.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\GlassWire\lang\de_de.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\GlassWire\lang\en_gb.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\GlassWire\lang\en_us.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\GlassWire\lang\es_es.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\GlassWire\lang\fr_fr.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\GlassWire\lang\it_it.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\GlassWire\lang\ja_jp.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\GlassWire\lang\ko_kr.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\GlassWire\lang\pl_pl.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\GlassWire\lang\pt_br.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\GlassWire\lang\ru_ru.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\GlassWire\lang\tr_tr.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\GlassWire\lang\zh_cn.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\GlassWire\lang\zh_tw.qm
|
Qt Translation file
|
dropped
|
||
C:\Program Files (x86)\GlassWire\platforms\qwindows.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\GlassWire\plugins\windows.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\GlassWire\uninstall.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x3009ffef, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\GlassWire\GlassWire.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0,
Archive, ctime=Mon Aug 12 07:19:56 2024, mtime=Mon Oct 7 15:59:36 2024, atime=Mon Aug 12 07:19:56 2024, length=12010624,
window=hide
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\GlassWire\Uninstall.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0,
Archive, ctime=Mon Aug 12 07:20:50 2024, mtime=Mon Oct 7 15:59:38 2024, atime=Mon Aug 12 07:20:50 2024, length=9394760, window=hide
|
dropped
|
||
C:\ProgramData\Package Cache\.unverified\cab54A5CABBE7274D8A22EB58060AAB7623 (copy)
|
Microsoft Cabinet archive data, many, 741101 bytes, 10 files, at 0x44 +A "concrt140.dll" +A "msvcp140.dll", flags 0x4, number
1, extra bytes 20 in head, 55 datablocks, 0x1 compression
|
dropped
|
||
C:\ProgramData\Package Cache\.unverified\cabB3E1576D1FEFBB979E13B1A5379E0B16 (copy)
|
Microsoft Cabinet archive data, many, 5190395 bytes, 14 files, at 0x44 +A "mfc140.dll" +A "mfc140chs.dll", flags 0x4, number
1, extra bytes 20 in head, 326 datablocks, 0x1 compression
|
dropped
|
||
C:\ProgramData\Package Cache\.unverified\vcRuntimeAdditional_x86 (copy)
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2019 X86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2019 X86 Additional Runtime - 14.29.30139.,
Template: Intel;1033, Revision Number: {02910D02-C4AB-4DC8-8CDC-AD5C0F55DDF0}, Create Time/Date: Fri Dec 10 22:31:12 2021,
Last Saved Time/Date: Fri Dec 10 22:31:12 2021, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML Toolset (3.10.4.4718), Security: 2
|
dropped
|
||
C:\ProgramData\Package Cache\.unverified\vcRuntimeMinimum_x86 (copy)
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2019 X86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.29.30139.,
Template: Intel;1033, Revision Number: {C903B036-1F58-4F43-8CA4-2797FED0F6CC}, Create Time/Date: Fri Dec 10 22:28:10 2021,
Last Saved Time/Date: Fri Dec 10 22:28:10 2021, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML Toolset (3.10.4.4718), Security: 2
|
dropped
|
||
C:\ProgramData\Package Cache\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}v14.29.30139\packages\vcRuntimeMinimum_x86\cab1.cab (copy)
|
Microsoft Cabinet archive data, many, 741101 bytes, 10 files, at 0x44 +A "concrt140.dll" +A "msvcp140.dll", flags 0x4, number
1, extra bytes 20 in head, 55 datablocks, 0x1 compression
|
dropped
|
||
C:\ProgramData\Package Cache\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}v14.29.30139\packages\vcRuntimeMinimum_x86\vc_runtimeMinimum_x86.msi
(copy)
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2019 X86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.29.30139.,
Template: Intel;1033, Revision Number: {C903B036-1F58-4F43-8CA4-2797FED0F6CC}, Create Time/Date: Fri Dec 10 22:28:10 2021,
Last Saved Time/Date: Fri Dec 10 22:28:10 2021, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML Toolset (3.10.4.4718), Security: 2
|
dropped
|
||
C:\ProgramData\Package Cache\{1AEA8854-7597-4CD3-948F-8DE364D94E07}v14.29.30139\packages\vcRuntimeAdditional_x86\cab1.cab
(copy)
|
Microsoft Cabinet archive data, many, 5190395 bytes, 14 files, at 0x44 +A "mfc140.dll" +A "mfc140chs.dll", flags 0x4, number
1, extra bytes 20 in head, 326 datablocks, 0x1 compression
|
dropped
|
||
C:\ProgramData\Package Cache\{1AEA8854-7597-4CD3-948F-8DE364D94E07}v14.29.30139\packages\vcRuntimeAdditional_x86\vc_runtimeAdditional_x86.msi
(copy)
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2019 X86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2019 X86 Additional Runtime - 14.29.30139.,
Template: Intel;1033, Revision Number: {02910D02-C4AB-4DC8-8CDC-AD5C0F55DDF0}, Create Time/Date: Fri Dec 10 22:31:12 2021,
Last Saved Time/Date: Fri Dec 10 22:31:12 2021, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML Toolset (3.10.4.4718), Security: 2
|
dropped
|
||
C:\ProgramData\Package Cache\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}\VC_redist.x86.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Package Cache\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}\state.rsm
|
data
|
dropped
|
||
C:\ProgramData\glasswire\service-full\cloud\cloud.db
|
SQLite 3.x database, user version 14, last written using SQLite version 3041002, writer version 2, read version 2, file counter
2, database pages 1, cookie 0, schema 0, unknown 0 encoding, version-valid-for 2
|
dropped
|
||
C:\ProgramData\glasswire\service-full\cloud\cloud.db-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\ProgramData\glasswire\service-full\cloud\cloud.db-shm
|
data
|
dropped
|
||
C:\ProgramData\glasswire\service-full\cloud\cloud.db-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\ProgramData\glasswire\service-full\glasswire.conf
|
ASCII text, with very long lines (376), with CRLF line terminators
|
dropped
|
||
C:\ProgramData\glasswire\service-full\glasswire.db
|
SQLite 3.x database, user version 14, last written using SQLite version 3041002, writer version 2, read version 2, file counter
2, database pages 26, cookie 0x17, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\ProgramData\glasswire\service-full\glasswire.db-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\ProgramData\glasswire\service-full\glasswire.db-shm
|
data
|
dropped
|
||
C:\ProgramData\glasswire\service-full\glasswire.db-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\ProgramData\glasswire\service-full\log\update\20241007.log
|
ASCII text, with very long lines (527), with CRLF line terminators
|
modified
|
||
C:\ProgramData\glasswire\share\storage.db
|
SQLite 3.x database, last written using SQLite version 3008011, page size 1024, file counter 1252, database pages 1969, cookie
0x68, schema 4, UTF-16 little endian, version-valid-for 1239
|
dropped
|
||
C:\Users\Public\Desktop\GlassWire.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0,
Archive, ctime=Mon Aug 12 07:19:56 2024, mtime=Mon Oct 7 16:00:07 2024, atime=Mon Aug 12 07:19:56 2024, length=12010624,
window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\GlassWire\client-full\client.conf
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\GlassWire\client-full\log\20241007.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\ExplorerStartupLog_RunOnce.etl
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20241007125848.log
|
ASCII text, with very long lines (321), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20241007125848_000_vcRuntimeMinimum_x86.log
|
Unicode text, UTF-16, little-endian text, with very long lines (319), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20241007125848_001_vcRuntimeAdditional_x86.log
|
Unicode text, UTF-16, little-endian text, with very long lines (411), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsx9694.tmp\StartMenu.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsx9694.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsx9694.tmp\eventlog.man
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsx9694.tmp\modern-header.bmp
|
PC bitmap, Windows 3.x format, 150 x 57 x 24, image size 25766, resolution 2834 x 2834 px/m, cbSize 25820, bits offset 54
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsx9694.tmp\modern-wizard.bmp
|
PC bitmap, Windows 3.x format, 164 x 314 x 24, image size 154490, resolution 2834 x 2834 px/m, cbSize 154544, bits offset
54
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsx9694.tmp\nsDialogs.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsx9694.tmp\nsExec.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsx9694.tmp\nsihelper.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsx9694.tmp\vc_redist.x86.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{1b9ae675-a69a-784f-a0a3-d898132a09ba}\SET898F.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{1b9ae675-a69a-784f-a0a3-d898132a09ba}\SET899F.tmp
|
Windows setup INFormation
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{1b9ae675-a69a-784f-a0a3-d898132a09ba}\SET89B0.tmp
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{1b9ae675-a69a-784f-a0a3-d898132a09ba}\gwdrv.cat (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{1b9ae675-a69a-784f-a0a3-d898132a09ba}\gwdrv.inf (copy)
|
Windows setup INFormation
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{1b9ae675-a69a-784f-a0a3-d898132a09ba}\gwdrv.sys (copy)
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\GlassWire 3.4.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0,
Archive, ctime=Mon Aug 12 07:19:56 2024, mtime=Mon Oct 7 16:00:07 2024, atime=Mon Aug 12 07:19:56 2024, length=12010624,
window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\INF\oem4.inf
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\INF\setupapi.dev.log
|
Generic INItialization configuration [BeginLog]
|
dropped
|
||
C:\Windows\Installer\$PatchCache$\Managed\56FE97613F5584249BE1B6B31E6AC9FD\14.29.30139\concrt140.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\$PatchCache$\Managed\56FE97613F5584249BE1B6B31E6AC9FD\14.29.30139\msvcp140.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\$PatchCache$\Managed\56FE97613F5584249BE1B6B31E6AC9FD\14.29.30139\msvcp140_1.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\$PatchCache$\Managed\56FE97613F5584249BE1B6B31E6AC9FD\14.29.30139\msvcp140_2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\$PatchCache$\Managed\56FE97613F5584249BE1B6B31E6AC9FD\14.29.30139\msvcp140_atomic_wait.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\$PatchCache$\Managed\56FE97613F5584249BE1B6B31E6AC9FD\14.29.30139\msvcp140_codecvt_ids.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\$PatchCache$\Managed\56FE97613F5584249BE1B6B31E6AC9FD\14.29.30139\vccorlib140.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\$PatchCache$\Managed\56FE97613F5584249BE1B6B31E6AC9FD\14.29.30139\vcruntime140.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\3bd8bd.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2019 X86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.29.30139.,
Template: Intel;1033, Revision Number: {C903B036-1F58-4F43-8CA4-2797FED0F6CC}, Create Time/Date: Fri Dec 10 22:28:10 2021,
Last Saved Time/Date: Fri Dec 10 22:28:10 2021, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML Toolset (3.10.4.4718), Security: 2
|
dropped
|
||
C:\Windows\Installer\3bd8c1.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2019 X86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.29.30139.,
Template: Intel;1033, Revision Number: {C903B036-1F58-4F43-8CA4-2797FED0F6CC}, Create Time/Date: Fri Dec 10 22:28:10 2021,
Last Saved Time/Date: Fri Dec 10 22:28:10 2021, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML Toolset (3.10.4.4718), Security: 2
|
dropped
|
||
C:\Windows\Installer\3bd8c2.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2019 X86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2019 X86 Additional Runtime - 14.29.30139.,
Template: Intel;1033, Revision Number: {02910D02-C4AB-4DC8-8CDC-AD5C0F55DDF0}, Create Time/Date: Fri Dec 10 22:31:12 2021,
Last Saved Time/Date: Fri Dec 10 22:31:12 2021, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML Toolset (3.10.4.4718), Security: 2
|
dropped
|
||
C:\Windows\Installer\3bd8c9.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2019 X86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2019 X86 Additional Runtime - 14.29.30139.,
Template: Intel;1033, Revision Number: {02910D02-C4AB-4DC8-8CDC-AD5C0F55DDF0}, Create Time/Date: Fri Dec 10 22:31:12 2021,
Last Saved Time/Date: Fri Dec 10 22:31:12 2021, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML Toolset (3.10.4.4718), Security: 2
|
dropped
|
||
C:\Windows\Installer\MSIDD41.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSIE2B1.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\SourceHash{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\SourceHash{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
C:\Windows\SysWOW64\mfc140.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc140chs.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc140cht.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc140deu.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc140enu.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc140esn.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc140fra.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc140ita.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc140jpn.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc140kor.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc140rus.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc140u.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfcm140.dll
|
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfcm140u.dll
|
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\vcamp140.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\vcomp140.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{1b774c08-0e2d-f04a-affb-563599d0a20e}\SET8C1F.tmp
|
data
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{1b774c08-0e2d-f04a-affb-563599d0a20e}\SET8C3F.tmp
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{1b774c08-0e2d-f04a-affb-563599d0a20e}\SET8C50.tmp
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{1b774c08-0e2d-f04a-affb-563599d0a20e}\gwdrv.cat (copy)
|
data
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{1b774c08-0e2d-f04a-affb-563599d0a20e}\gwdrv.inf (copy)
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{1b774c08-0e2d-f04a-affb-563599d0a20e}\gwdrv.sys (copy)
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\catroot2\dberr.txt
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Windows\System32\drivers\gwdrv.cat
|
data
|
dropped
|
||
C:\Windows\System32\drivers\gwdrv.inf
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\System32\drivers\gwdrv.sys
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Temp\OLD945C.tmp
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1028\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1028\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1029\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1029\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1031\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1031\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1036\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1036\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1040\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1040\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1041\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1041\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1042\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1042\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1045\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1045\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1046\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1046\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1049\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1049\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1055\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\1055\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\2052\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\2052\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\3082\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\3082\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\BootstrapperApplicationData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (558), with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\logo.png
|
PNG image data, 64 x 64, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\thm.wxl
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\thm.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.ba\wixstdba.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.be\VC_redist.x86.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\cab54A5CABBE7274D8A22EB58060AAB7623
|
Microsoft Cabinet archive data, many, 741101 bytes, 10 files, at 0x44 +A "concrt140.dll" +A "msvcp140.dll", flags 0x4, number
1, extra bytes 20 in head, 55 datablocks, 0x1 compression
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\cabB3E1576D1FEFBB979E13B1A5379E0B16
|
Microsoft Cabinet archive data, many, 5190395 bytes, 14 files, at 0x44 +A "mfc140.dll" +A "mfc140chs.dll", flags 0x4, number
1, extra bytes 20 in head, 326 datablocks, 0x1 compression
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\vcRuntimeAdditional_x86
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2019 X86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2019 X86 Additional Runtime - 14.29.30139.,
Template: Intel;1033, Revision Number: {02910D02-C4AB-4DC8-8CDC-AD5C0F55DDF0}, Create Time/Date: Fri Dec 10 22:31:12 2021,
Last Saved Time/Date: Fri Dec 10 22:31:12 2021, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML Toolset (3.10.4.4718), Security: 2
|
dropped
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\vcRuntimeMinimum_x86
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2019 X86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.29.30139.,
Template: Intel;1033, Revision Number: {C903B036-1F58-4F43-8CA4-2797FED0F6CC}, Create Time/Date: Fri Dec 10 22:28:10 2021,
Last Saved Time/Date: Fri Dec 10 22:28:10 2021, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML Toolset (3.10.4.4718), Security: 2
|
dropped
|
||
C:\Windows\Temp\{FAC60DB1-A697-45EE-963C-3E79552A0F30}\.cr\vc_redist.x86.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Temp\~DF0538875032E347E0.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF063AD5405B76E19B.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF2CB328544F637D7B.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF3C6D1ACF4456307B.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF497FD7286ECDDC32.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF4F6ACF0974D6F467.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF5A2D86795CF83812.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF6AB17DEB3A600A3C.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF728EB49F90B6D81A.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF7E5C243651EDAC2F.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF83FE8E8802E13142.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF8BDD8E6D32DF3C51.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF928F288195A5C8C3.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFA1E2EDCCBA4B94F5.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFA5DDEDE3239FC6C2.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFAB84A446354C418B.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFBDB96B0A699B1268.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFC1751C8B4A3976B7.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFCE241A67BA6BDA40.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFCFF3B4CEDBD2EB36.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFD425AD7A1DD824A1.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFE1BCB02B54137856.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFF2800AADAF31D898.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFF5210D750882D8F6.TMP
|
data
|
dropped
|
There are 221 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\GlassWireSetup.exe
|
"C:\Users\user\Desktop\GlassWireSetup.exe"
|
||
C:\Users\user\AppData\Local\Temp\nsx9694.tmp\GWInstSt.exe
|
"C:\Users\user\AppData\Local\Temp\nsx9694.tmp\GWInstSt.exe" "https://www.glasswire.com/stat/install.php?v=3.4.694&build_type=full&os=Ten&platform=x64&update=0&install_id=8AC7009D4B52E62F54AD1F4176FBF27962F3EAF3F7DDE916A08729FD64A8AEEE&referrer=https%3A%2F%2Fwww.google.com%2F&user_agent=Mozilla%2F5.0+%28Windows+NT+10.0%3B+Win64%3B+x64%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F129.0.0.0+Safari%2F537.36+Edg%2F129.0.0.0&ga_client_id=1231827075.1728319357"
"nsis$$.tmp"
|
||
C:\Windows\System32\rundll32.exe
|
"C:\Windows\system32\rundll32.exe" setupapi.dll,InstallHinfSection DefaultInstall 128 C:\Windows\system32\drivers\gwdrv.inf
|
||
C:\Windows\System32\drvinst.exe
|
DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{1b9ae675-a69a-784f-a0a3-d898132a09ba}\gwdrv.inf" "9" "4e7eab47b" "0000000000000144"
"WinSta0\Default" "0000000000000170" "208" "C:\Windows\system32\drivers"
|
||
C:\Windows\System32\drvinst.exe
|
DrvInst.exe "8" "4" "C:\Windows\System32\DriverStore\FileRepository\gwdrv.inf_amd64_54933c59b5293195\gwdrv.inf" "0" "4e7eab47b"
"0000000000000170" "WinSta0\Default"
|
||
C:\Program Files (x86)\GlassWire\GWCtlSrv.exe
|
"C:\Program Files (x86)\GlassWire\GWCtlSrv.exe" "-i"
|
||
C:\Program Files (x86)\GlassWire\GWCtlSrv.exe
|
"C:\Program Files (x86)\GlassWire\GWCtlSrv.exe" "-s"
|
||
C:\Program Files (x86)\GlassWire\GWCtlSrv.exe
|
"C:\Program Files (x86)\GlassWire\GWCtlSrv.exe"
|
||
C:\Program Files (x86)\GlassWire\GlassWire.exe
|
"C:\Program Files (x86)\GlassWire\GlassWire.exe"
|
||
C:\Program Files (x86)\GlassWire\GlassWire.exe
|
"C:\Program Files (x86)\GlassWire\glasswire.exe" -hide
|
||
C:\Program Files (x86)\GlassWire\GlassWire.exe
|
"C:\Program Files (x86)\GlassWire\glasswire.exe" -hide
|
||
C:\Users\user\AppData\Local\Temp\nsx9694.tmp\vc_redist.x86.exe
|
"C:\Users\user\AppData\Local\Temp\nsx9694.tmp\vc_redist.x86.exe" /install /quiet /norestart
|
||
C:\Windows\Temp\{FAC60DB1-A697-45EE-963C-3E79552A0F30}\.cr\vc_redist.x86.exe
|
"C:\Windows\Temp\{FAC60DB1-A697-45EE-963C-3E79552A0F30}\.cr\vc_redist.x86.exe" -burn.clean.room="C:\Users\user\AppData\Local\Temp\nsx9694.tmp\vc_redist.x86.exe"
-burn.filehandle.attached=524 -burn.filehandle.self=640 /install /quiet /norestart
|
||
C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.be\VC_redist.x86.exe
|
"C:\Windows\Temp\{A3612FE9-3C22-4098-98C3-2CD91218666B}\.be\VC_redist.x86.exe" -q -burn.elevated BurnPipe.{4C6967F0-7861-4E5E-A266-A79F91D53451}
{8D47B6A8-8425-45E8-BA0B-10ED43630BCC} 1148
|
||
C:\Windows\System32\VSSVC.exe
|
C:\Windows\system32\vssvc.exe
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k swprv
|
||
C:\Windows\System32\SrTasks.exe
|
C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
|
||
C:\Windows\System32\runonce.exe
|
"C:\Windows\system32\runonce.exe" -r
|
||
C:\Windows\System32\grpconv.exe
|
"C:\Windows\System32\grpconv.exe" -o
|
||
C:\Windows\System32\net.exe
|
"C:\Windows\system32\net.exe" start gwdrv
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\net1.exe
|
C:\Windows\system32\net1 start gwdrv
|
||
C:\Windows\SysWOW64\wevtutil.exe
|
"C:\Windows\system32\wevtutil.exe" im "C:\Users\user\AppData\Local\Temp\nsx9694.tmp\eventlog.man" /rf:"C:\Program Files (x86)\GlassWire\GWEventLog.dll"
/mf:"C:\Program Files (x86)\GlassWire\GWEventLog.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wevtutil.exe
|
"C:\Windows\system32\wevtutil.exe" im "C:\Users\user\AppData\Local\Temp\nsx9694.tmp\eventlog.man" /rf:"C:\Program Files (x86)\GlassWire\GWEventLog.dll"
/mf:"C:\Program Files (x86)\GlassWire\GWEventLog.dll" /fromwow64
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\explorer.exe
|
"C:\Windows\explorer.exe" "C:\Program Files (x86)\GlassWire\glasswire.exe"
|
||
C:\Windows\explorer.exe
|
C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
There are 23 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
|
unknown
|
||
http://www.CAcert.org/index.php?id=1004
|
unknown
|
||
http://www.chambersign.orgD
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
|
unknown
|
||
http://www.CAcert.org/index.php?id=10
|
unknown
|
||
https://pivot.protect.glasswire.comj6
|
unknown
|
||
http://crl.chambersign.org/chambersroot.crl0
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
|
unknown
|
||
http://www.e-szigno.hu/SZSZ/
|
unknown
|
||
http://wixtoolset.org/schemas/thmutil/2010
|
unknown
|
||
https://www.cacert.org/revoke.crl
|
unknown
|
||
http://www.startssl.com/policy.pdf04
|
unknown
|
||
http://repository.swisssign.com/I
|
unknown
|
||
http://acedicom.edicomgroup.com/doc
|
unknown
|
||
http://www.certifikat.dk/repository0
|
unknown
|
||
http://www.chambersign.org1
|
unknown
|
||
http://www.quovadisglobal.com/cpsK/
|
unknown
|
||
http://crl.chambersign.org/chambersignroot.crl
|
unknown
|
||
http://policy.camerfirma.com:Dv
|
unknown
|
||
http://www.pkioverheid.nl/policies/root-policy0
|
unknown
|
||
http://www.pkioverheid.nl/policies/root-policy
|
unknown
|
||
https://www.maxmind.com/en/geolite2/eula.
|
unknown
|
||
https://ocsp.quovadisoffshore.com
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0Copyright
|
unknown
|
||
http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
|
unknown
|
||
http://ca.disig.sk/ca/crl/ca_disig.crl0
|
unknown
|
||
http://www.CAcert.org/index.php?id=100P
|
unknown
|
||
https://curl.se/docs/hsts.html
|
unknown
|
||
http://crl.oces.certifikat.dk/oces.crl
|
unknown
|
||
http://www.disig.sk/ca/crl/ca_disig.crl0
|
unknown
|
||
https://www.GlassWire.com/privacy-policy.php
|
unknown
|
||
https://creativecommons.org/licenses/by/4.0/.
|
unknown
|
||
http://www.chambersign.org287
|
unknown
|
||
http://www.startssl.com/policy.pdf0
|
unknown
|
||
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl?
|
unknown
|
||
http://www.sk.ee/cps/0
|
unknown
|
||
http://www.valicert.com/rk
|
unknown
|
||
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFL
|
unknown
|
||
http://www.cacert.org
|
unknown
|
||
https://api-eu-north-1.protect.glasswire.com/api/v1.1/agent/event
|
16.16.13.164
|
||
http://www.CAcert.org/ca.crt
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0Licensed
|
unknown
|
||
https://api-eu-north-1.protect.glasswire.com/api/v1.1/agent/device/register
|
16.16.13.164
|
||
http://acedicom.edicomgroup.com/docF-
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
|
unknown
|
||
http://ocsp.pki.gva.es0
|
unknown
|
||
http://www.startssl.com/policy.pdfB
|
unknown
|
||
https://pivot.protect.glasswire.com
|
unknown
|
||
http://crl.oces.certifikat.dk/oces.crl0
|
unknown
|
||
https://www.glasswire.com/stat/install.php?v=3.4.694&build_type=full&os=
|
unknown
|
||
https://pivot.protect.glasswire.com/api/v1/celld6
|
unknown
|
||
https://api-eu-north-1.protect.glasswire.com/v1/api
|
unknown
|
||
http://www.gnu.org/philosophy/why-not-lgpl.html
|
unknown
|
||
http://www.certicamara.com/dpc/0Z
|
unknown
|
||
http://crl.pki.wellsfargo.com/wsprca.crl0
|
unknown
|
||
http://www.certplus.com/CRL/class2.crl
|
unknown
|
||
https://www.glasswire.com/stat/install.php?v=3.4.694&build_type=full&os=Ten&platform=x64&update=0&install_id=8AC7009D4B52E62F54AD1F4176FBF27962F3EAF3F7DDE916A08729FD64A8AEEE&referrer=https%3A%2F%2Fwww.google.com%2F&user_agent=Mozilla%2F5.0+%28Windows+NT+10.0%3B+Win64%3B+x64%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F129.0.0.0+Safari%2F537.36+Edg%2F129.0.0.0&ga_client_id=1231827075.1728319357
|
18.244.164.20
|
||
http://ca.disig.sk/ca/crl/ca_disig.crl
|
unknown
|
||
http://www.e-szigno.hu/RootCA.crt
|
unknown
|
||
http://www.e-szigno.hu/SZSZ
|
unknown
|
||
http://ocsp.CAcert.org/0(
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://curl.se/docs/alt-svc.html
|
unknown
|
||
http://www.entrust.net/CRL/net1.crl
|
unknown
|
||
http://www.sansoxygen.comhttp://www.sansoxygen.comThis
|
unknown
|
||
http://www.symauth.com/cps0(
|
unknown
|
||
http://www.color.org)
|
unknown
|
||
http://policy.camerfirma.comvDwN
|
unknown
|
||
http://cps.chambersign.org/cps/chambersroot.html
|
unknown
|
||
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLCopyright
|
unknown
|
||
https://api-eu-north-1.protect.glasswire.com/api/v1.1/agent/eventd74z
|
unknown
|
||
http://www.entrust.net/CRL/net1.crl0
|
unknown
|
||
https://www.catcert.net/verarrel
|
unknown
|
||
http://crl.securetrust.com/STCA.crl
|
unknown
|
||
http://ocsp.pki.gva.esT
|
unknown
|
||
http://www.disig.sk/ca0f
|
unknown
|
||
https://api-eu-north-1.protect.glasswire.com/agent-api/v1/license/activatek
|
unknown
|
||
http://www.firmaprofesional.com?
|
unknown
|
||
http://www.e-szigno.hu/RootCA.crl
|
unknown
|
||
http://www.symauth.com/rpa00
|
unknown
|
||
http://www.sk.ee/juur/crl/0
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
|
unknown
|
||
http://crl.chambersign.org/chambersignroot.crl0
|
unknown
|
||
http://crl.xrampsecurity.com/XGCA.crl0
|
unknown
|
||
https://api-eu-north-1.protect.glasswire.com/endpoint-api/v1/endpoint/%s/geoip-db/downloadJZ
|
unknown
|
||
http://www.quovadis.bm0
|
unknown
|
||
http://cps.chambersign.org/cps/chambersroot.htmlUDwm
|
unknown
|
||
http://www.wellsfargo.com/certpolicy
|
unknown
|
||
http://ocsp.pki.gva.es
|
unknown
|
||
http://www.trustdst.com/certificates/policy/ACES-index.html0
|
unknown
|
||
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl
|
unknown
|
||
http://www.firmaprofesional.com0
|
unknown
|
||
http://www.openssl.org/)
|
unknown
|
||
https://api-eu-north-1.protect.glasswire.com/endpoint-api/v1/endpoint/%s/heartbeat/%s
|
unknown
|
||
http://www.pkioverheid.nl/policies/root-policy-G20
|
unknown
|
||
https://www.netlock.net/docs
|
unknown
|
||
http://www.trustcenter.de/crl/v2/tc_class_2_ca_II.crl
|
unknown
|
||
http://appsyndication.org/2006/appsyn
|
unknown
|
||
http://fedir.comsign.co.il/crl/ComSignCA.crl0
|
unknown
|
||
https://pivot.protect.glasswire.com/api/v1/cell?locale=ch
|
13.50.186.172
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
api-eu-north-1.protect.glasswire.com
|
16.16.13.164
|
||
pivot.protect.glasswire.com
|
13.50.186.172
|
||
www.glasswire.com
|
18.244.164.20
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
18.244.164.20
|
www.glasswire.com
|
United States
|
||
13.50.186.172
|
pivot.protect.glasswire.com
|
United States
|
||
16.16.13.164
|
api-eu-north-1.protect.glasswire.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
GlassWire
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
|
GrpConv
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\GlassWire.exe
|
DumpFolder
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\GlassWire.exe
|
DumpType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\GWCtlSrv.exe
|
DumpFolder
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\GWCtlSrv.exe
|
DumpType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\GWIdlMon.exe
|
DumpFolder
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\GWIdlMon.exe
|
DumpType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GlassWire\full
|
CampaignId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GlassWire\full
|
InstallID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GlassWire\full
|
CloudDeviceId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GlassWire\full
|
CloudCurrentServer
|
||
HKEY_CURRENT_USER\SOFTWARE\GlassWire
|
LastInstallationVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GlassWire
|
LastInstallationDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\GlassWire 3.4
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\GlassWire 3.4
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\GlassWire 3.4
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\GlassWire 3.4
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\GlassWire 3.4
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\GlassWire 3.4
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\GlassWire 3.4
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\GlassWire 3.4
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\GlassWire 3.4
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\GlassWire 3.4
|
DisplayIcon
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GlassWire\full
|
CloudDeviceId
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
|
AoACAPIError
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
|
AoACAPIResult
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
FirstRun
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
LastIndex
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
|
NestingLevel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
|
StartNesting
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
SRInitDone
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
|
SrCreateRp (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
|
SrCreateRp (Leave)
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
|
BundleCachePath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
|
BundleUpgradeCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
|
BundleAddonCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
|
BundleDetectCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
|
BundlePatchCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
|
BundleVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
|
BundleProviderKey
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
|
BundleTag
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
|
EngineVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
|
DisplayIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
|
NoElevateOnModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
|
QuietUninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x86,x86,14.29,bundle
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x86,x86,14.29,bundle
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x86,x86,14.29,bundle
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
|
Resume
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
|
{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
|
BundleResumeCommandLine
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
|
Installed
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
RPSessionInterval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
LastIndex
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8d5fdf81-7022-423f-bd8b-b513a1050ae1}
|
Resume
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
IDENTIFY (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
IDENTIFY (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer
|
IDENTIFY (Enter)
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Description
|
FirmwareModified
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
IDENTIFY (Leave)
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001
|
Element
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\12000002
|
Element
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{584f4cfd-61ca-11ee-8a62-e43725c6cdb7}\Elements\12000004
|
Element
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{584f4cfe-61ca-11ee-8a62-e43725c6cdb7}\Elements\12000004
|
Element
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{a5a30fa2-3d06-4e9f-b5f4-a01df9d1fcba}\Description
|
Type
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
IDENTIFY (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
IDENTIFY (Enter)
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{a5a30fa2-3d06-4e9f-b5f4-a01df9d1fcba}\Elements\24000001
|
Element
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{a5a30fa2-3d06-4e9f-b5f4-a01df9d1fcba}\Elements\25000004
|
Element
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
IDENTIFY (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer
|
IDENTIFY (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_BEGINPREPARE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_BEGINPREPARE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
PREPAREBACKUP (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
PREPAREBACKUP (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
PREPAREBACKUP (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
PREPAREBACKUP (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
VSS_WS_STABLE (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
PREPAREBACKUP (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
VSS_WS_STABLE (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
PREPAREBACKUP (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
VSS_WS_STABLE (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
GETSTATE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
GETSTATE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
GETSTATE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
GETSTATE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
GETSTATE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
GETSTATE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_ENDPREPARE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_ENDPREPARE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
PREPARESNAPSHOT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
PREPARESNAPSHOT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
PREPARESNAPSHOT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
PREPARESNAPSHOT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
PREPARESNAPSHOT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
VSS_WS_WAITING_FOR_FREEZE (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
PREPARESNAPSHOT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
VSS_WS_WAITING_FOR_FREEZE (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
PREPARESNAPSHOT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
VSS_WS_WAITING_FOR_FREEZE (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
PREPARESNAPSHOT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
FREEZE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
FREEZE_FRONT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
FREEZE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
FREEZE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
VSS_WS_WAITING_FOR_THAW (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
BKGND_FREEZE_THREAD (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
FREEZE_FRONT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
FREEZE_BACK (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
FREEZE_BACK (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
FREEZE_SYSTEM (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
FREEZE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
FREEZE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
VSS_WS_WAITING_FOR_THAW (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
BKGND_FREEZE_THREAD (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
FREEZE_SYSTEM (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
FREEZE_KTM (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
FREEZE_KTM (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
FREEZE_RM (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
FREEZE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
FREEZE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
VSS_WS_WAITING_FOR_THAW (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
BKGND_FREEZE_THREAD (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
FREEZE_RM (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
FREEZE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_PRECOMMIT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_PRECOMMIT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
|
OPEN_VOLUME_HANDLE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
|
OPEN_VOLUME_HANDLE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
|
OPEN_VOLUME_HANDLE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
|
OPEN_VOLUME_HANDLE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
|
IOCTL_FLUSH_AND_HOLD (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
|
IOCTL_FLUSH_AND_HOLD (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
|
IOCTL_RELEASE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
|
IOCTL_RELEASE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
|
IOCTL_FLUSH_AND_HOLD (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
|
IOCTL_FLUSH_AND_HOLD (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
|
IOCTL_RELEASE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
|
IOCTL_RELEASE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_COMMIT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_COMMIT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_POSTCOMMIT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_POSTCOMMIT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
THAW_KTM (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
THAW_KTM (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
THAW (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
THAW (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
BKGND_FREEZE_THREAD (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
THAW (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
THAW (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
VSS_WS_WAITING_FOR_POST_SNAPSHOT (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
BKGND_FREEZE_THREAD (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
THAW (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
BKGND_FREEZE_THREAD (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
THAW (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
VSS_WS_WAITING_FOR_POST_SNAPSHOT (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
THAW (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
VSS_WS_WAITING_FOR_POST_SNAPSHOT (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
THAW (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_PREFINALCOMMIT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_PREFINALCOMMIT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
POSTSNAPSHOT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
POSTSNAPSHOT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
POSTSNAPSHOT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
POSTSNAPSHOT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
POSTSNAPSHOT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
VSS_WS_WAITING_FOR_BACKUP_COMPLETE (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
POSTSNAPSHOT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
VSS_WS_WAITING_FOR_BACKUP_COMPLETE (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
POSTSNAPSHOT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
VSS_WS_WAITING_FOR_BACKUP_COMPLETE (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
POSTSNAPSHOT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_POSTFINALCOMMIT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_POSTFINALCOMMIT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_ABORTSNAPSHOTS (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_ABORTSNAPSHOTS (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
ABORT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
ABORT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
ABORT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
ABORT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
ABORT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
ABORT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
ABORT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
ABORT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
BACKUPSHUTDOWN (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
BACKUPSHUTDOWN (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
BACKUPSHUTDOWN (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
BACKUPSHUTDOWN (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
BACKUPSHUTDOWN (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
BACKUPSHUTDOWN (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
BACKUPSHUTDOWN (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
BACKUPSHUTDOWN (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\3bd8bf.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\3bd8bf.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\46B9183E65C37DD329D1000B11DA13ED
|
56FE97613F5584249BE1B6B31E6AC9FD
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14
|
56FE97613F5584249BE1B6B31E6AC9FD
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C069AA2AC3DFD6A3DBF641390311FA3B
|
56FE97613F5584249BE1B6B31E6AC9FD
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F3027E2A2C06E7D3A864BDD383A1C26E
|
56FE97613F5584249BE1B6B31E6AC9FD
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA
|
56FE97613F5584249BE1B6B31E6AC9FD
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D2CEC367661A6084E955D760679C2B2C
|
56FE97613F5584249BE1B6B31E6AC9FD
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9512E90A57FAE634AAD4526B0B1AD106
|
56FE97613F5584249BE1B6B31E6AC9FD
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8F139CF91DE936230A1FA8ED33D0E0EC
|
56FE97613F5584249BE1B6B31E6AC9FD
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\97FC00201A9B4EB359A592AFD9B4A1C5
|
56FE97613F5584249BE1B6B31E6AC9FD
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\vcamp140.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2085E0429CDB18632976C73AF592EEFB
|
56FE97613F5584249BE1B6B31E6AC9FD
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC
|
56FE97613F5584249BE1B6B31E6AC9FD
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1F6CD69CA4980E338A1CE3E93749AF82
|
56FE97613F5584249BE1B6B31E6AC9FD
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB48ECA76FF4B153EA191E89DD8B25EE
|
56FE97613F5584249BE1B6B31E6AC9FD
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F2D616F7941B2083EBC4F079B192B3C6
|
56FE97613F5584249BE1B6B31E6AC9FD
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\56FE97613F5584249BE1B6B31E6AC9FD
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\56FE97613F5584249BE1B6B31E6AC9FD
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\56FE97613F5584249BE1B6B31E6AC9FD
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\56FE97613F5584249BE1B6B31E6AC9FD
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\56FE97613F5584249BE1B6B31E6AC9FD
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\56FE97613F5584249BE1B6B31E6AC9FD
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\56FE97613F5584249BE1B6B31E6AC9FD
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\56FE97613F5584249BE1B6B31E6AC9FD
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\56FE97613F5584249BE1B6B31E6AC9FD
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\56FE97613F5584249BE1B6B31E6AC9FD
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14\56FE97613F5584249BE1B6B31E6AC9FD
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14\56FE97613F5584249BE1B6B31E6AC9FD
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14\56FE97613F5584249BE1B6B31E6AC9FD
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14\56FE97613F5584249BE1B6B31E6AC9FD
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14\56FE97613F5584249BE1B6B31E6AC9FD
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14\56FE97613F5584249BE1B6B31E6AC9FD
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14\56FE97613F5584249BE1B6B31E6AC9FD
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14\56FE97613F5584249BE1B6B31E6AC9FD
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14\56FE97613F5584249BE1B6B31E6AC9FD
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14\56FE97613F5584249BE1B6B31E6AC9FD
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C069AA2AC3DFD6A3DBF641390311FA3B\56FE97613F5584249BE1B6B31E6AC9FD
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F3027E2A2C06E7D3A864BDD383A1C26E\56FE97613F5584249BE1B6B31E6AC9FD
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA\56FE97613F5584249BE1B6B31E6AC9FD
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA\56FE97613F5584249BE1B6B31E6AC9FD
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA\56FE97613F5584249BE1B6B31E6AC9FD
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA\56FE97613F5584249BE1B6B31E6AC9FD
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA\56FE97613F5584249BE1B6B31E6AC9FD
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA\56FE97613F5584249BE1B6B31E6AC9FD
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA\56FE97613F5584249BE1B6B31E6AC9FD
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA\56FE97613F5584249BE1B6B31E6AC9FD
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA\56FE97613F5584249BE1B6B31E6AC9FD
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA\56FE97613F5584249BE1B6B31E6AC9FD
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D2CEC367661A6084E955D760679C2B2C\56FE97613F5584249BE1B6B31E6AC9FD
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9512E90A57FAE634AAD4526B0B1AD106\56FE97613F5584249BE1B6B31E6AC9FD
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8F139CF91DE936230A1FA8ED33D0E0EC\56FE97613F5584249BE1B6B31E6AC9FD
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\97FC00201A9B4EB359A592AFD9B4A1C5\56FE97613F5584249BE1B6B31E6AC9FD
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v14
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v14
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v14
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\14.0\VC\Runtimes\X86
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\14.0\VC\Runtimes\X86
|
Installed
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\14.0\VC\Runtimes\X86
|
Major
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\14.0\VC\Runtimes\X86
|
Minor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\14.0\VC\Runtimes\X86
|
Bld
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\14.0\VC\Runtimes\X86
|
Rbld
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
SystemComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
SystemComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\60DB5E5629367203C8625813703DFCA1
|
56FE97613F5584249BE1B6B31E6AC9FD
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1679EF65-55F3-4248-B91E-6B3BE1A69CDF}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\56FE97613F5584249BE1B6B31E6AC9FD
|
VC_Runtime_Minimum
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\Features
|
VC_Runtime_Minimum
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\56FE97613F5584249BE1B6B31E6AC9FD
|
Provider
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\Features
|
Provider
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\56FE97613F5584249BE1B6B31E6AC9FD
|
Servicing_Key
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\Features
|
Servicing_Key
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\56FE97613F5584249BE1B6B31E6AC9FD\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\60DB5E5629367203C8625813703DFCA1
|
56FE97613F5584249BE1B6B31E6AC9FD
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\56FE97613F5584249BE1B6B31E6AC9FD\SourceList
|
LastUsedSource
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\3bd8c4.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\3bd8c4.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\46B9183E65C37DD329D1000B11DA13ED
|
4588AEA179573DC449F8D83E469DE470
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D
|
4588AEA179573DC449F8D83E469DE470
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6
|
4588AEA179573DC449F8D83E469DE470
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9
|
4588AEA179573DC449F8D83E469DE470
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AF6D649BB945143DAD2D436C434C20F
|
4588AEA179573DC449F8D83E469DE470
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc140chs.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\841B335EA38A88737A36C0C664FCC63C
|
4588AEA179573DC449F8D83E469DE470
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc140cht.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3A1C53B88CB3F7C33B57D6B5E272B8FF
|
4588AEA179573DC449F8D83E469DE470
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc140deu.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0B76360A9B1D0AC35A81B25B36672275
|
4588AEA179573DC449F8D83E469DE470
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc140enu.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BF427A2B66EB00A3182637A36261AA34
|
4588AEA179573DC449F8D83E469DE470
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc140esn.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BCE00C92AF70C413399B4A50F82E20B5
|
4588AEA179573DC449F8D83E469DE470
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc140fra.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7FD8D5E49CB105931B840901B2EC77A7
|
4588AEA179573DC449F8D83E469DE470
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc140ita.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\18E39E9B8AC8A5A3EA358562C997478C
|
4588AEA179573DC449F8D83E469DE470
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc140jpn.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E52BAFB9807F7F32B60B598A4DBB7A7
|
4588AEA179573DC449F8D83E469DE470
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc140kor.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\52FCE2A887EC8E939BD4BAB1A128F53C
|
4588AEA179573DC449F8D83E469DE470
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc140rus.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CF1288ED10B63B4328E2F1739AE9A4E2
|
4588AEA179573DC449F8D83E469DE470
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1F6CD69CA4980E338A1CE3E93749AF82
|
4588AEA179573DC449F8D83E469DE470
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FD022AE163B598239B970D86144E8188
|
4588AEA179573DC449F8D83E469DE470
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D119A3F71F2F0B13890895B0C76A267C
|
4588AEA179573DC449F8D83E469DE470
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\4588AEA179573DC449F8D83E469DE470
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\4588AEA179573DC449F8D83E469DE470
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\4588AEA179573DC449F8D83E469DE470
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\4588AEA179573DC449F8D83E469DE470
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\4588AEA179573DC449F8D83E469DE470
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\4588AEA179573DC449F8D83E469DE470
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\4588AEA179573DC449F8D83E469DE470
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\4588AEA179573DC449F8D83E469DE470
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\4588AEA179573DC449F8D83E469DE470
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\4588AEA179573DC449F8D83E469DE470
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\4588AEA179573DC449F8D83E469DE470
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\4588AEA179573DC449F8D83E469DE470
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\4588AEA179573DC449F8D83E469DE470
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\4588AEA179573DC449F8D83E469DE470
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\4588AEA179573DC449F8D83E469DE470
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\4588AEA179573DC449F8D83E469DE470
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\4588AEA179573DC449F8D83E469DE470
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\4588AEA179573DC449F8D83E469DE470
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\4588AEA179573DC449F8D83E469DE470
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\4588AEA179573DC449F8D83E469DE470
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\4588AEA179573DC449F8D83E469DE470
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\4588AEA179573DC449F8D83E469DE470
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\4588AEA179573DC449F8D83E469DE470
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\4588AEA179573DC449F8D83E469DE470
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\4588AEA179573DC449F8D83E469DE470
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\4588AEA179573DC449F8D83E469DE470
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\4588AEA179573DC449F8D83E469DE470
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\4588AEA179573DC449F8D83E469DE470
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\4588AEA179573DC449F8D83E469DE470
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\4588AEA179573DC449F8D83E469DE470
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AF6D649BB945143DAD2D436C434C20F\4588AEA179573DC449F8D83E469DE470
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AF6D649BB945143DAD2D436C434C20F\4588AEA179573DC449F8D83E469DE470
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AF6D649BB945143DAD2D436C434C20F\4588AEA179573DC449F8D83E469DE470
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AF6D649BB945143DAD2D436C434C20F\4588AEA179573DC449F8D83E469DE470
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AF6D649BB945143DAD2D436C434C20F\4588AEA179573DC449F8D83E469DE470
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AF6D649BB945143DAD2D436C434C20F\4588AEA179573DC449F8D83E469DE470
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AF6D649BB945143DAD2D436C434C20F\4588AEA179573DC449F8D83E469DE470
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AF6D649BB945143DAD2D436C434C20F\4588AEA179573DC449F8D83E469DE470
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AF6D649BB945143DAD2D436C434C20F\4588AEA179573DC449F8D83E469DE470
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AF6D649BB945143DAD2D436C434C20F\4588AEA179573DC449F8D83E469DE470
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v14
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v14
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v14
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
SystemComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
SystemComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\15E8B87C56C0E773581D82F286F95E50
|
4588AEA179573DC449F8D83E469DE470
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1AEA8854-7597-4CD3-948F-8DE364D94E07}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\4588AEA179573DC449F8D83E469DE470
|
VC_Runtime_Additional
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\Features
|
VC_Runtime_Additional
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\4588AEA179573DC449F8D83E469DE470
|
Provider
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\Features
|
Provider
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\4588AEA179573DC449F8D83E469DE470
|
Servicing_Key
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\Features
|
Servicing_Key
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4588AEA179573DC449F8D83E469DE470\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\15E8B87C56C0E773581D82F286F95E50
|
4588AEA179573DC449F8D83E469DE470
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\4588AEA179573DC449F8D83E469DE470\SourceList
|
LastUsedSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\vcruntime140.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\msvcp140.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\msvcp140_1.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\msvcp140_2.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\msvcp140_atomic_wait.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\msvcp140_codecvt_ids.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\concrt140.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\vccorlib140.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\vcomp140.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\14.0\RuntimeMinimum
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\14.0\RuntimeMinimum
|
UpdateVersion
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc140.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc140u.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfcm140.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfcm140u.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\14.0\RuntimeAdditional
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\14.0\RuntimeAdditional
|
UpdateVersion
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\26\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\26\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupapiLogStatus
|
setupapi.dev.log
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
GlobalAssocChangedCounter
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\26\417C44EB
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\26\417C44EB
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\26\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\26\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\26\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\26\417C44EB
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\26\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\26\417C44EB
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\gwdrv
|
Owners
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup\PnpLockdownFiles\%SystemRoot%/System32/drivers/gwdrv.sys
|
Owners
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Alerts
|
OwningPublisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Alerts
|
Enabled
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Alerts
|
Isolation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Alerts
|
ChannelAccess
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Alerts
|
Type
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e1a51a95-b1b8-45bd-b370-83748b932e1a}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e1a51a95-b1b8-45bd-b370-83748b932e1a}
|
ResourceFileName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e1a51a95-b1b8-45bd-b370-83748b932e1a}
|
MessageFileName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e1a51a95-b1b8-45bd-b370-83748b932e1a}\ChannelReferences
|
Count
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e1a51a95-b1b8-45bd-b370-83748b932e1a}\ChannelReferences\0
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e1a51a95-b1b8-45bd-b370-83748b932e1a}\ChannelReferences\0
|
Id
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e1a51a95-b1b8-45bd-b370-83748b932e1a}\ChannelReferences\0
|
Flags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e1a51a95-b1b8-45bd-b370-83748b932e1a}\ChannelReferences
|
Count
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\GlassWire
|
Description
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\GlassWire\State
|
Pid
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\GlassWire\Cookie
|
GwCookie1
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\GlassWire\Cookie
|
GwCookie2
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\GlassWire\Cookie
|
GwCookie3
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\GlassWire\Cookie
|
GwCookie4
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.AAD.BrokerPlugin_cw5n1h2txyewy%5Cresources.pri\1d5acdde7226641\4b38d458
|
@{Microsoft.AAD.BrokerPlugin_1000.19041.1023.0_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.AAD.BrokerPlugin/resources/PublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.AccountsControl_cw5n1h2txyewy%5Cresources.pri\1d8c32fd52327f0\4b38d458
|
@{Microsoft.AccountsControl_10.0.19041.1023_neutral__cw5n1h2txyewy?ms-resource://Microsoft.AccountsControl/Resources/PublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.AsyncTextService_8wekyb3d8bbwe%5Cresources.pri\1d8c32ff4d71c2f\4b38d458
|
@{Microsoft.AsyncTextService_10.0.19041.1023_neutral__8wekyb3d8bbwe?ms-resource://Microsoft.AsyncTextService/Resources/PublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.BioEnrollment_cw5n1h2txyewy%5Cresources.pri\1d8c330753d842\4b38d458
|
@{Microsoft.BioEnrollment_10.0.19041.1023_neutral__cw5n1h2txyewy?ms-resource://Microsoft.BioEnrollment/Resources/PublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5Cmicrosoft.creddialoghost_cw5n1h2txyewy%5Cresources.pri\1d5acddee21b7ec\4b38d458
|
@{Microsoft.CredDialogHost_10.0.19041.1023_neutral__cw5n1h2txyewy?ms-resource://Microsoft.CredDialogHost/Resources/PublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\26\417C44EB
|
@%systemroot%\system32\FirewallControlPanel.dll,-12122
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.ECApp_8wekyb3d8bbwe%5Cresources.pri\1d8c32fe87ffd7b\4b38d458
|
@{Microsoft.ECApp_10.0.19041.1023_neutral__8wekyb3d8bbwe?ms-resource://Microsoft.ECApp/Resources/PublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.LockApp_cw5n1h2txyewy%5Cresources.pri\1d8c32ff076865c\4b38d458
|
@{Microsoft.LockApp_10.0.19041.1023_neutral__cw5n1h2txyewy?ms-resource://Microsoft.LockApp/resources/PublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe%5Cresources.pri\1d5acddd8370c4b\4b38d458
|
@{Microsoft.MicrosoftEdgeDevToolsClient_1000.19041.1023.0_neutral_neutral_8wekyb3d8bbwe?ms-resource://Microsoft.MicrosoftEdgeDevToolsClient/resources/PublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Win32WebViewHost_cw5n1h2txyewy%5Cresources.pri\1d5acdef0fedca\4b38d458
|
@{Microsoft.Win32WebViewHost_10.0.19041.1023_neutral_neutral_cw5n1h2txyewy?ms-resource://Windows.Win32WebViewHost/resources/PublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.AppRep.ChxApp_cw5n1h2txyewy%5Cresources.pri\1d5acddee1afafc\4b38d458
|
@{Microsoft.Windows.Apprep.ChxApp_1000.19041.1023.0_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.Apprep.ChxApp/resources/PublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.AssignedAccessLockApp_cw5n1h2txyewy%5Cresources.pri\1d8c330155cee50\4b38d458
|
@{Microsoft.Windows.AssignedAccessLockApp_1000.19041.1023.0_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.AssignedAccessLockApp/Resources/PublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.CallingShellApp_cw5n1h2txyewy%5Cresources.pri\1d8c32fd2531136\4b38d458
|
@{Microsoft.Windows.CallingShellApp_1000.19041.1023.0_neutral_neutral_cw5n1h2txyewy?ms-resource://WindowsInternal.Shell.Experiences.Calling/resources/PublisherDisplayName}
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\GlassWire\State
|
LocalListeningPort
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.CloudExperienceHost_cw5n1h2txyewy%5Cresources.pri\1d8c32fdff34402\4b38d458
|
@{Microsoft.Windows.CloudExperienceHost_10.0.19041.1266_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.CloudExperienceHost/resources/PublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.ContentDeliveryManager_cw5n1h2txyewy%5Cresources.pri\1d5acddd82645c0\4b38d458
|
@{Microsoft.Windows.ContentDeliveryManager_10.0.19041.1023_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.ContentDeliveryManager/resources/PublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5Cmicrosoft.windows.narratorquickstart_8wekyb3d8bbwe%5Cresources.pri\1d5acdded540f4d\4b38d458
|
@{Microsoft.Windows.NarratorQuickStart_10.0.19041.1023_neutral_neutral_8wekyb3d8bbwe?ms-resource://Microsoft.Windows.NarratorQuickStart/Resources/PublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.OOBENetworkCaptivePortal_cw5n1h2txyewy%5Cresources.pri\1d5acddeb9898a7\4b38d458
|
@{Microsoft.Windows.OOBENetworkCaptivePortal_10.0.19041.1023_neutral__cw5n1h2txyewy?ms-resource://Microsoft.Windows.OOBENetworkCaptivePortal/Resources/PublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.OOBENetworkConnectionFlow_cw5n1h2txyewy%5Cresources.pri\1d5acddeb9b0f78\4b38d458
|
@{Microsoft.Windows.OOBENetworkConnectionFlow_10.0.19041.1023_neutral__cw5n1h2txyewy?ms-resource://Microsoft.Windows.OOBENetworkConnectionFlow/Resources/PublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CParentalControls_cw5n1h2txyewy%5Cresources.pri\1d8c32fd30d0ae0\4b38d458
|
@{Microsoft.Windows.ParentalControls_1000.19041.1023.0_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.ParentalControls/resources/PublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.PeopleExperienceHost_cw5n1h2txyewy%5Cresources.pri\1d8c32fe6e84da4\4b38d458
|
@{Microsoft.Windows.PeopleExperienceHost_10.0.19041.1023_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.PeopleExperienceHost/resources/PublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy%5Cresources.pri\1d5ad0d6f88fe76\4b38d458
|
@{Microsoft.Windows.SecureAssessmentBrowser_10.0.19041.1023_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.SecureAssessmentBrowser/Resources/PublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CShellExperienceHost_cw5n1h2txyewy%5Cresources.pri\1d8c3301c13f68d\4b38d458
|
@{Microsoft.Windows.ShellExperienceHost_10.0.19041.1949_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.ShellExperienceHost/resources/PublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy%5Cresources.pri\1d5acddea4e2414\4b38d458
|
@{Microsoft.Windows.StartMenuExperienceHost_10.0.19041.1023_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.XboxGameCallableUI_cw5n1h2txyewy%5Cresources.pri\1d5acdddadc1b8f\4b38d458
|
@{Microsoft.XboxGameCallableUI_1000.19041.1023.0_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.XboxGameCallableUI/resources/PublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoftWindows.Client.CBS_cw5n1h2txyewy%5Cresources.pri\1d8c3301e8968be\4b38d458
|
@{MicrosoftWindows.Client.CBS_120.2212.4180.0_x64__cw5n1h2txyewy?ms-resource://MicrosoftWindows.Client.CBS/Resources/ProductPublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CWindows.CBSPreview_cw5n1h2txyewy%5Cresources.pri\1d5acdde3e269d3\4b38d458
|
@{Windows.CBSPreview_10.0.19041.1023_neutral_neutral_cw5n1h2txyewy?ms-resource://Windows.CBSPreview/resources/PublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CImmersiveControlPanel%5Cresources.pri\1d5acde2d018dbc\4b38d458
|
@{windows.immersivecontrolpanel_10.0.2.1000_neutral_neutral_cw5n1h2txyewy?ms-resource://windows.immersivecontrolpanel/resources/PublisherDisplayName}
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CPrintDialog%5Cresources.pri\1d8c32ff3aab316\4b38d458
|
@{Windows.PrintDialog_6.2.1.0_neutral_neutral_cw5n1h2txyewy?ms-resource://Windows.PrintDialog/resources/PublisherDisplayName}
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
There are 684 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1C9D000
|
unkown
|
page execute and read and write
|
||
3010000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
4502CFC000
|
stack
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C9E94000
|
heap
|
page read and write
|
||
1AA63C79000
|
heap
|
page read and write
|
||
2A5C7DA3000
|
heap
|
page read and write
|
||
2A5C90E5000
|
trusted library allocation
|
page read and write
|
||
2A5CA010000
|
heap
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
2A5C8D49000
|
trusted library allocation
|
page read and write
|
||
662D000
|
direct allocation
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
17090693000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
48CE000
|
stack
|
page read and write
|
||
6A1F000
|
direct allocation
|
page read and write
|
||
170906BD000
|
heap
|
page read and write
|
||
6A9F3000
|
unkown
|
page execute read
|
||
2A5C977D000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
775E000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
2A5C7D81000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
1F733D60000
|
heap
|
page read and write
|
||
48B0000
|
direct allocation
|
page read and write
|
||
4B8E000
|
heap
|
page read and write
|
||
2A5C97C1000
|
heap
|
page read and write
|
||
69D71000
|
unkown
|
page execute read
|
||
655000
|
heap
|
page read and write
|
||
861000
|
unkown
|
page execute read
|
||
6F4000
|
heap
|
page read and write
|
||
848E000
|
heap
|
page read and write
|
||
5B62000
|
heap
|
page read and write
|
||
2A5C9D06000
|
heap
|
page read and write
|
||
84FD000
|
heap
|
page read and write
|
||
5690000
|
direct allocation
|
page read and write
|
||
170906BF000
|
heap
|
page read and write
|
||
6B9E1000
|
unkown
|
page readonly
|
||
1ACF000
|
unkown
|
page write copy
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
2A5C9D55000
|
heap
|
page read and write
|
||
1BC0000
|
unkown
|
page readonly
|
||
655000
|
heap
|
page read and write
|
||
215061A8000
|
heap
|
page read and write
|
||
CC0000
|
direct allocation
|
page read and write
|
||
2A5C8D3B000
|
trusted library allocation
|
page read and write
|
||
7849000
|
heap
|
page read and write
|
||
2150622D000
|
heap
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
76A8000
|
heap
|
page read and write
|
||
775C000
|
heap
|
page read and write
|
||
2A5C9D06000
|
heap
|
page read and write
|
||
2A5C8D63000
|
trusted library allocation
|
page read and write
|
||
1191000
|
heap
|
page read and write
|
||
170905A0000
|
heap
|
page read and write
|
||
170906BE000
|
heap
|
page read and write
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
17090677000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1709067D000
|
heap
|
page read and write
|
||
3810000
|
heap
|
page read and write
|
||
557A000
|
heap
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
7F46000
|
heap
|
page read and write
|
||
4A60000
|
direct allocation
|
page read and write
|
||
8422000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C8CE6000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
5803000
|
direct allocation
|
page read and write
|
||
1E88A746000
|
heap
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
17090676000
|
heap
|
page read and write
|
||
1EF000
|
unkown
|
page readonly
|
||
170906E2000
|
heap
|
page read and write
|
||
194A12FE000
|
trusted library allocation
|
page read and write
|
||
17090648000
|
heap
|
page read and write
|
||
2A5C9FEC000
|
heap
|
page read and write
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
2A5C8D1A000
|
trusted library allocation
|
page read and write
|
||
1AFBD3C8000
|
heap
|
page read and write
|
||
2E9E000
|
heap
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
215061D6000
|
heap
|
page read and write
|
||
2155D7C0000
|
heap
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
2155D812000
|
heap
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
2A5C8D4C000
|
trusted library allocation
|
page read and write
|
||
12DD000
|
heap
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
215061A6000
|
heap
|
page read and write
|
||
215061DC000
|
heap
|
page read and write
|
||
4440000
|
heap
|
page read and write
|
||
6A0CF000
|
unkown
|
page execute read
|
||
984000
|
heap
|
page read and write
|
||
2A5C90E4000
|
trusted library allocation
|
page read and write
|
||
2A5C8D12000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
2A5CA1F7000
|
heap
|
page read and write
|
||
5650000
|
direct allocation
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
840C000
|
heap
|
page read and write
|
||
2A5C8D60000
|
trusted library allocation
|
page read and write
|
||
2A5CA1E2000
|
heap
|
page read and write
|
||
2A5CA21A000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
2A424F60000
|
heap
|
page read and write
|
||
2418000
|
unkown
|
page readonly
|
||
6A21000
|
direct allocation
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
2A5CA20A000
|
heap
|
page read and write
|
||
5A80000
|
direct allocation
|
page read and write
|
||
A20000
|
unkown
|
page readonly
|
||
1E88A727000
|
heap
|
page read and write
|
||
293F000
|
stack
|
page read and write
|
||
2A5C9F36000
|
heap
|
page read and write
|
||
840D000
|
heap
|
page read and write
|
||
2150621F000
|
heap
|
page read and write
|
||
76C5000
|
heap
|
page read and write
|
||
5511000
|
heap
|
page read and write
|
||
2247000
|
unkown
|
page write copy
|
||
69D92000
|
unkown
|
page execute read
|
||
12A1000
|
heap
|
page read and write
|
||
170906BE000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
8CE000
|
unkown
|
page readonly
|
||
EFA000
|
stack
|
page read and write
|
||
1E8000
|
unkown
|
page readonly
|
||
57AE000
|
direct allocation
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
24BA000
|
unkown
|
page readonly
|
||
2A5C90DF000
|
trusted library allocation
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
847A000
|
heap
|
page read and write
|
||
2A5C8D41000
|
trusted library allocation
|
page read and write
|
||
1D501510000
|
heap
|
page read and write
|
||
6840000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
46BC000
|
heap
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
21B1000
|
unkown
|
page execute read
|
||
2155D80C000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
85FD77F000
|
stack
|
page read and write
|
||
1BFD000
|
unkown
|
page write copy
|
||
1709067C000
|
heap
|
page read and write
|
||
1F73420B000
|
heap
|
page read and write
|
||
6EE5000
|
direct allocation
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
2A5C977E000
|
heap
|
page read and write
|
||
1429000
|
unkown
|
page execute read
|
||
2A5C975F000
|
heap
|
page read and write
|
||
2A5C7DA4000
|
heap
|
page read and write
|
||
2A5C9E4B000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
6D4000
|
heap
|
page read and write
|
||
1AB54E08000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
17090693000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
3340000
|
trusted library allocation
|
page read and write
|
||
385F000
|
stack
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
6B1E000
|
direct allocation
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
4278000
|
heap
|
page read and write
|
||
8AB000
|
unkown
|
page readonly
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C9799000
|
heap
|
page read and write
|
||
B3C000
|
stack
|
page read and write
|
||
5593000
|
heap
|
page read and write
|
||
11C3000
|
heap
|
page read and write
|
||
769B000
|
heap
|
page read and write
|
||
17090685000
|
heap
|
page read and write
|
||
569B000
|
direct allocation
|
page read and write
|
||
4B96000
|
heap
|
page read and write
|
||
4A54000
|
heap
|
page read and write
|
||
2A5C9CE9000
|
heap
|
page read and write
|
||
49F4000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1BB6000
|
unkown
|
page readonly
|
||
1D5015F0000
|
heap
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
17090685000
|
heap
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
4C23000
|
heap
|
page read and write
|
||
6AFB000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
5620000
|
direct allocation
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
1709067A000
|
heap
|
page read and write
|
||
1115000
|
heap
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
5424000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
2A5C8D1D000
|
trusted library allocation
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
556C000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
170924C1000
|
trusted library allocation
|
page read and write
|
||
8420000
|
heap
|
page read and write
|
||
6A981000
|
unkown
|
page execute read
|
||
4BCA000
|
heap
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
215060A0000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
AE3000
|
unkown
|
page execute read
|
||
D3D8C7E000
|
stack
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
78F000
|
heap
|
page read and write
|
||
194A1313000
|
trusted library allocation
|
page read and write
|
||
2A5C8D15000
|
trusted library allocation
|
page read and write
|
||
54F8000
|
heap
|
page read and write
|
||
17090667000
|
heap
|
page read and write
|
||
2A5C97F6000
|
trusted library allocation
|
page read and write
|
||
21B1000
|
unkown
|
page execute read
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
46E3000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C8D15000
|
trusted library allocation
|
page read and write
|
||
7408000
|
direct allocation
|
page read and write
|
||
19AC000
|
unkown
|
page readonly
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
2A5C9CF1000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C8CE3000
|
trusted library allocation
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
2A5C8D16000
|
trusted library allocation
|
page read and write
|
||
4698000
|
heap
|
page read and write
|
||
2155D81D000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
496B000
|
direct allocation
|
page read and write
|
||
2A5C8D38000
|
trusted library allocation
|
page read and write
|
||
2A5C90DB000
|
trusted library allocation
|
page read and write
|
||
53EF000
|
heap
|
page read and write
|
||
17090678000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C9DBA000
|
heap
|
page read and write
|
||
2FFE000
|
trusted library allocation
|
page read and write
|
||
6B707000
|
unkown
|
page execute read
|
||
2150621D000
|
heap
|
page read and write
|
||
7692000
|
heap
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
2A5C97CE000
|
heap
|
page read and write
|
||
2A5C8D30000
|
trusted library allocation
|
page read and write
|
||
2A5C9E4B000
|
heap
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
12D5000
|
heap
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
8508000
|
heap
|
page read and write
|
||
170924C3000
|
trusted library allocation
|
page read and write
|
||
6B7E000
|
direct allocation
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
2E8C000
|
heap
|
page read and write
|
||
1F733D0E000
|
heap
|
page read and write
|
||
6AAD000
|
direct allocation
|
page read and write
|
||
2A5C8D3A000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
3560000
|
heap
|
page read and write
|
||
5410000
|
heap
|
page read and write
|
||
1516000
|
heap
|
page read and write
|
||
8449000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
DF1000
|
unkown
|
page execute read
|
||
2A5C9D06000
|
heap
|
page read and write
|
||
21506237000
|
heap
|
page read and write
|
||
CC0000
|
direct allocation
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
8467000
|
heap
|
page read and write
|
||
5418000
|
heap
|
page read and write
|
||
847F000
|
heap
|
page read and write
|
||
77E000
|
heap
|
page read and write
|
||
2150621D000
|
heap
|
page read and write
|
||
4F5000
|
heap
|
page read and write
|
||
2CF4000
|
heap
|
page read and write
|
||
2155D7FA000
|
heap
|
page read and write
|
||
2A5C96E2000
|
heap
|
page read and write
|
||
2155D7F5000
|
heap
|
page read and write
|
||
7792000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
3B7000
|
unkown
|
page execute and read and write
|
||
61A1000
|
heap
|
page read and write
|
||
3310000
|
unkown
|
page read and write
|
||
1AA65726000
|
heap
|
page read and write
|
||
2155D820000
|
heap
|
page read and write
|
||
2A5C9E13000
|
heap
|
page read and write
|
||
3002000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
777E000
|
heap
|
page read and write
|
||
3827000
|
trusted library allocation
|
page read and write
|
||
1AB54D00000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
5620000
|
direct allocation
|
page read and write
|
||
7824000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
3869000
|
direct allocation
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2155D806000
|
heap
|
page read and write
|
||
2A5CA038000
|
heap
|
page read and write
|
||
215061C2000
|
heap
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
215061BB000
|
heap
|
page read and write
|
||
11CF000
|
heap
|
page read and write
|
||
2FF2000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
84B1000
|
heap
|
page read and write
|
||
215061CF000
|
heap
|
page read and write
|
||
17092440000
|
heap
|
page read and write
|
||
84AB000
|
heap
|
page read and write
|
||
2A5C9E2A000
|
heap
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
17092140000
|
heap
|
page read and write
|
||
2A5C8D04000
|
trusted library allocation
|
page read and write
|
||
2A5C8D27000
|
trusted library allocation
|
page read and write
|
||
2A5C9799000
|
heap
|
page read and write
|
||
3305000
|
direct allocation
|
page read and write
|
||
170906BF000
|
heap
|
page read and write
|
||
1ACE000
|
unkown
|
page readonly
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
661000
|
heap
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
655000
|
heap
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
2CF4000
|
heap
|
page read and write
|
||
69D71000
|
unkown
|
page execute read
|
||
2A5C8CE1000
|
trusted library allocation
|
page read and write
|
||
2A5C8D33000
|
trusted library allocation
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
84F1000
|
heap
|
page read and write
|
||
2A5C9738000
|
heap
|
page read and write
|
||
194A12A0000
|
trusted library allocation
|
page read and write
|
||
2A5C8D32000
|
trusted library allocation
|
page read and write
|
||
1C9C000
|
unkown
|
page readonly
|
||
83EB000
|
heap
|
page read and write
|
||
106F000
|
stack
|
page read and write
|
||
2751000
|
heap
|
page read and write
|
||
11E8000
|
unkown
|
page execute read
|
||
17090580000
|
heap
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
8535000
|
heap
|
page read and write
|
||
A21000
|
unkown
|
page execute read
|
||
2A5C8D67000
|
trusted library allocation
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
3C7000
|
unkown
|
page execute and read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C8D13000
|
trusted library allocation
|
page read and write
|
||
1EE000
|
unkown
|
page write copy
|
||
397000
|
unkown
|
page execute and read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
8456000
|
heap
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C9E39000
|
heap
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
170906C1000
|
heap
|
page read and write
|
||
21506234000
|
heap
|
page read and write
|
||
43A000
|
unkown
|
page execute and read and write
|
||
49F0000
|
heap
|
page read and write
|
||
A20000
|
unkown
|
page readonly
|
||
6E14000
|
direct allocation
|
page read and write
|
||
2DD0000
|
heap
|
page readonly
|
||
4EFE000
|
stack
|
page read and write
|
||
553A000
|
heap
|
page read and write
|
||
757000
|
heap
|
page read and write
|
||
3D0000
|
unkown
|
page execute and read and write
|
||
170906BF000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1802000
|
unkown
|
page readonly
|
||
2155D7F3000
|
heap
|
page read and write
|
||
34B807F000
|
stack
|
page read and write
|
||
5B17000
|
heap
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
275A000
|
heap
|
page read and write
|
||
CC0000
|
direct allocation
|
page read and write
|
||
4C24000
|
heap
|
page read and write
|
||
1E80000
|
unkown
|
page execute and read and write
|
||
2A5CA031000
|
heap
|
page read and write
|
||
777F000
|
heap
|
page read and write
|
||
2A5C8D20000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1F73422A000
|
heap
|
page read and write
|
||
7688000
|
heap
|
page read and write
|
||
1189000
|
heap
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
275C000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
A21000
|
unkown
|
page execute read
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
8456000
|
heap
|
page read and write
|
||
215061DE000
|
heap
|
page read and write
|
||
6C20000
|
direct allocation
|
page read and write
|
||
1F734200000
|
heap
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C975F000
|
heap
|
page read and write
|
||
840B000
|
heap
|
page read and write
|
||
54C8000
|
heap
|
page read and write
|
||
1AA657AB000
|
heap
|
page read and write
|
||
8423000
|
heap
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
46E6000
|
heap
|
page read and write
|
||
4A60000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
90D000
|
stack
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
68AC000
|
direct allocation
|
page read and write
|
||
5590000
|
heap
|
page read and write
|
||
2B5A000
|
heap
|
page read and write
|
||
194A12B4000
|
trusted library allocation
|
page read and write
|
||
1E88A722000
|
heap
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1709067C000
|
heap
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
A20000
|
unkown
|
page readonly
|
||
AE3000
|
unkown
|
page execute read
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
30C0000
|
direct allocation
|
page read and write
|
||
17090685000
|
heap
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
1F7341F8000
|
heap
|
page read and write
|
||
8501000
|
heap
|
page read and write
|
||
1C9A000
|
unkown
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
849C000
|
heap
|
page read and write
|
||
54F6000
|
heap
|
page read and write
|
||
2A5C9E4D000
|
heap
|
page read and write
|
||
2A5C9D2F000
|
heap
|
page read and write
|
||
6B1E2000
|
unkown
|
page readonly
|
||
2FF1000
|
trusted library allocation
|
page read and write
|
||
170906BF000
|
heap
|
page read and write
|
||
2A5C9E3E000
|
heap
|
page read and write
|
||
2155D7FF000
|
heap
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
2A5C90D9000
|
trusted library allocation
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
8489000
|
heap
|
page read and write
|
||
2DD0000
|
direct allocation
|
page read and write
|
||
21506460000
|
heap
|
page read and write
|
||
38D000
|
unkown
|
page execute and read and write
|
||
2A5C8D56000
|
trusted library allocation
|
page read and write
|
||
6530000
|
direct allocation
|
page read and write
|
||
215061DC000
|
heap
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
2A5C8D1C000
|
trusted library allocation
|
page read and write
|
||
48FC000
|
stack
|
page read and write
|
||
2A5C97EB000
|
trusted library allocation
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
1F733D0A000
|
heap
|
page read and write
|
||
4A60000
|
direct allocation
|
page read and write
|
||
2A5C9DDB000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
6FB1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
1709067D000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C90E1000
|
trusted library allocation
|
page read and write
|
||
215061CC000
|
heap
|
page read and write
|
||
1BBF000
|
unkown
|
page read and write
|
||
83F5000
|
heap
|
page read and write
|
||
4D1E000
|
stack
|
page read and write
|
||
53F9000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C9EBF000
|
heap
|
page read and write
|
||
2FF8000
|
trusted library allocation
|
page read and write
|
||
2A5C97CC000
|
heap
|
page read and write
|
||
17090691000
|
heap
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
54C8000
|
heap
|
page read and write
|
||
84B1000
|
heap
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
77A7000
|
heap
|
page read and write
|
||
2A5C8CE1000
|
trusted library allocation
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
17090685000
|
heap
|
page read and write
|
||
17090675000
|
heap
|
page read and write
|
||
847F000
|
heap
|
page read and write
|
||
83E5000
|
heap
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
6AA10000
|
unkown
|
page execute read
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
2A5C9767000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
3834000
|
trusted library allocation
|
page read and write
|
||
1BB3000
|
unkown
|
page read and write
|
||
11B6000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
6A701000
|
unkown
|
page execute read
|
||
12DD000
|
heap
|
page read and write
|
||
2A424E21000
|
heap
|
page read and write
|
||
2A5C8D7D000
|
trusted library allocation
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
8430000
|
heap
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
1F73420C000
|
heap
|
page read and write
|
||
215061F6000
|
heap
|
page read and write
|
||
2A5C8D70000
|
trusted library allocation
|
page read and write
|
||
2A5CA20E000
|
heap
|
page read and write
|
||
2A5CA010000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
2A5C8D55000
|
trusted library allocation
|
page read and write
|
||
7760000
|
heap
|
page read and write
|
||
6A00000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2150621D000
|
heap
|
page read and write
|
||
1F7341F0000
|
heap
|
page read and write
|
||
6A26F000
|
unkown
|
page readonly
|
||
668587F000
|
stack
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
7692000
|
heap
|
page read and write
|
||
3DD000
|
unkown
|
page execute and read and write
|
||
30C0000
|
direct allocation
|
page read and write
|
||
2A5C8D74000
|
trusted library allocation
|
page read and write
|
||
6E9A000
|
direct allocation
|
page read and write
|
||
4B78000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
275E000
|
heap
|
page read and write
|
||
4A60000
|
direct allocation
|
page read and write
|
||
2A5C9CDA000
|
heap
|
page read and write
|
||
2155D7E0000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2FF9000
|
trusted library allocation
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
17090685000
|
heap
|
page read and write
|
||
1F733D05000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1E88A985000
|
heap
|
page read and write
|
||
84C9000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
1E1000
|
unkown
|
page execute read
|
||
1EB5000
|
unkown
|
page execute and read and write
|
||
2A5C7DB7000
|
heap
|
page read and write
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
2A424D80000
|
heap
|
page read and write
|
||
471E000
|
stack
|
page read and write
|
||
5B8A000
|
heap
|
page read and write
|
||
1F734224000
|
heap
|
page read and write
|
||
6C6F000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
7F59000
|
heap
|
page read and write
|
||
1E88A71B000
|
heap
|
page read and write
|
||
2A5C97C0000
|
heap
|
page read and write
|
||
2A5C8D4E000
|
trusted library allocation
|
page read and write
|
||
24BA000
|
unkown
|
page readonly
|
||
54C8000
|
heap
|
page read and write
|
||
1802000
|
unkown
|
page readonly
|
||
7F75000
|
heap
|
page read and write
|
||
7F59000
|
heap
|
page read and write
|
||
4B1E000
|
stack
|
page read and write
|
||
2A5C97ED000
|
trusted library allocation
|
page read and write
|
||
6AC2000
|
direct allocation
|
page read and write
|
||
7692000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
D4145E6000
|
stack
|
page read and write
|
||
1F733B60000
|
heap
|
page read and write
|
||
1E8C000
|
unkown
|
page execute and read and write
|
||
51E1000
|
heap
|
page read and write
|
||
4C1E000
|
stack
|
page read and write
|
||
5A80000
|
direct allocation
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
2A5C7DB6000
|
heap
|
page read and write
|
||
1E8000
|
unkown
|
page readonly
|
||
6D0000
|
heap
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
4820000
|
heap
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
F29000
|
heap
|
page read and write
|
||
170906BF000
|
heap
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
12D5000
|
heap
|
page read and write
|
||
6A64000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
53EF000
|
heap
|
page read and write
|
||
1E88A714000
|
heap
|
page read and write
|
||
22F5000
|
unkown
|
page readonly
|
||
6A29B000
|
unkown
|
page read and write
|
||
2753000
|
heap
|
page read and write
|
||
3420000
|
heap
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
7869000
|
heap
|
page read and write
|
||
2155D7FA000
|
heap
|
page read and write
|
||
7F48000
|
heap
|
page read and write
|
||
84F3000
|
heap
|
page read and write
|
||
29BE000
|
stack
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1BFE000
|
unkown
|
page readonly
|
||
51E1000
|
heap
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
D4148FF000
|
stack
|
page read and write
|
||
6A198000
|
unkown
|
page execute read
|
||
11E8000
|
unkown
|
page execute read
|
||
1191000
|
heap
|
page read and write
|
||
215061C1000
|
heap
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
2A5C90D4000
|
trusted library allocation
|
page read and write
|
||
21506230000
|
heap
|
page read and write
|
||
3DBBEFF000
|
stack
|
page read and write
|
||
6530000
|
direct allocation
|
page read and write
|
||
56CD000
|
direct allocation
|
page read and write
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
6A00000
|
direct allocation
|
page read and write
|
||
2155D7E3000
|
heap
|
page read and write
|
||
559D000
|
heap
|
page read and write
|
||
1BAF000
|
unkown
|
page readonly
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
1F734204000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
3833000
|
trusted library allocation
|
page read and write
|
||
1F7341FE000
|
heap
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
2A5C97ED000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
779000
|
heap
|
page read and write
|
||
7F45000
|
heap
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
2155D808000
|
heap
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
215061A9000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
12C4000
|
heap
|
page read and write
|
||
6A2000
|
heap
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
2A5C9DDE000
|
heap
|
page read and write
|
||
2A5C9CF0000
|
heap
|
page read and write
|
||
2A5C9E4B000
|
heap
|
page read and write
|
||
31D0000
|
direct allocation
|
page read and write
|
||
215061A2000
|
heap
|
page read and write
|
||
A21000
|
unkown
|
page execute read
|
||
118F000
|
heap
|
page read and write
|
||
2A5C9E50000
|
heap
|
page read and write
|
||
7807000
|
heap
|
page read and write
|
||
2A5C90EA000
|
trusted library allocation
|
page read and write
|
||
2E4F000
|
stack
|
page read and write
|
||
17090691000
|
heap
|
page read and write
|
||
2A5C9F3B000
|
heap
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
1E80000
|
unkown
|
page execute and read and write
|
||
215061CC000
|
heap
|
page read and write
|
||
1F733BD9000
|
heap
|
page read and write
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
3832000
|
trusted library allocation
|
page read and write
|
||
11B9000
|
heap
|
page read and write
|
||
8530000
|
heap
|
page read and write
|
||
2A5C8D35000
|
trusted library allocation
|
page read and write
|
||
2A5C9749000
|
heap
|
page read and write
|
||
6A26F000
|
unkown
|
page readonly
|
||
2155D6D0000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
69E000
|
heap
|
page read and write
|
||
2A5C9FA5000
|
heap
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
2A5C8D1F000
|
trusted library allocation
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
58A5000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
215061A6000
|
heap
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
194A12DC000
|
trusted library allocation
|
page read and write
|
||
1C9C000
|
unkown
|
page readonly
|
||
779C000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
1BB6000
|
unkown
|
page readonly
|
||
48AF000
|
stack
|
page read and write
|
||
65C0000
|
heap
|
page read and write
|
||
4A50000
|
heap
|
page read and write
|
||
2A5C7D9B000
|
heap
|
page read and write
|
||
6E4E000
|
direct allocation
|
page read and write
|
||
2A5C9CF1000
|
heap
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
6B49A000
|
unkown
|
page execute and read and write
|
||
17091FB0000
|
heap
|
page read and write
|
||
3340000
|
trusted library allocation
|
page read and write
|
||
2A5C9D7B000
|
heap
|
page read and write
|
||
30C0000
|
direct allocation
|
page read and write
|
||
1F73421A000
|
heap
|
page read and write
|
||
232E000
|
unkown
|
page readonly
|
||
4962000
|
heap
|
page read and write
|
||
B1C000
|
unkown
|
page execute read
|
||
7787000
|
heap
|
page read and write
|
||
F41000
|
heap
|
page read and write
|
||
215061E1000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
2A5C8CE3000
|
trusted library allocation
|
page read and write
|
||
3823000
|
trusted library allocation
|
page read and write
|
||
1E88A720000
|
heap
|
page read and write
|
||
777E000
|
heap
|
page read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
8417000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
69D70000
|
unkown
|
page readonly
|
||
2752000
|
heap
|
page read and write
|
||
17090693000
|
heap
|
page read and write
|
||
2150621F000
|
heap
|
page read and write
|
||
1E88A70B000
|
heap
|
page read and write
|
||
30D1000
|
heap
|
page read and write
|
||
5690000
|
direct allocation
|
page read and write
|
||
2A5CA1A0000
|
heap
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
11C8000
|
heap
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
2E00000
|
direct allocation
|
page read and write
|
||
6BEF000
|
direct allocation
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C8D37000
|
trusted library allocation
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
21506240000
|
heap
|
page read and write
|
||
6A2AA000
|
unkown
|
page readonly
|
||
33B0000
|
heap
|
page read and write
|
||
232D000
|
unkown
|
page write copy
|
||
170906D1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C8CDF000
|
trusted library allocation
|
page read and write
|
||
46E4000
|
heap
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
1174000
|
heap
|
page read and write
|
||
194A13C0000
|
trusted library allocation
|
page read and write
|
||
2155D7F3000
|
heap
|
page read and write
|
||
215061E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
215061B5000
|
heap
|
page read and write
|
||
2FF3000
|
trusted library allocation
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2757000
|
heap
|
page read and write
|
||
2A5C97A9000
|
heap
|
page read and write
|
||
17090691000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
30C0000
|
direct allocation
|
page read and write
|
||
76F6000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
6DA7000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C7D90000
|
heap
|
page read and write
|
||
2A5C9E29000
|
heap
|
page read and write
|
||
2155D7F9000
|
heap
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
4B65000
|
heap
|
page read and write
|
||
2753000
|
heap
|
page read and write
|
||
1E5000
|
unkown
|
page readonly
|
||
83FA000
|
heap
|
page read and write
|
||
190A000
|
unkown
|
page readonly
|
||
2A5C9ED1000
|
heap
|
page read and write
|
||
46AD000
|
heap
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
275D000
|
heap
|
page read and write
|
||
2A5C9FEC000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
2A5CA258000
|
heap
|
page read and write
|
||
17090685000
|
heap
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
2A5C97DC000
|
trusted library allocation
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
8529000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2758000
|
heap
|
page read and write
|
||
6979000
|
direct allocation
|
page read and write
|
||
2752000
|
heap
|
page read and write
|
||
1BC0000
|
unkown
|
page readonly
|
||
7787000
|
heap
|
page read and write
|
||
2A5C9D9B000
|
heap
|
page read and write
|
||
17090693000
|
heap
|
page read and write
|
||
53E1000
|
heap
|
page read and write
|
||
2155D7FB000
|
heap
|
page read and write
|
||
9FF000
|
stack
|
page read and write
|
||
517F000
|
stack
|
page read and write
|
||
A63000
|
heap
|
page read and write
|
||
387000
|
unkown
|
page execute and read and write
|
||
8429000
|
heap
|
page read and write
|
||
6A1BF000
|
unkown
|
page execute read
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
2755000
|
heap
|
page read and write
|
||
DF1000
|
unkown
|
page execute read
|
||
2A5C9E4F000
|
heap
|
page read and write
|
||
6800000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
2A5CA206000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
7787000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
4F3E000
|
stack
|
page read and write
|
||
2A5C9FC4000
|
heap
|
page read and write
|
||
53EC000
|
heap
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
2155D808000
|
heap
|
page read and write
|
||
5590000
|
heap
|
page read and write
|
||
2A5C97CA000
|
heap
|
page read and write
|
||
2DD0000
|
direct allocation
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
2A5C8D3C000
|
trusted library allocation
|
page read and write
|
||
2757000
|
heap
|
page read and write
|
||
4DE000
|
stack
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
2A5C7D8A000
|
heap
|
page read and write
|
||
83E0000
|
heap
|
page read and write
|
||
2A5C7D9B000
|
heap
|
page read and write
|
||
3654000
|
direct allocation
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
17090691000
|
heap
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
844F000
|
heap
|
page read and write
|
||
2A5C8D28000
|
trusted library allocation
|
page read and write
|
||
2155D824000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1F733B80000
|
heap
|
page read and write
|
||
17090679000
|
heap
|
page read and write
|
||
6AD8000
|
direct allocation
|
page read and write
|
||
194A1332000
|
trusted library allocation
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
661000
|
heap
|
page read and write
|
||
5F8000
|
heap
|
page read and write
|
||
6C68000
|
direct allocation
|
page read and write
|
||
2A5C97C1000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
2A5C9CFC000
|
heap
|
page read and write
|
||
2A5C90DE000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
53BE000
|
stack
|
page read and write
|
||
2A5C96E5000
|
heap
|
page read and write
|
||
2A5C9D68000
|
heap
|
page read and write
|
||
17090676000
|
heap
|
page read and write
|
||
679E000
|
direct allocation
|
page read and write
|
||
6B1E4000
|
unkown
|
page read and write
|
||
1802000
|
unkown
|
page readonly
|
||
2A5C97D7000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1ACE000
|
unkown
|
page readonly
|
||
69DEF000
|
unkown
|
page execute read
|
||
2155D80C000
|
heap
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
215061D9000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
2A5C90E7000
|
trusted library allocation
|
page read and write
|
||
8515000
|
heap
|
page read and write
|
||
84B1000
|
heap
|
page read and write
|
||
1C98000
|
unkown
|
page readonly
|
||
769B000
|
heap
|
page read and write
|
||
58ED000
|
direct allocation
|
page read and write
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
583A000
|
direct allocation
|
page read and write
|
||
2A5C8D62000
|
trusted library allocation
|
page read and write
|
||
170906BF000
|
heap
|
page read and write
|
||
2A5C7D69000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
17092110000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A424E23000
|
heap
|
page read and write
|
||
1C9C000
|
unkown
|
page readonly
|
||
1F734201000
|
heap
|
page read and write
|
||
1802000
|
unkown
|
page readonly
|
||
17090685000
|
heap
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
194A127E000
|
trusted library allocation
|
page read and write
|
||
2E00000
|
direct allocation
|
page read and write
|
||
170906BF000
|
heap
|
page read and write
|
||
5B7D000
|
heap
|
page read and write
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
1E88A755000
|
heap
|
page read and write
|
||
1AA657B2000
|
heap
|
page read and write
|
||
7692000
|
heap
|
page read and write
|
||
1AFBD3D8000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
275D000
|
heap
|
page read and write
|
||
2A5C97AB000
|
heap
|
page read and write
|
||
775E000
|
heap
|
page read and write
|
||
17090691000
|
heap
|
page read and write
|
||
661000
|
heap
|
page read and write
|
||
2A5C9759000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
54F2000
|
heap
|
page read and write
|
||
8527000
|
heap
|
page read and write
|
||
4A0E000
|
stack
|
page read and write
|
||
215061DE000
|
heap
|
page read and write
|
||
843B000
|
heap
|
page read and write
|
||
2A5CA1E2000
|
heap
|
page read and write
|
||
1E57000
|
unkown
|
page execute and read and write
|
||
7838000
|
heap
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
2A5C8D42000
|
trusted library allocation
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
8437000
|
heap
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
2A5C975C000
|
heap
|
page read and write
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
3001000
|
trusted library allocation
|
page read and write
|
||
24BA000
|
unkown
|
page readonly
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
E3B000
|
unkown
|
page readonly
|
||
2A5C7D80000
|
heap
|
page read and write
|
||
5B25000
|
direct allocation
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
232E000
|
unkown
|
page readonly
|
||
83ED000
|
heap
|
page read and write
|
||
2A5C9CFD000
|
heap
|
page read and write
|
||
194A12B0000
|
trusted library allocation
|
page read and write
|
||
2A5C9EAE000
|
heap
|
page read and write
|
||
215061D2000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
24BA000
|
unkown
|
page readonly
|
||
11E6000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
382E000
|
trusted library allocation
|
page read and write
|
||
2155D820000
|
heap
|
page read and write
|
||
5ABF000
|
direct allocation
|
page read and write
|
||
2A5C97F7000
|
trusted library allocation
|
page read and write
|
||
12A3000
|
heap
|
page read and write
|
||
2A5C97E0000
|
trusted library allocation
|
page read and write
|
||
B3F000
|
unkown
|
page execute read
|
||
6431000
|
heap
|
page read and write
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
2A5C7D9B000
|
heap
|
page read and write
|
||
2A5C9F13000
|
heap
|
page read and write
|
||
2A5C9D18000
|
heap
|
page read and write
|
||
2A5C9CD1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
17090685000
|
heap
|
page read and write
|
||
1F734217000
|
heap
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
1E5000
|
unkown
|
page readonly
|
||
215061D2000
|
heap
|
page read and write
|
||
1C9A000
|
unkown
|
page read and write
|
||
1E86000
|
unkown
|
page execute and read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
2762000
|
heap
|
page read and write
|
||
6B252000
|
unkown
|
page readonly
|
||
2155D7F5000
|
heap
|
page read and write
|
||
3570000
|
heap
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
1191000
|
heap
|
page read and write
|
||
2A424D60000
|
heap
|
page read and write
|
||
2155D7EE000
|
heap
|
page read and write
|
||
6B45B000
|
unkown
|
page execute and read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C8CE0000
|
trusted library allocation
|
page read and write
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
2A5C9747000
|
heap
|
page read and write
|
||
17090693000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
49F4000
|
heap
|
page read and write
|
||
2A5CA206000
|
heap
|
page read and write
|
||
2A5C8D31000
|
trusted library allocation
|
page read and write
|
||
5B30000
|
heap
|
page read and write
|
||
69D70000
|
unkown
|
page readonly
|
||
2A5C9CEA000
|
heap
|
page read and write
|
||
1AA63C71000
|
heap
|
page read and write
|
||
123E000
|
stack
|
page read and write
|
||
425000
|
unkown
|
page execute and read and write
|
||
241A000
|
unkown
|
page write copy
|
||
170906D1000
|
heap
|
page read and write
|
||
2A5C97B7000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
1E88A727000
|
heap
|
page read and write
|
||
46EA000
|
heap
|
page read and write
|
||
551A000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
7840000
|
heap
|
page read and write
|
||
2A5C97E8000
|
trusted library allocation
|
page read and write
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
4BC8000
|
heap
|
page read and write
|
||
2A5C8CE6000
|
trusted library allocation
|
page read and write
|
||
6530000
|
direct allocation
|
page read and write
|
||
85FD6FF000
|
stack
|
page read and write
|
||
2A5C7D9D000
|
heap
|
page read and write
|
||
83DB000
|
heap
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
1F7341F7000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
15A6000
|
heap
|
page read and write
|
||
7F49000
|
heap
|
page read and write
|
||
2A5C9D66000
|
heap
|
page read and write
|
||
2A5C97D2000
|
trusted library allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
2A5C90E3000
|
trusted library allocation
|
page read and write
|
||
6AE05000
|
unkown
|
page execute read
|
||
61A1000
|
heap
|
page read and write
|
||
2A5C7DAE000
|
heap
|
page read and write
|
||
D2E000
|
unkown
|
page execute read
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
8489000
|
heap
|
page read and write
|
||
3821000
|
trusted library allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
767000
|
heap
|
page read and write
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
5A80000
|
direct allocation
|
page read and write
|
||
2A5C8D40000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
215061E1000
|
heap
|
page read and write
|
||
1296000
|
heap
|
page read and write
|
||
17090685000
|
heap
|
page read and write
|
||
2758000
|
heap
|
page read and write
|
||
1E88A71F000
|
heap
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
77A7000
|
heap
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
2155D7FF000
|
heap
|
page read and write
|
||
2A5C9CD6000
|
heap
|
page read and write
|
||
275E000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C90D7000
|
trusted library allocation
|
page read and write
|
||
2155D7E3000
|
heap
|
page read and write
|
||
1BFF000
|
unkown
|
page readonly
|
||
2A5C8CE2000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
777E000
|
heap
|
page read and write
|
||
425000
|
unkown
|
page read and write
|
||
8423000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
566D000
|
direct allocation
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
5B1000
|
unkown
|
page execute read
|
||
48E0000
|
heap
|
page readonly
|
||
1090000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
846A000
|
heap
|
page read and write
|
||
29DA000
|
stack
|
page read and write
|
||
1F734200000
|
heap
|
page read and write
|
||
6530000
|
direct allocation
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
1E8A000
|
unkown
|
page execute and read and write
|
||
2A5C97CA000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
215061D6000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
52BE000
|
stack
|
page read and write
|
||
2A5C9DE2000
|
heap
|
page read and write
|
||
2A5C9D3D000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
6B01A000
|
unkown
|
page execute read
|
||
6B059000
|
unkown
|
page execute read
|
||
17092240000
|
heap
|
page read and write
|
||
56AF000
|
stack
|
page read and write
|
||
5422000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
4B65000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2E00000
|
direct allocation
|
page read and write
|
||
8449000
|
heap
|
page read and write
|
||
D3D8F7B000
|
stack
|
page read and write
|
||
2A5C9D2E000
|
heap
|
page read and write
|
||
215061D6000
|
heap
|
page read and write
|
||
8449000
|
heap
|
page read and write
|
||
2A5C8CE5000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
1F733D65000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
6A1D000
|
direct allocation
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
194A12DF000
|
trusted library allocation
|
page read and write
|
||
31D0000
|
direct allocation
|
page read and write
|
||
780D000
|
heap
|
page read and write
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
1E88A75C000
|
heap
|
page read and write
|
||
2A5C7D9D000
|
heap
|
page read and write
|
||
2A5C97EA000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
6386000
|
direct allocation
|
page read and write
|
||
2CF4000
|
heap
|
page read and write
|
||
2A5C8D78000
|
trusted library allocation
|
page read and write
|
||
121C000
|
heap
|
page read and write
|
||
65E0000
|
direct allocation
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
A21000
|
unkown
|
page execute read
|
||
5592000
|
heap
|
page read and write
|
||
5506000
|
heap
|
page read and write
|
||
7F4D000
|
heap
|
page read and write
|
||
17090691000
|
heap
|
page read and write
|
||
1AA65710000
|
heap
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
6A198000
|
unkown
|
page execute read
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C8D39000
|
trusted library allocation
|
page read and write
|
||
215061DE000
|
heap
|
page read and write
|
||
5A80000
|
direct allocation
|
page read and write
|
||
76A1000
|
heap
|
page read and write
|
||
7687000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
11FC000
|
heap
|
page read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
17090691000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
8449000
|
heap
|
page read and write
|
||
2150000
|
heap
|
page read and write
|
||
2A5C8D30000
|
trusted library allocation
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
49F4000
|
heap
|
page read and write
|
||
787000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
215061DC000
|
heap
|
page read and write
|
||
6A00000
|
direct allocation
|
page read and write
|
||
2755000
|
heap
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
2247000
|
unkown
|
page write copy
|
||
7F41000
|
heap
|
page read and write
|
||
30C0000
|
direct allocation
|
page read and write
|
||
2155D828000
|
heap
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
215061C4000
|
heap
|
page read and write
|
||
74A3000
|
heap
|
page read and write
|
||
2A5C9DE2000
|
heap
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
3826000
|
trusted library allocation
|
page read and write
|
||
2759000
|
heap
|
page read and write
|
||
6A03E000
|
unkown
|
page execute read
|
||
2A5C8D7E000
|
trusted library allocation
|
page read and write
|
||
2A5C9D3C000
|
heap
|
page read and write
|
||
1ACF000
|
unkown
|
page write copy
|
||
2A5C97C5000
|
heap
|
page read and write
|
||
655000
|
heap
|
page read and write
|
||
1EB000
|
unkown
|
page readonly
|
||
15A9000
|
heap
|
page read and write
|
||
2A5C97B7000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
1285000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
465000
|
unkown
|
page readonly
|
||
5B3B000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C977D000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C8D19000
|
trusted library allocation
|
page read and write
|
||
5536000
|
heap
|
page read and write
|
||
83F6000
|
heap
|
page read and write
|
||
4A54000
|
heap
|
page read and write
|
||
83DE000
|
heap
|
page read and write
|
||
1802000
|
unkown
|
page readonly
|
||
681E000
|
stack
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
5D8000
|
unkown
|
page execute read
|
||
2A5C8CE7000
|
trusted library allocation
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
770D000
|
heap
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
2A5CA21A000
|
heap
|
page read and write
|
||
1C9C000
|
unkown
|
page readonly
|
||
7810000
|
heap
|
page read and write
|
||
2A5C97CE000
|
heap
|
page read and write
|
||
215061D9000
|
heap
|
page read and write
|
||
7520000
|
heap
|
page read and write
|
||
2A5C8D18000
|
trusted library allocation
|
page read and write
|
||
1E88A710000
|
heap
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
2A5C9DB5000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
194A12C6000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
49F4000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
A21000
|
unkown
|
page execute read
|
||
6B44F000
|
unkown
|
page execute and read and write
|
||
28DB000
|
stack
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
461F000
|
stack
|
page read and write
|
||
1E38000
|
unkown
|
page execute and read and write
|
||
584E000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C9EC9000
|
heap
|
page read and write
|
||
2757000
|
heap
|
page read and write
|
||
7CD000
|
stack
|
page read and write
|
||
2A5C9FEC000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2751000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
170924DC000
|
trusted library allocation
|
page read and write
|
||
1F734212000
|
heap
|
page read and write
|
||
2A5C978C000
|
heap
|
page read and write
|
||
56A8000
|
direct allocation
|
page read and write
|
||
7F47000
|
heap
|
page read and write
|
||
2A5C8D35000
|
trusted library allocation
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
5A80000
|
direct allocation
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
84AB000
|
heap
|
page read and write
|
||
1E8C000
|
unkown
|
page execute and read and write
|
||
51E1000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1178000
|
heap
|
page read and write
|
||
7F75000
|
heap
|
page read and write
|
||
215061DC000
|
heap
|
page read and write
|
||
5B0000
|
unkown
|
page readonly
|
||
17090693000
|
heap
|
page read and write
|
||
2A5C9D2E000
|
heap
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
2A5C8D71000
|
trusted library allocation
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
31D0000
|
direct allocation
|
page read and write
|
||
97A000
|
heap
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
3DBBF7E000
|
stack
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
2A5C8D69000
|
trusted library allocation
|
page read and write
|
||
21506231000
|
heap
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
848E000
|
heap
|
page read and write
|
||
215061F6000
|
heap
|
page read and write
|
||
1F733BD0000
|
heap
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
1E88A720000
|
heap
|
page read and write
|
||
F11000
|
unkown
|
page execute read
|
||
3570000
|
trusted library allocation
|
page read and write
|
||
6B08000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
5BE1000
|
heap
|
page read and write
|
||
4AB0000
|
heap
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
2A5C90E0000
|
trusted library allocation
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
2A5C8D3B000
|
trusted library allocation
|
page read and write
|
||
5410000
|
heap
|
page read and write
|
||
2FF4000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5CA21A000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
4950000
|
heap
|
page read and write
|
||
215061CF000
|
heap
|
page read and write
|
||
151A000
|
heap
|
page read and write
|
||
215061DC000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
6B254000
|
unkown
|
page read and write
|
||
1297000
|
heap
|
page read and write
|
||
769B000
|
heap
|
page read and write
|
||
215060C0000
|
heap
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
11F2000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C7DAE000
|
heap
|
page read and write
|
||
5B75000
|
heap
|
page read and write
|
||
7F75000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
77A0000
|
heap
|
page read and write
|
||
1E57000
|
unkown
|
page execute and read and write
|
||
170906BD000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
47CE000
|
stack
|
page read and write
|
||
215061CF000
|
heap
|
page read and write
|
||
6FC0000
|
heap
|
page read and write
|
||
31F7000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
12B1000
|
heap
|
page read and write
|
||
17090693000
|
heap
|
page read and write
|
||
1709067C000
|
heap
|
page read and write
|
||
2A5C7DA3000
|
heap
|
page read and write
|
||
1BBF000
|
unkown
|
page write copy
|
||
215061D9000
|
heap
|
page read and write
|
||
2A5C8D2A000
|
trusted library allocation
|
page read and write
|
||
7759000
|
heap
|
page read and write
|
||
2A5C8D1D000
|
trusted library allocation
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
847F000
|
heap
|
page read and write
|
||
1EBB000
|
unkown
|
page execute and read and write
|
||
19AC000
|
unkown
|
page readonly
|
||
6431000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
843D000
|
heap
|
page read and write
|
||
275E000
|
heap
|
page read and write
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
2155D7F3000
|
heap
|
page read and write
|
||
B9F000
|
unkown
|
page execute read
|
||
1E88000
|
unkown
|
page execute and read and write
|
||
382D000
|
trusted library allocation
|
page read and write
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
3340000
|
trusted library allocation
|
page read and write
|
||
E5A000
|
unkown
|
page write copy
|
||
2A5C7DA7000
|
heap
|
page read and write
|
||
F10000
|
unkown
|
page readonly
|
||
6B9000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
17090600000
|
heap
|
page read and write
|
||
A21000
|
unkown
|
page execute read
|
||
215061A9000
|
heap
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
2A5C97F2000
|
trusted library allocation
|
page read and write
|
||
2155D7FF000
|
heap
|
page read and write
|
||
17090693000
|
heap
|
page read and write
|
||
5B32000
|
heap
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
4B73000
|
heap
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
11D3000
|
heap
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
2A5C8D7B000
|
trusted library allocation
|
page read and write
|
||
4A54000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
2A5C9F84000
|
heap
|
page read and write
|
||
D3D8E7E000
|
stack
|
page read and write
|
||
2A5C97AB000
|
heap
|
page read and write
|
||
30C0000
|
direct allocation
|
page read and write
|
||
3298000
|
direct allocation
|
page read and write
|
||
2A5C8D1A000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
848E000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
194A1288000
|
trusted library allocation
|
page read and write
|
||
2A5CA00D000
|
heap
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
2A5C90E2000
|
trusted library allocation
|
page read and write
|
||
1EB5000
|
unkown
|
page execute and read and write
|
||
194A1377000
|
trusted library allocation
|
page read and write
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
6846000
|
heap
|
page read and write
|
||
6900000
|
direct allocation
|
page read and write
|
||
6543000
|
direct allocation
|
page read and write
|
||
2A5C97E7000
|
trusted library allocation
|
page read and write
|
||
4B29000
|
heap
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
1EE000
|
unkown
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
2A5C8D47000
|
trusted library allocation
|
page read and write
|
||
2756000
|
heap
|
page read and write
|
||
2A5C8D76000
|
trusted library allocation
|
page read and write
|
||
2A5C8D29000
|
trusted library allocation
|
page read and write
|
||
152E000
|
stack
|
page read and write
|
||
2A5C848B000
|
heap
|
page read and write
|
||
170928C4000
|
heap
|
page read and write
|
||
3DBBC7A000
|
stack
|
page read and write
|
||
2A5C8D72000
|
trusted library allocation
|
page read and write
|
||
12E5000
|
heap
|
page read and write
|
||
170906BF000
|
heap
|
page read and write
|
||
2A5C8D25000
|
trusted library allocation
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
693E000
|
direct allocation
|
page read and write
|
||
71C7000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
6B208000
|
unkown
|
page read and write
|
||
69E7000
|
direct allocation
|
page read and write
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
1717000
|
unkown
|
page execute read
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1AB54D80000
|
heap
|
page read and write
|
||
3D2000
|
unkown
|
page execute and read and write
|
||
31D0000
|
direct allocation
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
21506234000
|
heap
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
2A5C9767000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
661000
|
heap
|
page read and write
|
||
2A5C8D51000
|
trusted library allocation
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
3AF000
|
unkown
|
page execute and read and write
|
||
46D4000
|
heap
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
6BBD000
|
direct allocation
|
page read and write
|
||
2150621F000
|
heap
|
page read and write
|
||
6C92000
|
direct allocation
|
page read and write
|
||
2A5C8D17000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
215061F7000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
655000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
2A5C9753000
|
heap
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
12D5000
|
heap
|
page read and write
|
||
6900000
|
direct allocation
|
page read and write
|
||
2A5C8D77000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
6B067000
|
unkown
|
page readonly
|
||
51E1000
|
heap
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
5564000
|
heap
|
page read and write
|
||
574E000
|
direct allocation
|
page read and write
|
||
4A60000
|
direct allocation
|
page read and write
|
||
6B50000
|
direct allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
170924B0000
|
heap
|
page read and write
|
||
65E0000
|
direct allocation
|
page read and write
|
||
A2E000
|
heap
|
page read and write
|
||
77A0000
|
heap
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
1C98000
|
unkown
|
page readonly
|
||
6A23D000
|
unkown
|
page readonly
|
||
6A03E000
|
unkown
|
page execute read
|
||
777E000
|
heap
|
page read and write
|
||
6DB1000
|
direct allocation
|
page read and write
|
||
1BFF000
|
unkown
|
page readonly
|
||
775D000
|
heap
|
page read and write
|
||
1F733D03000
|
heap
|
page read and write
|
||
194A136F000
|
trusted library allocation
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
5515000
|
heap
|
page read and write
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
3825000
|
trusted library allocation
|
page read and write
|
||
61E000
|
unkown
|
page readonly
|
||
51E1000
|
heap
|
page read and write
|
||
3830000
|
trusted library allocation
|
page read and write
|
||
55A1000
|
heap
|
page read and write
|
||
11F2000
|
heap
|
page read and write
|
||
468E000
|
stack
|
page read and write
|
||
2A5C7D63000
|
heap
|
page read and write
|
||
84FE000
|
heap
|
page read and write
|
||
38B000
|
unkown
|
page execute and read and write
|
||
2CF4000
|
heap
|
page read and write
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
215061C2000
|
heap
|
page read and write
|
||
2A424DF0000
|
heap
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
2A5C9E3E000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
655000
|
heap
|
page read and write
|
||
170906BF000
|
heap
|
page read and write
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
2155D7F5000
|
heap
|
page read and write
|
||
72B000
|
stack
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1EF000
|
unkown
|
page readonly
|
||
7F5B000
|
heap
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
heap
|
page read and write
|
||
1AFBD3C0000
|
heap
|
page read and write
|
||
5690000
|
direct allocation
|
page read and write
|
||
2A5C9D31000
|
heap
|
page read and write
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
76AF000
|
heap
|
page read and write
|
||
B3F000
|
unkown
|
page execute read
|
||
1AFBD360000
|
heap
|
page read and write
|
||
CC0000
|
direct allocation
|
page read and write
|
||
3543000
|
heap
|
page read and write
|
||
2155D820000
|
heap
|
page read and write
|
||
4B65000
|
heap
|
page read and write
|
||
2755000
|
heap
|
page read and write
|
||
8515000
|
heap
|
page read and write
|
||
2A5C90EB000
|
trusted library allocation
|
page read and write
|
||
69D2000
|
direct allocation
|
page read and write
|
||
2A5C97B7000
|
heap
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
6FC0000
|
heap
|
page read and write
|
||
4B4A000
|
heap
|
page read and write
|
||
2A5C9E3E000
|
heap
|
page read and write
|
||
275C000
|
heap
|
page read and write
|
||
2FFA000
|
trusted library allocation
|
page read and write
|
||
4E9C000
|
stack
|
page read and write
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
2A5C7D94000
|
heap
|
page read and write
|
||
4A54000
|
heap
|
page read and write
|
||
2155D7EE000
|
heap
|
page read and write
|
||
12D6000
|
heap
|
page read and write
|
||
215061D9000
|
heap
|
page read and write
|
||
77B000
|
heap
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
2155D7E0000
|
heap
|
page read and write
|
||
2155D814000
|
heap
|
page read and write
|
||
84DD000
|
heap
|
page read and write
|
||
395000
|
unkown
|
page execute and read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
17090691000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
275E000
|
heap
|
page read and write
|
||
2A5C90D9000
|
trusted library allocation
|
page read and write
|
||
6C9E000
|
direct allocation
|
page read and write
|
||
8CA000
|
unkown
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
694F000
|
stack
|
page read and write
|
||
76AF000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2357000
|
unkown
|
page readonly
|
||
2A5C8D6D000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
2A5C8D39000
|
trusted library allocation
|
page read and write
|
||
1C9C000
|
unkown
|
page readonly
|
||
65C1000
|
heap
|
page read and write
|
||
2A5C8D58000
|
trusted library allocation
|
page read and write
|
||
22F5000
|
unkown
|
page readonly
|
||
2750000
|
heap
|
page read and write
|
||
2A424F65000
|
heap
|
page read and write
|
||
1E40000
|
unkown
|
page execute and read and write
|
||
2A5C7D9D000
|
heap
|
page read and write
|
||
4BCC000
|
heap
|
page read and write
|
||
5B85000
|
heap
|
page read and write
|
||
54FF000
|
stack
|
page read and write
|
||
2A5C90D3000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
668554F000
|
stack
|
page read and write
|
||
194A1270000
|
trusted library allocation
|
page read and write
|
||
2A5CA1E7000
|
heap
|
page read and write
|
||
46D4000
|
heap
|
page read and write
|
||
2A5C96D1000
|
heap
|
page read and write
|
||
2A5C90E4000
|
trusted library allocation
|
page read and write
|
||
2A5CA2D1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
55AC000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
5591000
|
heap
|
page read and write
|
||
2A5CA217000
|
heap
|
page read and write
|
||
4A60000
|
direct allocation
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
6A2AA000
|
unkown
|
page readonly
|
||
83C2000
|
heap
|
page read and write
|
||
170924DE000
|
trusted library allocation
|
page read and write
|
||
17090620000
|
heap
|
page read and write
|
||
848E000
|
heap
|
page read and write
|
||
17090693000
|
heap
|
page read and write
|
||
128A000
|
heap
|
page read and write
|
||
275D000
|
heap
|
page read and write
|
||
2A5C9D31000
|
heap
|
page read and write
|
||
5A80000
|
direct allocation
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1158000
|
heap
|
page read and write
|
||
215061E4000
|
heap
|
page read and write
|
||
7595000
|
direct allocation
|
page read and write
|
||
1BC0000
|
unkown
|
page readonly
|
||
11CF000
|
heap
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
77EC000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
7689000
|
heap
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
2A5C97B7000
|
heap
|
page read and write
|
||
3C5000
|
unkown
|
page execute and read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1E40000
|
unkown
|
page execute and read and write
|
||
17090679000
|
heap
|
page read and write
|
||
2A5C7DBB000
|
heap
|
page read and write
|
||
84AB000
|
heap
|
page read and write
|
||
847F000
|
heap
|
page read and write
|
||
2155D7F5000
|
heap
|
page read and write
|
||
5A80000
|
direct allocation
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
heap
|
page read and write
|
||
2A5C9DA0000
|
heap
|
page read and write
|
||
8443000
|
heap
|
page read and write
|
||
6845000
|
heap
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
2A5CA034000
|
heap
|
page read and write
|
||
6D0D000
|
direct allocation
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
A20000
|
unkown
|
page readonly
|
||
51E1000
|
heap
|
page read and write
|
||
2A5CA0E8000
|
heap
|
page read and write
|
||
2A5CA011000
|
heap
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
12ED000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
5424000
|
heap
|
page read and write
|
||
7686000
|
heap
|
page read and write
|
||
846C000
|
heap
|
page read and write
|
||
769D000
|
heap
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
170924D7000
|
trusted library allocation
|
page read and write
|
||
301E000
|
unkown
|
page readonly
|
||
76E7000
|
heap
|
page read and write
|
||
3620000
|
heap
|
page read and write
|
||
34B7DAF000
|
stack
|
page read and write
|
||
7828000
|
heap
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
2A5C977D000
|
heap
|
page read and write
|
||
6A4CF000
|
unkown
|
page execute and read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2155D806000
|
heap
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C9E1A000
|
heap
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
5690000
|
direct allocation
|
page read and write
|
||
2A5C8D4A000
|
trusted library allocation
|
page read and write
|
||
1F733D0B000
|
heap
|
page read and write
|
||
1F73422A000
|
heap
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
847A000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
4D1F000
|
stack
|
page read and write
|
||
2A5C9783000
|
heap
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
4B4B000
|
heap
|
page read and write
|
||
6A2E7000
|
unkown
|
page execute and read and write
|
||
3F6000
|
unkown
|
page execute and read and write
|
||
984000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2757000
|
heap
|
page read and write
|
||
3242000
|
direct allocation
|
page read and write
|
||
7712000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C9E95000
|
heap
|
page read and write
|
||
3540000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
6A971000
|
unkown
|
page readonly
|
||
2A424DF8000
|
heap
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
2A5C9EC5000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
8449000
|
heap
|
page read and write
|
||
1ACF000
|
unkown
|
page write copy
|
||
215061B4000
|
heap
|
page read and write
|
||
2A5C9DDB000
|
heap
|
page read and write
|
||
5A80000
|
direct allocation
|
page read and write
|
||
840D000
|
heap
|
page read and write
|
||
3340000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A424E27000
|
heap
|
page read and write
|
||
661000
|
heap
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C9CE9000
|
heap
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
6A00000
|
direct allocation
|
page read and write
|
||
66B000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
2A424E06000
|
heap
|
page read and write
|
||
2A5C97B7000
|
heap
|
page read and write
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
2FFF000
|
trusted library allocation
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
2759000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
1AFBD775000
|
heap
|
page read and write
|
||
5E9E000
|
stack
|
page read and write
|
||
21506235000
|
heap
|
page read and write
|
||
2A5C8CDC000
|
trusted library allocation
|
page read and write
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
121B000
|
heap
|
page read and write
|
||
2A5C90DA000
|
trusted library allocation
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
B3F000
|
unkown
|
page execute read
|
||
675E000
|
direct allocation
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
2A5C8CDB000
|
trusted library allocation
|
page read and write
|
||
53F4000
|
heap
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
6A88000
|
direct allocation
|
page read and write
|
||
2A5C8D61000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
1E88A71F000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
8424000
|
heap
|
page read and write
|
||
8473000
|
heap
|
page read and write
|
||
1C9A000
|
unkown
|
page write copy
|
||
6A1BF000
|
unkown
|
page execute read
|
||
17090640000
|
heap
|
page read and write
|
||
1268000
|
heap
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
61E000
|
unkown
|
page readonly
|
||
51E1000
|
heap
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
6B9000
|
heap
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
3DBBCFE000
|
stack
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
215061E1000
|
heap
|
page read and write
|
||
7798000
|
heap
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
2A5C9DDE000
|
heap
|
page read and write
|
||
1AFBD3CF000
|
heap
|
page read and write
|
||
3824000
|
trusted library allocation
|
page read and write
|
||
55AE000
|
stack
|
page read and write
|
||
85FD67A000
|
stack
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
2A5CA14A000
|
heap
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
7792000
|
heap
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
17090691000
|
heap
|
page read and write
|
||
2A5C9CFD000
|
heap
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
54EF000
|
heap
|
page read and write
|
||
6D82000
|
direct allocation
|
page read and write
|
||
2A5C8D68000
|
trusted library allocation
|
page read and write
|
||
2A5C9E4B000
|
heap
|
page read and write
|
||
2A5C9E3C000
|
heap
|
page read and write
|
||
6A2E5000
|
unkown
|
page read and write
|
||
2755000
|
heap
|
page read and write
|
||
46BC000
|
heap
|
page read and write
|
||
6A2B2000
|
unkown
|
page readonly
|
||
7762000
|
heap
|
page read and write
|
||
1E59000
|
unkown
|
page execute and read and write
|
||
6EF0000
|
direct allocation
|
page read and write
|
||
E5A000
|
unkown
|
page read and write
|
||
2A5C7DAC000
|
heap
|
page read and write
|
||
2A5C9E3B000
|
heap
|
page read and write
|
||
17090691000
|
heap
|
page read and write
|
||
2A5C9CFF000
|
heap
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
46D4000
|
heap
|
page read and write
|
||
6B256000
|
unkown
|
page readonly
|
||
2150621D000
|
heap
|
page read and write
|
||
8501000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C97E4000
|
trusted library allocation
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
7762000
|
heap
|
page read and write
|
||
4E1E000
|
stack
|
page read and write
|
||
2A5C7D96000
|
heap
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
11AD000
|
heap
|
page read and write
|
||
49F4000
|
heap
|
page read and write
|
||
689000
|
heap
|
page read and write
|
||
59C000
|
stack
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
4A54000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
2A5C8CDB000
|
trusted library allocation
|
page read and write
|
||
77A0000
|
heap
|
page read and write
|
||
4B7B000
|
heap
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
8421000
|
heap
|
page read and write
|
||
2A5C9CE0000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
4A60000
|
direct allocation
|
page read and write
|
||
5752000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C8D24000
|
trusted library allocation
|
page read and write
|
||
6B0E9000
|
unkown
|
page readonly
|
||
8CD000
|
stack
|
page read and write
|
||
2A5C97DB000
|
trusted library allocation
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
1AA657A6000
|
heap
|
page read and write
|
||
5410000
|
heap
|
page read and write
|
||
127F000
|
heap
|
page read and write
|
||
7F5A000
|
heap
|
page read and write
|
||
669E000
|
direct allocation
|
page read and write
|
||
114E000
|
stack
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
3252000
|
direct allocation
|
page read and write
|
||
1E90000
|
unkown
|
page execute and read and write
|
||
2155D7F3000
|
heap
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
1E38000
|
unkown
|
page execute and read and write
|
||
39B000
|
unkown
|
page execute and read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
194A1358000
|
trusted library allocation
|
page read and write
|
||
7710000
|
heap
|
page read and write
|
||
121E000
|
heap
|
page read and write
|
||
2759000
|
heap
|
page read and write
|
||
2A5C975F000
|
heap
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
1C98000
|
unkown
|
page readonly
|
||
215061D2000
|
heap
|
page read and write
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
3340000
|
trusted library allocation
|
page read and write
|
||
30C0000
|
direct allocation
|
page read and write
|
||
58B0000
|
direct allocation
|
page read and write
|
||
1BB3000
|
unkown
|
page read and write
|
||
55AC000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5CA20E000
|
heap
|
page read and write
|
||
768A000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
2752000
|
heap
|
page read and write
|
||
83D1000
|
heap
|
page read and write
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
DF0000
|
unkown
|
page readonly
|
||
51E1000
|
heap
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
2A5C7D80000
|
heap
|
page read and write
|
||
2A5C9DE9000
|
heap
|
page read and write
|
||
2A5CA083000
|
heap
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
655000
|
heap
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
2A5C8D4D000
|
trusted library allocation
|
page read and write
|
||
49F4000
|
heap
|
page read and write
|
||
8421000
|
heap
|
page read and write
|
||
2A5CA21A000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
361C000
|
stack
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
569E000
|
direct allocation
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
2154000
|
heap
|
page read and write
|
||
6B19C000
|
unkown
|
page readonly
|
||
170924DD000
|
trusted library allocation
|
page read and write
|
||
6CCC000
|
direct allocation
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
heap
|
page read and write
|
||
1C98000
|
unkown
|
page readonly
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
2A5CA038000
|
heap
|
page read and write
|
||
17090693000
|
heap
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
4D5B000
|
stack
|
page read and write
|
||
275D000
|
heap
|
page read and write
|
||
846A000
|
heap
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
1E88A727000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
53FE000
|
stack
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
6A23D000
|
unkown
|
page readonly
|
||
215061E4000
|
heap
|
page read and write
|
||
170924C8000
|
trusted library allocation
|
page read and write
|
||
170924DA000
|
trusted library allocation
|
page read and write
|
||
2756000
|
heap
|
page read and write
|
||
E3B000
|
unkown
|
page readonly
|
||
4960000
|
direct allocation
|
page read and write
|
||
17090693000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
2A5C8D6F000
|
trusted library allocation
|
page read and write
|
||
2A5C90DC000
|
trusted library allocation
|
page read and write
|
||
2155D7F3000
|
heap
|
page read and write
|
||
860000
|
unkown
|
page readonly
|
||
1E8A000
|
unkown
|
page execute and read and write
|
||
2C10000
|
heap
|
page read and write
|
||
1E88A722000
|
heap
|
page read and write
|
||
3C20000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
215061E4000
|
heap
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
7828000
|
heap
|
page read and write
|
||
843E000
|
heap
|
page read and write
|
||
68ED000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C9E4D000
|
heap
|
page read and write
|
||
83F5000
|
heap
|
page read and write
|
||
785E000
|
heap
|
page read and write
|
||
6B73000
|
direct allocation
|
page read and write
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
2A5CA14D000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C9EC8000
|
heap
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
843A000
|
heap
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
8AB000
|
unkown
|
page readonly
|
||
51E1000
|
heap
|
page read and write
|
||
6A2000
|
heap
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
194A12BD000
|
trusted library allocation
|
page read and write
|
||
2A5CA15E000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C9E0A000
|
heap
|
page read and write
|
||
2A5C9CD8000
|
heap
|
page read and write
|
||
7798000
|
heap
|
page read and write
|
||
215061D2000
|
heap
|
page read and write
|
||
1E88A70F000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1F73420A000
|
heap
|
page read and write
|
||
1E88A980000
|
heap
|
page read and write
|
||
777000
|
heap
|
page read and write
|
||
74E3000
|
heap
|
page read and write
|
||
4C1D000
|
heap
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
644B000
|
direct allocation
|
page read and write
|
||
5570000
|
remote allocation
|
page read and write
|
||
1E90000
|
unkown
|
page execute and read and write
|
||
8456000
|
heap
|
page read and write
|
||
215061BB000
|
heap
|
page read and write
|
||
678A000
|
direct allocation
|
page read and write
|
||
215061F6000
|
heap
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
689000
|
heap
|
page read and write
|
||
66A2000
|
direct allocation
|
page read and write
|
||
2A5C7DAE000
|
heap
|
page read and write
|
||
2A5C8D4F000
|
trusted library allocation
|
page read and write
|
||
4A60000
|
direct allocation
|
page read and write
|
||
A62000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
777000
|
heap
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
5620000
|
direct allocation
|
page read and write
|
||
8449000
|
heap
|
page read and write
|
||
6A00000
|
direct allocation
|
page read and write
|
||
1E88A600000
|
heap
|
page read and write
|
||
2A5C9738000
|
heap
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
3831000
|
trusted library allocation
|
page read and write
|
||
2A5C9FA4000
|
heap
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
2A5C9D55000
|
heap
|
page read and write
|
||
382F000
|
trusted library allocation
|
page read and write
|
||
2A5C90E8000
|
trusted library allocation
|
page read and write
|
||
2A5C7D9B000
|
heap
|
page read and write
|
||
2A5CA010000
|
heap
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
2A5C8D2B000
|
trusted library allocation
|
page read and write
|
||
8449000
|
heap
|
page read and write
|
||
17090680000
|
heap
|
page read and write
|
||
215061E4000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
43FC000
|
stack
|
page read and write
|
||
2A5C9DA6000
|
heap
|
page read and write
|
||
490C000
|
stack
|
page read and write
|
||
2A424E20000
|
heap
|
page read and write
|
||
2A5C7D9D000
|
heap
|
page read and write
|
||
6CD000
|
heap
|
page read and write
|
||
2A5C97CB000
|
heap
|
page read and write
|
||
780B000
|
heap
|
page read and write
|
||
2A5C7DAF000
|
heap
|
page read and write
|
||
7820000
|
heap
|
page read and write
|
||
170906BF000
|
heap
|
page read and write
|
||
2A5C8CE4000
|
trusted library allocation
|
page read and write
|
||
1E101A2E000
|
heap
|
page read and write
|
||
2A5C8CE7000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
69DB5000
|
unkown
|
page execute read
|
||
12E5000
|
heap
|
page read and write
|
||
2A5CA082000
|
heap
|
page read and write
|
||
2A5C9CFD000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
840C000
|
heap
|
page read and write
|
||
843E000
|
heap
|
page read and write
|
||
2FF7000
|
trusted library allocation
|
page read and write
|
||
2A5C9CDA000
|
heap
|
page read and write
|
||
57DF000
|
stack
|
page read and write
|
||
2A5C9E63000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
6D5000
|
heap
|
page read and write
|
||
12ED000
|
heap
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2155D808000
|
heap
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
17DC000
|
unkown
|
page execute read
|
||
2A5C7DAF000
|
heap
|
page read and write
|
||
275E000
|
heap
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
74CE000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
17090693000
|
heap
|
page read and write
|
||
2A5C8D2C000
|
trusted library allocation
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
5570000
|
remote allocation
|
page read and write
|
||
775E000
|
heap
|
page read and write
|
||
2A5C90E2000
|
trusted library allocation
|
page read and write
|
||
441000
|
unkown
|
page read and write
|
||
6A8000
|
heap
|
page read and write
|
||
30C0000
|
direct allocation
|
page read and write
|
||
83E7000
|
heap
|
page read and write
|
||
2FF5000
|
trusted library allocation
|
page read and write
|
||
2A5C8D23000
|
trusted library allocation
|
page read and write
|
||
850B000
|
heap
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
2A5C975F000
|
heap
|
page read and write
|
||
170924D8000
|
trusted library allocation
|
page read and write
|
||
53E6000
|
heap
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
2A5C977D000
|
heap
|
page read and write
|
||
77E000
|
heap
|
page read and write
|
||
5A47000
|
direct allocation
|
page read and write
|
||
6FB0000
|
heap
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
6C15000
|
direct allocation
|
page read and write
|
||
46D4000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
427000
|
unkown
|
page read and write
|
||
1AB54D20000
|
heap
|
page read and write
|
||
1E88A726000
|
heap
|
page read and write
|
||
17090662000
|
heap
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
1BFE000
|
unkown
|
page readonly
|
||
1AA6578E000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
4F70000
|
heap
|
page read and write
|
||
17090693000
|
heap
|
page read and write
|
||
194A138A000
|
trusted library allocation
|
page read and write
|
||
24BA000
|
unkown
|
page readonly
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
78F000
|
heap
|
page read and write
|
||
83E4000
|
heap
|
page read and write
|
||
5641000
|
direct allocation
|
page read and write
|
||
2752000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
215061CF000
|
heap
|
page read and write
|
||
1AA65713000
|
heap
|
page read and write
|
||
2755000
|
heap
|
page read and write
|
||
1AA657BE000
|
heap
|
page read and write
|
||
215061F6000
|
heap
|
page read and write
|
||
D2E000
|
unkown
|
page execute read
|
||
5A9B000
|
direct allocation
|
page read and write
|
||
170906BF000
|
heap
|
page read and write
|
||
5AF8000
|
direct allocation
|
page read and write
|
||
2A5C97B8000
|
heap
|
page read and write
|
||
2A5C90D4000
|
trusted library allocation
|
page read and write
|
||
84B1000
|
heap
|
page read and write
|
||
2155D7F5000
|
heap
|
page read and write
|
||
2A5C8D5F000
|
trusted library allocation
|
page read and write
|
||
127D000
|
heap
|
page read and write
|
||
2A5C97F0000
|
trusted library allocation
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
595C000
|
direct allocation
|
page read and write
|
||
17090691000
|
heap
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
8433000
|
heap
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
76A000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
11C7000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170906BD000
|
heap
|
page read and write
|
||
A21000
|
unkown
|
page execute read
|
||
1040000
|
heap
|
page read and write
|
||
840D000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1E88A73E000
|
heap
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
8449000
|
heap
|
page read and write
|
||
D3D8DFD000
|
stack
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
301E000
|
unkown
|
page readonly
|
||
17090693000
|
heap
|
page read and write
|
||
21506240000
|
heap
|
page read and write
|
||
77A0000
|
heap
|
page read and write
|
||
2A5C8D3F000
|
trusted library allocation
|
page read and write
|
||
1D501630000
|
heap
|
page read and write
|
||
83FA000
|
heap
|
page read and write
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
6E50000
|
heap
|
page read and write
|
||
1EBB000
|
unkown
|
page execute and read and write
|
||
BEE000
|
stack
|
page read and write
|
||
49F4000
|
heap
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
72D6000
|
direct allocation
|
page read and write
|
||
2A5C8D7C000
|
trusted library allocation
|
page read and write
|
||
770D000
|
heap
|
page read and write
|
||
156E000
|
stack
|
page read and write
|
||
5590000
|
heap
|
page read and write
|
||
83C5000
|
heap
|
page read and write
|
||
784E000
|
heap
|
page read and write
|
||
2A5CA15E000
|
heap
|
page read and write
|
||
2759000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
597E000
|
direct allocation
|
page read and write
|
||
69D92000
|
unkown
|
page execute read
|
||
4962000
|
heap
|
page read and write
|
||
5414000
|
heap
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
A21000
|
unkown
|
page execute read
|
||
2CF4000
|
heap
|
page read and write
|
||
4B9F000
|
heap
|
page read and write
|
||
8525000
|
heap
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
77BE000
|
heap
|
page read and write
|
||
A2B000
|
heap
|
page read and write
|
||
84B2000
|
heap
|
page read and write
|
||
C28000
|
heap
|
page read and write
|
||
7762000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
2155D7F6000
|
heap
|
page read and write
|
||
1F73422A000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
A20000
|
unkown
|
page readonly
|
||
1E88A727000
|
heap
|
page read and write
|
||
5C0E000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
2A5C8D2F000
|
trusted library allocation
|
page read and write
|
||
551E000
|
heap
|
page read and write
|
||
2A5C8D45000
|
trusted library allocation
|
page read and write
|
||
7822000
|
heap
|
page read and write
|
||
6B40C000
|
unkown
|
page execute and read and write
|
||
51E1000
|
heap
|
page read and write
|
||
194A1301000
|
trusted library allocation
|
page read and write
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
2A5C8CDC000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
8465000
|
heap
|
page read and write
|
||
2A5C8D2E000
|
trusted library allocation
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
2A5C8CE2000
|
trusted library allocation
|
page read and write
|
||
4C1E000
|
heap
|
page read and write
|
||
76A1000
|
heap
|
page read and write
|
||
73F139F000
|
stack
|
page read and write
|
||
2A5C9D18000
|
heap
|
page read and write
|
||
194A132A000
|
trusted library allocation
|
page read and write
|
||
6B12F000
|
unkown
|
page readonly
|
||
1ACF000
|
unkown
|
page read and write
|
||
F14000
|
heap
|
page read and write
|
||
2155D7A0000
|
heap
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
2A5C90DD000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
980000
|
heap
|
page read and write
|
||
1AA65722000
|
heap
|
page read and write
|
||
1975000
|
unkown
|
page readonly
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
2A5C90D6000
|
trusted library allocation
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
F41000
|
heap
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
2A5C9D47000
|
heap
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
2A424EF0000
|
trusted library allocation
|
page read and write
|
||
2A5C9759000
|
heap
|
page read and write
|
||
689000
|
heap
|
page read and write
|
||
2A5C9D17000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
4B6F000
|
heap
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
2A5C8D1E000
|
trusted library allocation
|
page read and write
|
||
769B000
|
heap
|
page read and write
|
||
5E57000
|
direct allocation
|
page read and write
|
||
2753000
|
heap
|
page read and write
|
||
8409000
|
heap
|
page read and write
|
||
2A5C8D14000
|
trusted library allocation
|
page read and write
|
||
17090676000
|
heap
|
page read and write
|
||
2A5C9EF0000
|
heap
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
8449000
|
heap
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
1F733D07000
|
heap
|
page read and write
|
||
1AA657B5000
|
heap
|
page read and write
|
||
2A5C9FC5000
|
heap
|
page read and write
|
||
8443000
|
heap
|
page read and write
|
||
5D8000
|
unkown
|
page execute read
|
||
51E1000
|
heap
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
8CA000
|
unkown
|
page write copy
|
||
4962000
|
heap
|
page read and write
|
||
1E7E000
|
unkown
|
page execute and read and write
|
||
2150621F000
|
heap
|
page read and write
|
||
7870000
|
heap
|
page read and write
|
||
215061A8000
|
heap
|
page read and write
|
||
2A5CA041000
|
heap
|
page read and write
|
||
434000
|
unkown
|
page read and write
|
||
2A5C8D53000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
6A2E3000
|
unkown
|
page readonly
|
||
275B000
|
heap
|
page read and write
|
||
454C000
|
stack
|
page read and write
|
||
5410000
|
heap
|
page read and write
|
||
8436000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
53E0000
|
heap
|
page read and write
|
||
2A5C9FC4000
|
heap
|
page read and write
|
||
5B85000
|
heap
|
page read and write
|
||
215061BB000
|
heap
|
page read and write
|
||
2A5C7D9D000
|
heap
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
420000
|
unkown
|
page execute and read and write
|
||
51E1000
|
heap
|
page read and write
|
||
215061E1000
|
heap
|
page read and write
|
||
2A5C8D17000
|
trusted library allocation
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
215061F6000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
1F733A80000
|
heap
|
page read and write
|
||
8526000
|
heap
|
page read and write
|
||
55A0000
|
heap
|
page read and write
|
||
6A2E000
|
direct allocation
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
83DF000
|
heap
|
page read and write
|
||
2A5C9EC6000
|
heap
|
page read and write
|
||
21505FC0000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
12A1000
|
heap
|
page read and write
|
||
558C000
|
heap
|
page read and write
|
||
1E88A700000
|
heap
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
2155D7E3000
|
heap
|
page read and write
|
||
6B7000
|
heap
|
page read and write
|
||
7735000
|
heap
|
page read and write
|
||
5A80000
|
direct allocation
|
page read and write
|
||
2A5C8D21000
|
trusted library allocation
|
page read and write
|
||
17090685000
|
heap
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
6BAA000
|
direct allocation
|
page read and write
|
||
2A5C97EF000
|
trusted library allocation
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
2A5C8D20000
|
trusted library allocation
|
page read and write
|
||
2DD0000
|
direct allocation
|
page read and write
|
||
215061D2000
|
heap
|
page read and write
|
||
499D000
|
direct allocation
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
1E88A746000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
53E1000
|
heap
|
page read and write
|
||
2A5C7DA7000
|
heap
|
page read and write
|
||
FF6000
|
heap
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
1AA63E0B000
|
heap
|
page read and write
|
||
2CF4000
|
heap
|
page read and write
|
||
8484000
|
heap
|
page read and write
|
||
2A5C9752000
|
heap
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
8430000
|
heap
|
page read and write
|
||
6A07000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
6098000
|
direct allocation
|
page read and write
|
||
2155D7F5000
|
heap
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
6A2E7000
|
unkown
|
page execute and read and write
|
||
6A4D000
|
direct allocation
|
page read and write
|
||
3480000
|
trusted library allocation
|
page read and write
|
||
2A5C9CDD000
|
heap
|
page read and write
|
||
118F000
|
heap
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
8417000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
5520000
|
heap
|
page read and write
|
||
775E000
|
heap
|
page read and write
|
||
2DD0000
|
direct allocation
|
page read and write
|
||
2A424E23000
|
heap
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
7787000
|
heap
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
17090685000
|
heap
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
direct allocation
|
page read and write
|
||
2A5C7DAC000
|
heap
|
page read and write
|
||
7692000
|
heap
|
page read and write
|
||
194A1278000
|
trusted library allocation
|
page read and write
|
||
17090685000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1717000
|
unkown
|
page execute read
|
||
51E1000
|
heap
|
page read and write
|
||
661000
|
heap
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
2A5C8D36000
|
trusted library allocation
|
page read and write
|
||
2A5CA1A1000
|
heap
|
page read and write
|
||
6C1000
|
heap
|
page read and write
|
||
194A12E2000
|
trusted library allocation
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
1BAF000
|
unkown
|
page readonly
|
||
2DE0000
|
direct allocation
|
page read and write
|
||
8522000
|
heap
|
page read and write
|
||
6ABE000
|
direct allocation
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
4920000
|
direct allocation
|
page read and write
|
||
1BC0000
|
unkown
|
page readonly
|
||
1F73422A000
|
heap
|
page read and write
|
||
2155D80C000
|
heap
|
page read and write
|
||
65E0000
|
direct allocation
|
page read and write
|
||
5521000
|
heap
|
page read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
1709067B000
|
heap
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
3820000
|
trusted library allocation
|
page read and write
|
||
6668000
|
direct allocation
|
page read and write
|
||
6A2000
|
heap
|
page read and write
|
||
382B000
|
trusted library allocation
|
page read and write
|
||
2A5C8D5C000
|
trusted library allocation
|
page read and write
|
||
215061B4000
|
heap
|
page read and write
|
||
121D000
|
heap
|
page read and write
|
||
847A000
|
heap
|
page read and write
|
||
2A5C8CDF000
|
trusted library allocation
|
page read and write
|
||
2A5C97B3000
|
heap
|
page read and write
|
||
61A000
|
unkown
|
page read and write
|
||
782D000
|
heap
|
page read and write
|
||
215061D6000
|
heap
|
page read and write
|
||
215061CF000
|
heap
|
page read and write
|
||
2A5C8D52000
|
trusted library allocation
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
8484000
|
heap
|
page read and write
|
||
31D0000
|
direct allocation
|
page read and write
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
2A5C9DE7000
|
heap
|
page read and write
|
||
6A7E000
|
direct allocation
|
page read and write
|
||
76ED000
|
heap
|
page read and write
|
||
2A5C9E75000
|
heap
|
page read and write
|
||
68AD000
|
direct allocation
|
page read and write
|
||
69DF9000
|
unkown
|
page execute read
|
||
6753000
|
direct allocation
|
page read and write
|
||
6A29B000
|
unkown
|
page read and write
|
||
2A5C8D2F000
|
trusted library allocation
|
page read and write
|
||
6E27000
|
direct allocation
|
page read and write
|
||
5D9F000
|
stack
|
page read and write
|
||
2A5C90D3000
|
trusted library allocation
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
1F733CD0000
|
heap
|
page read and write
|
||
77BB000
|
direct allocation
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
215061D9000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
2CF4000
|
heap
|
page read and write
|
||
6B257000
|
unkown
|
page execute and read and write
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2155D7F5000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
4E5F000
|
stack
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
||
54C8000
|
heap
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
6BE3000
|
direct allocation
|
page read and write
|
||
E5E000
|
unkown
|
page readonly
|
||
353C000
|
stack
|
page read and write
|
||
2155D803000
|
heap
|
page read and write
|
||
1F733BA8000
|
heap
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
6A00000
|
direct allocation
|
page read and write
|
||
7808000
|
heap
|
page read and write
|
||
170924C4000
|
trusted library allocation
|
page read and write
|
||
8476000
|
heap
|
page read and write
|
||
2A5C9ECD000
|
heap
|
page read and write
|
||
8449000
|
heap
|
page read and write
|
||
8520000
|
heap
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
37BC000
|
stack
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
A37000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
7831000
|
heap
|
page read and write
|
||
4A60000
|
direct allocation
|
page read and write
|
||
2A5C90D5000
|
trusted library allocation
|
page read and write
|
||
2A5C97FC000
|
trusted library allocation
|
page read and write
|
||
4A60000
|
direct allocation
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
18C0000
|
unkown
|
page readonly
|
||
94456FE000
|
stack
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
46DD000
|
heap
|
page read and write
|
||
2A5C90DE000
|
trusted library allocation
|
page read and write
|
||
2A5C8D1B000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5CA14B000
|
heap
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
1AB54C20000
|
heap
|
page read and write
|
||
3004000
|
trusted library allocation
|
page read and write
|
||
275B000
|
heap
|
page read and write
|
||
69E000
|
heap
|
page read and write
|
||
841D000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
527F000
|
stack
|
page read and write
|
||
2A5CA038000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
30D1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
7F75000
|
heap
|
page read and write
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
5B31000
|
heap
|
page read and write
|
||
49F4000
|
heap
|
page read and write
|
||
5520000
|
heap
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
7819000
|
heap
|
page read and write
|
||
215061E4000
|
heap
|
page read and write
|
||
17090693000
|
heap
|
page read and write
|
||
777E000
|
heap
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
4B65000
|
heap
|
page read and write
|
||
6A4FF000
|
unkown
|
page execute and read and write
|
||
25DF000
|
stack
|
page read and write
|
||
232C000
|
unkown
|
page readonly
|
||
7733000
|
heap
|
page read and write
|
||
12DD000
|
heap
|
page read and write
|
||
2A5C8D40000
|
trusted library allocation
|
page read and write
|
||
2A5C9D55000
|
heap
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2155D6F0000
|
heap
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
699000
|
heap
|
page read and write
|
||
1E7E000
|
unkown
|
page execute and read and write
|
||
1AA6576A000
|
heap
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
2A5C9E50000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C7D96000
|
heap
|
page read and write
|
||
2A5CA038000
|
heap
|
page read and write
|
||
2753000
|
heap
|
page read and write
|
||
1F73420D000
|
heap
|
page read and write
|
||
21506190000
|
heap
|
page read and write
|
||
2A5C97B7000
|
heap
|
page read and write
|
||
550D000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1D501735000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C9DB9000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
65E0000
|
direct allocation
|
page read and write
|
||
1BFD000
|
unkown
|
page write copy
|
||
7760000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
785E000
|
heap
|
page read and write
|
||
2A5C8D1B000
|
trusted library allocation
|
page read and write
|
||
1E88A727000
|
heap
|
page read and write
|
||
1E88A520000
|
heap
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
1F733BC1000
|
heap
|
page read and write
|
||
170906BD000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
4B73000
|
heap
|
page read and write
|
||
2A5C90E0000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5CA206000
|
heap
|
page read and write
|
||
215061E7000
|
heap
|
page read and write
|
||
2752000
|
heap
|
page read and write
|
||
CC0000
|
direct allocation
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
661000
|
heap
|
page read and write
|
||
1A22000
|
unkown
|
page readonly
|
||
2357000
|
unkown
|
page readonly
|
||
17090691000
|
heap
|
page read and write
|
||
83DF000
|
heap
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
2A5C9E3E000
|
heap
|
page read and write
|
||
779000
|
heap
|
page read and write
|
||
2758000
|
heap
|
page read and write
|
||
1AA6576C000
|
heap
|
page read and write
|
||
1AFBD370000
|
heap
|
page read and write
|
||
1A22000
|
unkown
|
page readonly
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
2A5C90EA000
|
trusted library allocation
|
page read and write
|
||
2CF4000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
271C000
|
stack
|
page read and write
|
||
2A5C9D3B000
|
heap
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
768000
|
heap
|
page read and write
|
||
7783000
|
heap
|
page read and write
|
||
5B1000
|
unkown
|
page execute read
|
||
31E0000
|
heap
|
page read and write
|
||
7F46000
|
heap
|
page read and write
|
||
215061E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2754000
|
heap
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
4540000
|
trusted library allocation
|
page read and write
|
||
B71000
|
unkown
|
page execute read
|
||
51E1000
|
heap
|
page read and write
|
||
6B20B000
|
unkown
|
page readonly
|
||
2A5C97DA000
|
trusted library allocation
|
page read and write
|
||
2A5C7D9D000
|
heap
|
page read and write
|
||
CC0000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C97F3000
|
trusted library allocation
|
page read and write
|
||
8489000
|
heap
|
page read and write
|
||
1F73420D000
|
heap
|
page read and write
|
||
847A000
|
heap
|
page read and write
|
||
5664000
|
direct allocation
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
665E000
|
direct allocation
|
page read and write
|
||
2A5C9CDC000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
12DD000
|
heap
|
page read and write
|
||
1AA657A2000
|
heap
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
69EC000
|
direct allocation
|
page read and write
|
||
215061CF000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C97F9000
|
trusted library allocation
|
page read and write
|
||
194A1310000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
21B1000
|
unkown
|
page execute read
|
||
170906D1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
8527000
|
heap
|
page read and write
|
||
E5E000
|
unkown
|
page readonly
|
||
78D000
|
heap
|
page read and write
|
||
2759000
|
heap
|
page read and write
|
||
215061D6000
|
heap
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
5593000
|
heap
|
page read and write
|
||
194A1285000
|
trusted library allocation
|
page read and write
|
||
21506230000
|
heap
|
page read and write
|
||
17090691000
|
heap
|
page read and write
|
||
5FB000
|
unkown
|
page readonly
|
||
4430000
|
heap
|
page read and write
|
||
215061E1000
|
heap
|
page read and write
|
||
1F73421D000
|
heap
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
8CE000
|
unkown
|
page readonly
|
||
4962000
|
heap
|
page read and write
|
||
2A5C97E9000
|
trusted library allocation
|
page read and write
|
||
2A5C97B3000
|
heap
|
page read and write
|
||
37FC000
|
stack
|
page read and write
|
||
2A5C9CFA000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170906BE000
|
heap
|
page read and write
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
2A5C8D05000
|
trusted library allocation
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
2A5C7DBB000
|
heap
|
page read and write
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
1F734218000
|
heap
|
page read and write
|
||
2A90000
|
trusted library allocation
|
page read and write
|
||
215061DE000
|
heap
|
page read and write
|
||
53F0000
|
heap
|
page read and write
|
||
4940000
|
heap
|
page read and write
|
||
215061F6000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
A18000
|
heap
|
page read and write
|
||
5519000
|
heap
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
6FBE000
|
heap
|
page read and write
|
||
2A5C9D83000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C97E2000
|
trusted library allocation
|
page read and write
|
||
24DE000
|
stack
|
page read and write
|
||
2A5C9D38000
|
heap
|
page read and write
|
||
170924D7000
|
trusted library allocation
|
page read and write
|
||
21506231000
|
heap
|
page read and write
|
||
77EA000
|
heap
|
page read and write
|
||
17090679000
|
heap
|
page read and write
|
||
7F4E000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
215061F6000
|
heap
|
page read and write
|
||
2A5C8D48000
|
trusted library allocation
|
page read and write
|
||
1AA657BB000
|
heap
|
page read and write
|
||
2A5C97B3000
|
heap
|
page read and write
|
||
275E000
|
heap
|
page read and write
|
||
194A1364000
|
trusted library allocation
|
page read and write
|
||
84BA000
|
heap
|
page read and write
|
||
2A5C97D4000
|
trusted library allocation
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
8489000
|
heap
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
F24000
|
heap
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
2155D5F0000
|
heap
|
page read and write
|
||
34B7D2D000
|
stack
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
2A5C90DC000
|
trusted library allocation
|
page read and write
|
||
12B1000
|
heap
|
page read and write
|
||
2418000
|
unkown
|
page readonly
|
||
56F8000
|
direct allocation
|
page read and write
|
||
3FC000
|
unkown
|
page execute and read and write
|
||
194A13D0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
769B000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
944577F000
|
stack
|
page read and write
|
||
194A1355000
|
trusted library allocation
|
page read and write
|
||
170928CF000
|
heap
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
2A5C7D9D000
|
heap
|
page read and write
|
||
6A30000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1F733D07000
|
heap
|
page read and write
|
||
5A6E000
|
direct allocation
|
page read and write
|
||
2A5C8D26000
|
trusted library allocation
|
page read and write
|
||
170906E2000
|
heap
|
page read and write
|
||
2A5C8D50000
|
trusted library allocation
|
page read and write
|
||
2A5C9D1E000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170906BF000
|
heap
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
2A5C97BD000
|
heap
|
page read and write
|
||
2A5C8D79000
|
trusted library allocation
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
17090691000
|
heap
|
page read and write
|
||
45FD000
|
stack
|
page read and write
|
||
2CEE000
|
stack
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
3A5000
|
unkown
|
page execute and read and write
|
||
170906BD000
|
heap
|
page read and write
|
||
2A5C8D6B000
|
trusted library allocation
|
page read and write
|
||
1F7341FC000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
8509000
|
heap
|
page read and write
|
||
6A2E3000
|
unkown
|
page readonly
|
||
32D0000
|
trusted library allocation
|
page read and write
|
||
8484000
|
heap
|
page read and write
|
||
194A12D4000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
4B65000
|
heap
|
page read and write
|
||
382C000
|
trusted library allocation
|
page read and write
|
||
215061BB000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2150623E000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
11AE000
|
heap
|
page read and write
|
||
2A5C8D16000
|
trusted library allocation
|
page read and write
|
||
350E000
|
stack
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
2A5C8D1E000
|
trusted library allocation
|
page read and write
|
||
134E000
|
stack
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
841C000
|
heap
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
2A5C7DA1000
|
heap
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
84BF000
|
heap
|
page read and write
|
||
2752000
|
heap
|
page read and write
|
||
2A5C9CD1000
|
heap
|
page read and write
|
||
34CD000
|
stack
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
215061A7000
|
heap
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
42F000
|
unkown
|
page read and write
|
||
7803000
|
heap
|
page read and write
|
||
232C000
|
unkown
|
page readonly
|
||
1E3A000
|
unkown
|
page execute and read and write
|
||
2A5C8CE5000
|
trusted library allocation
|
page read and write
|
||
77BE000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
8489000
|
heap
|
page read and write
|
||
2A5C8D65000
|
trusted library allocation
|
page read and write
|
||
170906BF000
|
heap
|
page read and write
|
||
2A5C8D73000
|
trusted library allocation
|
page read and write
|
||
2A5C7DA4000
|
heap
|
page read and write
|
||
6A2B7000
|
unkown
|
page readonly
|
||
4A60000
|
direct allocation
|
page read and write
|
||
2A5C8CE0000
|
trusted library allocation
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
1ACF000
|
unkown
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
2A5C8D64000
|
trusted library allocation
|
page read and write
|
||
2A5C8CDE000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
557D000
|
heap
|
page read and write
|
||
4C3A000
|
heap
|
page read and write
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
693000
|
heap
|
page read and write
|
||
1E88000
|
unkown
|
page execute and read and write
|
||
51E1000
|
heap
|
page read and write
|
||
84EC000
|
heap
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
83C6000
|
heap
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
2A5C8D6E000
|
trusted library allocation
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
117F000
|
heap
|
page read and write
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
2A45000
|
heap
|
page read and write
|
||
2A5C8D46000
|
trusted library allocation
|
page read and write
|
||
2A5C9D56000
|
heap
|
page read and write
|
||
2A5C97B7000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
1E88A73E000
|
heap
|
page read and write
|
||
66B000
|
heap
|
page read and write
|
||
12A1000
|
heap
|
page read and write
|
||
55A4000
|
heap
|
page read and write
|
||
2E1A000
|
heap
|
page read and write
|
||
786D000
|
heap
|
page read and write
|
||
2A5C8D5D000
|
trusted library allocation
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
trusted library allocation
|
page read and write
|
||
1D501740000
|
heap
|
page read and write
|
||
2A5C97F5000
|
trusted library allocation
|
page read and write
|
||
2A5C90EC000
|
trusted library allocation
|
page read and write
|
||
1F7341FE000
|
heap
|
page read and write
|
||
2A5C8D31000
|
trusted library allocation
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
2A5C8D11000
|
trusted library allocation
|
page read and write
|
||
2A5C9753000
|
heap
|
page read and write
|
||
3DBBE7F000
|
stack
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
2A5C7D93000
|
heap
|
page read and write
|
||
2E3D000
|
heap
|
page read and write
|
||
5AA8000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C97DD000
|
trusted library allocation
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C97E5000
|
trusted library allocation
|
page read and write
|
||
17090685000
|
heap
|
page read and write
|
||
1AFBD390000
|
heap
|
page read and write
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
6624000
|
direct allocation
|
page read and write
|
||
2A5C9DE9000
|
heap
|
page read and write
|
||
1D501730000
|
heap
|
page read and write
|
||
215061C2000
|
heap
|
page read and write
|
||
6A4CF000
|
unkown
|
page execute and read and write
|
||
2A5C8D2D000
|
trusted library allocation
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
275B000
|
heap
|
page read and write
|
||
2A5C90D8000
|
trusted library allocation
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
2A5CA20D000
|
heap
|
page read and write
|
||
21B1000
|
unkown
|
page execute read
|
||
84B2000
|
heap
|
page read and write
|
||
2A5C9CEE000
|
heap
|
page read and write
|
||
D2E000
|
unkown
|
page execute read
|
||
6A2AF000
|
unkown
|
page read and write
|
||
782D000
|
heap
|
page read and write
|
||
6A8000
|
heap
|
page read and write
|
||
2A5C8D1F000
|
trusted library allocation
|
page read and write
|
||
4B9D000
|
heap
|
page read and write
|
||
2A5C97B0000
|
heap
|
page read and write
|
||
3970000
|
trusted library allocation
|
page read and write
|
||
2A5C9E50000
|
heap
|
page read and write
|
||
F3C000
|
heap
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
215061E7000
|
heap
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
2A5C97EE000
|
trusted library allocation
|
page read and write
|
||
494E000
|
stack
|
page read and write
|
||
2A5C9EC6000
|
heap
|
page read and write
|
||
69DF9000
|
unkown
|
page execute read
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
2A5C9DDB000
|
heap
|
page read and write
|
||
8432000
|
heap
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
6A1F2000
|
unkown
|
page readonly
|
||
2FFD000
|
trusted library allocation
|
page read and write
|
||
2A5C97B7000
|
heap
|
page read and write
|
||
2155D812000
|
heap
|
page read and write
|
||
414000
|
unkown
|
page read and write
|
||
170924C6000
|
trusted library allocation
|
page read and write
|
||
12A1000
|
heap
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
6A2E5000
|
unkown
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
2A5C97EE000
|
trusted library allocation
|
page read and write
|
||
1E86000
|
unkown
|
page execute and read and write
|
||
6431000
|
heap
|
page read and write
|
||
2A5C8D34000
|
trusted library allocation
|
page read and write
|
||
2A5C97F8000
|
trusted library allocation
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
3E6000
|
unkown
|
page execute and read and write
|
||
787C000
|
heap
|
page read and write
|
||
1975000
|
unkown
|
page readonly
|
||
6F96000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
unkown
|
page readonly
|
||
2A424C80000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
2A5C8D54000
|
trusted library allocation
|
page read and write
|
||
1BB6000
|
unkown
|
page readonly
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
83FD000
|
heap
|
page read and write
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
66B000
|
heap
|
page read and write
|
||
5BD4000
|
heap
|
page read and write
|
||
1429000
|
unkown
|
page execute read
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
2753000
|
heap
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
84CE000
|
heap
|
page read and write
|
||
2A5C8CE4000
|
trusted library allocation
|
page read and write
|
||
5E5E000
|
direct allocation
|
page read and write
|
||
4B4B000
|
heap
|
page read and write
|
||
3003000
|
trusted library allocation
|
page read and write
|
||
93C000
|
stack
|
page read and write
|
||
2A5C9767000
|
heap
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
7F41000
|
heap
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
7804000
|
heap
|
page read and write
|
||
2A5CA038000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
6B471000
|
unkown
|
page execute and read and write
|
||
2A5C90E1000
|
trusted library allocation
|
page read and write
|
||
2A5C97B8000
|
heap
|
page read and write
|
||
8400000
|
heap
|
page read and write
|
||
7838000
|
heap
|
page read and write
|
||
170906E2000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
194A1340000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
77EC000
|
heap
|
page read and write
|
||
2A5C97E3000
|
trusted library allocation
|
page read and write
|
||
194A1361000
|
trusted library allocation
|
page read and write
|
||
2A5C8D3E000
|
trusted library allocation
|
page read and write
|
||
D6E000
|
stack
|
page read and write
|
||
83E8000
|
heap
|
page read and write
|
||
2A5C7DAE000
|
heap
|
page read and write
|
||
12D5000
|
heap
|
page read and write
|
||
689000
|
heap
|
page read and write
|
||
2A5C9F13000
|
heap
|
page read and write
|
||
1AB567B0000
|
heap
|
page read and write
|
||
241C000
|
unkown
|
page readonly
|
||
51E1000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
5B70000
|
heap
|
page read and write
|
||
21B1000
|
unkown
|
page execute read
|
||
2155D820000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
D41487F000
|
stack
|
page read and write
|
||
2755000
|
heap
|
page read and write
|
||
2A5CA15E000
|
heap
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
2A5C97B7000
|
heap
|
page read and write
|
||
69DB5000
|
unkown
|
page execute read
|
||
51E1000
|
heap
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
1F733D04000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1F733D0A000
|
heap
|
page read and write
|
||
325F000
|
direct allocation
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
D3D8EFE000
|
stack
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
84B7000
|
heap
|
page read and write
|
||
6BBE000
|
direct allocation
|
page read and write
|
||
8522000
|
heap
|
page read and write
|
||
843E000
|
heap
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
1BBF000
|
unkown
|
page write copy
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
1E88A620000
|
heap
|
page read and write
|
||
1E7000
|
unkown
|
page write copy
|
||
83C9000
|
heap
|
page read and write
|
||
2759000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
215061AE000
|
heap
|
page read and write
|
||
DDB000
|
stack
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170906BD000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
17090676000
|
heap
|
page read and write
|
||
54FE000
|
heap
|
page read and write
|
||
2A5C8D19000
|
trusted library allocation
|
page read and write
|
||
38A8000
|
direct allocation
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
2A5C90EE000
|
trusted library allocation
|
page read and write
|
||
776E000
|
heap
|
page read and write
|
||
2A5C97E6000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924C2000
|
trusted library allocation
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
2155D81A000
|
heap
|
page read and write
|
||
2A5CA038000
|
heap
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
76B5000
|
heap
|
page read and write
|
||
6D32000
|
direct allocation
|
page read and write
|
||
6A2000
|
heap
|
page read and write
|
||
215061AB000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
5518000
|
heap
|
page read and write
|
||
22BD000
|
unkown
|
page readonly
|
||
2A5C977D000
|
heap
|
page read and write
|
||
215061D6000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1E8E000
|
unkown
|
page execute and read and write
|
||
170906BF000
|
heap
|
page read and write
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
655000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
4A40000
|
heap
|
page readonly
|
||
2A5C8D36000
|
trusted library allocation
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
66B000
|
heap
|
page read and write
|
||
69DBE000
|
unkown
|
page execute read
|
||
1BB6000
|
unkown
|
page readonly
|
||
1AA63C71000
|
heap
|
page read and write
|
||
5521000
|
heap
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
3822000
|
trusted library allocation
|
page read and write
|
||
785E000
|
heap
|
page read and write
|
||
76EB000
|
heap
|
page read and write
|
||
170906BF000
|
heap
|
page read and write
|
||
170906BD000
|
heap
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
170924C0000
|
trusted library allocation
|
page read and write
|
||
1F733D0E000
|
heap
|
page read and write
|
||
2A5C97D5000
|
trusted library allocation
|
page read and write
|
||
2A5C7DAE000
|
heap
|
page read and write
|
||
AE3000
|
unkown
|
page execute read
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
4502DFF000
|
stack
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C975F000
|
heap
|
page read and write
|
||
1AA63C79000
|
heap
|
page read and write
|
||
66E8000
|
direct allocation
|
page read and write
|
||
11F2000
|
heap
|
page read and write
|
||
3340000
|
trusted library allocation
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
F10000
|
unkown
|
page readonly
|
||
48F0000
|
direct allocation
|
page read and write
|
||
5B8A000
|
heap
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
5AF3000
|
direct allocation
|
page read and write
|
||
19C0000
|
unkown
|
page readonly
|
||
2A5C9DE1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
30BF000
|
stack
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
17090693000
|
heap
|
page read and write
|
||
2A5C9752000
|
heap
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
1BFD000
|
unkown
|
page write copy
|
||
17090685000
|
heap
|
page read and write
|
||
2A5C8D7A000
|
trusted library allocation
|
page read and write
|
||
2150621F000
|
heap
|
page read and write
|
||
2A5C8D3D000
|
trusted library allocation
|
page read and write
|
||
66855CE000
|
stack
|
page read and write
|
||
2A5CA088000
|
heap
|
page read and write
|
||
848E000
|
heap
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
655000
|
heap
|
page read and write
|
||
1E88A714000
|
heap
|
page read and write
|
||
2A5C8D22000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
4BBA000
|
heap
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
275C000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
215061F6000
|
heap
|
page read and write
|
||
12B1000
|
heap
|
page read and write
|
||
5578000
|
heap
|
page read and write
|
||
842E000
|
heap
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
849C000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
4690000
|
heap
|
page read and write
|
||
2A5C97D9000
|
trusted library allocation
|
page read and write
|
||
215061C1000
|
heap
|
page read and write
|
||
6B495000
|
unkown
|
page execute and read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
5A80000
|
direct allocation
|
page read and write
|
||
4502D7F000
|
stack
|
page read and write
|
||
3C0000
|
unkown
|
page execute and read and write
|
||
3000000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C9F80000
|
heap
|
page read and write
|
||
3340000
|
trusted library allocation
|
page read and write
|
||
D3D8CFE000
|
stack
|
page read and write
|
||
2A5C97D3000
|
trusted library allocation
|
page read and write
|
||
6A971000
|
unkown
|
page readonly
|
||
2A5C8D5B000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C8D4B000
|
trusted library allocation
|
page read and write
|
||
2CF4000
|
heap
|
page read and write
|
||
2A5C8D44000
|
trusted library allocation
|
page read and write
|
||
769B000
|
heap
|
page read and write
|
||
21506231000
|
heap
|
page read and write
|
||
613C000
|
stack
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
465000
|
unkown
|
page readonly
|
||
61A1000
|
heap
|
page read and write
|
||
49C8000
|
direct allocation
|
page read and write
|
||
2155D806000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C97FB000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170906D0000
|
heap
|
page read and write
|
||
739B000
|
direct allocation
|
page read and write
|
||
661000
|
heap
|
page read and write
|
||
2A5CA088000
|
heap
|
page read and write
|
||
12A3000
|
heap
|
page read and write
|
||
2A5C96D1000
|
heap
|
page read and write
|
||
2A5C9763000
|
heap
|
page read and write
|
||
17090693000
|
heap
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C90DF000
|
trusted library allocation
|
page read and write
|
||
2A5C9E4D000
|
heap
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
17092230000
|
heap
|
page read and write
|
||
B1C000
|
unkown
|
page execute read
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
48E0000
|
direct allocation
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
1F734214000
|
heap
|
page read and write
|
||
785E000
|
heap
|
page read and write
|
||
8484000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
83CF000
|
heap
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
2A5C97DE000
|
trusted library allocation
|
page read and write
|
||
784E000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1E3A000
|
unkown
|
page execute and read and write
|
||
2A5C9D9F000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
2A5C9E52000
|
heap
|
page read and write
|
||
2A5C9FA4000
|
heap
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
5690000
|
direct allocation
|
page read and write
|
||
76EC000
|
heap
|
page read and write
|
||
2A5C90DD000
|
trusted library allocation
|
page read and write
|
||
E6E000
|
stack
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
1E59000
|
unkown
|
page execute and read and write
|
||
849C000
|
heap
|
page read and write
|
||
2A5CA0C9000
|
heap
|
page read and write
|
||
2155D7FF000
|
heap
|
page read and write
|
||
694A000
|
direct allocation
|
page read and write
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
6A1C2000
|
unkown
|
page readonly
|
||
2A5C8D5A000
|
trusted library allocation
|
page read and write
|
||
12D6000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
53E7000
|
heap
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
65E0000
|
direct allocation
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
170906BD000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
7EF000
|
stack
|
page read and write
|
||
6A00000
|
direct allocation
|
page read and write
|
||
5538000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2CF4000
|
heap
|
page read and write
|
||
34FC000
|
stack
|
page read and write
|
||
77B000
|
heap
|
page read and write
|
||
5F9E000
|
stack
|
page read and write
|
||
1E1000
|
unkown
|
page execute read
|
||
19C0000
|
unkown
|
page readonly
|
||
2A5C97D6000
|
trusted library allocation
|
page read and write
|
||
77EC000
|
heap
|
page read and write
|
||
215061E6000
|
heap
|
page read and write
|
||
1E88A720000
|
heap
|
page read and write
|
||
215061DF000
|
heap
|
page read and write
|
||
1A17000
|
unkown
|
page readonly
|
||
2DCE000
|
stack
|
page read and write
|
||
241C000
|
unkown
|
page readonly
|
||
847F000
|
heap
|
page read and write
|
||
2A5C7DA7000
|
heap
|
page read and write
|
||
722D000
|
stack
|
page read and write
|
||
275D000
|
heap
|
page read and write
|
||
2FFB000
|
trusted library allocation
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
1A17000
|
unkown
|
page readonly
|
||
2A5C97B7000
|
heap
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
481E000
|
stack
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1F73420D000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
2A5C97E1000
|
trusted library allocation
|
page read and write
|
||
67F5000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C90D5000
|
trusted library allocation
|
page read and write
|
||
170906BE000
|
heap
|
page read and write
|
||
661000
|
heap
|
page read and write
|
||
69DBE000
|
unkown
|
page execute read
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C9E0A000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924CB000
|
trusted library allocation
|
page read and write
|
||
2A5C9748000
|
heap
|
page read and write
|
||
18C0000
|
unkown
|
page readonly
|
||
83C000
|
stack
|
page read and write
|
||
21506465000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924DB000
|
trusted library allocation
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
4A60000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
580E000
|
direct allocation
|
page read and write
|
||
215061A9000
|
heap
|
page read and write
|
||
5A80000
|
direct allocation
|
page read and write
|
||
2A5C97F4000
|
trusted library allocation
|
page read and write
|
||
66DB000
|
direct allocation
|
page read and write
|
||
2FF0000
|
unkown
|
page read and write
|
||
6A00000
|
direct allocation
|
page read and write
|
||
2A5C8D14000
|
trusted library allocation
|
page read and write
|
||
2A5C8D3A000
|
trusted library allocation
|
page read and write
|
||
2155D82F000
|
heap
|
page read and write
|
||
61A000
|
unkown
|
page write copy
|
||
17090691000
|
heap
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
6AB000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
1E88A71B000
|
heap
|
page read and write
|
||
118F000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
83CA000
|
heap
|
page read and write
|
||
1F73422A000
|
heap
|
page read and write
|
||
4BC8000
|
heap
|
page read and write
|
||
8509000
|
heap
|
page read and write
|
||
439000
|
unkown
|
page read and write
|
||
1F733BA0000
|
heap
|
page read and write
|
||
2A5C9E2C000
|
heap
|
page read and write
|
||
170906CF000
|
heap
|
page read and write
|
||
3829000
|
trusted library allocation
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
17090680000
|
heap
|
page read and write
|
||
30C0000
|
direct allocation
|
page read and write
|
||
2752000
|
heap
|
page read and write
|
||
66B000
|
heap
|
page read and write
|
||
2A5C9DB4000
|
heap
|
page read and write
|
||
57E0000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
6CE000
|
heap
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
692000
|
heap
|
page read and write
|
||
17090679000
|
heap
|
page read and write
|
||
1709067E000
|
heap
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
2FF6000
|
trusted library allocation
|
page read and write
|
||
6A2B2000
|
unkown
|
page readonly
|
||
170924DF000
|
trusted library allocation
|
page read and write
|
||
76A000
|
heap
|
page read and write
|
||
844C000
|
heap
|
page read and write
|
||
A21000
|
unkown
|
page execute read
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
66FE000
|
direct allocation
|
page read and write
|
||
241A000
|
unkown
|
page write copy
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
17090691000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
84F2000
|
heap
|
page read and write
|
||
215061E7000
|
heap
|
page read and write
|
||
2A5C90EF000
|
trusted library allocation
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
17090676000
|
heap
|
page read and write
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
1F733D00000
|
heap
|
page read and write
|
||
777E000
|
heap
|
page read and write
|
||
275A000
|
heap
|
page read and write
|
||
558C000
|
heap
|
page read and write
|
||
6601000
|
direct allocation
|
page read and write
|
||
170924CC000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
275C000
|
heap
|
page read and write
|
||
2A5C7D90000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
6A2B7000
|
unkown
|
page readonly
|
||
215061DE000
|
heap
|
page read and write
|
||
2155D7FA000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
215061D6000
|
heap
|
page read and write
|
||
2A5C7D92000
|
heap
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C9D1C000
|
heap
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
399000
|
unkown
|
page execute and read and write
|
||
1429000
|
unkown
|
page execute read
|
||
1291000
|
heap
|
page read and write
|
||
83FC000
|
heap
|
page read and write
|
||
849C000
|
heap
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
2A5C7D99000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2E1E000
|
heap
|
page read and write
|
||
7762000
|
heap
|
page read and write
|
||
2A5C9D46000
|
heap
|
page read and write
|
||
6B455000
|
unkown
|
page execute and read and write
|
||
558C000
|
heap
|
page read and write
|
||
6A29A000
|
unkown
|
page readonly
|
||
B90000
|
heap
|
page read and write
|
||
5506000
|
heap
|
page read and write
|
||
5BB9000
|
heap
|
page read and write
|
||
6B201000
|
unkown
|
page readonly
|
||
51E1000
|
heap
|
page read and write
|
||
12E5000
|
heap
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
2A5C9E09000
|
heap
|
page read and write
|
||
11E8000
|
unkown
|
page execute read
|
||
2A5CA25B000
|
heap
|
page read and write
|
||
29DC000
|
stack
|
page read and write
|
||
1F734205000
|
heap
|
page read and write
|
||
49F4000
|
heap
|
page read and write
|
||
2150619F000
|
heap
|
page read and write
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
2A5C90E6000
|
trusted library allocation
|
page read and write
|
||
54EF000
|
heap
|
page read and write
|
||
2758000
|
heap
|
page read and write
|
||
2155D824000
|
heap
|
page read and write
|
||
17090680000
|
heap
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
3DBBD7E000
|
stack
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
4BF6000
|
heap
|
page read and write
|
||
12A3000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1C9A000
|
unkown
|
page write copy
|
||
190A000
|
unkown
|
page readonly
|
||
1D501628000
|
heap
|
page read and write
|
||
2A5C9D55000
|
heap
|
page read and write
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
5B23000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C9D17000
|
heap
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
2756000
|
heap
|
page read and write
|
||
9FD000
|
stack
|
page read and write
|
||
622000
|
heap
|
page read and write
|
||
215061BB000
|
heap
|
page read and write
|
||
11C3000
|
heap
|
page read and write
|
||
2155D7EE000
|
heap
|
page read and write
|
||
215061CF000
|
heap
|
page read and write
|
||
170922F0000
|
heap
|
page read and write
|
||
6A9A8000
|
unkown
|
page execute read
|
||
6B46E000
|
unkown
|
page execute and read and write
|
||
556E000
|
heap
|
page read and write
|
||
21506237000
|
heap
|
page read and write
|
||
76EB000
|
heap
|
page read and write
|
||
6A980000
|
unkown
|
page readonly
|
||
4A54000
|
heap
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170906BE000
|
heap
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
12A1000
|
heap
|
page read and write
|
||
17DC000
|
unkown
|
page execute read
|
||
170906BF000
|
heap
|
page read and write
|
||
6A7B000
|
direct allocation
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
275D000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
170924C9000
|
trusted library allocation
|
page read and write
|
||
1E8E000
|
unkown
|
page execute and read and write
|
||
83FD000
|
heap
|
page read and write
|
||
1BB6000
|
unkown
|
page readonly
|
||
2A5C90D7000
|
trusted library allocation
|
page read and write
|
||
4B7D000
|
heap
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
2A5C9E3C000
|
heap
|
page read and write
|
||
2A5C8D6A000
|
trusted library allocation
|
page read and write
|
||
1BC0000
|
unkown
|
page readonly
|
||
2A5C9E4D000
|
heap
|
page read and write
|
||
6A0CF000
|
unkown
|
page execute read
|
||
2A5C9DBB000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
787000
|
heap
|
page read and write
|
||
6A1C2000
|
unkown
|
page readonly
|
||
2A5C8D5E000
|
trusted library allocation
|
page read and write
|
||
275E000
|
heap
|
page read and write
|
||
8416000
|
heap
|
page read and write
|
||
8433000
|
heap
|
page read and write
|
||
3010000
|
heap
|
page read and write
|
||
1F733D0A000
|
heap
|
page read and write
|
||
2A5C8D32000
|
trusted library allocation
|
page read and write
|
||
6A29A000
|
unkown
|
page readonly
|
||
215061D6000
|
heap
|
page read and write
|
||
6A76000
|
direct allocation
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
2A5C9DE7000
|
heap
|
page read and write
|
||
17090685000
|
heap
|
page read and write
|
||
215061F6000
|
heap
|
page read and write
|
||
5570000
|
remote allocation
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
30D1000
|
heap
|
page read and write
|
||
B9F000
|
unkown
|
page execute read
|
||
83C1000
|
heap
|
page read and write
|
||
7F64000
|
heap
|
page read and write
|
||
EF9000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
12E5000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
8437000
|
heap
|
page read and write
|
||
215061DF000
|
heap
|
page read and write
|
||
334B000
|
direct allocation
|
page read and write
|
||
2A5C96F1000
|
heap
|
page read and write
|
||
215061C2000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C97F1000
|
trusted library allocation
|
page read and write
|
||
5E40000
|
direct allocation
|
page read and write
|
||
6FE8000
|
direct allocation
|
page read and write
|
||
84C4000
|
heap
|
page read and write
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
7F4C000
|
heap
|
page read and write
|
||
2A5C9E4D000
|
heap
|
page read and write
|
||
2155D81A000
|
heap
|
page read and write
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
77A0000
|
heap
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
777E000
|
heap
|
page read and write
|
||
2A5C8D6C000
|
trusted library allocation
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
777E000
|
heap
|
page read and write
|
||
6CCD000
|
direct allocation
|
page read and write
|
||
2E00000
|
direct allocation
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
2BA9000
|
unkown
|
page execute read
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
4A54000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
847A000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
215061DE000
|
heap
|
page read and write
|
||
D4149FE000
|
stack
|
page read and write
|
||
A38000
|
heap
|
page read and write
|
||
215061CF000
|
heap
|
page read and write
|
||
12B1000
|
heap
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
5B00000
|
direct allocation
|
page read and write
|
||
2155D828000
|
heap
|
page read and write
|
||
6C13000
|
direct allocation
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
2A5C9CEE000
|
heap
|
page read and write
|
||
170906C3000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
215061C4000
|
heap
|
page read and write
|
||
30C0000
|
direct allocation
|
page read and write
|
||
5C0E000
|
heap
|
page read and write
|
||
2A5CA088000
|
heap
|
page read and write
|
||
846F000
|
heap
|
page read and write
|
||
2BA9000
|
unkown
|
page execute read
|
||
2A5C90E3000
|
trusted library allocation
|
page read and write
|
||
7686000
|
heap
|
page read and write
|
||
83D4000
|
heap
|
page read and write
|
||
5FB000
|
unkown
|
page readonly
|
||
170924D9000
|
trusted library allocation
|
page read and write
|
||
655000
|
heap
|
page read and write
|
||
6A4FF000
|
unkown
|
page execute and read and write
|
||
2A5C9F32000
|
heap
|
page read and write
|
||
3CE000
|
unkown
|
page execute and read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
4960000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C8D34000
|
trusted library allocation
|
page read and write
|
||
170906D1000
|
heap
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
8501000
|
heap
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
6C9000
|
heap
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
5A80000
|
direct allocation
|
page read and write
|
||
73F131F000
|
stack
|
page read and write
|
||
6A44000
|
direct allocation
|
page read and write
|
||
3828000
|
trusted library allocation
|
page read and write
|
||
2A5CA21A000
|
heap
|
page read and write
|
||
215061E1000
|
heap
|
page read and write
|
||
1AA63E07000
|
heap
|
page read and write
|
||
6900000
|
direct allocation
|
page read and write
|
||
2A5C97BD000
|
heap
|
page read and write
|
||
232D000
|
unkown
|
page write copy
|
||
6C20000
|
direct allocation
|
page read and write
|
||
4C22000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2150619B000
|
heap
|
page read and write
|
||
45B0000
|
heap
|
page read and write
|
||
7760000
|
heap
|
page read and write
|
||
764000
|
heap
|
page read and write
|
||
2A5C97FA000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
7713000
|
heap
|
page read and write
|
||
1E88A755000
|
heap
|
page read and write
|
||
1E88A726000
|
heap
|
page read and write
|
||
5A80000
|
direct allocation
|
page read and write
|
||
B1C000
|
unkown
|
page execute read
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C9CDA000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5CA038000
|
heap
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
1F734205000
|
heap
|
page read and write
|
||
6D5E000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
852D000
|
heap
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
8484000
|
heap
|
page read and write
|
||
4270000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C8D1C000
|
trusted library allocation
|
page read and write
|
||
2A5C97B8000
|
heap
|
page read and write
|
||
2A5C9CEA000
|
heap
|
page read and write
|
||
2155D7A5000
|
heap
|
page read and write
|
||
2A5C9F3D000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
2DD0000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
2A5C7D7F000
|
heap
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
66B000
|
heap
|
page read and write
|
||
6B5000
|
heap
|
page read and write
|
||
D41497F000
|
stack
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
6A1F2000
|
unkown
|
page readonly
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
215061A5000
|
heap
|
page read and write
|
||
3350000
|
heap
|
page read and write
|
||
1E88A72D000
|
heap
|
page read and write
|
||
7834000
|
heap
|
page read and write
|
||
2A5C8D43000
|
trusted library allocation
|
page read and write
|
||
1F73422A000
|
heap
|
page read and write
|
||
12C3000
|
heap
|
page read and write
|
||
17090693000
|
heap
|
page read and write
|
||
2A5CA0A9000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C8D12000
|
trusted library allocation
|
page read and write
|
||
83DF000
|
heap
|
page read and write
|
||
6BD000
|
heap
|
page read and write
|
||
578B000
|
direct allocation
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
2155D7C8000
|
heap
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
2751000
|
heap
|
page read and write
|
||
2A5C7D94000
|
heap
|
page read and write
|
||
2A5C9E4D000
|
heap
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
2E4F000
|
stack
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C9DE6000
|
heap
|
page read and write
|
||
170924CF000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
860000
|
unkown
|
page readonly
|
||
F6B000
|
stack
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
4C1E000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
1F734207000
|
heap
|
page read and write
|
||
2A5C7DBB000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170920B4000
|
trusted library allocation
|
page read and write
|
||
5B64000
|
heap
|
page read and write
|
||
2A5C90ED000
|
trusted library allocation
|
page read and write
|
||
781E000
|
heap
|
page read and write
|
||
84AB000
|
heap
|
page read and write
|
||
849C000
|
heap
|
page read and write
|
||
2A5C9E4E000
|
heap
|
page read and write
|
||
4C23000
|
heap
|
page read and write
|
||
275E000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5CA108000
|
heap
|
page read and write
|
||
215061E4000
|
heap
|
page read and write
|
||
83EF000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
6988000
|
direct allocation
|
page read and write
|
||
2A5C97FD000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C9CFF000
|
heap
|
page read and write
|
||
2A5C9DE7000
|
heap
|
page read and write
|
||
30C0000
|
direct allocation
|
page read and write
|
||
17090691000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
2A5C9E42000
|
heap
|
page read and write
|
||
843E000
|
heap
|
page read and write
|
||
687000
|
heap
|
page read and write
|
||
2A5C97EC000
|
trusted library allocation
|
page read and write
|
||
17090685000
|
heap
|
page read and write
|
||
7760000
|
heap
|
page read and write
|
||
17090685000
|
heap
|
page read and write
|
||
17090691000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
2DD0000
|
direct allocation
|
page read and write
|
||
2FFC000
|
trusted library allocation
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
215061DC000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
B71000
|
unkown
|
page execute read
|
||
2E00000
|
direct allocation
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
2A5C9D7B000
|
heap
|
page read and write
|
||
2A5C9D46000
|
heap
|
page read and write
|
||
7412000
|
direct allocation
|
page read and write
|
||
2A5C8D75000
|
trusted library allocation
|
page read and write
|
||
170924C7000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C9F22000
|
heap
|
page read and write
|
||
69DEF000
|
unkown
|
page execute read
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
3E8000
|
unkown
|
page execute and read and write
|
||
61A1000
|
heap
|
page read and write
|
||
1E88A729000
|
heap
|
page read and write
|
||
382A000
|
trusted library allocation
|
page read and write
|
||
69E8000
|
direct allocation
|
page read and write
|
||
2753000
|
heap
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
861000
|
unkown
|
page execute read
|
||
22BD000
|
unkown
|
page readonly
|
||
A20000
|
unkown
|
page readonly
|
||
2756000
|
heap
|
page read and write
|
||
66858FE000
|
stack
|
page read and write
|
||
6A701000
|
unkown
|
page execute read
|
||
2A5C9DBA000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
1C9A000
|
unkown
|
page write copy
|
||
2A5C8D59000
|
trusted library allocation
|
page read and write
|
||
1F733D02000
|
heap
|
page read and write
|
||
12B1000
|
heap
|
page read and write
|
||
11CF000
|
heap
|
page read and write
|
||
599D000
|
direct allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
17090625000
|
heap
|
page read and write
|
||
2A5C8D37000
|
trusted library allocation
|
page read and write
|
||
96000
|
stack
|
page read and write
|
||
689000
|
heap
|
page read and write
|
||
66854C6000
|
stack
|
page read and write
|
||
2A5C9E4B000
|
heap
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
65C1000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
F3B000
|
heap
|
page read and write
|
||
1AFBD770000
|
heap
|
page read and write
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
2A5C8D13000
|
trusted library allocation
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
BBA000
|
stack
|
page read and write
|
||
194A136C000
|
trusted library allocation
|
page read and write
|
||
8527000
|
heap
|
page read and write
|
||
17090691000
|
heap
|
page read and write
|
||
170924CE000
|
trusted library allocation
|
page read and write
|
||
7F4B000
|
heap
|
page read and write
|
||
552B000
|
heap
|
page read and write
|
||
DF0000
|
unkown
|
page readonly
|
||
2155D828000
|
heap
|
page read and write
|
||
2A5C97AC000
|
heap
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
215061F6000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
2A5C9ECA000
|
heap
|
page read and write
|
||
8460000
|
heap
|
page read and write
|
||
170924C5000
|
trusted library allocation
|
page read and write
|
||
F41000
|
heap
|
page read and write
|
||
2A5C96D3000
|
heap
|
page read and write
|
||
2A5C9767000
|
heap
|
page read and write
|
||
170906E2000
|
heap
|
page read and write
|
||
84B1000
|
heap
|
page read and write
|
||
73F129D000
|
stack
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
215061F6000
|
heap
|
page read and write
|
||
B9F000
|
unkown
|
page execute read
|
||
2150621D000
|
heap
|
page read and write
|
||
2A5C96D1000
|
heap
|
page read and write
|
||
2A5C8D02000
|
trusted library allocation
|
page read and write
|
||
5424000
|
heap
|
page read and write
|
||
275E000
|
heap
|
page read and write
|
||
7838000
|
heap
|
page read and write
|
||
83E7000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
B71000
|
unkown
|
page execute read
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
7404000
|
heap
|
page read and write
|
||
6A2AF000
|
unkown
|
page read and write
|
||
261C000
|
stack
|
page read and write
|
||
2A5C90E9000
|
trusted library allocation
|
page read and write
|
||
2A5C9D57000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
7F5C000
|
heap
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
170924D4000
|
trusted library allocation
|
page read and write
|
||
170928C0000
|
heap
|
page read and write
|
||
1BFE000
|
unkown
|
page readonly
|
||
2155D7F3000
|
heap
|
page read and write
|
||
CC0000
|
direct allocation
|
page read and write
|
||
2A5C8D57000
|
trusted library allocation
|
page read and write
|
||
1AB54E00000
|
heap
|
page read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
2A5C97EF000
|
trusted library allocation
|
page read and write
|
||
2155D81A000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
1BBF000
|
unkown
|
page read and write
|
||
2E9E000
|
heap
|
page read and write
|
||
556F000
|
heap
|
page read and write
|
||
5798000
|
direct allocation
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
1F733BBC000
|
heap
|
page read and write
|
||
11FC000
|
heap
|
page read and write
|
||
2A5C97A7000
|
heap
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
6730000
|
direct allocation
|
page read and write
|
||
2A5C9CD9000
|
heap
|
page read and write
|
||
2A5C8CDE000
|
trusted library allocation
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
2A5C8D7F000
|
trusted library allocation
|
page read and write
|
||
5B3F000
|
heap
|
page read and write
|
||
712C000
|
stack
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C9D56000
|
heap
|
page read and write
|
||
11FC000
|
heap
|
page read and write
|
||
170924D0000
|
trusted library allocation
|
page read and write
|
||
7681000
|
heap
|
page read and write
|
||
17090685000
|
heap
|
page read and write
|
||
170924D5000
|
trusted library allocation
|
page read and write
|
||
2A5C8D33000
|
trusted library allocation
|
page read and write
|
||
2A5C8D38000
|
trusted library allocation
|
page read and write
|
||
661000
|
heap
|
page read and write
|
||
2DD0000
|
direct allocation
|
page read and write
|
||
170924CD000
|
trusted library allocation
|
page read and write
|
||
215061D9000
|
heap
|
page read and write
|
||
2155F110000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
A33000
|
heap
|
page read and write
|
||
2A5C8D66000
|
trusted library allocation
|
page read and write
|
||
975000
|
heap
|
page read and write
|
||
61A0000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
6431000
|
heap
|
page read and write
|
||
170924CA000
|
trusted library allocation
|
page read and write
|
||
2A4268A0000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
170924D1000
|
trusted library allocation
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
F11000
|
unkown
|
page execute read
|
||
215061CF000
|
heap
|
page read and write
|
||
2A5CA21B000
|
heap
|
page read and write
|
||
170920B0000
|
trusted library allocation
|
page read and write
|
||
46BB000
|
heap
|
page read and write
|
||
48F0000
|
direct allocation
|
page read and write
|
||
11E8000
|
heap
|
page read and write
|
||
4962000
|
heap
|
page read and write
|
||
1BBF000
|
unkown
|
page write copy
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C9F40000
|
heap
|
page read and write
|
||
7839000
|
heap
|
page read and write
|
||
2A5C8D18000
|
trusted library allocation
|
page read and write
|
||
170924D3000
|
trusted library allocation
|
page read and write
|
||
2758000
|
heap
|
page read and write
|
||
170924D2000
|
trusted library allocation
|
page read and write
|
||
2ECF000
|
stack
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
2A5C9D7B000
|
heap
|
page read and write
|
||
8510000
|
heap
|
page read and write
|
||
1C98000
|
unkown
|
page readonly
|
||
944567B000
|
stack
|
page read and write
|
||
83EB000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C97D8000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
heap
|
page read and write
|
||
2A5C9E4D000
|
heap
|
page read and write
|
||
1C9D000
|
unkown
|
page execute and read and write
|
||
2A5C9D1B000
|
heap
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
2A5C9EC5000
|
heap
|
page read and write
|
||
84AB000
|
heap
|
page read and write
|
||
8423000
|
heap
|
page read and write
|
||
17090570000
|
heap
|
page read and write
|
||
2A5C9767000
|
heap
|
page read and write
|
||
17090693000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
2FB4000
|
trusted library allocation
|
page read and write
|
||
D3D89A7000
|
stack
|
page read and write
|
||
1D501620000
|
heap
|
page read and write
|
||
5BE1000
|
heap
|
page read and write
|
||
6F1D000
|
direct allocation
|
page read and write
|
||
2A5C9E39000
|
heap
|
page read and write
|
||
4B4B000
|
heap
|
page read and write
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
170924D6000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
direct allocation
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
170906BF000
|
heap
|
page read and write
|
||
7F44000
|
heap
|
page read and write
|
||
78D000
|
heap
|
page read and write
|
There are 3932 hidden memdumps, click here to show them.