IOC Report
at.zip

loading gif

Files

File Path
Type
Category
Malicious
at.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
initial sample
malicious
C:\Config.Msi\532a59.rbs
data
dropped
C:\Program Files (x86)\Dell\UpdateService\Common.Logging.Core.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Common.Logging.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Configuration.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Configuration.RemoteStorage.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Dell.Pla.P1.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Dell.Pla.P1.MessageClient.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Execution.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\FrameworkCore.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Interop.COMAdmin.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Interop.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Logger.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Microsoft.ServiceBus.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Quartz.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Scheduler.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Serialize.Linq.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\ServiceShell.Configuration.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\ServiceShell.ContinualService.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\ServiceShell.Core.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\ServiceShell.Loader.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\ServiceShell.Logger.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\ServiceShell.Notifications.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\ServiceShell.Proxy.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\ServiceShell.ServiceModel.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\ServiceShell.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\ServiceShell.exe.Config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\Dell\UpdateService\Service\Assets\LogEntries.xsd
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Dell\UpdateService\Service\InvColPC.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Service\Storage.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Service\Storage.Principal.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Service\Update.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Service\Update.Principal.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Service\UpdateScheduler.Principal.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Service\WindowsManagement.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Service\WindowsManagement.Principal.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\SharpBITS.Base.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Storage.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\System.Net.Http.Formatting.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\System.Reactive.Core.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\System.Reactive.Interfaces.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\System.Reactive.Linq.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\System.Reactive.PlatformServices.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\System.Reactive.Windows.Threading.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\ThirdPartyLicenses.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Dell\UpdateService\Transfer.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Update.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Update.Custom.Loader.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Update.Custom.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\UpdateClient.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\UpdateTelemetry.Principal.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\UpdateTelemetry.Principal.dll.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Dell\UpdateService\UpdateTelemetry.Proxy.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\UserSettings.Configuration.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\Verification.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Dell\UpdateService\log4net.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\App.Core.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\Configuration.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\Configuration.RemoteStorage.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\FrameworkCore.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\GUI.Core.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\Interop.COMAdmin.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\Interop.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\Logger.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\Scheduler.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\Serialize.Linq.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\ServiceShell.Configuration.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\ServiceShell.ContinualService.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\ServiceShell.Core.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\ServiceShell.Notifications.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\ServiceShell.ServiceModel.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\Storage.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\System.Reactive.Core.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\System.Reactive.Interfaces.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\Update.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\UpdateClient.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\UserSettings.Configuration.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\Verification.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\WindowsManagement.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\dcu-cli.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\log4net.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\Dell\CommandUpdate\readme.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Dell\InventoryCollector\Log\ICDebugLog.txt
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Dell\UpdateService\Clients\CommandUpdate\Scheduler.dat
XML 1.0 document, ASCII text, with CRLF line terminators
modified
C:\ProgramData\Dell\UpdateService\Log\Activity.log
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Dell\UpdateService\Log\Service.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Dell\UpdateService\Temp\BIT908F.tmp
Microsoft Cabinet archive data, single, 364648 bytes, 1 file, at 0x44 +A "CatalogIndexPC.xml", flags 0x4, number 1, extra bytes 20 in head, 115 datablocks, 0x1 compression
dropped
C:\ProgramData\Dell\UpdateService\Temp\BITAC74.tmp
Microsoft Cabinet archive data, single, 364648 bytes, 1 file, at 0x44 +A "CatalogIndexPC.xml", flags 0x4, number 1, extra bytes 20 in head, 115 datablocks, 0x1 compression
dropped
C:\ProgramData\Dell\UpdateService\Temp\BITEE8F.tmp
Microsoft Cabinet archive data, single, 364648 bytes, 1 file, at 0x44 +A "CatalogIndexPC.xml", flags 0x4, number 1, extra bytes 20 in head, 115 datablocks, 0x1 compression
dropped
C:\ProgramData\Dell\UpdateService\Temp\CatalogIndexPC.cab (copy)
Microsoft Cabinet archive data, single, 364648 bytes, 1 file, at 0x44 +A "CatalogIndexPC.xml", flags 0x4, number 1, extra bytes 20 in head, 115 datablocks, 0x1 compression
dropped
C:\ProgramData\Dell\UpdateService\Temp\Inventory.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text
modified
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xb3c1c652, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\ClipSVC\Install\Apps\dellinc.dellcommandupdate_htrsf667h5kn2.xml
ASCII text, with very long lines (2676), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\209d7fd5-7f39-4c9c-9f3a-e00d3859c78a\AddAppxProvisionedPackage.ps1
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\AppxProvider.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\AssocProvider.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\CbsProvider.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\DismCore.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\DismCorePS.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\DismHost.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\DismProv.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\DmiProvider.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\FfuProvider.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\FolderProvider.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\GenericProvider.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\IBSProvider.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\ImagingProvider.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\IntlProvider.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\LogProvider.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\MsiProvider.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\OSProvider.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\OfflineSetupProvider.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\ProvProvider.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\SetupPlatformProvider.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\SmiProvider.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\SysprepProvider.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\TransmogProvider.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\UnattendProvider.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\VhdProvider.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\WimProvider.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\en-US\AppxProvider.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\en-US\AssocProvider.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\en-US\CbsProvider.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\en-US\DismCore.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\en-US\DismProv.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\en-US\DmiProvider.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\en-US\FfuProvider.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\en-US\FolderProvider.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\en-US\GenericProvider.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\en-US\IBSProvider.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\en-US\ImagingProvider.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\en-US\IntlProvider.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\en-US\LogProvider.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\en-US\MsiProvider.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\en-US\OSProvider.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\en-US\OfflineSetupProvider.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\en-US\ProvProvider.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\en-US\SetupPlatformProvider.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\en-US\SmiProvider.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\en-US\SysprepProvider.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\en-US\TransmogProvider.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\en-US\UnattendProvider.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\en-US\VhdProvider.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\en-US\WimProvider.dll.mui
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\APPX.2s9kp9mk0hclo97w3nkgf76mf.tmp
XML 1.0 document, ASCII text, with very long lines (15101), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\APPX.2x8alr1ann3dsztdc314o_vnh.tmp
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (505), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\APPX.47uxzcfrrjyangitw77ovmcvg.tmp
XML 1.0 document, ASCII text, with very long lines (15101), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\APPX.6dty55tqcko6vfohyya_ri47e.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\APPX.7sehyp7ajfm6tiu7ylkghdlce.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\APPX.8no1i641a0qqfzjys9qpmoyzf.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\APPX.gn76ohpr3xidew9mozfga42je.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\APPX.hyfqpoylye4645imj6mv61n_g.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\APPX.iswq45udyeaj0_kq7o72wghre.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\APPX.klpxb44zgge5wj4yqcas_n4pc.tmp
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (505), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\APPX.o7o966iuf7lsej02oih36wcvh.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\APPX.t8mqwtu5j5pg8c5nai0t49rcf.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\APPX.xko4t58ih9pdvu3wyvtm0q19.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\MSI166.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI2fadb.LOG
data
dropped
C:\Users\user\AppData\Local\Temp\MSIBE3F.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSID7E3.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIFBC6.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIFCFF.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIFDEB.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gl23f3yk.rt5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qoyj5agt.30g.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_va1m1zqs.hmw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z1jdqpzv.aly.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\appxStage-{47F959DA-A9A2-41C3-869C-B8431F518AC1}\DellInc.DellCommandUpdate_3.1.58.0_neutral_~_htrsf667h5kn2DCU.Centennial_3.1.58.0_x64.appx
Zip archive data, at least v4.5 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\{5669AB71-1302-4412-8DA1-CB69CD7B7324}\DellCommandUpdate.appxbundle
Zip archive data, at least v4.5 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\{5669AB71-1302-4412-8DA1-CB69CD7B7324}\DellCommandUpdate_License1.xml
ASCII text, with very long lines (2676), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\ISBEW64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\ISRT.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
dropped
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\IsConfig.ini
Generic INItialization configuration [f4]
dropped
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\String1033.txt
Unicode text, UTF-16, little-endian text, with very long lines (332), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\_isres_0x0409.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\setup.inx
data
dropped
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\ISBEW64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\ISRT.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
dropped
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\IsConfig.ini
Generic INItialization configuration [f4]
dropped
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\String1033.txt
Unicode text, UTF-16, little-endian text, with very long lines (332), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\_isres_0x0409.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\setup.inx
data
dropped
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\ISBEW64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\ISRT.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
dropped
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\IsConfig.ini
Generic INItialization configuration [f4]
dropped
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\String1033.txt
Unicode text, UTF-16, little-endian text, with very long lines (332), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\_isres_0x0409.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\setup.inx
data
dropped
C:\Windows\Installer\532a58.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: Installation Database, Comments: Contact: Your local administrator, Keywords: Installer,MSI,Database, Subject: Dell Command Update App, Author: Dell, Inc., Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2016 - Professional Edition 23, Last Saved Time/Date: Mon Nov 18 19:01:26 2019, Create Time/Date: Mon Nov 18 19:01:26 2019, Last Printed: Mon Nov 18 19:01:26 2019, Revision Number: {59C5BCBE-15E4-49AF-BB4B-C5A27E48EEAF}, Code page: 1252, Template: x64;1033
dropped
C:\Windows\Installer\532a5a.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: Installation Database, Comments: Contact: Your local administrator, Keywords: Installer,MSI,Database, Subject: Dell Command Update App, Author: Dell, Inc., Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2016 - Professional Edition 23, Last Saved Time/Date: Mon Nov 18 19:01:26 2019, Create Time/Date: Mon Nov 18 19:01:26 2019, Last Printed: Mon Nov 18 19:01:26 2019, Revision Number: {59C5BCBE-15E4-49AF-BB4B-C5A27E48EEAF}, Code page: 1252, Template: x64;1033
dropped
C:\Windows\Installer\MSI2E4F.tmp
data
dropped
C:\Windows\Installer\MSI2ECD.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI5A14.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\SourceHash{5669AB71-1302-4412-8DA1-CB69CD7B7324}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\{5669AB71-1302-4412-8DA1-CB69CD7B7324}\ARPPRODUCTICON.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Logs\DISM\dism.log
Unicode text, UTF-8 (with BOM) text, with very long lines (389), with CRLF line terminators
modified
C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{2EF74E71-39CF-4E5B-A8B9-6E1C57F9D94F}.crmlog
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\Windows\System32\MsDtc\Trace\dtctrace.log
data
dropped
C:\Windows\Temp\ICProgress\Dell_InventoryCollector_Progress.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text
dropped
C:\Windows\Temp\inv5098_tmp\dsupt32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp\icconfig_sys.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp\icconfig_user.xml
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (345), with CRLF, LF line terminators
dropped
C:\Windows\Temp\inv5098_tmp\icpolicy.xsl
XML 1.0 document, ASCII text, with CR line terminators
dropped
C:\Windows\Temp\inv5098_tmp\icprogredir.txt
ASCII text, with CRLF line terminators
modified
C:\Windows\Temp\inv5098_tmp\icsvc32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp\invcol.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp\msvcp100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp\msvcr100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\5560_5565_broadband_gps\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\5560_5565_broadband_gps\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\5560_5565_broadband_gps\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\AMD_Graphics\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\AMD_Graphics\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\AMD_Graphics\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\AMD_Graphics\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\AMD_Graphics_1\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\AMD_Graphics_1\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\AMD_Graphics_1\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\AMD_Graphics_1\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\AMD_Virtual_Buttons\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\AMD_Virtual_Buttons\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\AMD_Virtual_Buttons\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_17625_WIGIG\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_17625_WIGIG\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_17625_WIGIG\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_Barcode_Scanner\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_Barcode_Scanner\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_Barcode_Scanner\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_CIRRUSCLIENT_3_0\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_CIRRUSCLIENT_3_0\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_CIRRUSCLIENT_3_0\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_DELL_LIGHT_BAR\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_DELL_LIGHT_BAR\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_DELL_LIGHT_BAR\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_DELL_LIGHT_BAR\RegForceInventory.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_DELL_PM_Lite\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_DELL_PM_Lite\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_DELL_PM_Lite\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_DELL_QUICKSET\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_DELL_QUICKSET\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_DELL_QUICKSET\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_ENT-CLNT-INST_1_0\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_ENT-CLNT-INST_1_0\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_ENT-CLNT-INST_1_0\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_ENT-HUB-INST_1_0\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_ENT-HUB-INST_1_0\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_ENT-HUB-INST_1_0\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_ENT-SRVR-INST_1_0\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_ENT-SRVR-INST_1_0\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_ENT-SRVR-INST_1_0\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_INTEL_7265_WAPI\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_INTEL_7265_WAPI\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_INTEL_7265_WAPI\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_INTEL_7265_WAPI_1\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_INTEL_7265_WAPI_1\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_INTEL_7265_WAPI_1\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_INTEL_7265_WAPI_reg\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_INTEL_7265_WAPI_reg\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_INTEL_7265_WAPI_reg\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_INTEL_DISPLAY\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_INTEL_DISPLAY\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_INTEL_DISPLAY\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_INTEL_TELEM\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_INTEL_TELEM\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_INTEL_TELEM\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_OSD_AIO_7440\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_OSD_AIO_7440\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_OSD_AIO_7440\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_RCC_1_2\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_RCC_1_2\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_RCC_1_2\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_SBA3PX_XLOB\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_SBA3PX_XLOB\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_SBA3PX_XLOB\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_TOUCH_FRMW\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_TOUCH_FRMW\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_TOUCH_FRMW\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_USB3_DISP\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_USB3_DISP\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_USB3_DISP\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_USB3_DISP\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_UTIL_SDROM\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_UTIL_SDROM\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_UTIL_SDROM\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_WBS_INTEL_31-7265_WB64\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_WBS_INTEL_31-7265_WB64\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\APP_WBS_INTEL_31-7265_WB64\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Alexa\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Alexa\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Alexa\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Alexa\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Alienware_Command_Center\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Alienware_Command_Center\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Alienware_Command_Center\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Alienware_Command_Center_Reg\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Alienware_Command_Center_Reg\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Alienware_Command_Center_Reg\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Alienware_External_Graphics_Amplifier\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Alienware_External_Graphics_Amplifier\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Alienware_External_Graphics_Amplifier\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Alienware_Mobile_Connect\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Alienware_Mobile_Connect\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Alienware_Mobile_Connect\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Alienware_OC_Controls\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Alienware_OC_Controls\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Alienware_OC_Controls\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Alienware_OSD\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Alienware_OSD\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Alienware_OSD\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\AlpsTouchPad\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\AlpsTouchPad\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\AlpsTouchPad\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\AlpsTouchPad\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Aquantia\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Aquantia\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Aquantia\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Aquantia\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Asix_SP_Port\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Asix_SP_Port\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Asix_SP_Port\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Asix_SP_Port\RegForceInventory.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Authentec\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Authentec\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Authentec\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Authentec\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Authentec_FP\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Authentec_FP\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Authentec_FP\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\BlacktopReader\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\BlacktopReader\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\BlacktopReader\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\BlacktopReader\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\BroadcomEhernetController\DrvCfg32.ini
Generic INItialization configuration [Force]
dropped
C:\Windows\Temp\inv5098_tmp_1\BroadcomEhernetController\DrvCfg64.ini
Generic INItialization configuration [Force]
dropped
C:\Windows\Temp\inv5098_tmp_1\BroadcomEhernetController\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\BroadcomEhernetController\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Broadcom_BT\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Broadcom_BT\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Broadcom_BT\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Broadcom_BT\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\CCTK\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\CCTK\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\CCTK\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Canvas_Palettes\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Canvas_Palettes\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Canvas_Palettes\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Canvas_Palettes\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Chipset\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Chipset\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Chipset\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Chipset\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Chipset_msi\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Chipset_msi\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Chipset_msi\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Chipset_msi\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Chipset_old\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Chipset_old\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Chipset_old\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Chipset_old\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Chipset_reg\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Chipset_reg\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Chipset_reg\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Chipset_reg\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Citrix_App\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Citrix_App\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Citrix_App\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Citrix_App\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\CompID_Mapping.ini
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\ConexantAudio\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\ConexantAudio\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\ConexantAudio\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\ConexantAudio\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\ConnexantModem\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\ConnexantModem\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\ConnexantModem\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\ConnexantModem\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\ConnexantModem_D400\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\ConnexantModem_D400\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\ConnexantModem_D400\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\ConnexantModem_D400\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\ControlVault\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\ControlVault\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\ControlVault\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Cyberlink_BD_Kernal\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Cyberlink_BD_Kernal\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Cyberlink_BD_Kernal\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Cyberlink_BD_Kernal\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Cypress\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Cypress\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Cypress\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Cypress\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DCC\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DCC\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DCC\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DCC\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DCC_MSI\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DCC_MSI\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DCC_MSI\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DCC_MSI\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DCH_CompID_Mapping.ini
JSON data
dropped
C:\Windows\Temp\inv5098_tmp_1\DCH_Mapping.ini
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DCP_ConnMgr\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DCP_ConnMgr\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DCP_ConnMgr\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DCP_ConnMgr\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DCP_SecMgr_App\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DCP_SecMgr_App\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DCP_SecMgr_App\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DCP_SecMgr_App\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DCP_SecMgr_Drv\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DCP_SecMgr_Drv\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DCP_SecMgr_Drv\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DCP_SecMgr_Drv\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DCSU\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DCSU\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DCSU\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DCSU\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DCU_Bradbury\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DCU_Bradbury\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DCU_Bradbury\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DDDApp\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DDDApp\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DDDApp\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DDDApp\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DDPA\DDPA.cmd
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DDPA\DDPA.vbs
ASCII text, with very long lines (355), with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DDPA\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DDPA\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DDPA\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DDPA_App\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DDPA_App\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DDPA_App\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DDPA_Mware\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DDPA_Mware\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DDPA_Mware\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DDPA_Mware\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DELLUPDATE_1_3\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DELLUPDATE_1_3\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DELLUPDATE_1_3\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DELL_MOBILE\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DELL_MOBILE\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DELL_MOBILE\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DELL_MOBILE\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DPP\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DPP\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DPP\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DRVR_HOTKEY_E7_W7\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DRVR_HOTKEY_E7_W7\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DRVR_HOTKEY_E7_W7\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DRVR_ISS3P0_NEW\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DRVR_ISS3P0_NEW\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DRVR_ISS3P0_NEW\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DRVR_ISS3P0_XLOB\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DRVR_ISS3P0_XLOB\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DRVR_ISS3P0_XLOB\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DRVR_Intel_RealSense\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DRVR_Intel_RealSense\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DRVR_Intel_RealSense\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DRVR_Intel_WireL_Disp\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DRVR_Intel_WireL_Disp\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DRVR_Intel_WireL_Disp\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DRVR_NTWK_INTEL_W64_16_5_0\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DRVR_NTWK_INTEL_W64_16_5_0\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DRVR_NTWK_INTEL_W64_16_5_0\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DRVR_WDT_WINDOWS\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DRVR_WDT_WINDOWS\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DRVR_WDT_WINDOWS\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DRV_DS4CAM_7275_Y15Q3\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DRV_DS4CAM_7275_Y15Q3\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DRV_DS4CAM_7275_Y15Q3\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DSS\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DSS\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DSS\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DSS\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DU_Bradbury\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DU_Bradbury\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DU_Bradbury\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DW5820e\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DW5820e\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DW5820e\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DW5820e\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DW5821e\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DW5821e\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DW5821e\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DW5821e\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DW5821e_CM\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DW5821e_CM\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DW5821e_CM\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DW5821e_CM\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DW5821e_GNSS_Manager\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DW5821e_GNSS_Manager\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DW5821e_GNSS_Manager\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DW5821e_GNSS_Manager\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DW5822e\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DW5822e\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DW5822e\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DW5822e\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DellFreeFall\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DellFreeFall\DrvCfg64.ini
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DellFreeFall\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DellFreeFall\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DellFreeFall_X4\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DellFreeFall_X4\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DellFreeFall_X4\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DellFreeFall_X4\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DellFreeFall_X5\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DellFreeFall_X5\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DellFreeFall_X5\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Dell_Mobile_Connect\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Dell_Mobile_Connect\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Dell_Mobile_Connect\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Dell_Power_Manager_Service\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Dell_Power_Manager_Service\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Dell_Power_Manager_Service\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Dell_Proximity_Sensor\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Dell_Proximity_Sensor\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Dell_Proximity_Sensor\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Dell_SupportAssist_OS_Recovery\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Dell_SupportAssist_OS_Recovery\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Dell_SupportAssist_OS_Recovery\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Dell_Touch_Firmware\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Dell_Touch_Firmware\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Dell_Touch_Firmware\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Dell_USB_Recovery_Tool\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Dell_USB_Recovery_Tool\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Dell_USB_Recovery_Tool\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Dell_quickset\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Dell_quickset\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Dell_quickset\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DisplayLink_Dock_Driver\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DisplayLink_Dock_Driver\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\DisplayLink_Dock_Driver\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DrvAppIE_MSI\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DrvAppIE_MSI\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DrvAppIE_MSI\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DrvAppIE_MSI\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DrvAppIE_MSI\supportdev.cfg
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DrvAppIE_PCI\DRVUpdate.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\DrvAppIE_PCI\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DrvAppIE_PCI\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\DrvAppIE_PCI\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DrvAppIE_PCI\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\DrvAppIE_PCI\supportdev.cfg
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\EETI_Touch_Panel_Application\DrvCfg32.ini
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\EETI_Touch_Panel_Application\DrvCfg64.ini
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\EETI_Touch_Panel_Application\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\ESMMapping.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Ethertronic_Active_Steering_Driver\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Ethertronic_Active_Steering_Driver\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Ethertronic_Active_Steering_Driver\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Executables\AppUpdate.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\Executables\DRVUpdate.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\Executables\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Executables\PNPUpdate.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\Executables\SSDUpdate.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\Executables\USBUpdate.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\FW_ALPS_TP_A01\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\FW_ALPS_TP_A01\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\FW_ALPS_TP_A01\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Fingerprint_Cards_Fingerprint_Sensor_Device_Driver\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Fingerprint_Cards_Fingerprint_Sensor_Device_Driver\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Fingerprint_Cards_Fingerprint_Sensor_Device_Driver\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Gemalto\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Gemalto\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Gemalto\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Gemalto\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\HDD_SSD_Inventory\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\HDD_SSD_Inventory\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\HDD_SSD_Inventory\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\HDD_SSD_Inventory\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\HDD_SSD_Inventory\supportdev.cfg
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\ICINIT\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\ICINIT\init.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\IDT_AUDIO\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\IDT_AUDIO\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\IDT_AUDIO\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\IDT_AUDIO\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\IDT_X3\IDT_X3.cmd
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\IDT_X3\IDT_X3.vbs
ASCII text, with very long lines (355), with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\IDT_X3\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\IMAGE\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\IMAGE\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\IMAGE\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\IMAGE\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\INTEL_DPTF_WIN8_14\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\INTEL_DPTF_WIN8_14\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\INTEL_DPTF_WIN8_14\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\IPT\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\IPT\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\IPT\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\IPT_X4\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\IPT_X4\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\IPT_X4\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\IRMT\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\IRMT\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\IRMT\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\IRSTE_Drvr\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\IRSTE_Drvr\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\IRSTE_Drvr\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\IRST\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\IRST\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\IRST\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\IRST\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\IRST_X5\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\IRST_X5\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\IRST_X5\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\IRST_X5\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\IntelAMTInv
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\IntelManagementEngineInterfaceDriver\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\IntelManagementEngineInterfaceDriver\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\IntelManagementEngineInterfaceDriver\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\IntelUSB\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\IntelUSB\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\IntelUSB\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_BT\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_BT\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_BT\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_ECD\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_ECD\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_ECD\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_GACS\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_GACS\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_GACS\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_HHHL\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_HHHL\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_HHHL\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_HHHL\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_Imaging\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_Imaging\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_Imaging\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_Imaging\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_LOM\IntelLOM_Inv.vbs
ASCII text, with very long lines (411), with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_LOM\Intel_LOM.cmd
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_LOM\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_OLED_Panel\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_OLED_Panel\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_OLED_Panel\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_OTLK\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_OTLK\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_OTLK\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_SKYPE\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_SKYPE\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_SKYPE\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_Unite_Display\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_Unite_Display\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_Unite_Display\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_Unite_Display\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_Wifi\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_Wifi\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_Wifi\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_wifi_6300\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_wifi_6300\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_wifi_6300\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_wifi_6300_WN7\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_wifi_6300_WN7\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Intel_wifi_6300_WN7\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Killer_WLAN_New\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Killer_WLAN_New\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Killer_WLAN_New\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Killer_WLAN_New\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Killer_wireless\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Killer_wireless\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Killer_wireless\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Killer_wireless\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Killer_wireless_1550\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Killer_wireless_1550\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Killer_wireless_1550\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Killer_wireless_1550\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Killer_wireless_E2400_E2500\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Killer_wireless_E2400_E2500\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Killer_wireless_E2400_E2500\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Killer_wireless_E2400_E2500\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Mapping.ini
JSON data
dropped
C:\Windows\Temp\inv5098_tmp_1\NETWORK_M16_9350_Q4Y15\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\NETWORK_M16_9350_Q4Y15\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\NETWORK_M16_9350_Q4Y15\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\NIC_Broadcom_reg\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\NIC_Broadcom_reg\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\NIC_Broadcom_reg\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\NIC_Broadcom_reg\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\NTrig_MultiTouch\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\NTrig_MultiTouch\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\NTrig_MultiTouch\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\NTrig_MultiTouch\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Nvidia_video\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Nvidia_video\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Nvidia_video\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Nvidia_video\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Nvidia_video_reg\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Nvidia_video_reg\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Nvidia_video_reg\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Nvidia_video_reg\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\O2Micro_CardReader1_X5\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\O2Micro_CardReader1_X5\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\O2Micro_CardReader1_X5\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\O2Micro_CardReader\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\O2Micro_CardReader\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\O2Micro_CardReader\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\O2Micro_CardReader\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\O2Micro_CardReader_X5\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\O2Micro_CardReader_X5\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\O2Micro_CardReader_X5\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\OC_Controls\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\OC_Controls\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\OC_Controls\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\OMCI\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\OMCI\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\OMCI\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\OMCI\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\OMCI_MSI\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\OMCI_MSI\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\OMCI_MSI\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\OMCI_MSI\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\OSINV\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\OSINV\osinv.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\PREMIER_COLOR_FY16\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\PREMIER_COLOR_FY16\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\PREMIER_COLOR_FY16\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\PackageVersion.ini
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\PnP_Devices\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\PnP_Devices\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\PnP_Devices\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\PnP_Devices\pnpDevices.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\PnP_Devices\pnpDevicesList.ini
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\PnP_Devices\pnpdevices_inv.cmd
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\PnP_Devices\pnpdevices_inv.vbs
ASCII text, with very long lines (354), with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\PowerManager\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\PowerManager\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\PowerManager\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\QLogicInstaller_Reg\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\QLogicInstaller_Reg\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\QLogicInstaller_Reg\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\QLogicInstaller_Reg\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\RapidStart\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\RapidStart\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\RapidStart\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\RapidStart\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\RapidStart_msi\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\RapidStart_msi\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\RapidStart_msi\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\RapidStart_msi\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\RealTek_LAN\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\RealTek_LAN\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\RealTek_LAN\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\RealtekAudio\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\RealtekAudio\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\RealtekAudio\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\RealtekAudio\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\RealtekAudio\supportdev.cfg
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\RealtekHDAudio\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\RealtekHDAudio\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\RealtekHDAudio\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\RealtekHDAudio\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Realtek_8723DE\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Realtek_8723DE\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Realtek_8723DE\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Realtek_8723DE\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Realtek_USB_Audio_Driver_Reg\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Realtek_USB_Audio_Driver_Reg\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Realtek_USB_Audio_Driver_Reg\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\SCSI_ODD\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\SCSI_ODD\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\SCSI_ODD\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\SCSI_ODD\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\SCSI_ODD\SCSIUpdate.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\SGX_XLOB\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\SGX_XLOB\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\SGX_XLOB\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\SWB_UTIL_INTEL_VIRTUAL_BTN\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\SWB_UTIL_INTEL_VIRTUAL_BTN\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\SWB_UTIL_INTEL_VIRTUAL_BTN\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\SW_APP_LRN-CTR_V2_0_WEB\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\SW_APP_LRN-CTR_V2_0_WEB\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\SW_APP_LRN-CTR_V2_0_WEB\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\SW_DBAR_1_8_WEB\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\SW_DBAR_1_8_WEB\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\SW_DBAR_1_8_WEB\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\SW_DFND_SVC_TRIB_1_1\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\SW_DFND_SVC_TRIB_1_1\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\SW_DFND_SVC_TRIB_1_1\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\SYSID.ini
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\SalomonDock\SalomonDock.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\Serial_IO_Drvr\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Serial_IO_Drvr\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Serial_IO_Drvr\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Sierra_multiPNP\Sierra.cmd
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Sierra_multiPNP\Sierra_Inv.vbs
ASCII text, with very long lines (354), with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\SmallBusinessAdv\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\SmallBusinessAdv\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\SmallBusinessAdv\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\SmallBusinessAdv\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\SmartByte\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\SmartByte\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\SmartByte\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\SmartConnect\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\SmartConnect\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\SmartConnect\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\SmartConnect\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Stardock\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Stardock\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Stardock\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Stardock\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\StaticIC\StaticIC.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\Synaptic_Touchpad\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Synaptic_Touchpad\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Synaptic_Touchpad\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Synaptic_Touchpad\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Synaptics_Fingerprint_Sensor_Driver\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Synaptics_Fingerprint_Sensor_Driver\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Synaptics_Fingerprint_Sensor_Driver\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\TBT_Dock_Firmware\GetDockVer32W.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\TBT_Dock_Firmware\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\ASMedia_USB_Controller\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\ASMedia_USB_Controller\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\ASMedia_USB_Controller\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\ASMedia_USB_Controller\RegForceInventory.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF, CR line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\BIOS_Tool\G7ArTbtPower64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\Executables\DRVUpdate.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\Executables\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\RLtek_Ethernate\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\RLtek_Ethernate\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\RLtek_Ethernate\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\RLtek_Ethernate\RegForceInventory.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF, CR line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\RLtek_USB_Driver\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\RLtek_USB_Driver\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\RLtek_USB_Driver\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\RLtek_USB_Driver\RegForceInventory.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF, CR line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\RLtek_USB_Driver_WOW\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\RLtek_USB_Driver_WOW\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\RLtek_USB_Driver_WOW\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\RLtek_USB_Driver_WOW\RegForceInventory.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF, CR line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\RegForceInventory.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF, CR line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\TB_Controller_new\DRVUpdate.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\TB_Controller_new\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\TB_Controller_new\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\TB_Controller_new\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\TB_Controller_new\RegForceInventory.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF, CR line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\TB_Firmware\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\TB_Firmware\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\TB_Firmware\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\TB_Firmware\RegForceInventory.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF, CR line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\ThunderboltRegModule.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\ThunderboltZeroInv.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\Thunderbolt_Reg\zeroConfig.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Tobi_Eye_Tracker\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Tobi_Eye_Tracker\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Tobi_Eye_Tracker\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Tobiee_Eyex\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Tobiee_Eyex\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\Tobiee_Eyex\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\TouchPad\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\TouchPad\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\TouchPad\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\TouchPad\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\TouchPad_X8\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\TouchPad_X8\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\TouchPad_X8\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\TouchPad_X8\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\TouchPad_reg\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\TouchPad_reg\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\TouchPad_reg\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\TouchPad_reg\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Touchpad_reg1\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Touchpad_reg1\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Touchpad_reg1\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Touchpad_reg1\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\UTIL_INTEL_WIDI6_E7\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\UTIL_INTEL_WIDI6_E7\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\UTIL_INTEL_WIDI6_E7\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\UTIL_INTEL_WIDI_NEW\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\UTIL_INTEL_WIDI_NEW\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\UTIL_INTEL_WIDI_NEW\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\UTL_CORVUS\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\UTL_CORVUS\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\UTL_CORVUS\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\VMWare\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\VMWare\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\VMWare\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\VMWare\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WDA_App\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WDA_App\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WDA_App\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WDA_App\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WDT\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WDT\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WDT\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WDT\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WLAN_Drvr\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WLAN_Drvr\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WLAN_Drvr\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WLAN_Drvr\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WLAN_Frmw\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WLAN_Frmw\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WLAN_Frmw\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WLAN_Frmw\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5419_Drvr\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5419_Drvr\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5419_Drvr\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5419_Drvr\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5500_APP\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5500_APP\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5500_APP\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5500_APP\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5500_DRVR\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5500_DRVR\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5500_DRVR\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5500_DRVR\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5565_Drvr\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5565_Drvr\WWAN_5565.cmd
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5565_Drvr\WWAN_5565.vbs
ASCII text, with very long lines (355), with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5570_App\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5570_App\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5570_App\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5630_APP\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5630_APP\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5630_APP\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5630_APP\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5630_APP_X4\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5630_APP_X4\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5630_APP_X4\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5630_APP_X4\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5630_DRVR\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5630_DRVR\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5630_DRVR\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5630_DRVR\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5630_Drvr_X4\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5630_Drvr_X4\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5630_Drvr_X4\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5802_Drvr\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5802_Drvr\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5802_Drvr\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5802_Drvr\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5804_Drvr\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5804_Drvr\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5804_Drvr\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5804_Drvr\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5810e_Drvr\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5810e_Drvr\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5810e_Drvr\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WWAN_5810e_Drvr\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WebCamCentral\DrvCfg32.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\WebCamCentral\DrvCfg64.ini
Windows setup INFormation
dropped
C:\Windows\Temp\inv5098_tmp_1\WebCamCentral\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WiMax\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WiMax\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\WiMax\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\WiMax\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Wifi_Broadcom\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Wifi_Broadcom\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\Wifi_Broadcom\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Wifi_Broadcom\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\Wifi_Broadcom\supportdev.cfg
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\XPSOSD\DrvCfg32.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\XPSOSD\DrvCfg64.ini
Generic INItialization configuration [Regular]
dropped
C:\Windows\Temp\inv5098_tmp_1\XPSOSD\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\XPSOSD\PIEInfo.txt
ASCII text, with no line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\dsupt32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\icconfig_sys.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\icconfig_user.xml
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (345), with CRLF, LF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\icpolicy.xsl
XML 1.0 document, ASCII text, with CR line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\icstderrlog.xml
XML 1.0 document, ASCII text
dropped
C:\Windows\Temp\inv5098_tmp_1\icsvc32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\icsvc32.dll.intermediate.manifest
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\invcol.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\libsmbios\PIEConfig.xml
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\libsmbios\smbiosHelp.txt
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\libsmbios\smbiosinfo.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\libsmbios\smbiosinfo.exe.intermediate.manifest
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv5098_tmp_1\msvcp100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\msvcp140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\msvcr100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv5098_tmp_1\vcruntime140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\Temp\inv65D5_tmp\dsupt32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv65D5_tmp\icconfig_sys.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\inv65D5_tmp\icconfig_user.xml
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (345), with CRLF, LF line terminators
dropped
C:\Windows\Temp\inv65D5_tmp\icpolicy.xsl
XML 1.0 document, ASCII text, with CR line terminators
dropped
C:\Windows\Temp\inv65D5_tmp\icprogredir.txt
ASCII text, with CRLF line terminators
modified
C:\Windows\Temp\inv65D5_tmp\icsvc32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv65D5_tmp\invcol.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv65D5_tmp\msvcp100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\inv65D5_tmp\msvcr100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\~DF1C4FA8E7648226DD.TMP
data
dropped
C:\Windows\Temp\~DF489099101C15BDA5.TMP
data
dropped
C:\Windows\Temp\~DF526D8A41D8DABAF5.TMP
data
dropped
C:\Windows\Temp\~DF5B858D7FB1AFCFB7.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF5C036DA607E72E5E.TMP
data
dropped
C:\Windows\Temp\~DF635F4678B45AEFCB.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFABA8FBD401824BDB.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFC52430845855F67F.TMP
data
dropped
C:\Windows\Temp\~DFD646EF3E138C0ED4.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFE3F70735A49CDCF3.TMP
data
dropped
C:\Windows\Temp\~DFED077D5C34C4D61A.TMP
data
dropped
C:\Windows\Temp\~DFF1737B33627BA910.TMP
Composite Document File V2 Document, Cannot read section info
dropped
\Device\ConDrv
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
There are 992 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k UnistackSvcGroup
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\E0CF309ACFAF60FE32F23CEFAF7C1A32DEA1B9F9.msi"
malicious
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding F73FC5BE388AC90391F7C233BAB74653 C
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding E2F957FEC349BF7B483546BFBAD7298A
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 978A58EFDA084F66A555F22C9485C2C4 E Global\MSI0000
malicious
C:\Program Files (x86)\Dell\UpdateService\ServiceShell.exe
"C:\Program Files (x86)\Dell\UpdateService\ServiceShell.exe"
malicious
C:\Windows\System32\msiexec.exe
C:\Windows\System32\MsiExec.exe -Embedding 3D34A1BCEFEFC55E701097BF7FDC5FA7 E Global\MSI0000
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k AppReadiness -p -s AppReadiness
malicious
C:\Program Files (x86)\Dell\UpdateService\ServiceShell.exe
"C:\Program Files (x86)\Dell\UpdateService\ServiceShell.exe"
malicious
C:\Windows\Temp\inv5098_tmp_1\invcol.exe
C:\Windows\TEMP\inv5098_tmp_1\.\invcol.exe -bdir="C:\Windows\system32" "-outc=C:\ProgramData\Dell\UpdateService\Temp\Inventory.xml"
malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{607A0846-7FAA-484B-BAE7-495122EFB1D7}
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{BD98A506-F1A0-4A2A-94F9-1230E3DC00D0}
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{CA5762C4-33FC-4D8D-9D4F-E8335D2893E9}
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{69BB69E2-CA60-448A-B3E2-C8DB9863E765}
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{F036FD47-334C-47B8-A3E5-01A14999B665}
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{B0CAD4F4-7A0D-4ED7-B980-E015B12ECC39}
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{6D39ED87-D5E3-4531-AD77-9BBEDC82DCAB}
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{CD0E6580-BEFA-4156-A6B9-224AE1C144D4}
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{76D3BE47-3108-4355-987E-96FD21AAE7DE}
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{93DCC339-D737-4287-9496-9EB73D0176C2}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{21D9055D-1632-4E84-9D59-F0731B49FF8E}
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{76179EBE-6058-4117-967C-80856ABD982F}
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{5B07184C-5113-4F64-92ED-9A263AB05DA7}
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{10209B81-218A-4EF3-8AF1-19A29A5986F9}
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{996A2DD5-2A2C-48CE-AC11-9EA456FDC2E7}
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{EFD1604A-6248-4498-ADCE-3361829C7E1D}
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{CE560784-D3BB-44F4-9907-C10B218DCC17}
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{1B60702B-AD7B-47CC-B27B-DE367CA1D354}
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{37BB446B-F9AF-4014-A93F-55A3E319780F}
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{2CF4727D-7605-4A5F-8B09-A18BFB920E8A}
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{A04B0DAC-0591-4B8C-BCD7-195AE9B7AD78}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{3C13FFD2-7102-4879-9759-81B32AE3765D}
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{650B6CF9-4E93-4302-87AA-17533D8B885D}
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{C3CDC299-282E-4460-8D30-E1232142E995}
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{5B66BE4B-B0C3-4DC1-97B8-6F778BA1D76E}
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{D661ED2D-688E-41CC-9DEC-612D0C81BA5D}
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{5820DB16-9391-42AA-BF17-584A7B99DCB5}
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{313BCC91-5505-4E94-AED8-911B55BF87B7}
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{55B683E6-2048-47C3-97F1-301495CEBE86}
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{49C79C11-F027-44D7-A2B9-2E9D8A93B766}
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{A5B49D98-6548-4070-BA57-D5A2DDA91B2E}
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{6526D998-314D-4EBF-9570-83D043C29027}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{01428B13-0DF2-4580-86F4-CAC7053EC6FA}
C:\Windows\SysWOW64\sc.exe
"C:\Windows\System32\sc.exe" config DellClientManagementService start= delayed-auto
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\dllhost.exe
C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
C:\Windows\System32\msdtc.exe
C:\Windows\System32\msdtc.exe
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\DismHost.exe
C:\Users\user\AppData\Local\Temp\9F0C1B54-5F0B-402A-BC6E-6BE4F3D097DD\dismhost.exe {FEA8E85D-CA55-4941-A607-6EF73554AE62}
C:\Windows\System32\rundll32.exe
rundll32.exe AppXDeploymentExtensions.OneCore.dll,ShellRefresh
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\dllhost.exe
C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
C:\Program Files (x86)\Dell\UpdateService\Service\InvColPC.exe
"C:\Program Files (x86)\Dell\UpdateService\Service\InvColPC.exe" -progress
C:\Program Files (x86)\Dell\UpdateService\Service\InvColPC.exe
"C:\Program Files (x86)\Dell\UpdateService\Service\InvColPC.exe" -outc=C:\ProgramData\Dell\UpdateService\Temp\Inventory.xml
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Temp\inv5098_tmp\invcol.exe
C:\Windows\TEMP\inv5098_tmp\.\invcol.exe -bdir="C:\Windows\system32" "-progress"
C:\Program Files (x86)\Dell\UpdateService\Service\InvColPC.exe
"C:\Program Files (x86)\Dell\UpdateService\Service\InvColPC.exe" -progress
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Temp\inv65D5_tmp\invcol.exe
C:\Windows\TEMP\inv65D5_tmp\.\invcol.exe -bdir="C:\Windows\system32" "-progress"
There are 54 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://ocsp.suscerte.gob.ve0
unknown
http://schemas.datacontract.org
unknown
http://dellincca.dell.com/crl/externalissuingca2.crl0P
unknown
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
unknown
http://tempuri.org/
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://aia.entrust.net/ts1-chain256.cer
unknown
http://www.suscerte.gob.ve/dpc0
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://www.jclark.com/xtnode-sethttp://xmlsoft.org/XSLT/namespacexsl:import
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://schemas.datacontract.org/2004/07/Dell.Asimov.ServiceShell.Core
unknown
http://schemas.datacontract.org/2004/07/Dell.Asimov.Update
unknown
http://crl.entrust.net/ovcs2.crl
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.flexerasoftware.com0
unknown
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://www.jclark.com/xtmp_1
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://www.dell.com/support
unknown
https://www.dell.com
unknown
http://www.entrust.net/rpa03
unknown
http://exslt.org/common
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://exslt.org/commonxsl:sort
unknown
http://www.w3.or
unknown
http://crl.ver)
unknown
http://ocsp.entrust.net/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRr2bwARTxMtEy9aspRAZg5QFhagQQUgrrWPZfOn89x6JI3
unknown
http://www.dell.com
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://schemas.datacontract.org/2004/07/System.ServiceModel
unknown
http://www.symauth.com/cps0(
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
https://downloads.dell.com/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://www.w3.oh
unknown
http://schemas.dell.com/openmanage/cm/2009/1/1/staticinventory.xsd
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://www.jclark.com/xt
unknown
https://dynamic.t
unknown
https://g.live.com/odclientsettings/Prod-C:
unknown
http://www.symauth.com/rpa00
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
http://icl.com/saxon
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
ftp://http://hrefbaseheadhtml%.20s%ddefault%d%.20scopying
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://aia.entrust.net/ovcs2-chain.p7cg
unknown
http://ocsp.entrust.net/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQQYZiPAAGkmN%2BgbjpL0XWVofDLNAQUKgpvMiwpICF2ar
unknown
https://t0.ssl.ak.dynamic.tiles.virtu
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://support.dell.com
unknown
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
http://crl.entrust.net/g2ca.crl0
unknown
https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://ocsp.entrust.net/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRRKiO2Poi0XFwdRr1PZXruPzTMZAQU75%2B6ebBz8iUeeJ
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://crl.entrust.net/g2ca.crl7
unknown
http://dellincca.dell.com/crl/Dell%20Inc.%20Enterprise%20CA.crl0
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://tempuri.org/H
unknown
http://crl.entrust.net/g2ca.crlE
unknown
http://schemas.datacontract.org/2004/07/Serialize.Linq.Nodes
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://schemas.xmlsoap.org/ws/2004/06/addressingex
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
http://crl.entrust.net/csbr1.crl
unknown
http://www.apache.org/).
unknown
https://dellupdater.dell.com/non_du/ClientService/Catalog/Platform/
unknown
http://crl.entrust.net/g2ca.crlM
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://crl.entrust.net/g2ca.crl0;
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
http://schemas.datacontract.org/2004/07/Serialize.Linq.NodesH
unknown
http://reactivex.io/0
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/rol
unknown
http://dellincca.dell.com/aia/externalissuingca2.crt0
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dellupdater.dell.com
unknown
downloads.dell.com
unknown

IPs

IP
Domain
Country
Malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\WMI\Security
c688cf83-9945-5ff6-0e1e-1ff1f8a2ec9a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\532a59.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\532a59.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\65A7D1482CF87C6488211CFA141070D9
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\062120A0A494B0E48B45E17D49F84CB8
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\34BA8AE011BA3E541935D44688BC8F66
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DE2C59E7802446F43B3F87DAA5B51034
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\32052825B3FE73D43AA99033FAAE3702
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F44CB0D3B2699E8448F98184CE633F46
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\22FFE04A362B2344497C12468FB74225
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3F0BE64F1163544488CD5E5EC7B7D0EE
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FA9B159C48F06B346AD1904E8139F0EB
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C51911BB4BDF84C468CABF43C610B803
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0E471674163ABFA4A85A03B52D92F20E
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6E6A186E2A6B1F54095B429C5C70E4E5
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\EEFB9C871258A9740B5BB0548A7BBD60
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\83C3714D2B9B1DC41A8D0401F902DD23
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\06DD983C6B129774F9E8BD06DF08EE47
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5F180937A40E09643A89B10914F4FA5F
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3CAFA7F2E8767144E80C8BC7EDFD7D3A
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1B6D73EB33AA2E34693E6E68520FFD64
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DC494BA12F1376E4491BCB162B8480BE
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A16482E43D52A0248B1DF6E10CC58761
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\78F0720172472B749BFA012C343E4C82
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FCB5CD4E1B0B4424B9119EF0C31BC3F2
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\776CA74DB2925AE4DBA00A7C8FB06E00
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3526EF4E0EDFE0408EBCF1CB702E04E
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\74DC55D4425BF0A4EAE6C818A9CD3CA2
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D2529E72798DD43429B10E15EC75D658
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\05FC9891776881F419DEC952E92E271C
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1B570DC0E3AED4B4DAD5A44E18C99815
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\47900A411BF68584F93E8278DE5F2D53
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9F7124B17258A874C9C589D0E95466B2
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6B3433F1191E0F244A612C3A5AD9E038
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3307147D3E8C06948AF434C47385F5F5
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D8113D47C0533184182FFB9B7AE1F875
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\33FB30662CE270744B65915BC127FE4C
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0080582425FC5A14F8C68F6B19748693
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BFDE85EB490F1E646809CB0691F299DD
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9FD8492B72E96DC498F74D7582043E4F
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\072B534376FAD74429742A2359DE81AE
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2E0D7D25A8ED4CE43994828A0E4E362F
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\EC98BC01E7E40B4428E8355255E2B8C7
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BB24FAE912DE45649890111C11B7D275
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\952893AD174B97E45911361F41AB162E
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6CDCE36B97A9C6A46AF522BE18ED4637
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\366BFD9CDCDF13F42B05974E6FE2BF64
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1A9E5C643B3B5924B93DE191F30F0136
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F1EF641606C9AEF4EB1A84CFC867D4CD
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A75AEADEA23DA3C41884D11A60C160E4
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\07B5667FCA97C9049981CB4D233ACE63
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\4302439B4C5D7894D9405E0856B73EC0
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\4E9AFF1F630251E43A4805BD11BD6C0A
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\4FF82E24CC44AEB409A785D103030BF3
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D93BEAC53317CCC498FD124AC4733AC7
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B57229E945DBDAE4892E27A430CAE6B9
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\70B106FDF95700C46BC94AA45DE265E7
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\16EA92A2292F92043B182045B7BE4FB4
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6631C9420B72A5E41A4B3F29955A985A
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CF1D0DD3B6B4A9B44849F33A1E8E2DB6
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\65411A76061F23542846D066C913B8CE
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\914FBB08790D05346992AC055214C39E
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BC1BEC76C3CFA4E40B72221572FD9BE5
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D74FE1369B9CDF44BAC52013265D575C
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E6E8C462E8EE5524EB377193673D0695
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F797F4EF3CD2FC44FB53F6AEA1FA3335
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D927C304C3254184BB91DBF0323421D5
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\4809B8966C2BD4249B4B72BE6D23026B
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2A4C5FC4A53367946A900CC48378C367
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BAAFFB47272C04F409E2385C307AA4A9
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6E340020A80D3714FB8F08A2792EA44E
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\4E4458E3E186E4A4A96825C7EF42314F
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\835EE99661D0A344DBCB2ADE8B483CE3
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2ECC716CCA4A7B949AF5CAA0DA52BA09
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AF03C230EEAC887459C921F443B440A2
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F223E70ACA992734DB64AAE42E81AA01
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2F7D4416BD6B8D34FB7C5A5EE08FE386
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BD0CE5824BD62FE489AA0BF1A43C3988
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C129BAD6FC09D1C4CAC89547CD120CBF
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DE43A7EA5546EB5449DF77F61B3EF573
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F67382FCCC54BD44C9CC47439A3081CA
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9117A7364D9383A45919E094D0E8663C
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\424CBF062E29CD6478FE3490890E7963
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F5A20324011DC2F438D7284825C95BA8
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\22E345B0DC3DAA448B9492AB4F24ACE4
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files\Dell\CommandUpdate\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files\Dell\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Dell\UpdateService\Service\Assets\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Dell\UpdateService\Service\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Dell\UpdateService\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Dell\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Windows\Installer\{5669AB71-1302-4412-8DA1-CB69CD7B7324}\
HKEY_LOCAL_MACHINE\SOFTWARE\DELL\UpdateService\Clients\CommandUpdate\Preferences\Settings\General
UserConsent
HKEY_LOCAL_MACHINE\SOFTWARE\DELL\UpdateService\Clients\CommandUpdate\Preferences\Settings\General
SuspendBitLocker
HKEY_LOCAL_MACHINE\SOFTWARE\DELL\UpdateService\Clients\CommandUpdate\Preferences\Settings
InstallPath
HKEY_LOCAL_MACHINE\SOFTWARE\DELL\UpdateService\Clients\CommandUpdate\Preferences\Settings
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\DELL\UpdateService\Clients\CommandUpdate\Preferences\Settings
AppCode
HKEY_LOCAL_MACHINE\SOFTWARE\DELL\UpdateService\Clients\CommandUpdate\Preferences\CFG
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\DELL\UpdateService\Clients
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\DELL\UpdateService\Clients\CommandUpdate\Preferences\Settings\AdvancedDriverRestore
IsAdvancedDriverRestoreEnabled
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
RegOwner
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
RegCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
ProductID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5669AB71-1302-4412-8DA1-CB69CD7B7324}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5669AB71-1302-4412-8DA1-CB69CD7B7324}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5669AB71-1302-4412-8DA1-CB69CD7B7324}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5669AB71-1302-4412-8DA1-CB69CD7B7324}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5669AB71-1302-4412-8DA1-CB69CD7B7324}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5669AB71-1302-4412-8DA1-CB69CD7B7324}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5669AB71-1302-4412-8DA1-CB69CD7B7324}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5669AB71-1302-4412-8DA1-CB69CD7B7324}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5669AB71-1302-4412-8DA1-CB69CD7B7324}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5669AB71-1302-4412-8DA1-CB69CD7B7324}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5669AB71-1302-4412-8DA1-CB69CD7B7324}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5669AB71-1302-4412-8DA1-CB69CD7B7324}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5669AB71-1302-4412-8DA1-CB69CD7B7324}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5669AB71-1302-4412-8DA1-CB69CD7B7324}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5669AB71-1302-4412-8DA1-CB69CD7B7324}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5669AB71-1302-4412-8DA1-CB69CD7B7324}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5669AB71-1302-4412-8DA1-CB69CD7B7324}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5669AB71-1302-4412-8DA1-CB69CD7B7324}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5669AB71-1302-4412-8DA1-CB69CD7B7324}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5669AB71-1302-4412-8DA1-CB69CD7B7324}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5669AB71-1302-4412-8DA1-CB69CD7B7324}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5669AB71-1302-4412-8DA1-CB69CD7B7324}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5669AB71-1302-4412-8DA1-CB69CD7B7324}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\19F88496B5EB1E042920DC97C39A84DE
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5669AB71-1302-4412-8DA1-CB69CD7B7324}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\17BA966520312144D81ABC96DCB73742
App
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\Features
App
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\17BA966520312144D81ABC96DCB73742
Service
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\Features
Service
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\17BA966520312144D81ABC96DCB73742\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\17BA966520312144D81ABC96DCB73742
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\17BA966520312144D81ABC96DCB73742
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\17BA966520312144D81ABC96DCB73742
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\17BA966520312144D81ABC96DCB73742
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\17BA966520312144D81ABC96DCB73742
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\17BA966520312144D81ABC96DCB73742
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\17BA966520312144D81ABC96DCB73742
ProductIcon
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\17BA966520312144D81ABC96DCB73742
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\17BA966520312144D81ABC96DCB73742
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\17BA966520312144D81ABC96DCB73742
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\19F88496B5EB1E042920DC97C39A84DE
17BA966520312144D81ABC96DCB73742
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\17BA966520312144D81ABC96DCB73742\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\17BA966520312144D81ABC96DCB73742\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\17BA966520312144D81ABC96DCB73742\SourceList\Media
DiskPrompt
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\17BA966520312144D81ABC96DCB73742\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\17BA966520312144D81ABC96DCB73742
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\17BA966520312144D81ABC96DCB73742\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings
JITDebug
HKEY_USERS.DEFAULT\Software\Microsoft\Windows Script\Settings
JITDebug
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
AutoBackupLogFiles
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\DellClientManagementService
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\503006091D97D4F5AE39F7CBE7927D7D652D3431
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\503006091D97D4F5AE39F7CBE7927D7D652D3431
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8CF427FD790C3AD166068DE81E57EFBB932272D4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8CF427FD790C3AD166068DE81E57EFBB932272D4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\503006091D97D4F5AE39F7CBE7927D7D652D3431
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\503006091D97D4F5AE39F7CBE7927D7D652D3431
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8CF427FD790C3AD166068DE81E57EFBB932272D4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8CF427FD790C3AD166068DE81E57EFBB932272D4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Ole\Instrumentation
InstrumentationLogFileDir
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Ole\Instrumentation
TraceAlwaysEnabled
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\Applications\DellInc.DellCommandUpdate_3.1.58.0_neutral_~_htrsf667h5kn2
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\Staged\DellInc.DellCommandUpdate_htrsf667h5kn2\DellInc.DellCommandUpdate_3.1.58.0_neutral_~_htrsf667h5kn2
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\Staged\DellInc.DellCommandUpdate_htrsf667h5kn2\DellInc.DellCommandUpdate_3.1.58.0_x64__htrsf667h5kn2
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy
Operation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\Metadata
OnStart
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\DellInc.DellCommandUpdate_htrsf667h5kn2\Metadata
LockScreenApps
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\Microsoft.MicrosoftEdge.Stable_8wekyb3d8bbwe\Metadata
LockScreenApps
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation\MicrosoftWindows.Client.CBS_cw5n1h2txyewy
InstallState
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation\MicrosoftWindows.Client.CBS_cw5n1h2txyewy
InstallProgress
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\MicrosoftWindows.Client.CBS_cw5n1h2txyewy
registerPackage:MicrosoftWindows.Client.CBS_120.2212.4180.0_neutral_neutral_cw5n1h2txyewy
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\MicrosoftWindows.Client.CBS_cw5n1h2txyewy
install::MicrosoftWindows.Client.CBS_cw5n1h2txyewy
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\S-1-5-21-2246122658-3693405117-2476756634-1003\MicrosoftWindows.Client.CBS_120.2212.4180.0_neutral_neutral_cw5n1h2txyewy
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\S-1-5-21-2246122658-3693405117-2476756634-1003\MicrosoftWindows.Client.CBS_120.2212.4180.0_neutral_neutral_cw5n1h2txyewy
LastReturnValue
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\S-1-5-21-2246122658-3693405117-2476756634-1003\MicrosoftWindows.Client.CBS_120.2212.4180.0_neutral_neutral_cw5n1h2txyewy
NumberOfAttempts
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\Metadata
OnStart
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy
InstallState
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy
InstallProgress
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy
registerPackage:Microsoft.Windows.SecureAssessmentBrowser_10.0.19041.1023_neutral_neutral_cw5n1h2txyewy
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy
install::Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\S-1-5-21-2246122658-3693405117-2476756634-1003\Microsoft.Windows.SecureAssessmentBrowser_10.0.19041.1023_neutral_neutral_cw5n1h2txyewy
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\S-1-5-21-2246122658-3693405117-2476756634-1003\Microsoft.Windows.SecureAssessmentBrowser_10.0.19041.1023_neutral_neutral_cw5n1h2txyewy
LastReturnValue
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\S-1-5-21-2246122658-3693405117-2476756634-1003\Microsoft.Windows.SecureAssessmentBrowser_10.0.19041.1023_neutral_neutral_cw5n1h2txyewy
NumberOfAttempts
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\Metadata
OnStart
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation\Microsoft.Windows.Search_cw5n1h2txyewy
InstallProgress
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\Microsoft.Windows.Search_cw5n1h2txyewy
registerPackage:Microsoft.Windows.Search_10.0.19041.1949_neutral_neutral_cw5n1h2txyewy
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\Microsoft.Windows.Search_cw5n1h2txyewy
install::Microsoft.Windows.Search_cw5n1h2txyewy
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\S-1-5-21-2246122658-3693405117-2476756634-1003\Microsoft.Windows.Search_10.0.19041.1949_neutral_neutral_cw5n1h2txyewy
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\S-1-5-21-2246122658-3693405117-2476756634-1003\Microsoft.Windows.Search_10.0.19041.1949_neutral_neutral_cw5n1h2txyewy
LastReturnValue
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\S-1-5-21-2246122658-3693405117-2476756634-1003\Microsoft.Windows.Search_10.0.19041.1949_neutral_neutral_cw5n1h2txyewy
NumberOfAttempts
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\Microsoft.Windows.Search_cw5n1h2txyewy\Metadata
OnStart
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\Metadata
OnStart
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy
InstallState
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy
InstallProgress
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy
registerPackage:Microsoft.Windows.CloudExperienceHost_10.0.19041.1266_neutral_neutral_cw5n1h2txyewy
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy
install::Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\S-1-5-21-2246122658-3693405117-2476756634-1003\Microsoft.Windows.CloudExperienceHost_10.0.19041.1266_neutral_neutral_cw5n1h2txyewy
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\S-1-5-21-2246122658-3693405117-2476756634-1003\Microsoft.Windows.CloudExperienceHost_10.0.19041.1266_neutral_neutral_cw5n1h2txyewy
LastReturnValue
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\S-1-5-21-2246122658-3693405117-2476756634-1003\Microsoft.Windows.CloudExperienceHost_10.0.19041.1266_neutral_neutral_cw5n1h2txyewy
NumberOfAttempts
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\Metadata
OnStart
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\Metadata
OnStart
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\Microsoft.MicrosoftEdge.Stable_8wekyb3d8bbwe
stageUserData:Microsoft.MicrosoftEdge.Stable_92.0.902.67_neutral__8wekyb3d8bbwe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\Microsoft.MicrosoftEdge.Stable_8wekyb3d8bbwe
install::Microsoft.MicrosoftEdge.Stable_8wekyb3d8bbwe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\Metadata
OnStart
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\Metadata
OnStart
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\Metadata
OnStart
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\Microsoft.MicrosoftEdge.Stable_8wekyb3d8bbwe\Metadata
OnStart
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\Microsoft.MicrosoftEdge.Stable_8wekyb3d8bbwe\Metadata
LockScreenApps
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation\DellInc.DellCommandUpdate_htrsf667h5kn2
InstallState
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation\DellInc.DellCommandUpdate_htrsf667h5kn2
InstallProgress
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\DellInc.DellCommandUpdate_htrsf667h5kn2
stageUserData:DellInc.DellCommandUpdate_3.1.58.0_neutral_~_htrsf667h5kn2
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\DellInc.DellCommandUpdate_htrsf667h5kn2
registerPackage:DellInc.DellCommandUpdate_3.1.58.0_neutral_~_htrsf667h5kn2
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003\Queue\DellInc.DellCommandUpdate_htrsf667h5kn2
install::DellInc.DellCommandUpdate_htrsf667h5kn2
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\S-1-5-21-2246122658-3693405117-2476756634-1003\DellInc.DellCommandUpdate_3.1.58.0_neutral_~_htrsf667h5kn2
Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\S-1-5-21-2246122658-3693405117-2476756634-1003\DellInc.DellCommandUpdate_3.1.58.0_neutral_~_htrsf667h5kn2
LastReturnValue
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\S-1-5-21-2246122658-3693405117-2476756634-1003\DellInc.DellCommandUpdate_3.1.58.0_neutral_~_htrsf667h5kn2
NumberOfAttempts
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-18
UserState
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003
UserState
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-18
UserState
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation\Microsoft.MicrosoftEdge.Stable_8wekyb3d8bbwe
InstallState
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation\Microsoft.MicrosoftEdge.Stable_8wekyb3d8bbwe
InstallProgress
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation\Microsoft.MicrosoftEdge.Stable_8wekyb3d8bbwe
InstallProgress
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation\Microsoft.MicrosoftEdge.Stable_8wekyb3d8bbwe
InstallState
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\S-1-5-21-2246122658-3693405117-2476756634-1003\Microsoft.MicrosoftEdge.Stable_92.0.902.67_neutral__8wekyb3d8bbwe
NumberOfAttempts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation\DellInc.DellCommandUpdate_htrsf667h5kn2
InstallProgress
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation\DellInc.DellCommandUpdate_htrsf667h5kn2
InstallProgress
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation\DellInc.DellCommandUpdate_htrsf667h5kn2
InstallProgress
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation\DellInc.DellCommandUpdate_htrsf667h5kn2
InstallProgress
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Package Installation
PackageListVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppReadiness\S-1-5-21-2246122658-3693405117-2476756634-1003
UserState
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_LOCAL_MACHINE\SOFTWARE\DELL\UpdateService\Service\UpdateScheduler
CurrentActionEvent
HKEY_LOCAL_MACHINE\SOFTWARE\DELL\UpdateService\Service\UpdateScheduler
CurrentUpdateState
HKEY_LOCAL_MACHINE\SOFTWARE\DELL\UpdateService\Service\UpdateScheduler
CurrentActionEvent
There are 286 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5D1887D000
stack
page read and write
2825B8FD000
heap
page read and write
7FFECC020000
trusted library allocation
page read and write
1F13CE00000
heap
page read and write
1602DA12000
heap
page read and write
28ECF980000
trusted library allocation
page read and write
1A279CCA000
heap
page read and write
1A279BDA000
heap
page read and write
2AF6C02B000
heap
page read and write
75E000
heap
page read and write
21240B36000
heap
page read and write
7FFECBDFA000
trusted library allocation
page read and write
EE57A7E000
unkown
page readonly
1A279BAF000
heap
page read and write
1945A8F1000
heap
page read and write
7FFECC0D0000
trusted library allocation
page read and write
1A27A19C000
heap
page read and write
1A27976C000
heap
page read and write
292FD413000
unkown
page read and write
87B43FE000
stack
page read and write
2AF6C4B6000
heap
page read and write
1602D9DC000
heap
page read and write
EE577FE000
unkown
page readonly
2AF6C342000
unkown
page readonly
F73B57E000
stack
page read and write
1F1C0448000
heap
page read and write
7FFECBC50000
trusted library allocation
page execute and read and write
1602D9EE000
heap
page read and write
1A27A1E0000
heap
page read and write
C80A3FB000
stack
page read and write
1A279CCC000
heap
page read and write
1A27A4DA000
heap
page read and write
21BC5785000
heap
page read and write
1A279DE0000
heap
page read and write
F5E000
heap
page read and write
E23BD4C000
stack
page read and write
1B47B952000
heap
page read and write
1A279B17000
heap
page read and write
1A279D2A000
heap
page read and write
FD9000
heap
page read and write
1A279B54000
heap
page read and write
28871712000
heap
page read and write
1B47C4A2000
heap
page read and write
28260F6B000
heap
page read and write
1A279AA7000
heap
page read and write
282822C3000
heap
page read and write
7FF629957000
unkown
page readonly
231C5CC7000
heap
page read and write
A6864FF000
stack
page read and write
2AF53CC0000
trusted library allocation
page read and write
42A000
unkown
page write copy
F73BC7E000
unkown
page readonly
1C74B540000
heap
page read and write
6CCD4000
unkown
page execute read
1A27A66B000
heap
page read and write
2AF53D18000
trusted library allocation
page read and write
1F13B4C6000
heap
page read and write
1A279BD6000
heap
page read and write
28ED05E4000
heap
page read and write
21930722000
heap
page read and write
1A279FB4000
heap
page read and write
288716FA000
heap
page read and write
7FFECB880000
trusted library allocation
page read and write
1A27A342000
heap
page read and write
C80AD78000
stack
page read and write
1A279762000
heap
page read and write
13A0E863000
heap
page read and write
231C5CC2000
heap
page read and write
1B47C478000
heap
page read and write
21BC3D37000
heap
page read and write
1A279AAC000
heap
page read and write
2825C1A0000
heap
page read and write
6CCAF000
unkown
page execute read
23FF5BFA000
heap
page read and write
1C83D37B000
heap
page read and write
7FFECBE60000
trusted library allocation
page read and write
5D1797E000
stack
page readonly
A5C17E000
stack
page read and write
2AF5387B000
trusted library allocation
page read and write
1A279E08000
heap
page read and write
BCE000
stack
page read and write
7FFECBF10000
trusted library allocation
page read and write
1A27A4B5000
heap
page read and write
28ED06E0000
heap
page read and write
2825C11C000
heap
page read and write
245C456C000
heap
page read and write
1A279BFD000
heap
page read and write
1A27A164000
heap
page read and write
1A279FFA000
heap
page read and write
23FF5BD1000
heap
page read and write
ED0000
heap
page read and write
245C457C000
heap
page read and write
2AF53C0E000
trusted library allocation
page read and write
2AF52A20000
trusted library allocation
page read and write
139B0B69000
heap
page read and write
1A279720000
heap
page read and write
1A27A48D000
heap
page read and write
1A279AF9000
heap
page read and write
181BB02B000
heap
page read and write
7FFF22FC1000
unkown
page execute read
1A27A625000
heap
page read and write
7FFECBAB0000
trusted library allocation
page read and write
88B697E000
stack
page read and write
28EB7950000
heap
page execute and read and write
2775CFE000
stack
page read and write
13A0E89F000
heap
page read and write
245C4571000
heap
page read and write
7FFECBD25000
trusted library allocation
page read and write
2F99CFF000
stack
page read and write
1A27A0F2000
heap
page read and write
5D17F7E000
unkown
page readonly
28260F1D000
heap
page read and write
231C5CA0000
heap
page read and write
7FFECC160000
trusted library allocation
page read and write
139B0B8C000
heap
page read and write
28ED046C000
heap
page read and write
1A27A1D7000
heap
page read and write
100E000
heap
page read and write
2AF531B3000
trusted library allocation
page read and write
7FF629966000
unkown
page read and write
1A27A1A4000
heap
page read and write
1A279D2D000
heap
page read and write
7FFECB956000
trusted library allocation
page execute and read and write
1A27972A000
heap
page read and write
24926082000
heap
page read and write
2825B82B000
heap
page read and write
28EC7971000
trusted library allocation
page read and write
28EB80D9000
trusted library allocation
page read and write
7FFECC120000
trusted library allocation
page read and write
1945A8FF000
heap
page read and write
264F46C0000
heap
page read and write
E29AAFE000
stack
page read and write
1F0EB150000
heap
page read and write
1602D9E2000
heap
page read and write
21240AF0000
heap
page read and write
4A7E2FE000
unkown
page readonly
1A279EF0000
heap
page read and write
231C5CE1000
heap
page read and write
1A27A0B2000
heap
page read and write
1753C140000
heap
page read and write
1945A90B000
heap
page read and write
1A27799A000
heap
page read and write
28260C52000
trusted library allocation
page read and write
181BB01F000
heap
page read and write
1A27A118000
heap
page read and write
7FF61EDDA000
unkown
page read and write
3DACEFE000
stack
page read and write
7FFECBCE6000
trusted library allocation
page read and write
28EB7E4B000
trusted library allocation
page read and write
A1007FE000
stack
page read and write
28260D30000
trusted library allocation
page read and write
6CCD7000
unkown
page execute read
7FF629966000
unkown
page write copy
1EB47B5A000
heap
page read and write
1A27976F000
heap
page read and write
1BD8CF28000
heap
page read and write
7FF7C0060000
unkown
page readonly
7FF462480000
trusted library allocation
page execute and read and write
1A279CD7000
heap
page read and write
1B47C3F0000
heap
page read and write
FE8000
heap
page read and write
9C000
stack
page read and write
690000
heap
page read and write
7FFECC0CD000
trusted library allocation
page read and write
1A279E6F000
heap
page read and write
7FFECBA12000
trusted library allocation
page read and write
A69000
unkown
page readonly
1001FE000
stack
page read and write
28EB72B0000
unkown
page readonly
264F4717000
heap
page read and write
181BB011000
heap
page read and write
7FFECC0E1000
trusted library allocation
page read and write
139B0B89000
heap
page read and write
7FFECBF15000
trusted library allocation
page read and write
1A27A57D000
heap
page read and write
23FF5BE7000
heap
page read and write
1B47B8EF000
heap
page read and write
AB0000
heap
page read and write
27942790000
heap
page read and write
1A279DFE000
heap
page read and write
29ED6313000
heap
page read and write
1B47B8FC000
heap
page read and write
E23C4FE000
stack
page read and write
1A279AA0000
heap
page read and write
23FF5BEF000
heap
page read and write
EE56CFB000
stack
page read and write
1945A8C0000
heap
page read and write
1A279C17000
heap
page read and write
88B6C7E000
trusted library allocation
page read and write
1C83EC15000
heap
page read and write
1A27A34A000
heap
page read and write
1B572DDE000
heap
page read and write
2AF53BCC000
trusted library allocation
page read and write
7FF7C0086000
unkown
page read and write
1945A906000
heap
page read and write
2A37CFE000
stack
page read and write
7FFECBF40000
trusted library allocation
page read and write
1A27A269000
heap
page read and write
181BB018000
heap
page read and write
292FD310000
trusted library allocation
page read and write
262DFFB3000
heap
page read and write
1945A8F3000
heap
page read and write
17311DB6000
heap
page read and write
1A279D43000
heap
page read and write
28260F00000
heap
page read and write
28EB72E8000
unkown
page readonly
1A27A20D000
heap
page read and write
C809B73000
stack
page read and write
231C5E70000
heap
page read and write
EE56DFE000
unkown
page readonly
17311D89000
heap
page read and write
1A27A342000
heap
page read and write
28ED01F2000
unkown
page readonly
1B47B949000
heap
page read and write
1A279775000
heap
page read and write
249260AF000
heap
page read and write
1F13B450000
heap
page read and write
7FFECC010000
trusted library allocation
page read and write
1A27A63E000
heap
page read and write
28ED070C000
heap
page read and write
420000
unkown
page execute read
1A2779B7000
heap
page read and write
196000
stack
page read and write
1A279C57000
heap
page read and write
7FFECC025000
trusted library allocation
page read and write
181BB01E000
heap
page read and write
38D5FFE000
stack
page read and write
A6862FE000
stack
page read and write
2825B913000
heap
page read and write
1A27798D000
heap
page read and write
7FFF22FF1000
unkown
page execute read
21240B50000
heap
page read and write
1A279AFF000
heap
page read and write
24926070000
heap
page read and write
1A279BEC000
heap
page read and write
2775DFE000
stack
page read and write
1BD8CE40000
heap
page read and write
2AF6BF4C000
unkown
page readonly
2AF6C3F6000
heap
page read and write
1AAF61E0000
heap
page read and write
1A279B37000
heap
page read and write
3DACFFE000
stack
page read and write
1945A8E9000
heap
page read and write
7FFECC030000
trusted library allocation
page execute and read and write
1A27A4A3000
heap
page read and write
1FC21270000
heap
page read and write
1753C110000
heap
page read and write
403000
unkown
page readonly
E29C139000
stack
page read and write
1A27A0F0000
heap
page read and write
1A279D17000
heap
page read and write
23FF5BB0000
heap
page read and write
29ED6227000
heap
page read and write
181BB01C000
heap
page read and write
1A277992000
heap
page read and write
7FFECBE52000
trusted library allocation
page read and write
1030000
heap
page read and write
B4535FE000
stack
page read and write
1A279FE7000
heap
page read and write
7FFECBD00000
trusted library allocation
page read and write
1F0EB19D000
heap
page read and write
222CFF000
stack
page read and write
2825C1A0000
heap
page read and write
1A279738000
heap
page read and write
1A279C58000
heap
page read and write
1A279ED9000
heap
page read and write
1A27A2AE000
heap
page read and write
28ED0D08000
unkown
page readonly
7FF495880000
trusted library allocation
page execute and read and write
292FD400000
unkown
page read and write
2AF6C002000
heap
page read and write
A4F000
stack
page read and write
C80D47D000
stack
page read and write
E29C736000
stack
page read and write
1602DA22000
heap
page read and write
1B47B8B9000
heap
page read and write
23FF5BD7000
heap
page read and write
1C74B500000
heap
page read and write
C80D67C000
stack
page read and write
7FFECBFE0000
trusted library allocation
page read and write
1B572DCD000
heap
page read and write
7FFECBE32000
trusted library allocation
page read and write
1A27A31F000
heap
page read and write
1A27A1D9000
heap
page read and write
7FFECBB44000
trusted library allocation
page read and write
1B5747A0000
heap
page read and write
2DE8F971000
heap
page read and write
1BD8CDB0000
heap
page read and write
A1005FF000
stack
page read and write
EE567FE000
unkown
page readonly
7FF7C0086000
unkown
page read and write
282822F9000
heap
page read and write
264F4711000
heap
page read and write
1A279759000
heap
page read and write
28EB7852000
unkown
page readonly
1A27795B000
heap
page read and write
2AF6BDC0000
trusted library allocation
page read and write
1A27A07B000
heap
page read and write
7FF61EDB1000
unkown
page execute read
FD2000
heap
page read and write
10A4000
heap
page read and write
1AAF7C45000
heap
page read and write
2AF6C32F000
unkown
page readonly
28EB7E4F000
trusted library allocation
page read and write
C80B478000
stack
page read and write
1A279B1D000
heap
page read and write
7FFECBD20000
trusted library allocation
page read and write
1A27A33E000
heap
page read and write
6C959FF000
stack
page read and write
7FFECBBBA000
trusted library allocation
page read and write
1A279D43000
heap
page read and write
1A279F3D000
heap
page read and write
1F1C0457000
heap
page read and write
1A279A75000
heap
page read and write
2AF63251000
trusted library allocation
page read and write
1A279AC6000
heap
page read and write
2AF6C2AD000
unkown
page readonly
282822D8000
heap
page read and write
7FFECBCF2000
trusted library allocation
page read and write
7FFECBA00000
trusted library allocation
page read and write
E29C33A000
stack
page read and write
69E000
heap
page read and write
73D96000
unkown
page write copy
1B572DD6000
heap
page read and write
1A27A10C000
heap
page read and write
1B47B898000
heap
page read and write
D55A8FE000
stack
page read and write
28EB7E1A000
trusted library allocation
page read and write
FFB000
heap
page read and write
1A27976C000
heap
page read and write
1A2779C6000
heap
page read and write
2AF6C1D2000
unkown
page readonly
1A27A05E000
heap
page read and write
28260F61000
heap
page read and write
2AF6C782000
unkown
page readonly
2825C640000
trusted library section
page readonly
2AF6B9D0000
heap
page read and write
1A27A31E000
heap
page read and write
10F0000
heap
page read and write
1A27A225000
heap
page read and write
2AF6BC30000
trusted library allocation
page read and write
6CD53000
unkown
page read and write
1A27A0C2000
heap
page read and write
28871717000
heap
page read and write
6CD56000
unkown
page write copy
1A27A3C4000
heap
page read and write
630000
heap
page read and write
1018000
heap
page read and write
1BE82FE000
stack
page read and write
1A27A2F5000
heap
page read and write
C80C77C000
stack
page read and write
7FFECBDCA000
trusted library allocation
page read and write
1A279BC9000
heap
page read and write
7FFECBB46000
trusted library allocation
page read and write
1A279B35000
heap
page read and write
2825C1E0000
heap
page read and write
7FFECC000000
trusted library allocation
page read and write
28ED01B0000
unkown
page readonly
1F1C0468000
heap
page read and write
7FFECBBDE000
trusted library allocation
page read and write
28260E9E000
heap
page read and write
A415DFF000
stack
page read and write
7FFF22FA1000
unkown
page execute read
288716D0000
heap
page read and write
28EB7942000
unkown
page readonly
2825B83F000
heap
page read and write
1A27989A000
heap
page read and write
58E000
heap
page read and write
1A279FE3000
heap
page read and write
1A279FAB000
heap
page read and write
1A27A59D000
heap
page read and write
1602DA10000
heap
page read and write
7FFF22F04000
unkown
page readonly
1A27A302000
heap
page read and write
E23C0FF000
stack
page read and write
55E000
stack
page read and write
696E519000
stack
page read and write
292FD500000
trusted library allocation
page read and write
2AF529C0000
heap
page read and write
1A279C0B000
heap
page read and write
28260C5C000
trusted library allocation
page read and write
1AAF6220000
heap
page read and write
E19C47E000
stack
page read and write
88B6C7E000
trusted library allocation
page read and write
CED4CFF000
stack
page read and write
B00000
heap
page read and write
1602DA1D000
heap
page read and write
2AF531A1000
trusted library allocation
page read and write
38D5DFC000
stack
page read and write
1A279724000
heap
page read and write
1B47B95B000
heap
page read and write
1A2779D0000
heap
page read and write
1B47C3F0000
heap
page read and write
23FF5BEB000
heap
page read and write
23FF5C05000
heap
page read and write
1A279733000
heap
page read and write
2825B7A0000
trusted library allocation
page read and write
245C4588000
heap
page read and write
E29BE3A000
stack
page read and write
EE569FE000
unkown
page readonly
2AF6C1D0000
unkown
page readonly
405000
unkown
page read and write
181BCB10000
heap
page read and write
1A279736000
heap
page read and write
FE2000
heap
page read and write
28ED00BE000
heap
page read and write
7FFECBB79000
trusted library allocation
page read and write
7FFECBCD9000
trusted library allocation
page read and write
7FFF22FE3000
unkown
page read and write
28ED0614000
heap
page read and write
1A277AF0000
heap
page read and write
28260E59000
heap
page read and write
1BE80FF000
stack
page read and write
28EB7838000
unkown
page readonly
7FFECBCF0000
trusted library allocation
page read and write
1A27A0F8000
heap
page read and write
1AAF622D000
heap
page read and write
7FFECC020000
trusted library allocation
page read and write
EE578FE000
stack
page read and write
1C74CF50000
heap
page read and write
B4531FE000
stack
page read and write
1A279FD1000
heap
page read and write
1A279B05000
heap
page read and write
1A27A563000
heap
page read and write
1A27975A000
heap
page read and write
520000
heap
page read and write
7FFECBF4C000
trusted library allocation
page read and write
7FFECBFB0000
trusted library allocation
page read and write
16CE2829000
heap
page read and write
1B47B897000
heap
page read and write
1A279F66000
heap
page read and write
1A27A55E000
heap
page read and write
21BC3CD0000
heap
page read and write
1A27A120000
heap
page read and write
EEC000
heap
page read and write
1A279A8A000
heap
page read and write
222BFE000
stack
page read and write
1BD8CE62000
heap
page read and write
E9046FF000
stack
page read and write
1A279BBB000
heap
page read and write
EE0000
heap
page read and write
7FFECBCE0000
trusted library allocation
page read and write
422000
unkown
page readonly
23FF5BEB000
heap
page read and write
1A27A08B000
heap
page read and write
1B47B902000
heap
page read and write
1A279BD3000
heap
page read and write
231C5CDA000
heap
page read and write
2AF6C547000
heap
page read and write
D9153FF000
stack
page read and write
7FFECBE02000
trusted library allocation
page read and write
1A279BFB000
heap
page read and write
29323FE000
stack
page read and write
28ED03FE000
heap
page read and write
23FF5BFB000
heap
page read and write
1F0EB177000
heap
page read and write
1A279C30000
heap
page read and write
1A27A423000
heap
page read and write
1A279B23000
heap
page read and write
1A27A5C4000
heap
page read and write
1A279760000
heap
page read and write
2A80EA87000
heap
page read and write
7FFECBA09000
trusted library allocation
page read and write
1A27A1E1000
heap
page read and write
28EB7802000
unkown
page readonly
7FFECBE22000
trusted library allocation
page read and write
F4C000
heap
page read and write
1A27793F000
heap
page read and write
429000
unkown
page read and write
1B47B943000
heap
page read and write
1D089210000
heap
page read and write
FD2000
heap
page read and write
1602DA14000
heap
page read and write
2DE8F96C000
heap
page read and write
2825C002000
heap
page read and write
1A279C1F000
heap
page read and write
28ED01E0000
unkown
page readonly
69A000
heap
page read and write
28260F02000
heap
page read and write
2AF6BCE2000
unkown
page readonly
2AF6BFB0000
unkown
page readonly
2AF6C004000
heap
page read and write
7FF61EDD6000
unkown
page read and write
1C83D367000
heap
page read and write
262DFFC7000
heap
page read and write
1A27A04F000
heap
page read and write
21BC3D54000
heap
page read and write
7FFECBD06000
trusted library allocation
page execute and read and write
A318FE000
stack
page read and write
28EB7892000
unkown
page readonly
28260DF0000
remote allocation
page read and write
1A27A346000
heap
page read and write
E29BF39000
stack
page read and write
282821F0000
heap
page read and write
181BB006000
heap
page read and write
A4159FF000
stack
page read and write
1A279C2E000
heap
page read and write
1B572DC9000
heap
page read and write
1BD8CE24000
heap
page read and write
1A27A57D000
heap
page read and write
1A27A4A3000
heap
page read and write
2825B7B0000
trusted library section
page read and write
1B47B897000
heap
page read and write
FF8000
heap
page read and write
1F0ECCD5000
heap
page read and write
8CF000
stack
page read and write
C80C279000
stack
page read and write
2825C291000
trusted library allocation
page read and write
7FFECB860000
trusted library allocation
page read and write
23FF5BD9000
heap
page read and write
2AF6BD10000
unkown
page readonly
1A279C0E000
heap
page read and write
1A27A4C3000
heap
page read and write
7FFECB853000
trusted library allocation
page read and write
1F1C049D000
heap
page read and write
7FFECB874000
trusted library allocation
page read and write
1A27A546000
heap
page read and write
7FFECBE65000
trusted library allocation
page read and write
7FFECB87D000
trusted library allocation
page execute and read and write
7FF62996A000
unkown
page read and write
329B4FE000
stack
page read and write
7FFF22FB1000
unkown
page readonly
EE5797E000
stack
page read and write
1A27A583000
heap
page read and write
1B47B902000
heap
page read and write
1A27A0FB000
heap
page read and write
2825C15C000
heap
page read and write
19963BA0000
heap
page read and write
2193072A000
heap
page read and write
5D178FE000
stack
page read and write
AC0000
heap
page read and write
21BC3D57000
heap
page read and write
1B572DD8000
heap
page read and write
1A277927000
heap
page read and write
7FFF22EB0000
unkown
page readonly
1B47B93E000
heap
page read and write
1A279752000
heap
page read and write
1A27A109000
heap
page read and write
1B47B957000
heap
page read and write
1A27796C000
heap
page read and write
1A279B25000
heap
page read and write
7FFECBA52000
trusted library allocation
page read and write
29ED622B000
heap
page read and write
1A27A3F4000
heap
page read and write
E29BA39000
stack
page read and write
231C5CEA000
heap
page read and write
1B572DD5000
heap
page read and write
C80B87E000
stack
page read and write
139B0C70000
heap
page read and write
28EB72B2000
unkown
page readonly
7FFF22FF0000
unkown
page readonly
1945C3E0000
heap
page read and write
A5BD7E000
stack
page read and write
1E0000
heap
page read and write
2AF52A15000
heap
page read and write
1A279BF5000
heap
page read and write
28ED01D0000
unkown
page readonly
1A279732000
heap
page read and write
7FFECBCE0000
trusted library allocation
page read and write
1B47B95E000
heap
page read and write
1C83EC10000
heap
page read and write
1A27A0CC000
heap
page read and write
28ED0322000
heap
page read and write
28EB7832000
unkown
page readonly
1A279C0D000
heap
page read and write
1A279CA7000
heap
page read and write
D9156FF000
stack
page read and write
7FF629966000
unkown
page read and write
A58AFFF000
stack
page read and write
1A279770000
heap
page read and write
1A27A5BD000
heap
page read and write
1A27A21F000
heap
page read and write
FC7000
heap
page read and write
7FFECBF02000
trusted library allocation
page read and write
28EC79BE000
trusted library allocation
page read and write
2AF6C780000
unkown
page readonly
1753C1CE000
heap
page read and write
28EB72F2000
unkown
page readonly
7FFECBA90000
trusted library allocation
page execute and read and write
1A279CFF000
heap
page read and write
7FFECBEF0000
trusted library allocation
page read and write
1B47BEA0000
heap
page read and write
EE571FB000
stack
page read and write
28EB715D000
heap
page read and write
7FF7E8847000
unkown
page readonly
1AAF7B50000
heap
page read and write
2AF53190000
heap
page execute and read and write
28EB7159000
heap
page read and write
FD0000
heap
page read and write
28ED066D000
heap
page read and write
28EB7DE6000
trusted library allocation
page read and write
E29C539000
stack
page read and write
245C4570000
heap
page read and write
21240B46000
heap
page read and write
1B47B8E1000
heap
page read and write
29ED6200000
heap
page read and write
B4536FE000
stack
page read and write
1B47B901000
heap
page read and write
1A27976C000
heap
page read and write
5B0000
heap
page read and write
28ED01E2000
unkown
page readonly
1A279A54000
heap
page read and write
1A27975A000
heap
page read and write
1A27A4A2000
heap
page read and write
2887171C000
heap
page read and write
262DFFCE000
heap
page read and write
1A279F1B000
heap
page read and write
1A279EE1000
heap
page read and write
7FF7E8851000
unkown
page write copy
1A279D1F000
heap
page read and write
1A27A3CB000
heap
page read and write
1A279EFF000
heap
page read and write
7FFECBCB6000
trusted library allocation
page read and write
28ECF960000
trusted library allocation
page read and write
9C000
stack
page read and write
7FF7C0086000
unkown
page read and write
1F1C0494000
heap
page read and write
245C4547000
heap
page read and write
1A279ED5000
heap
page read and write
1010000
heap
page read and write
1A279732000
heap
page read and write
1A27A109000
heap
page read and write
1AAF61A0000
heap
page read and write
7FF61EDDA000
unkown
page read and write
2229FF000
stack
page read and write
1A279B9D000
heap
page read and write
1B47C430000
heap
page read and write
9C000
stack
page read and write
10D0000
heap
page read and write
2492609B000
heap
page read and write
1A279FA0000
heap
page read and write
28260DB0000
trusted library allocation
page read and write
1B47B953000
heap
page read and write
1A279ABB000
heap
page read and write
139B0B60000
heap
page read and write
1A279BC5000
heap
page read and write
1B47B8EA000
heap
page read and write
1004000
heap
page read and write
231C5CED000
heap
page read and write
1A27A0F0000
heap
page read and write
1A279757000
heap
page read and write
FDB000
heap
page read and write
1A27A11E000
heap
page read and write
1A27A070000
heap
page read and write
7FFECBB74000
trusted library allocation
page read and write
1A279B33000
heap
page read and write
73F000
stack
page read and write
1A279A5E000
heap
page read and write
2F9A0FF000
stack
page read and write
17311DCE000
heap
page read and write
1A27A3E8000
heap
page read and write
29ED6300000
heap
page read and write
19963B78000
heap
page read and write
1AAF621B000
heap
page read and write
23FF5BE0000
heap
page read and write
1A27A3C3000
heap
page read and write
C80DA7B000
stack
page read and write
7FFECBA90000
trusted library allocation
page read and write
1A27A251000
heap
page read and write
1A279C38000
heap
page read and write
292FD48D000
heap
page read and write
28ED04CF000
heap
page read and write
1A279750000
heap
page read and write
1B47B942000
heap
page read and write
E29AEF9000
stack
page read and write
1602D9FB000
heap
page read and write
181BC9C5000
heap
page read and write
19C000
stack
page read and write
28ED0070000
heap
page read and write
C80CD7D000
stack
page read and write
5A0000
heap
page read and write
6C95BFF000
stack
page read and write
28260F35000
heap
page read and write
1A27A42B000
heap
page read and write
54E000
stack
page read and write
13A0E899000
heap
page read and write
329B8FE000
stack
page read and write
27942786000
heap
page read and write
23FF5C01000
heap
page read and write
C80D37D000
stack
page read and write
1F1C045F000
heap
page read and write
1A279C4A000
heap
page read and write
1F1C046D000
heap
page read and write
4F0000
heap
page read and write
28EB7961000
trusted library allocation
page read and write
28283CE5000
heap
page read and write
24926010000
heap
page read and write
28ED0C88000
unkown
page readonly
1C74B52A000
heap
page read and write
73D98000
unkown
page readonly
19963B76000
heap
page read and write
19D000
stack
page read and write
1A279C56000
heap
page read and write
CED4BFF000
stack
page read and write
1A279CCD000
heap
page read and write
19D000
stack
page read and write
88B6A73000
stack
page read and write
21932105000
heap
page read and write
7FFECBD55000
trusted library allocation
page read and write
1A279C94000
heap
page read and write
1A27A102000
heap
page read and write
1A279CF4000
heap
page read and write
1A279CFC000
heap
page read and write
28EB72C0000
unkown
page readonly
28EB70D6000
heap
page read and write
2AF631FE000
trusted library allocation
page read and write
E19C77E000
unkown
page readonly
24925FB0000
heap
page read and write
1B47C478000
heap
page read and write
1A279CDD000
heap
page read and write
7FFECBEF8000
trusted library allocation
page execute and read and write
7FFECBA40000
trusted library allocation
page read and write
87B40FE000
stack
page read and write
2AF6C4EB000
heap
page read and write
1A27A08B000
heap
page read and write
1B47B917000
heap
page read and write
10E0000
trusted library allocation
page read and write
E29ADFF000
stack
page read and write
28260C50000
trusted library allocation
page read and write
1A27A302000
heap
page read and write
5D17B7D000
stack
page read and write
1F1C0502000
heap
page read and write
1A279E40000
heap
page read and write
FCD000
heap
page read and write
A415AFE000
stack
page read and write
29ED6213000
heap
page read and write
28EB7E0F000
trusted library allocation
page read and write
E29B73E000
stack
page read and write
FE8000
heap
page read and write
1A279EB4000
heap
page read and write
EE57AFE000
unkown
page readonly
1A27A5E3000
heap
page read and write
1A2779C2000
heap
page read and write
1D0892BA000
heap
page read and write
29320F8000
stack
page read and write
1A27A1EA000
heap
page read and write
EE57DF9000
stack
page read and write
1A277963000
heap
page read and write
7FFECB8F6000
trusted library allocation
page read and write
1A279BCE000
heap
page read and write
F73AE7E000
unkown
page readonly
7FFECB9E2000
trusted library allocation
page read and write
2825B88F000
heap
page read and write
1A27A4B5000
heap
page read and write
2DE8F926000
heap
page read and write
2193073F000
heap
page read and write
7FFECC0B0000
trusted library allocation
page read and write
7FFECC110000
trusted library allocation
page read and write
1A279ED3000
heap
page read and write
1A27A360000
heap
page read and write
1A279A80000
heap
page read and write
1A27A641000
heap
page read and write
2825C19E000
heap
page read and write
1A279C70000
heap
page read and write
282822F4000
heap
page read and write
1A279AB8000
heap
page read and write
29321FE000
stack
page read and write
21BC3D48000
heap
page read and write
1A27A3B1000
heap
page read and write
400000
unkown
page readonly
7FF7C008A000
unkown
page read and write
28260DA0000
trusted library allocation
page read and write
1F1C0400000
heap
page read and write
C80B770000
stack
page read and write
1A279F04000
heap
page read and write
1A279ACE000
heap
page read and write
1A279A7E000
heap
page read and write
4A7E37E000
stack
page read and write
7FFECBD32000
trusted library allocation
page read and write
9BD3AFE000
stack
page read and write
7FFECBDFF000
trusted library allocation
page read and write
19963A80000
heap
page read and write
1A277937000
heap
page read and write
139B0B95000
heap
page read and write
1B47B889000
heap
page read and write
E23C1FE000
stack
page read and write
7FFECBA82000
trusted library allocation
page read and write
7FFECBF39000
trusted library allocation
page read and write
7FFECBD40000
trusted library allocation
page read and write
1A27794F000
heap
page read and write
1A27A4FC000
heap
page read and write
A129AFE000
stack
page read and write
292FD496000
heap
page read and write
1A279B37000
heap
page read and write
1A279C34000
heap
page read and write
400000
unkown
page readonly
279441D5000
heap
page read and write
1A279F4E000
heap
page read and write
7FFECBC07000
trusted library allocation
page read and write
1A27A5BE000
heap
page read and write
1A27A460000
heap
page read and write
1A279A80000
heap
page read and write
1A27A641000
heap
page read and write
1A279736000
heap
page read and write
670000
heap
page read and write
5D39FFF000
stack
page read and write
1A27A009000
heap
page read and write
2AF539A4000
trusted library allocation
page read and write
1A27A166000
heap
page read and write
1A27A480000
heap
page read and write
7FFECBFC0000
trusted library allocation
page read and write
1B47C4A1000
heap
page read and write
1B47B8F3000
heap
page read and write
1A279EFF000
heap
page read and write
1F13B4AF000
heap
page read and write
7FFECBB80000
trusted library allocation
page read and write
28ED02C0000
unkown
page readonly
1602D9D6000
heap
page read and write
2E180E40000
heap
page read and write
1602D970000
heap
page read and write
1A27A52B000
heap
page read and write
7FFECBAFA000
trusted library allocation
page read and write
CF0000
heap
page read and write
1A27A689000
heap
page read and write
7FFF23041000
unkown
page execute read
7FFECC0C0000
trusted library allocation
page read and write
7FFECBCD0000
trusted library allocation
page read and write
1B47B939000
heap
page read and write
7FFECBF10000
trusted library allocation
page read and write
7FF7E8847000
unkown
page readonly
1B47BEB2000
heap
page read and write
1A279AB5000
heap
page read and write
23FF5BDC000
heap
page read and write
181BB026000
heap
page read and write
1A277988000
heap
page read and write
7FFECB84D000
trusted library allocation
page execute and read and write
7FFECBA39000
trusted library allocation
page read and write
D9152FE000
stack
page read and write
262DFFD9000
heap
page read and write
2AF6C5BF000
heap
page read and write
2825C11A000
heap
page read and write
16CE27F0000
heap
page read and write
2AF631A1000
trusted library allocation
page read and write
F30000
heap
page read and write
1F1C042B000
heap
page read and write
C35C2FF000
stack
page read and write
E903F18000
stack
page read and write
1A27A142000
heap
page read and write
7FFECBEF6000
trusted library allocation
page execute and read and write
1042000
heap
page read and write
2775AFE000
stack
page read and write
28EB7850000
unkown
page readonly
1A27A267000
heap
page read and write
1A279B93000
heap
page read and write
1A279F41000
heap
page read and write
5D1837D000
stack
page read and write
73CE1000
unkown
page execute read
28ED074E000
heap
page read and write
21240B21000
heap
page read and write
7FFECC030000
trusted library allocation
page read and write
288716FA000
heap
page read and write
1B47B94C000
heap
page read and write
1EB47B7B000
heap
page read and write
292FD472000
heap
page read and write
1F1C0467000
heap
page read and write
1A279CBF000
heap
page read and write
A2F000
stack
page read and write
1AAF6202000
heap
page read and write
580000
heap
page read and write
1A279D00000
heap
page read and write
264F4690000
heap
page read and write
1A279DF2000
heap
page read and write
1A279F3B000
heap
page read and write
2AF53CBA000
trusted library allocation
page read and write
1A27796B000
heap
page read and write
7FFECBD22000
trusted library allocation
page read and write
38D5CFF000
stack
page read and write
2193072A000
heap
page read and write
17311DA1000
heap
page read and write
28260D90000
trusted library allocation
page read and write
28EB8211000
trusted library allocation
page read and write
1A27976B000
heap
page read and write
1A27975E000
heap
page read and write
1A279766000
heap
page read and write
1F1C0486000
heap
page read and write
7FFECC1C3000
trusted library allocation
page read and write
1A27A53D000
heap
page read and write
28EB7903000
heap
page execute and read and write
7FFECBE30000
trusted library allocation
page read and write
2825C15A000
heap
page read and write
C809FFE000
stack
page read and write
1A279F32000
heap
page read and write
7FFECBB20000
trusted library allocation
page read and write
EE584FE000
unkown
page readonly
FE6000
heap
page read and write
7FFECC170000
trusted library allocation
page read and write
21BC3D4A000
heap
page read and write
7FFECC120000
trusted library allocation
page read and write
23FF5AE0000
heap
page read and write
1A2799E0000
heap
page read and write
1A279C1F000
heap
page read and write
28260DF0000
remote allocation
page read and write
C80D77D000
stack
page read and write
1A279E89000
heap
page read and write
1A277945000
heap
page read and write
1A2777C0000
heap
page read and write
1A279F7C000
heap
page read and write
1A27A2FE000
heap
page read and write
1753C170000
trusted library allocation
page read and write
282822F7000
heap
page read and write
7EE000
stack
page read and write
28ED0483000
heap
page read and write
1A279A0E000
heap
page read and write
1A27975A000
heap
page read and write
9EF5EFE000
stack
page read and write
1A279D38000
heap
page read and write
1602D9F4000
heap
page read and write
28ED04C3000
heap
page read and write
1B47C47C000
heap
page read and write
7FFECBD42000
trusted library allocation
page read and write
23FF5BF1000
heap
page read and write
FF0000
heap
page read and write
21240B2A000
heap
page read and write
1B47BB05000
heap
page read and write
17311DC4000
heap
page read and write
1A277B15000
heap
page read and write
1A27A216000
heap
page read and write
1A27A556000
heap
page read and write
1F0EB172000
heap
page read and write
1A2799F9000
heap
page read and write
1A27A323000
heap
page read and write
2AF631B1000
trusted library allocation
page read and write
7FF61EDD6000
unkown
page read and write
B30000
heap
page read and write
2794277A000
heap
page read and write
1A27A21F000
heap
page read and write
28260E4A000
heap
page read and write
1A27A623000
heap
page read and write
19B000
stack
page read and write
21242510000
heap
page read and write
2A810660000
heap
page read and write
88B6BFC000
stack
page read and write
1B47B935000
heap
page read and write
1A279A9E000
heap
page read and write
1BE81FE000
stack
page read and write
1A279BCB000
heap
page read and write
28283BC0000
heap
page read and write
7FFECBB12000
trusted library allocation
page read and write
1945A8E4000
heap
page read and write
1A27A302000
heap
page read and write
7FFECB843000
trusted library allocation
page execute and read and write
7FFF22FAB000
unkown
page readonly
7FF7C008A000
unkown
page read and write
55E000
stack
page read and write
E29B0F0000
stack
page read and write
1753C180000
heap
page readonly
1A279750000
heap
page read and write
23FF5C01000
heap
page read and write
1A27A124000
heap
page read and write
1AAF621B000
heap
page read and write
249260AC000
heap
page read and write
1EB47B79000
heap
page read and write
21240B30000
heap
page read and write
1A27A2B3000
heap
page read and write
2E180DE0000
heap
page read and write
28EB7E27000
trusted library allocation
page read and write
1F0EB18D000
heap
page read and write
A12A0FF000
stack
page read and write
1A27A58B000
heap
page read and write
C80C67F000
stack
page read and write
1A279EFB000
heap
page read and write
EE5737E000
stack
page read and write
1B572DB2000
heap
page read and write
1A27A4A8000
heap
page read and write
2AF52A10000
heap
page read and write
139B0D50000
heap
page read and write
2A80EA9B000
heap
page read and write
1A27A19E000
heap
page read and write
19963B62000
heap
page read and write
1602D960000
heap
page read and write
231C5CE9000
heap
page read and write
1A279762000
heap
page read and write
19963B50000
heap
page read and write
1F13B4B1000
heap
page read and write
1A279D1B000
heap
page read and write
56E000
stack
page read and write
13A0E857000
heap
page read and write
29ED6302000
heap
page read and write
1F1C0454000
heap
page read and write
1A279B13000
heap
page read and write
28EB80FC000
trusted library allocation
page read and write
7FFECC180000
trusted library allocation
page read and write
1A279BD6000
heap
page read and write
329B5FE000
stack
page read and write
C80A87C000
stack
page read and write
28ED0CF0000
unkown
page readonly
2A80EA99000
heap
page read and write
429000
unkown
page read and write
245C4590000
heap
page read and write
1A279729000
heap
page read and write
7FF629940000
unkown
page readonly
28ED0726000
heap
page read and write
2AF53708000
trusted library allocation
page read and write
1A279C14000
heap
page read and write
2AF6BCC0000
heap
page execute and read and write
1C74B52D000
heap
page read and write
1A27A070000
heap
page read and write
9C000
stack
page read and write
CEF000
stack
page read and write
7FFECBF32000
trusted library allocation
page read and write
C19FDCC000
stack
page read and write
D9155FE000
stack
page read and write
27942795000
heap
page read and write
1A279896000
heap
page read and write
7FFECBCC0000
trusted library allocation
page read and write
1A27A0F0000
heap
page read and write
262DFFA0000
heap
page read and write
28EB7305000
heap
page read and write
7FFECBC00000
trusted library allocation
page read and write
9BD38FE000
stack
page read and write
1F0EB340000
heap
page read and write
580000
heap
page read and write
1A27A0C4000
heap
page read and write
9CF000
stack
page read and write
1D08ABF0000
heap
page read and write
1A279F96000
heap
page read and write
696EDFF000
stack
page read and write
1A279ABB000
heap
page read and write
1BE7CFE000
stack
page read and write
1A279BDF000
heap
page read and write
1A279AB0000
heap
page read and write
1A27A174000
heap
page read and write
1C83D387000
heap
page read and write
1A279E03000
heap
page read and write
1A27A059000
heap
page read and write
C80B57C000
stack
page read and write
1A279D03000
heap
page read and write
1A279B77000
heap
page read and write
2AF6C404000
heap
page read and write
1A27A252000
heap
page read and write
7FF61EDD6000
unkown
page read and write
7FFECBB50000
trusted library allocation
page read and write
7FF629966000
unkown
page read and write
28EB7F00000
trusted library allocation
page read and write
1A27972E000
heap
page read and write
29ED6265000
heap
page read and write
1020000
heap
page read and write
7FFECC100000
trusted library allocation
page read and write
1A27792A000
heap
page read and write
EE564F7000
stack
page read and write
5D17D7E000
stack
page read and write
1A279BB1000
heap
page read and write
279426D0000
heap
page read and write
1B47C48E000
heap
page read and write
C80C87A000
stack
page read and write
2AF6BD90000
trusted library allocation
page read and write
1A277968000
heap
page read and write
1B572DBB000
heap
page read and write
C80B378000
stack
page read and write
C80E27C000
stack
page read and write
19963B80000
heap
page read and write
1A279CE0000
heap
page read and write
23FF7615000
heap
page read and write
1A279750000
heap
page read and write
1A279E22000
heap
page read and write
1602DA07000
heap
page read and write
1A277941000
heap
page read and write
610000
heap
page read and write
7FFF22FE5000
unkown
page readonly
1A27793C000
heap
page read and write
9BD332B000
stack
page read and write
750000
heap
page read and write
19963B10000
heap
page read and write
1A279CE1000
heap
page read and write
1A279BBB000
heap
page read and write
1F13B4BA000
heap
page read and write
5D1877E000
unkown
page readonly
28260CC3000
trusted library allocation
page read and write
9EF5FFE000
stack
page read and write
1A279F19000
heap
page read and write
1A279FE1000
heap
page read and write
FEC000
heap
page read and write
1A279776000
heap
page read and write
1A279F5F000
heap
page read and write
1A27975C000
heap
page read and write
1A27A1F8000
heap
page read and write
E29B1F8000
stack
page read and write
7FFF23014000
unkown
page readonly
28ED0520000
unkown
page readonly
C1A03FE000
stack
page read and write
282822D1000
heap
page read and write
1A279C3E000
heap
page read and write
29ED6170000
heap
page read and write
C35BEF8000
stack
page read and write
7FFECBAF6000
trusted library allocation
page read and write
282822D7000
heap
page read and write
2AF6C47A000
heap
page read and write
1A279E08000
heap
page read and write
1A279ED4000
heap
page read and write
1A279CFF000
heap
page read and write
1A27A4CA000
heap
page read and write
28282300000
heap
page read and write
17311DCE000
heap
page read and write
28EB7090000
trusted library allocation
page read and write
1A279C3D000
heap
page read and write
7FFECBA70000
trusted library allocation
page read and write
7FFECBD08000
trusted library allocation
page execute and read and write
1A279C34000
heap
page read and write
28260F0D000
heap
page read and write
3DAD2FF000
stack
page read and write
1A27975A000
heap
page read and write
1A27A2E5000
heap
page read and write
1A279FC6000
heap
page read and write
1A27A56C000
heap
page read and write
1A27A479000
heap
page read and write
7FFECBF50000
trusted library allocation
page execute and read and write
181BAE90000
heap
page read and write
7FFECBF24000
trusted library allocation
page execute and read and write
1F13B4C0000
heap
page read and write
1A27A0C7000
heap
page read and write
7FFECC010000
trusted library allocation
page read and write
2AF53050000
heap
page read and write
7FFF2306B000
unkown
page readonly
264F46C5000
heap
page read and write
1A27A41D000
heap
page read and write
1B47C4A1000
heap
page read and write
1B47B953000
heap
page read and write
10000000
unkown
page readonly
1A279BEA000
heap
page read and write
28283CE0000
heap
page read and write
1A279C1B000
heap
page read and write
2825C100000
heap
page read and write
21BC3D4F000
heap
page read and write
1A279B42000
heap
page read and write
1A279750000
heap
page read and write
7FFECC1A2000
trusted library allocation
page read and write
1F0EB18A000
heap
page read and write
1A279775000
heap
page read and write
1A27A02F000
heap
page read and write
E19BF7E000
unkown
page readonly
7FFECC0E0000
trusted library allocation
page read and write
1A279C51000
heap
page read and write
1602D9D0000
heap
page read and write
1A279A13000
heap
page read and write
181BAF70000
heap
page read and write
1A27976C000
heap
page read and write
1A279C88000
heap
page read and write
29ED628F000
heap
page read and write
7FFECB926000
trusted library allocation
page execute and read and write
1A279EF6000
heap
page read and write
1A27A10F000
heap
page read and write
7FF61EDDA000
unkown
page read and write
28873060000
heap
page read and write
1A279BDC000
heap
page read and write
1A279BB0000
heap
page read and write
C80C07D000
stack
page read and write
1753C190000
heap
page read and write
1C83D36A000
heap
page read and write
28871715000
heap
page read and write
1A27A00F000
heap
page read and write
7CE000
stack
page read and write
2825B889000
heap
page read and write
2825C11C000
heap
page read and write
1BD8CD80000
heap
page read and write
231C5CA9000
heap
page read and write
7FF629966000
unkown
page read and write
1A279E06000
heap
page read and write
1A27A5D1000
heap
page read and write
1A27A2AA000
heap
page read and write
28EB7932000
unkown
page readonly
28EB7800000
unkown
page readonly
277551B000
stack
page read and write
282822DD000
heap
page read and write
23FF59D0000
heap
page read and write
28EB7E0A000
trusted library allocation
page read and write
1A27A056000
heap
page read and write
1A27796E000
heap
page read and write
2825B8A0000
heap
page read and write
1A279EE8000
heap
page read and write
C80BB76000
stack
page read and write
1753C1C8000
heap
page read and write
29ED6A15000
heap
page read and write
1A279B13000
heap
page read and write
1EB47B52000
heap
page read and write
7FF629957000
unkown
page readonly
E29C23A000
stack
page read and write
759000
unkown
page readonly
7FFF22FC0000
unkown
page readonly
1A279F14000
heap
page read and write
181BB012000
heap
page read and write
1B47B8E5000
heap
page read and write
2AF6C584000
heap
page read and write
1B47C450000
heap
page read and write
1A279A1B000
heap
page read and write
2DE8F944000
heap
page read and write
7FFECBB72000
trusted library allocation
page read and write
1A279C68000
heap
page read and write
1004FE000
stack
page read and write
1AAF61E9000
heap
page read and write
28EB7F12000
trusted library allocation
page read and write
1A27A61E000
heap
page read and write
1010000
heap
page read and write
1B47B944000
heap
page read and write
245C44D0000
heap
page read and write
1A27A653000
heap
page read and write
19963B71000
heap
page read and write
1A27A0F8000
heap
page read and write
2AF6B1D0000
trusted library allocation
page read and write
2A80EA69000
heap
page read and write
17311D20000
heap
page read and write
28871660000
heap
page read and write
7FFECBAC0000
trusted library allocation
page read and write
1B47B91F000
heap
page read and write
1B47B8F5000
heap
page read and write
1A27A4FD000
heap
page read and write
1A279AC9000
heap
page read and write
1B572DD1000
heap
page read and write
1A279FEC000
heap
page read and write
1A279B2C000
heap
page read and write
2AF6BC04000
unkown
page readonly
6CD61000
unkown
page execute read
1A27A478000
heap
page read and write
1D0892B2000
heap
page read and write
1F0ECB10000
heap
page read and write
1A27A08B000
heap
page read and write
1F13CE85000
heap
page read and write
28EC79B0000
trusted library allocation
page read and write
B3C000
heap
page read and write
1A27A55A000
heap
page read and write
EE5607B000
stack
page read and write
A1000FB000
stack
page read and write
2AF52AAF000
heap
page read and write
E29ACFE000
stack
page read and write
2887171A000
heap
page read and write
1B572DDC000
heap
page read and write
EE568FC000
stack
page read and write
28260F10000
heap
page read and write
1A279DF4000
heap
page read and write
1A27A154000
heap
page read and write
13A0E88D000
heap
page read and write
7FF7E8831000
unkown
page execute read
7FFECBEF0000
trusted library allocation
page execute and read and write
282822F0000
heap
page read and write
23FF5BF3000
heap
page read and write
7FFECBAC0000
trusted library allocation
page read and write
23FF5BF1000
heap
page read and write
139B0B9A000
heap
page read and write
1F13B4A5000
heap
page read and write
219306F9000
heap
page read and write
7FFECC100000
trusted library allocation
page read and write
23FF5BFA000
heap
page read and write
100BE000
unkown
page readonly
73D93000
unkown
page read and write
16CE27F7000
heap
page read and write
1A279CF3000
heap
page read and write
21240B4B000
heap
page read and write
73CE0000
unkown
page readonly
1A277967000
heap
page read and write
2825B895000
heap
page read and write
2AF53C9C000
trusted library allocation
page read and write
1A279C21000
heap
page read and write
1A277937000
heap
page read and write
1A279B25000
heap
page read and write
410000
heap
page read and write
D9157FE000
stack
page read and write
403000
unkown
page readonly
1A27A068000
heap
page read and write
F73B87E000
unkown
page readonly
C80C379000
stack
page read and write
4A7DF6B000
stack
page read and write
16CE281E000
heap
page read and write
28ED073A000
heap
page read and write
1A277938000
heap
page read and write
9EF62FF000
stack
page read and write
1020000
heap
page read and write
288716F1000
heap
page read and write
1A27A479000
heap
page read and write
E29BB39000
stack
page read and write
1A27A255000
heap
page read and write
181BAFE7000
heap
page read and write
21930717000
heap
page read and write
21BC3D10000
heap
page read and write
181BB00A000
heap
page read and write
16CE283B000
heap
page read and write
1B47B8EA000
heap
page read and write
1F13B4CA000
heap
page read and write
13A102E5000
heap
page read and write
2228FE000
stack
page read and write
28EB81F0000
trusted library allocation
page read and write
2AF529A0000
heap
page read and write
1A279FD2000
heap
page read and write
6CDBF000
unkown
page read and write
1A279FE7000
heap
page read and write
1B47B95A000
heap
page read and write
7FFECBB00000
trusted library allocation
page read and write
1A279BF8000
heap
page read and write
1A27A50D000
heap
page read and write
1B47B933000
heap
page read and write
7FF7C0086000
unkown
page read and write
E29A76E000
stack
page read and write
1945A7C0000
heap
page read and write
EE562FE000
unkown
page readonly
7FFF22FB0000
unkown
page read and write
1A279A23000
heap
page read and write
1A27A109000
heap
page read and write
17311DAF000
heap
page read and write
1EB47A90000
heap
page read and write
1B47B919000
heap
page read and write
1B47B917000
heap
page read and write
1A27A5D8000
heap
page read and write
28260C90000
trusted library allocation
page read and write
28ED0C20000
trusted library allocation
page read and write
1A27A4F4000
heap
page read and write
1F1C046E000
heap
page read and write
1B47B946000
heap
page read and write
1A277988000
heap
page read and write
1F1C0C02000
trusted library allocation
page read and write
1A279C02000
heap
page read and write
292FD49D000
unkown
page read and write
28871708000
heap
page read and write
1EB47B6B000
heap
page read and write
1C74B495000
heap
page read and write
13A0E87C000
heap
page read and write
1A279ED1000
heap
page read and write
1BD8CE00000
heap
page read and write
1017000
heap
page read and write
1B572C40000
heap
page read and write
1A27A5CF000
heap
page read and write
28ED02E4000
heap
page read and write
1A279753000
heap
page read and write
1A279B0B000
heap
page read and write
7FF495890000
trusted library allocation
page execute and read and write
28EB72F0000
unkown
page readonly
219306F0000
heap
page read and write
1A279D06000
heap
page read and write
1A279A28000
heap
page read and write
28EB7E2A000
trusted library allocation
page read and write
1A27A05E000
heap
page read and write
7B0000
heap
page read and write
38D5BFE000
stack
page read and write
1A27976C000
heap
page read and write
1B572DC2000
heap
page read and write
23FF5BD6000
heap
page read and write
1A279775000
heap
page read and write
1A2779B4000
heap
page read and write
27942789000
heap
page read and write
7FFECC040000
trusted library allocation
page read and write
1F1C0441000
heap
page read and write
1A279CC1000
heap
page read and write
A12971B000
stack
page read and write
28260D80000
trusted library allocation
page read and write
1A279D07000
heap
page read and write
1A279E69000
heap
page read and write
28ED0066000
unkown
page readonly
1B47B8DB000
heap
page read and write
1B47B939000
heap
page read and write
1A27A334000
heap
page read and write
1A27A554000
heap
page read and write
1602F450000
heap
page read and write
1A27A191000
heap
page read and write
1A27A675000
heap
page read and write
1A27795B000
heap
page read and write
28260C50000
trusted library allocation
page read and write
28260DF0000
remote allocation
page read and write
FF7000
heap
page read and write
401000
unkown
page execute read
28EB72CE000
unkown
page readonly
28ED0CEC000
unkown
page readonly
1FC2124D000
heap
page read and write
D55A9FE000
stack
page read and write
7FFECBAA8000
trusted library allocation
page read and write
29ED61A0000
heap
page read and write
1A27A351000
heap
page read and write
1B47B8E1000
heap
page read and write
1A27A00F000
heap
page read and write
C80D07D000
stack
page read and write
1A279C0E000
heap
page read and write
7D0000
heap
page read and write
231C5CE5000
heap
page read and write
21BC3D40000
heap
page read and write
1B572DD8000
heap
page read and write
1B47C4AE000
heap
page read and write
CED49FE000
stack
page read and write
1A279C92000
heap
page read and write
17313745000
heap
page read and write
2A80EA9B000
heap
page read and write
1A27972E000
heap
page read and write
2887170D000
heap
page read and write
1A279A9B000
heap
page read and write
1A2779B2000
heap
page read and write
1A27A0DC000
heap
page read and write
FDA000
heap
page read and write
1A27A195000
heap
page read and write
1A2779AC000
heap
page read and write
288716F2000
heap
page read and write
1A277945000
heap
page read and write
249260B4000
heap
page read and write
7FFECC036000
trusted library allocation
page read and write
2AF53D42000
trusted library allocation
page read and write
1A279EFF000
heap
page read and write
1B47B918000
heap
page read and write
7FF61EDDA000
unkown
page read and write
1BD8CE1B000
heap
page read and write
6CC31000
unkown
page execute read
1A279AA2000
heap
page read and write
B14CEFE000
stack
page read and write
7151BFE000
stack
page read and write
264F6260000
heap
page read and write
1B47B950000
heap
page read and write
1B47B95C000
heap
page read and write
1A279CFF000
heap
page read and write
28ED0C80000
unkown
page readonly
7FFECB9F2000
trusted library allocation
page read and write
1B47B926000
heap
page read and write
279441D0000
heap
page read and write
2AF52C40000
heap
page read and write
7FFECBBC0000
trusted library allocation
page read and write
2AF6BC02000
unkown
page readonly
1A279C35000
heap
page read and write
6CCCE000
unkown
page execute read
1F13B4AA000
heap
page read and write
EE5847E000
stack
page read and write
7FFECBB52000
trusted library allocation
page read and write
28ED09F0000
heap
page execute and read and write
1BE7EFE000
stack
page read and write
4A7E9FE000
stack
page read and write
7FFECBE54000
trusted library allocation
page read and write
1A277945000
heap
page read and write
1A279A71000
heap
page read and write
1B47BEB0000
heap
page read and write
2AF6C4D3000
heap
page read and write
1A27A63A000
heap
page read and write
7FFECB890000
trusted library allocation
page read and write
1D0892B6000
heap
page read and write
C80A2F9000
stack
page read and write
A41553B000
stack
page read and write
7FFECBBD0000
trusted library allocation
page read and write
1A279AC6000
heap
page read and write
29326FF000
stack
page read and write
C80BF74000
stack
page read and write
1F1C0461000
heap
page read and write
1B47B944000
heap
page read and write
28EB80F0000
trusted library allocation
page read and write
1945A8FF000
heap
page read and write
7FFECBC0A000
trusted library allocation
page read and write
1A27A4D1000
heap
page read and write
6C956FC000
stack
page read and write
21932100000
heap
page read and write
1A279E81000
heap
page read and write
7FFECC150000
trusted library allocation
page read and write
2DE8F945000
heap
page read and write
7FFECBACA000
trusted library allocation
page read and write
28ED04DD000
heap
page read and write
245C4561000
heap
page read and write
1A27A2C3000
heap
page read and write
292FD442000
heap
page read and write
EE5637C000
stack
page read and write
6CCDC000
unkown
page execute read
1945A8CC000
heap
page read and write
1A27A549000
heap
page read and write
FDC000
heap
page read and write
1A27A52D000
heap
page read and write
1A279AE5000
heap
page read and write
1753C550000
heap
page read and write
1A27A059000
heap
page read and write
249260AA000
heap
page read and write
2AF528A0000
heap
page read and write
1A279E0C000
heap
page read and write
B30000
heap
page read and write
1F1C0470000
heap
page read and write
1B47B8F7000
heap
page read and write
2825C15C000
heap
page read and write
2AF538EF000
trusted library allocation
page read and write
139B0BA5000
heap
page read and write
1A279F8A000
heap
page read and write
1C74B53D000
heap
page read and write
1A279E98000
heap
page read and write
2AF6C4A6000
heap
page read and write
1A27976C000
heap
page read and write
FFB000
heap
page read and write
1A279EA1000
heap
page read and write
1A279B66000
heap
page read and write
B50000
heap
page read and write
1C83D380000
heap
page read and write
1A27A4BA000
heap
page read and write
1B47C4A1000
heap
page read and write
1C74B532000
heap
page read and write
1945A8F5000
heap
page read and write
1A27A4DD000
heap
page read and write
C80AF7A000
stack
page read and write
CED46F8000
stack
page read and write
9C000
stack
page read and write
E29BC39000
stack
page read and write
1A27A124000
heap
page read and write
E29C837000
stack
page read and write
1A277977000
heap
page read and write
440000
heap
page read and write
28ED0AC0000
heap
page read and write
EE56E7E000
stack
page read and write
1A279F50000
heap
page read and write
7FFECC190000
trusted library allocation
page read and write
1A279A79000
heap
page read and write
2AF6C558000
heap
page read and write
1A27976C000
heap
page read and write
1A27973B000
heap
page read and write
1A279A92000
heap
page read and write
29ED624C000
heap
page read and write
21240B00000
heap
page read and write
231C5CD1000
heap
page read and write
2AF631C0000
trusted library allocation
page read and write
1753C555000
heap
page read and write
5A0000
heap
page read and write
B14CDFE000
stack
page read and write
7FFECC006000
trusted library allocation
page read and write
C1A05FE000
stack
page read and write
28EC79A1000
trusted library allocation
page read and write
28EB8144000
trusted library allocation
page read and write
2AF53B48000
trusted library allocation
page read and write
1A27A241000
heap
page read and write
28EB8110000
trusted library allocation
page read and write
10094000
unkown
page readonly
1A279AAE000
heap
page read and write
C80DF7C000
stack
page read and write
1BD8E870000
trusted library allocation
page read and write
1A279CF6000
heap
page read and write
3DAD4FE000
stack
page read and write
28ED01B2000
unkown
page readonly
5D17EFD000
stack
page read and write
1F0EB18F000
heap
page read and write
1A27A3E0000
heap
page read and write
2825B8B5000
heap
page read and write
421000
unkown
page execute read
1A279732000
heap
page read and write
1D089240000
heap
page read and write
7FFECBC04000
trusted library allocation
page read and write
406000
unkown
page readonly
1A277972000
heap
page read and write
245C4588000
heap
page read and write
1A279772000
heap
page read and write
1A279A79000
heap
page read and write
1B47C4AE000
heap
page read and write
E19C07A000
stack
page read and write
1B572DDA000
heap
page read and write
1A27A197000
heap
page read and write
E29B63E000
stack
page read and write
1A279CD0000
heap
page read and write
28EB8140000
trusted library allocation
page read and write
2AF53313000
trusted library allocation
page read and write
264F46E7000
heap
page read and write
1A27796E000
heap
page read and write
777000
unkown
page read and write
1602D9F5000
heap
page read and write
28260E2A000
heap
page read and write
19963B98000
heap
page read and write
7FFECC111000
trusted library allocation
page read and write
1FC21202000
heap
page read and write
E29B938000
stack
page read and write
1A27A257000
heap
page read and write
1A27A281000
heap
page read and write
1A27A228000
heap
page read and write
7FFECBF28000
trusted library allocation
page execute and read and write
B8E000
stack
page read and write
1602DA16000
heap
page read and write
1A279C48000
heap
page read and write
1A279ECF000
heap
page read and write
19963B76000
heap
page read and write
1EB494B5000
heap
page read and write
28260F78000
heap
page read and write
1A279D1E000
heap
page read and write
7FFECBF45000
trusted library allocation
page read and write
21240B39000
heap
page read and write
1B47B8E1000
heap
page read and write
7FF4624A0000
trusted library allocation
page execute and read and write
1FC21190000
trusted library allocation
page read and write
7FF61EDDA000
unkown
page read and write
E29A7ED000
stack
page read and write
1A279D43000
heap
page read and write
2825C15D000
heap
page read and write
A9D000
unkown
page readonly
28ED01E4000
unkown
page readonly
2A379DC000
stack
page read and write
292FD515000
trusted library allocation
page read and write
282822E2000
heap
page read and write
10094000
unkown
page readonly
5B8000
heap
page read and write
7FFECC114000
trusted library allocation
page read and write
A6866FE000
stack
page read and write
1A279D28000
heap
page read and write
222DFE000
stack
page read and write
BD0000
heap
page read and write
C80CC7D000
stack
page read and write
1A27A384000
heap
page read and write
1A27A34A000
heap
page read and write
7FFECBEF4000
trusted library allocation
page execute and read and write
1B47B8DD000
heap
page read and write
139B26E0000
heap
page read and write
1A279765000
heap
page read and write
292FD467000
heap
page read and write
88B687E000
stack
page read and write
1D0892C1000
heap
page read and write
292FD49F000
unkown
page read and write
1A279C81000
heap
page read and write
C80A1FE000
stack
page read and write
1A279F47000
heap
page read and write
292FD4A2000
unkown
page read and write
C80AE78000
stack
page read and write
28260D20000
trusted library allocation
page read and write
245C4568000
heap
page read and write
1A27A4F1000
heap
page read and write
1A279E5F000
heap
page read and write
F73B37B000
stack
page read and write
71520FE000
stack
page read and write
1A279E83000
heap
page read and write
1A279FCD000
heap
page read and write
A312FC000
stack
page read and write
1A27A4CC000
heap
page read and write
E23C2FF000
stack
page read and write
1A27A671000
heap
page read and write
1A279A86000
heap
page read and write
7FF61EDDB000
unkown
page readonly
C80C97E000
stack
page read and write
7FFECBB50000
trusted library allocation
page read and write
1A279D26000
heap
page read and write
282822FA000
heap
page read and write
2227FE000
stack
page read and write
28ED00E8000
heap
page read and write
C80C57E000
stack
page read and write
28873140000
heap
page read and write
A5D000
stack
page read and write
28EB7A28000
trusted library allocation
page read and write
28EB7020000
heap
page read and write
7FF629966000
unkown
page read and write
1A279775000
heap
page read and write
1A279C7A000
heap
page read and write
1F0EB18F000
heap
page read and write
1A279A15000
heap
page read and write
29ED6239000
heap
page read and write
7DA000
heap
page read and write
17311DA6000
heap
page read and write
139B0B9E000
heap
page read and write
FDA000
heap
page read and write
1A279AB5000
heap
page read and write
1B47B8B6000
heap
page read and write
1B47B8DD000
heap
page read and write
7FFECBDE0000
trusted library allocation
page read and write
7FFECBD38000
trusted library allocation
page execute and read and write
1A27A109000
heap
page read and write
1A27A5D6000
heap
page read and write
A5C07D000
stack
page read and write
7FFECBA70000
trusted library allocation
page read and write
1A27A1D8000
heap
page read and write
1A27A2E5000
heap
page read and write
1A279C48000
heap
page read and write
E9043FE000
stack
page read and write
1A279FAA000
heap
page read and write
17311D50000
heap
page read and write
1F0EB181000
heap
page read and write
1F0EB260000
heap
page read and write
7FFECBE6D000
trusted library allocation
page read and write
17311DBC000
heap
page read and write
1F1C046C000
heap
page read and write
7FFECBC03000
trusted library allocation
page read and write
57E000
stack
page read and write
1A279CF2000
heap
page read and write
1A27A002000
heap
page read and write
28ED0C82000
unkown
page readonly
1A27A60E000
heap
page read and write
58E000
stack
page read and write
292FD4A6000
unkown
page read and write
1A27A3EB000
heap
page read and write
28260CB2000
trusted library allocation
page read and write
1A27A1C9000
heap
page read and write
7FF7C008A000
unkown
page read and write
1A27A45F000
heap
page read and write
2DE8F94B000
heap
page read and write
2A80EA99000
heap
page read and write
7FF462490000
trusted library allocation
page execute and read and write
C35C4FE000
stack
page read and write
1BD8CE8A000
heap
page read and write
1A279F00000
heap
page read and write
1A27A5E1000
heap
page read and write
2AF6C5D0000
heap
page read and write
1C83D349000
heap
page read and write
1A279FB3000
heap
page read and write
1002000
heap
page read and write
7FFECBBE6000
trusted library allocation
page read and write
1A279E1A000
heap
page read and write
7FFECBDC0000
trusted library allocation
page read and write
4A7E4FE000
unkown
page readonly
1D0892DB000
heap
page read and write
1A27A109000
heap
page read and write
1002000
heap
page read and write
EE56BFE000
unkown
page readonly
28EB72C2000
unkown
page readonly
292FD613000
heap
page read and write
2A80EA60000
heap
page read and write
C809BBE000
stack
page read and write
1C83D371000
heap
page read and write
1BD8CF02000
heap
page read and write
1A2778A0000
heap
page read and write
1A279F4B000
heap
page read and write
1A279741000
heap
page read and write
1B47B8EA000
heap
page read and write
2825B86A000
heap
page read and write
2825B800000
heap
page read and write
21240B2E000
heap
page read and write
231C5CE1000
heap
page read and write
1A279B16000
heap
page read and write
2DE8F94A000
heap
page read and write
1A27A176000
heap
page read and write
1A27989E000
heap
page read and write
1A279C12000
heap
page read and write
196000
stack
page read and write
FE6000
heap
page read and write
2AF52ACB000
heap
page read and write
17311DBA000
heap
page read and write
1BD8CE73000
heap
page read and write
19D000
stack
page read and write
1B47C459000
heap
page read and write
EE573FE000
unkown
page readonly
1602F380000
heap
page read and write
A58AEFE000
stack
page read and write
1B47B8E0000
heap
page read and write
1B47B955000
heap
page read and write
1A279BF3000
heap
page read and write
28260DC0000
trusted library allocation
page read and write
1A27976F000
heap
page read and write
1A279F14000
heap
page read and write
28871580000
heap
page read and write
28260F19000
heap
page read and write
1A279B06000
heap
page read and write
C80B67B000
stack
page read and write
28ED02B0000
trusted library allocation
page read and write
7FFECBC10000
trusted library allocation
page read and write
C80CF7D000
stack
page read and write
7FFECC130000
trusted library allocation
page read and write
1B47C452000
heap
page read and write
1A279C1B000
heap
page read and write
6CCA0000
unkown
page readonly
21BC3D46000
heap
page read and write
1A27A208000
heap
page read and write
F73BB7E000
unkown
page readonly
1B572DB1000
heap
page read and write
28260BD0000
trusted library allocation
page read and write
29ED6A02000
heap
page read and write
29ED61D0000
trusted library allocation
page read and write
1BD8CDE0000
trusted library allocation
page read and write
5D1867D000
stack
page read and write
5D397FB000
stack
page read and write
23FF7540000
heap
page read and write
2E180FA0000
heap
page read and write
A5BEFE000
stack
page read and write
2AF6BCB0000
trusted library allocation
page read and write
2AF6C4CB000
heap
page read and write
1FC21213000
heap
page read and write
2794278B000
heap
page read and write
2825B690000
heap
page read and write
5D39BFE000
stack
page read and write
7FFECBD20000
trusted library allocation
page read and write
1A279E7F000
heap
page read and write
A415EFE000
stack
page read and write
7FFECBAD0000
trusted library allocation
page read and write
13A0E881000
heap
page read and write
1945A8A0000
heap
page read and write
28EB7930000
unkown
page readonly
1A279BB9000
heap
page read and write
2E180DC0000
heap
page read and write
1A27A3AF000
heap
page read and write
7FFECBB22000
trusted library allocation
page read and write
10B0000
heap
page read and write
1A279CC6000
heap
page read and write
1F1C049F000
heap
page read and write
1A279A9B000
heap
page read and write
1A27A12C000
heap
page read and write
245C4562000
heap
page read and write
28EB6E90000
unkown
page readonly
2DE8F96C000
heap
page read and write
28EB79A0000
trusted library allocation
page read and write
F73B07D000
stack
page read and write
F73BA7E000
unkown
page readonly
1FC21160000
heap
page read and write
139B0B90000
heap
page read and write
28260E53000
heap
page read and write
1A279C4A000
heap
page read and write
279426A0000
heap
page read and write
7FFECBB07000
trusted library allocation
page read and write
7FFECBBD0000
trusted library allocation
page read and write
B4E000
stack
page read and write
245C4553000
heap
page read and write
23FF5AB0000
heap
page read and write
7FFECBBF0000
trusted library allocation
page read and write
1945C1F5000
heap
page read and write
B4532FE000
stack
page read and write
7FFECBA22000
trusted library allocation
page read and write
28ED0204000
unkown
page readonly
1A27795B000
heap
page read and write
F3C000
heap
page read and write
1A27A4A1000
heap
page read and write
19963B95000
heap
page read and write
1A27976C000
heap
page read and write
1F1C043F000
heap
page read and write
EE57EFE000
unkown
page readonly
2E180CE0000
heap
page read and write
28ED0CF2000
unkown
page readonly
1A279726000
heap
page read and write
FEB000
heap
page read and write
7FFECBA60000
trusted library allocation
page execute and read and write
1A279EF5000
heap
page read and write
1A27A0AE000
heap
page read and write
2825C15D000
heap
page read and write
A58B4FE000
stack
page read and write
88B68FE000
stack
page read and write
C80CE7D000
stack
page read and write
139B2560000
heap
page read and write
7FFECBE10000
trusted library allocation
page read and write
9EF60FE000
stack
page read and write
2DE8F93C000
heap
page read and write
7FFECBAA0000
trusted library allocation
page read and write
181BAFE0000
heap
page read and write
1A279F8F000
heap
page read and write
EE56AFC000
stack
page read and write
28EB7854000
unkown
page readonly
38D576B000
stack
page read and write
1A279FC8000
heap
page read and write
1A27A2E5000
heap
page read and write
1B47B8DD000
heap
page read and write
7A0000
heap
page read and write
C80DB7C000
stack
page read and write
1A279EFA000
heap
page read and write
6CDC2000
unkown
page readonly
1A27975A000
heap
page read and write
B3D000
heap
page read and write
1F1C0465000
heap
page read and write
245C4583000
heap
page read and write
1A279AC8000
heap
page read and write
FF4000
heap
page read and write
87B3BBB000
stack
page read and write
FCF000
heap
page read and write
28EB7886000
unkown
page readonly
E19C57E000
unkown
page readonly
B35000
heap
page read and write
1A279C88000
heap
page read and write
7FFECBD04000
trusted library allocation
page execute and read and write
1A279B31000
heap
page read and write
F73B779000
stack
page read and write
21240B3E000
heap
page read and write
1AAF7C40000
heap
page read and write
FDC000
heap
page read and write
1B47B800000
heap
page read and write
28260C90000
trusted library allocation
page read and write
2DE8F954000
heap
page read and write
1006FF000
stack
page read and write
1A279E1A000
heap
page read and write
1A279BE2000
heap
page read and write
28EB7E3B000
trusted library allocation
page read and write
1EB47A40000
heap
page read and write
1A279B3F000
heap
page read and write
245C458B000
heap
page read and write
264F6050000
heap
page read and write
1B47C4A5000
heap
page read and write
1C74B460000
heap
page read and write
1A27A2B0000
heap
page read and write
1A279736000
heap
page read and write
181BC9C0000
heap
page read and write
1A279F20000
heap
page read and write
23FF5BE1000
heap
page read and write
1A279B1B000
heap
page read and write
1A279CC0000
heap
page read and write
1A279E15000
heap
page read and write
1A27796C000
heap
page read and write
2AF53B72000
trusted library allocation
page read and write
1602DA1D000
heap
page read and write
1A279739000
heap
page read and write
2825B86D000
heap
page read and write
181BB001000
heap
page read and write
28EB72E2000
unkown
page readonly
1B47C457000
heap
page read and write
28260C5A000
trusted library allocation
page read and write
292FD42B000
heap
page read and write
1A27A3B8000
heap
page read and write
1A27A0D8000
heap
page read and write
C80DD7C000
stack
page read and write
1A27A3D6000
heap
page read and write
1A2779C7000
heap
page read and write
7FF7C0077000
unkown
page readonly
1A279FCC000
heap
page read and write
A5BF7F000
stack
page read and write
1A27A56B000
heap
page read and write
28260EE1000
heap
page read and write
1A27A54E000
heap
page read and write
1A279DFB000
heap
page read and write
282822F7000
heap
page read and write
1A279AF0000
heap
page read and write
1A279BC5000
heap
page read and write
19963B70000
heap
page read and write
2825C015000
heap
page read and write
2E1810C0000
heap
page read and write
1A279C55000
heap
page read and write
10E0000
trusted library allocation
page read and write
28260F78000
heap
page read and write
1602DA0F000
heap
page read and write
1D0892D6000
heap
page read and write
7FFECBAD3000
trusted library allocation
page read and write
1A279762000
heap
page read and write
7FFECBF34000
trusted library allocation
page read and write
1A27A581000
heap
page read and write
7FFECBF09000
trusted library allocation
page read and write
181BB016000
heap
page read and write
9BD3CFE000
stack
page read and write
5D1827E000
unkown
page readonly
1A279BB9000
heap
page read and write
29325FE000
stack
page read and write
100BA000
unkown
page read and write
282822B7000
heap
page read and write
2AF63207000
trusted library allocation
page read and write
28ED0338000
heap
page read and write
7FFECBD50000
trusted library allocation
page read and write
1A279EE6000
heap
page read and write
1A27A4E1000
heap
page read and write
1007000
heap
page read and write
2AF53AF4000
trusted library allocation
page read and write
8BF000
stack
page read and write
1F1C0459000
heap
page read and write
28260E00000
heap
page read and write
1A27793F000
heap
page read and write
1A27A66B000
heap
page read and write
1A279EA2000
heap
page read and write
2825B870000
heap
page read and write
1A27A11A000
heap
page read and write
7FFF22FA0000
unkown
page readonly
2794279E000
heap
page read and write
1A279F44000
heap
page read and write
29ED6A00000
heap
page read and write
1A279FC4000
heap
page read and write
1A27A689000
heap
page read and write
1B47B89A000
heap
page read and write
7FFECB873000
trusted library allocation
page execute and read and write
1A2779BE000
heap
page read and write
1016000
heap
page read and write
1A279EB9000
heap
page read and write
1A27A3FA000
heap
page read and write
24927AC0000
heap
page read and write
24926091000
heap
page read and write
E29B43F000
stack
page read and write
9EF64FE000
stack
page read and write
1A279F88000
heap
page read and write
A6865FE000
stack
page read and write
1A27A05E000
heap
page read and write
13A0E885000
heap
page read and write
21240B26000
heap
page read and write
1A279758000
heap
page read and write
1C83EBE0000
heap
page read and write
7FFECB8CC000
trusted library allocation
page execute and read and write
EE57BFE000
stack
page read and write
1A27A5EB000
heap
page read and write
2AF6BF42000
unkown
page readonly
1A27A2C4000
heap
page read and write
1A279BCD000
heap
page read and write
1A279B9E000
heap
page read and write
1A279ACD000
heap
page read and write
1EB47B37000
heap
page read and write
1A27A539000
heap
page read and write
1F1C048E000
heap
page read and write
28871690000
heap
page read and write
38D5EFC000
stack
page read and write
1A27A11E000
heap
page read and write
1007FF000
stack
page read and write
ADF000
stack
page read and write
181BB016000
heap
page read and write
1A27A550000
heap
page read and write
E9042FE000
stack
page read and write
1A27A48A000
heap
page read and write
10094000
unkown
page readonly
2AF631D3000
trusted library allocation
page read and write
102E000
heap
page read and write
1A279756000
heap
page read and write
7FF7C008A000
unkown
page read and write
2AF6C1B9000
heap
page read and write
A5BFFF000
stack
page read and write
27942757000
heap
page read and write
1B47B94B000
heap
page read and write
2A80EA30000
heap
page read and write
1602DA1D000
heap
page read and write
1A279C40000
heap
page read and write
1EB494B0000
heap
page read and write
28260EFD000
heap
page read and write
2193073C000
heap
page read and write
2AF53069000
heap
page read and write
401000
unkown
page execute read
28ED060B000
heap
page read and write
1D08ABF5000
heap
page read and write
1A27798B000
heap
page read and write
1C83D340000
heap
page read and write
21240B08000
heap
page read and write
1A279CB9000
heap
page read and write
1A27A516000
heap
page read and write
1F13B4AA000
heap
page read and write
A316FE000
stack
page read and write
B3C000
heap
page read and write
1D089297000
heap
page read and write
1B572DCB000
heap
page read and write
EE576FE000
unkown
page readonly
1FC21060000
heap
page read and write
1A279F69000
heap
page read and write
2A810480000
heap
page read and write
1A279C40000
heap
page read and write
1A279BCD000
heap
page read and write
16CE2829000
heap
page read and write
100BA000
unkown
page read and write
1A277B1A000
heap
page read and write
245C4480000
heap
page read and write
1A277972000
heap
page read and write
C80E07C000
stack
page read and write
28260F69000
heap
page read and write
1FC21248000
heap
page read and write
3DAD0FF000
stack
page read and write
A10000
unkown
page readonly
7FFECBE24000
trusted library allocation
page read and write
245C457F000
heap
page read and write
1B47C3D1000
heap
page read and write
1A279BD2000
heap
page read and write
2AF6C514000
heap
page read and write
7FFECBF04000
trusted library allocation
page read and write
F73BBFD000
stack
page read and write
1A279CBC000
heap
page read and write
1A27A3C3000
heap
page read and write
16CE2820000
heap
page read and write
EC9515E000
stack
page read and write
AB5000
heap
page read and write
1B47B89A000
heap
page read and write
1F13B4B3000
heap
page read and write
1A27A582000
heap
page read and write
A129EFE000
stack
page read and write
A5C1FF000
stack
page read and write
7FFECBFE0000
trusted library allocation
page read and write
7FFECBD10000
trusted library allocation
page read and write
1A27A550000
heap
page read and write
7FFECBAF0000
trusted library allocation
page read and write
1B47B8F3000
heap
page read and write
7FF61EDD6000
unkown
page read and write
1B47C47F000
heap
page read and write
EDB000
heap
page read and write
29322FE000
stack
page read and write
A01000
unkown
page execute read
7FFECB8F0000
trusted library allocation
page read and write
1A27A0E5000
heap
page read and write
1A279BD9000
heap
page read and write
1A279A1D000
heap
page read and write
1C74B521000
heap
page read and write
C809BFE000
stack
page read and write
1B47B897000
heap
page read and write
1A27794D000
heap
page read and write
7FFECC1C0000
trusted library allocation
page read and write
2FF0000
heap
page read and write
1A27976D000
heap
page read and write
28EB7E4D000
trusted library allocation
page read and write
1B47C410000
heap
page read and write
28EB7300000
heap
page read and write
6F1000
unkown
page execute read
1A279F04000
heap
page read and write
E29C430000
stack
page read and write
C80BD7D000
stack
page read and write
7FF61EDDA000
unkown
page read and write
28EB7157000
heap
page read and write
6CCA1000
unkown
page execute read
7FFECB92C000
trusted library allocation
page execute and read and write
6CE000
stack
page read and write
1B47B939000
heap
page read and write
1B47B820000
heap
page read and write
B14CBFE000
stack
page read and write
7FFECBBE0000
trusted library allocation
page read and write
1B572DBB000
heap
page read and write
CED48FE000
stack
page read and write
1A279BE6000
heap
page read and write
2AF6C4A1000
heap
page read and write
28260E5D000
heap
page read and write
21930630000
heap
page read and write
245C4500000
heap
page read and write
2AF6C411000
heap
page read and write
D48000
heap
page read and write
28EB7E47000
trusted library allocation
page read and write
1753C120000
heap
page read and write
1C74B380000
heap
page read and write
1F0ECCC0000
heap
page read and write
1A279A64000
heap
page read and write
1A279BED000
heap
page read and write
28ED0290000
unkown
page readonly
1A279F37000
heap
page read and write
1A279F7A000
heap
page read and write
EFE000
heap
page read and write
E19C67E000
stack
page read and write
1A27A0E2000
heap
page read and write
2AF52A96000
heap
page read and write
1A279BF5000
heap
page read and write
2AF6C128000
heap
page read and write
28EB7B07000
trusted library allocation
page read and write
1B47B8E8000
heap
page read and write
7FFF2302B000
unkown
page readonly
1A279BE2000
heap
page read and write
1A27A195000
heap
page read and write
FCB000
heap
page read and write
7FF62996A000
unkown
page read and write
1B572DCD000
heap
page read and write
D55ACFF000
stack
page read and write
1A279C25000
heap
page read and write
2AF53CA6000
trusted library allocation
page read and write
A415CFE000
stack
page read and write
EE5757B000
stack
page read and write
27758FE000
stack
page read and write
1A279CFA000
heap
page read and write
28EC7980000
trusted library allocation
page read and write
EE57CFE000
unkown
page readonly
C80DC7C000
stack
page read and write
29327FE000
stack
page read and write
2AF6BFB6000
unkown
page readonly
1A27A08D000
heap
page read and write
94F000
stack
page read and write
1A279DFE000
heap
page read and write
6CD36000
unkown
page execute read
21240A80000
heap
page read and write
1A277963000
heap
page read and write
7FF61EDC7000
unkown
page readonly
1BD8EA02000
trusted library allocation
page read and write
21930734000
heap
page read and write
1F13B480000
heap
page read and write
1B572DE4000
heap
page read and write
292FD502000
trusted library allocation
page read and write
2AF6C34C000
unkown
page readonly
7FFECC000000
trusted library allocation
page read and write
1BD8CF13000
heap
page read and write
1A279AF3000
heap
page read and write
288716F8000
heap
page read and write
FC1000
heap
page read and write
5D1897E000
unkown
page readonly
1B47C4AA000
heap
page read and write
1F1C0458000
heap
page read and write
C80D87D000
stack
page read and write
1008FE000
stack
page read and write
1A277978000
heap
page read and write
2AF6C4EE000
heap
page read and write
E23C6FE000
stack
page read and write
1A27A2F5000
heap
page read and write
1F13CE80000
heap
page read and write
1A2799FF000
heap
page read and write
21930727000
heap
page read and write
2AF6C3B4000
heap
page read and write
282822D2000
heap
page read and write
28EB80BD000
trusted library allocation
page read and write
C35C0FE000
stack
page read and write
1A27A60D000
heap
page read and write
292FD464000
heap
page read and write
E19B79B000
stack
page read and write
C1A04FE000
stack
page read and write
7FFECBE30000
trusted library allocation
page read and write
28ED0BF0000
trusted library allocation
page read and write
1B572DCD000
heap
page read and write
100BA000
unkown
page read and write
1A279F07000
heap
page read and write
1C83D220000
heap
page read and write
CED4DFE000
stack
page read and write
1A27A3D8000
heap
page read and write
E29B33E000
stack
page read and write
A79000
unkown
page readonly
1A279BEB000
heap
page read and write
1A27A1C8000
heap
page read and write
1EB47B57000
heap
page read and write
2DE8F926000
heap
page read and write
1B47B948000
heap
page read and write
1A27A283000
heap
page read and write
1F1C0472000
heap
page read and write
1602D9E5000
heap
page read and write
1A279BFD000
heap
page read and write
1A27A4E1000
heap
page read and write
1B572DDA000
heap
page read and write
1A279B7A000
heap
page read and write
FDD000
heap
page read and write
EE5747E000
stack
page read and write
28260E79000
heap
page read and write
2AF6C0F5000
heap
page read and write
1A27A237000
heap
page read and write
28ED0786000
heap
page read and write
1B47C450000
heap
page read and write
262DFFA7000
heap
page read and write
7FF61EDD6000
unkown
page read and write
7FFECB883000
trusted library allocation
page read and write
1A279BDF000
heap
page read and write
1A27A4ED000
heap
page read and write
1A27A0D4000
heap
page read and write
7FFECBD36000
trusted library allocation
page execute and read and write
1A277967000
heap
page read and write
7FFF23040000
unkown
page readonly
23FF5BF6000
heap
page read and write
7FFECBE00000
trusted library allocation
page read and write
139B0B80000
heap
page read and write
2AF53C80000
trusted library allocation
page read and write
1A27A0CE000
heap
page read and write
7FF61EDB0000
unkown
page readonly
1A279AA8000
heap
page read and write
1A279D26000
heap
page read and write
181BB029000
heap
page read and write
21240B4E000
heap
page read and write
1753DC00000
heap
page read and write
28260C50000
trusted library allocation
page read and write
1602D9D6000
heap
page read and write
9BD36FE000
stack
page read and write
1A279C68000
heap
page read and write
7151AFE000
stack
page read and write
28EB6E9A000
unkown
page readonly
42D000
unkown
page readonly
1A279763000
heap
page read and write
24925EA0000
heap
page read and write
2AF52A8C000
heap
page read and write
4A7EAFE000
unkown
page readonly
1A27A4B2000
heap
page read and write
1D08ADC0000
heap
page read and write
790000
heap
page read and write
245C4576000
heap
page read and write
1A279A80000
heap
page read and write
1A27A241000
heap
page read and write
21BC5680000
heap
page read and write
1A279C7B000
heap
page read and write
245C458D000
heap
page read and write
42E000
unkown
page readonly
1A27A668000
heap
page read and write
262DFF80000
heap
page read and write
13A0E89D000
heap
page read and write
2A810485000
heap
page read and write
1A27A3CC000
heap
page read and write
7FFECB926000
trusted library allocation
page read and write
1A277999000
heap
page read and write
88B65CE000
stack
page read and write
1FC21259000
heap
page read and write
1A27A560000
heap
page read and write
D9150FC000
stack
page read and write
7FF7C008A000
unkown
page read and write
21BC5780000
heap
page read and write
7FFECBBA0000
trusted library allocation
page read and write
2F99FFF000
stack
page read and write
329B6FF000
stack
page read and write
28260E13000
heap
page read and write
EE566FE000
stack
page read and write
1C83D38A000
heap
page read and write
245C4567000
heap
page read and write
2AF6C772000
unkown
page readonly
1A279B5A000
heap
page read and write
1F1C0462000
heap
page read and write
102E000
heap
page read and write
329BAFF000
stack
page read and write
A0F000
stack
page read and write
13A0E895000
heap
page read and write
E9047FE000
stack
page read and write
1C74B542000
heap
page read and write
440000
heap
page read and write
1EB47A70000
heap
page read and write
FCC000
heap
page read and write
2AF52AAD000
heap
page read and write
262DFFDE000
heap
page read and write
28EB716F000
heap
page read and write
23FF5BFB000
heap
page read and write
2825C201000
trusted library allocation
page read and write
249260A1000
heap
page read and write
292FD458000
heap
page read and write
7FFECC1B0000
trusted library allocation
page read and write
262DFFE1000
heap
page read and write
1A279E27000
heap
page read and write
28EB813C000
trusted library allocation
page read and write
1A27A4E1000
heap
page read and write
7FF629966000
unkown
page read and write
7FFECBFF0000
trusted library allocation
page read and write
A1006FE000
stack
page read and write
262DFFD3000
heap
page read and write
1A279C18000
heap
page read and write
13A0E877000
heap
page read and write
1A27795E000
heap
page read and write
19963B78000
heap
page read and write
7FF61EDDA000
unkown
page read and write
24925F80000
heap
page read and write
13A0E89B000
heap
page read and write
1B47B93B000
heap
page read and write
1A27A1C4000
heap
page read and write
B452D58000
stack
page read and write
B14CAFE000
stack
page read and write
16CE2832000
heap
page read and write
19963B94000
heap
page read and write
2A80EA92000
heap
page read and write
28260BC0000
trusted library allocation
page read and write
1034000
heap
page read and write
28EB72E0000
unkown
page readonly
1A279CFA000
heap
page read and write
139B2520000
heap
page read and write
28EB7820000
trusted library allocation
page read and write
1A27A3D4000
heap
page read and write
7FFECBAF3000
trusted library allocation
page read and write
19963B85000
heap
page read and write
7FFECC11E000
trusted library allocation
page read and write
B3E000
heap
page read and write
292FD230000
heap
page read and write
EE57F7F000
stack
page read and write
1A277973000
heap
page read and write
23FF5BB7000
heap
page read and write
329B1CC000
stack
page read and write
1B47C459000
heap
page read and write
1F1C044E000
heap
page read and write
21930640000
heap
page read and write
7FF7E8851000
unkown
page read and write
1A279EDE000
heap
page read and write
1A27A1E8000
heap
page read and write
1A279C07000
heap
page read and write
1B572DC1000
heap
page read and write
21240B47000
heap
page read and write
1A27A3C8000
heap
page read and write
1B47B8EB000
heap
page read and write
282822DB000
heap
page read and write
7FF7C0086000
unkown
page read and write
1A279775000
heap
page read and write
C35C3FF000
stack
page read and write
28260C70000
trusted library allocation
page read and write
1A279774000
heap
page read and write
1B47B903000
heap
page read and write
16CE4265000
heap
page read and write
FEF000
heap
page read and write
1A27A195000
heap
page read and write
7FFECBDCF000
trusted library allocation
page read and write
5D184FE000
stack
page read and write
7FFECBA4C000
trusted library allocation
page read and write
1A279CB2000
heap
page read and write
1A27A3F2000
heap
page read and write
7FF7C008A000
unkown
page read and write
292FD602000
heap
page read and write
1A279C5F000
heap
page read and write
28EB7430000
unkown
page readonly
1A279D11000
heap
page read and write
2AF631C4000
trusted library allocation
page read and write
9EF5B09000
stack
page read and write
1A27A268000
heap
page read and write
7FF62996A000
unkown
page read and write
1A279E1E000
heap
page read and write
A129CFF000
stack
page read and write
FEF000
heap
page read and write
1A279DF0000
heap
page read and write
1A279B2C000
heap
page read and write
7FFECBBD3000
trusted library allocation
page read and write
7FFECB990000
trusted library allocation
page execute and read and write
1A279BC1000
heap
page read and write
E9048FE000
stack
page read and write
7FF7E8830000
unkown
page readonly
F73BD7E000
unkown
page readonly
D9151FE000
stack
page read and write
231C5C80000
heap
page read and write
1A279768000
heap
page read and write
E9044FE000
stack
page read and write
28260E3F000
heap
page read and write
13A0E88D000
heap
page read and write
245C4579000
heap
page read and write
2AF52A70000
heap
page read and write
1A27A54E000
heap
page read and write
1A279720000
heap
page read and write
7FFECBAF4000
trusted library allocation
page read and write
7FF61EDDA000
unkown
page read and write
23FF5BDA000
heap
page read and write
A317FE000
stack
page read and write
245C456C000
heap
page read and write
21BC3D32000
heap
page read and write
1A27A4B5000
heap
page read and write
28ED01D2000
unkown
page readonly
2F9A1FE000
stack
page read and write
E23C5FF000
stack
page read and write
1A27A35C000
heap
page read and write
1A279A02000
heap
page read and write
1A279E08000
heap
page read and write
7FFECBB55000
trusted library allocation
page read and write
2825B929000
heap
page read and write
1A279AD6000
heap
page read and write
1A279FF1000
heap
page read and write
1A279B4E000
heap
page read and write
24926098000
heap
page read and write
75A000
heap
page read and write
1A279AD8000
heap
page read and write
245C4576000
heap
page read and write
F10000
heap
page read and write
139B0B8C000
heap
page read and write
90E000
stack
page read and write
7FFECB960000
trusted library allocation
page execute and read and write
28260C51000
trusted library allocation
page read and write
28EB710F000
heap
page read and write
139B0B94000
heap
page read and write
245C4579000
heap
page read and write
FC0000
heap
page read and write
28ED09E0000
trusted library allocation
page read and write
1A27A120000
heap
page read and write
28EB7440000
heap
page read and write
7FF7C008A000
unkown
page read and write
28EB7445000
heap
page read and write
C80E37C000
stack
page read and write
88B6C7B000
trusted library allocation
page read and write
1A2778D0000
heap
page read and write
C80C479000
stack
page read and write
1A27A211000
heap
page read and write
F4E000
heap
page read and write
16CE4260000
heap
page read and write
7FFECB920000
trusted library allocation
page read and write
1D0892D1000
heap
page read and write
2AF6BFB2000
unkown
page readonly
7FFECBF13000
trusted library allocation
page read and write
28EB70D0000
heap
page read and write
1005000
heap
page read and write
27944320000
heap
page read and write
1C74B4A0000
heap
page read and write
E19BE76000
stack
page read and write
1A279E70000
heap
page read and write
1F1C0444000
heap
page read and write
7FFECBD02000
trusted library allocation
page read and write
2AF631E1000
trusted library allocation
page read and write
1C83D37B000
heap
page read and write
A6860FE000
stack
page read and write
403000
unkown
page readonly
1A279738000
heap
page read and write
C80A4F0000
stack
page read and write
21240A40000
heap
page read and write
2AF631BB000
trusted library allocation
page read and write
1A279B63000
heap
page read and write
1A27796C000
heap
page read and write
29ED6280000
heap
page read and write
2AF6BD12000
unkown
page readonly
1A27A1FA000
heap
page read and write
2AF531D2000
trusted library allocation
page read and write
19963B8D000
heap
page read and write
1A279FED000
heap
page read and write
1A279AE4000
heap
page read and write
7FFECBDD0000
trusted library allocation
page read and write
7FFECBABB000
trusted library allocation
page read and write
E19C17E000
unkown
page readonly
27942780000
heap
page read and write
2AF6BE02000
unkown
page readonly
28EB7420000
heap
page read and write
139B0B9E000
heap
page read and write
7FFECBE22000
trusted library allocation
page read and write
7FF61EDDA000
unkown
page read and write
1A279739000
heap
page read and write
21930737000
heap
page read and write
1B47B93F000
heap
page read and write
2AF53705000
trusted library allocation
page read and write
7FFECBD34000
trusted library allocation
page execute and read and write
1BD8CE66000
heap
page read and write
288716F7000
heap
page read and write
1A279F38000
heap
page read and write
E19C27E000
stack
page read and write
1A27979D000
heap
page read and write
1A27A595000
heap
page read and write
1B47B939000
heap
page read and write
1A279CB2000
heap
page read and write
28EB7940000
unkown
page readonly
FD6000
heap
page read and write
27942776000
heap
page read and write
1602DA19000
heap
page read and write
29ED6263000
heap
page read and write
1A27A123000
heap
page read and write
A6861FE000
stack
page read and write
1A279B03000
heap
page read and write
1A279ED6000
heap
page read and write
2193071A000
heap
page read and write
7FFECBAE0000
trusted library allocation
page read and write
1AAF6229000
heap
page read and write
1A279C96000
heap
page read and write
2825B85A000
heap
page read and write
1A279728000
heap
page read and write
7FFECBFD0000
trusted library allocation
page read and write
2A80E950000
heap
page read and write
1B47B8DB000
heap
page read and write
1F1C045B000
heap
page read and write
EE56FFE000
unkown
page readonly
68F000
stack
page read and write
29ED628B000
heap
page read and write
2AF63253000
trusted library allocation
page read and write
2AF6C521000
heap
page read and write
1030000
heap
page read and write
7FFECB870000
trusted library allocation
page read and write
2A37C7D000
stack
page read and write
27942690000
heap
page read and write
28ED0BC0000
trusted library allocation
page read and write
1B47B8F3000
heap
page read and write
7FF61EDD6000
unkown
page read and write
1A279E79000
heap
page read and write
16CE282C000
heap
page read and write
1B47B94B000
heap
page read and write
405000
unkown
page read and write
1945A90B000
heap
page read and write
88B69FE000
stack
page read and write
1B47BB00000
heap
page read and write
1A2779C8000
heap
page read and write
1A27A197000
heap
page read and write
1A279B2A000
heap
page read and write
19B000
stack
page read and write
FE0000
heap
page read and write
28260D20000
trusted library allocation
page read and write
13A0E889000
heap
page read and write
C80BE7D000
stack
page read and write
2AF52AF3000
heap
page read and write
1FC21A02000
trusted library allocation
page read and write
1A27A346000
heap
page read and write
1A27A3CB000
heap
page read and write
1A279C3C000
heap
page read and write
2E180E49000
heap
page read and write
1B47C47D000
heap
page read and write
1A27A339000
heap
page read and write
1A279F54000
heap
page read and write
7FFECBBDA000
trusted library allocation
page read and write
28260C59000
trusted library allocation
page read and write
1F1C04A4000
heap
page read and write
1A279AC2000
heap
page read and write
245C4470000
heap
page read and write
2775EFE000
stack
page read and write
28ED033A000
heap
page read and write
5D1847E000
unkown
page readonly
1A279BF7000
heap
page read and write
A4158FE000
stack
page read and write
C80D27E000
stack
page read and write
29ED6190000
heap
page read and write
28EB6F20000
heap
page read and write
7FFECBAC3000
trusted library allocation
page read and write
1A27A0E0000
heap
page read and write
1602DA04000
heap
page read and write
1945A8C6000
heap
page read and write
696E8FE000
stack
page read and write
1A279D31000
heap
page read and write
A87000
unkown
page read and write
1A279B38000
heap
page read and write
27942771000
heap
page read and write
2DE8F957000
heap
page read and write
2AF52A79000
heap
page read and write
2A80EAA8000
heap
page read and write
1A279F09000
heap
page read and write
1A279CFC000
heap
page read and write
4A7E7FE000
stack
page read and write
13A0E720000
heap
page read and write
1A279B99000
heap
page read and write
C1A00FE000
stack
page read and write
1B572DD5000
heap
page read and write
1A279759000
heap
page read and write
1A279F59000
heap
page read and write
2AF631F0000
trusted library allocation
page read and write
7FFECBA40000
trusted library allocation
page read and write
2AF53B8C000
trusted library allocation
page read and write
1A27A077000
heap
page read and write
28EB7890000
unkown
page readonly
C80B07E000
stack
page read and write
28EC7984000
trusted library allocation
page read and write
1A279FFA000
heap
page read and write
28ED0CE2000
unkown
page readonly
28871701000
heap
page read and write
1C83D362000
heap
page read and write
1A279B2C000
heap
page read and write
29ED6240000
heap
page read and write
1A277998000
heap
page read and write
17311C40000
heap
page read and write
1B47B939000
heap
page read and write
28EB6E90000
unkown
page readonly
21240B42000
heap
page read and write
2AF52C45000
heap
page read and write
1B572DC6000
heap
page read and write
2AF6B1A0000
trusted library allocation
page read and write
292FD210000
heap
page read and write
5D39CFE000
stack
page read and write
1A277977000
heap
page read and write
1EB47B69000
heap
page read and write
1B47C4A1000
heap
page read and write
7FF7C008A000
unkown
page read and write
1A279F1B000
heap
page read and write
264F46E0000
heap
page read and write
7FFECBD12000
trusted library allocation
page read and write
1A279759000
heap
page read and write
2825C540000
trusted library allocation
page read and write
1F0EB18D000
heap
page read and write
189000
stack
page read and write
1A279750000
heap
page read and write
7FFECBB76000
trusted library allocation
page read and write
28260EA5000
heap
page read and write
262DFFDE000
heap
page read and write
FEB000
heap
page read and write
1A27A4F4000
heap
page read and write
1F0EB185000
heap
page read and write
1A27A0B3000
heap
page read and write
1945A90F000
heap
page read and write
7FF62996A000
unkown
page read and write
2825C11C000
heap
page read and write
28EB7934000
unkown
page readonly
28EB7DFB000
trusted library allocation
page read and write
1602D9FD000
heap
page read and write
1A279770000
heap
page read and write
C80AB7B000
stack
page read and write
1A279762000
heap
page read and write
7FFECBF26000
trusted library allocation
page execute and read and write
28ED0292000
unkown
page readonly
262DFF70000
heap
page read and write
6CC8E000
unkown
page read and write
1B47B8B9000
heap
page read and write
1A27AC00000
heap
page read and write
1753C17F000
trusted library allocation
page read and write
1BD8CE8E000
heap
page read and write
2825C11C000
heap
page read and write
520000
heap
page read and write
1A279890000
heap
page read and write
1A27A239000
heap
page read and write
1A27A076000
heap
page read and write
7FF61EDD6000
unkown
page read and write
C80CA7C000
stack
page read and write
1D0892D9000
heap
page read and write
C80C17D000
stack
page read and write
1A2778D7000
heap
page read and write
1A279AF7000
heap
page read and write
1A279775000
heap
page read and write
1FC21080000
heap
page read and write
2AF52980000
heap
page read and write
7FFECBE00000
trusted library allocation
page read and write
410000
heap
page read and write
1002000
heap
page read and write
7FFECBC00000
trusted library allocation
page read and write
1A27A5CE000
heap
page read and write
245C4584000
heap
page read and write
1945A8F1000
heap
page read and write
7FFECBD30000
trusted library allocation
page read and write
7FFECBFF0000
trusted library allocation
page read and write
1B47B917000
heap
page read and write
7E8000
heap
page read and write
A9D000
stack
page read and write
231C76A0000
heap
page read and write
2F999AB000
stack
page read and write
1A27A015000
heap
page read and write
1A27A316000
heap
page read and write
429000
unkown
page write copy
264F4729000
heap
page read and write
28260CC0000
trusted library allocation
page read and write
1B47C3D0000
heap
page read and write
1A27A116000
heap
page read and write
7FFECBCB4000
trusted library allocation
page read and write
1F1C0451000
heap
page read and write
1A279728000
heap
page read and write
28262000000
heap
page read and write
1A277976000
heap
page read and write
13A0E800000
heap
page read and write
1F1C0413000
heap
page read and write
1A279EAB000
heap
page read and write
1B572D20000
heap
page read and write
245C44C0000
heap
page read and write
1A27979F000
heap
page read and write
1AAF7D60000
heap
page read and write
7FF7C0086000
unkown
page read and write
420000
heap
page read and write
1B47B905000
heap
page read and write
1B572DCB000
heap
page read and write
16CE2700000
heap
page read and write
1A27A323000
heap
page read and write
7FF7C0086000
unkown
page read and write
1F0EB193000
heap
page read and write
F20000
heap
page read and write
1A279775000
heap
page read and write
1B47C49C000
heap
page read and write
1A27A3A3000
heap
page read and write
4A7E8FE000
unkown
page readonly
329B9FE000
stack
page read and write
510000
heap
page read and write
2AF6C350000
heap
page read and write
FF4000
heap
page read and write
C80D97C000
stack
page read and write
2AF6C770000
unkown
page readonly
1A277967000
heap
page read and write
5EE000
stack
page read and write
1A27A009000
heap
page read and write
1A277996000
heap
page read and write
1A279E00000
heap
page read and write
21240B50000
heap
page read and write
1A277988000
heap
page read and write
1A27A583000
heap
page read and write
1A27976C000
heap
page read and write
FC9000
heap
page read and write
7FF7C0086000
unkown
page read and write
1AAF6218000
heap
page read and write
21240B3A000
heap
page read and write
1B47B93A000
heap
page read and write
1A279770000
heap
page read and write
288716D7000
heap
page read and write
1FC21200000
heap
page read and write
D55A53B000
stack
page read and write
1B47B917000
heap
page read and write
7FF629966000
unkown
page read and write
1B572D90000
heap
page read and write
1A27A2F5000
heap
page read and write
7FFF22F37000
unkown
page read and write
181BB01C000
heap
page read and write
1A279E7C000
heap
page read and write
1F1C0426000
heap
page read and write
1A27A3A5000
heap
page read and write
1A27A325000
heap
page read and write
16CE2844000
heap
page read and write
65F000
stack
page read and write
7FFECB89C000
trusted library allocation
page execute and read and write
1A279772000
heap
page read and write
FD9000
heap
page read and write
28260EF8000
heap
page read and write
7FF7E884B000
unkown
page readonly
5D1817E000
stack
page read and write
1A27A33E000
heap
page read and write
1B47B8FF000
heap
page read and write
1000F9000
stack
page read and write
7FFECBA30000
trusted library allocation
page read and write
1A277953000
heap
page read and write
7BE000
stack
page read and write
1BE7918000
stack
page read and write
1A2779C2000
heap
page read and write
1A279C68000
heap
page read and write
7AF000
stack
page read and write
6C95CFE000
stack
page read and write
2A80EAA5000
heap
page read and write
1A279A69000
heap
page read and write
1A27A687000
heap
page read and write
28ED0D02000
unkown
page readonly
1A279739000
heap
page read and write
7151FFF000
stack
page read and write
28261220000
trusted library allocation
page read and write
7FFECBCF0000
trusted library allocation
page read and write
1B574690000
heap
page read and write
1A27A0C2000
heap
page read and write
1B47B89F000
heap
page read and write
1EB47960000
heap
page read and write
6CCB7000
unkown
page execute read
1A279B6E000
heap
page read and write
28ED02E0000
heap
page read and write
292FD44D000
heap
page read and write
73D93000
unkown
page read and write
1A27A325000
heap
page read and write
1A279F5C000
heap
page read and write
2E1810C5000
heap
page read and write
2794277E000
heap
page read and write
7FFECBDF0000
trusted library allocation
page read and write
1A27A18D000
heap
page read and write
EFE000
heap
page read and write
1A279759000
heap
page read and write
1A27A361000
heap
page read and write
1F0EB19B000
heap
page read and write
2AF52A53000
trusted library allocation
page read and write
1F1C04A8000
heap
page read and write
1AAF6211000
heap
page read and write
E29C03A000
stack
page read and write
7FFECBA10000
trusted library allocation
page read and write
53E000
stack
page read and write
87B3FFE000
stack
page read and write
1F0EB159000
heap
page read and write
1A2779C3000
heap
page read and write
1B47B8B8000
heap
page read and write
7FFECBC0E000
trusted library allocation
page read and write
F40000
heap
page read and write
7FF629966000
unkown
page read and write
1A279C6A000
heap
page read and write
1A27A43D000
heap
page read and write
28EB7117000
heap
page read and write
1020000
heap
page read and write
1A27A112000
heap
page read and write
1B47B89A000
heap
page read and write
245C4540000
heap
page read and write
28ED0022000
unkown
page readonly
264F4707000
heap
page read and write
28282220000
heap
page read and write
2825C11A000
heap
page read and write
1C83D378000
heap
page read and write
87B44FE000
stack
page read and write
1A27A19C000
heap
page read and write
1A279B37000
heap
page read and write
1A279A1F000
heap
page read and write
7FFECBBB0000
trusted library allocation
page read and write
139B0BA9000
heap
page read and write
1D0892CD000
heap
page read and write
28ED05E0000
heap
page read and write
7FFECBC02000
trusted library allocation
page read and write
1A279C6B000
heap
page read and write
1A279E5D000
heap
page read and write
E29CB34000
stack
page read and write
279427A2000
heap
page read and write
88B654C000
stack
page read and write
ACF000
stack
page read and write
19963B7B000
heap
page read and write
1A27A050000
heap
page read and write
7FFECBEE2000
trusted library allocation
page read and write
28260C55000
trusted library allocation
page read and write
2F99DFF000
stack
page read and write
1A279DE1000
heap
page read and write
1A27A059000
heap
page read and write
C80BA77000
stack
page read and write
1A27A3A3000
heap
page read and write
7FFECB840000
trusted library allocation
page read and write
1A279F61000
heap
page read and write
6EF000
stack
page read and write
1A27A4D6000
heap
page read and write
28EB80F5000
trusted library allocation
page read and write
1FC21302000
heap
page read and write
1F1C0A80000
trusted library allocation
page read and write
21BC3D54000
heap
page read and write
1B47B860000
heap
page read and write
2DE8F96C000
heap
page read and write
181BB009000
heap
page read and write
7FFECBA30000
trusted library allocation
page read and write
7FFECBEF2000
trusted library allocation
page read and write
5D1857E000
unkown
page readonly
EE5777E000
stack
page read and write
1A279CBA000
heap
page read and write
1A27A51B000
heap
page read and write
28ED02C2000
unkown
page readonly
1A279D2A000
heap
page read and write
1A279ECF000
heap
page read and write
1A279F68000
heap
page read and write
E19C37E000
unkown
page readonly
EC9547F000
stack
page read and write
1D089130000
heap
page read and write
1A27975D000
heap
page read and write
28EB821A000
trusted library allocation
page read and write
1BD8CE13000
heap
page read and write
2825B8BA000
heap
page read and write
1B47B8EA000
heap
page read and write
1A279C38000
heap
page read and write
1A27975A000
heap
page read and write
2AF6BCFE000
unkown
page readonly
4A7E27E000
stack
page read and write
2DE8F840000
heap
page read and write
262E1AD5000
heap
page read and write
C80CB7C000
stack
page read and write
19963A90000
heap
page read and write
1A279FCF000
heap
page read and write
7FFECBBD7000
trusted library allocation
page read and write
16CE4450000
heap
page read and write
10B5000
heap
page read and write
28EB7882000
unkown
page readonly
1A279AC0000
heap
page read and write
8FE000
stack
page read and write
7FFF2301D000
unkown
page readonly
1A27A687000
heap
page read and write
1AAF620F000
heap
page read and write
28873145000
heap
page read and write
7FFF22F34000
unkown
page read and write
1A279775000
heap
page read and write
2DE91350000
heap
page read and write
7FFF22F35000
unkown
page write copy
7FFECBE70000
trusted library allocation
page execute and read and write
1F13CE40000
heap
page read and write
6C95DFE000
stack
page read and write
28261240000
trusted library allocation
page read and write
1A279AB0000
heap
page read and write
B14C8F8000
stack
page read and write
13A0E892000
heap
page read and write
1A27799D000
heap
page read and write
264F4702000
heap
page read and write
D55AAFE000
stack
page read and write
1A279BBD000
heap
page read and write
C80B27C000
stack
page read and write
FDC000
heap
page read and write
7FF7C0086000
unkown
page read and write
540000
heap
page read and write
7FFECBA20000
trusted library allocation
page read and write
16CE2837000
heap
page read and write
FE4000
heap
page read and write
1A279BC7000
heap
page read and write
9FF000
stack
page read and write
1C83ED50000
heap
page read and write
28ED02F0000
heap
page read and write
1AAF6223000
heap
page read and write
88B6C7E000
trusted library allocation
page read and write
1B47B948000
heap
page read and write
1AAF6207000
heap
page read and write
1F1C045D000
heap
page read and write
1EB47B62000
heap
page read and write
1A277995000
heap
page read and write
1F1C0310000
heap
page read and write
1A279C4F000
heap
page read and write
1A27A3B2000
heap
page read and write
1A279FF7000
heap
page read and write
1A27A481000
heap
page read and write
C809EFE000
stack
page read and write
1BE7DFF000
stack
page read and write
D40000
heap
page read and write
D55ADFF000
stack
page read and write
1F13B4CE000
heap
page read and write
422000
unkown
page readonly
2AF6BDF0000
trusted library allocation
page read and write
16CE2819000
heap
page read and write
1A279B3D000
heap
page read and write
28EB7900000
heap
page execute and read and write
7FFECBAEB000
trusted library allocation
page read and write
231C77A0000
heap
page read and write
F73BCFE000
stack
page read and write
7FFECC050000
trusted library allocation
page read and write
7FF7C0086000
unkown
page write copy
7FF62996A000
unkown
page read and write
10A0000
heap
page read and write
21BC3D19000
heap
page read and write
1A27A4EA000
heap
page read and write
13A0E872000
heap
page read and write
1B572DB7000
heap
page read and write
7FFECBCD0000
trusted library allocation
page execute and read and write
696E9FE000
stack
page read and write
1A27796E000
heap
page read and write
7FFF22F39000
unkown
page readonly
C80AA7E000
stack
page read and write
FE6000
heap
page read and write
1A27A2E5000
heap
page read and write
19963B57000
heap
page read and write
17313880000
heap
page read and write
C80A77E000
stack
page read and write
23FF5BE7000
heap
page read and write
19963AC0000
heap
page read and write
1A279722000
heap
page read and write
7FFECC1A0000
trusted library allocation
page read and write
1020000
heap
page read and write
1030000
heap
page read and write
1A27A2EE000
heap
page read and write
1A27A006000
heap
page read and write
F73B979000
stack
page read and write
28EB7432000
unkown
page readonly
1A279E0C000
heap
page read and write
FE6000
heap
page read and write
1A27794D000
heap
page read and write
262DFFE1000
heap
page read and write
16CE2825000
heap
page read and write
7FFECC0F0000
trusted library allocation
page read and write
1A27A052000
heap
page read and write
21BC3D48000
heap
page read and write
1A27A1CF000
heap
page read and write
2DE8F960000
heap
page read and write
1F1C048C000
heap
page read and write
231C5CD7000
heap
page read and write
1A279FC4000
heap
page read and write
1A27A325000
heap
page read and write
1A279C70000
heap
page read and write
7FFECBF00000
trusted library allocation
page read and write
1A279B43000
heap
page read and write
7FFECBAB0000
trusted library allocation
page execute and read and write
1A27979D000
heap
page read and write
B14CFFE000
stack
page read and write
1A27A215000
heap
page read and write
1FC21237000
heap
page read and write
C80A5F8000
stack
page read and write
1A279741000
heap
page read and write
23FF7610000
heap
page read and write
1A27A53B000
heap
page read and write
A1001FE000
stack
page read and write
3DAD3FF000
stack
page read and write
C80B979000
stack
page read and write
1A27A43E000
heap
page read and write
7FFECBEED000
trusted library allocation
page execute and read and write
7FFECBED0000
trusted library allocation
page read and write
231C77A5000
heap
page read and write
7FF61EDC7000
unkown
page readonly
1EB47B5F000
heap
page read and write
2825B670000
heap
page read and write
1A27A641000
heap
page read and write
1A279F49000
heap
page read and write
28ED0CE0000
unkown
page readonly
5D17E7E000
unkown
page readonly
FCC000
heap
page read and write
1A27A383000
heap
page read and write
E29ABFE000
stack
page read and write
1A279A99000
heap
page read and write
1A27A583000
heap
page read and write
1A279BAD000
heap
page read and write
1A27A23A000
heap
page read and write
1A279E03000
heap
page read and write
1A27A53D000
heap
page read and write
1A27A120000
heap
page read and write
6C957FE000
stack
page read and write
7FFF23028000
unkown
page read and write
1A27A22C000
heap
page read and write
7FFECBFD0000
trusted library allocation
page execute and read and write
1A279D0F000
heap
page read and write
A58ABD9000
stack
page read and write
1A27A4B7000
heap
page read and write
EE572FE000
unkown
page readonly
7FFECBCB0000
trusted library allocation
page read and write
1A279CF0000
heap
page read and write
2AF6BE00000
unkown
page readonly
4A7EBFE000
stack
page read and write
1A279B64000
heap
page read and write
2825C1E0000
heap
page read and write
1753C1EF000
heap
page read and write
E29B23E000
stack
page read and write
1A27A293000
heap
page read and write
3DACBD9000
stack
page read and write
13A0E895000
heap
page read and write
1A27793C000
heap
page read and write
6CD60000
unkown
page readonly
F73AA8D000
stack
page read and write
1A27976C000
heap
page read and write
1A27A5AF000
heap
page read and write
231C5CE2000
heap
page read and write
2AF536F6000
trusted library allocation
page read and write
1A279785000
heap
page read and write
C80E47C000
stack
page read and write
C80BC7D000
stack
page read and write
A129BFE000
stack
page read and write
19963B88000
heap
page read and write
17311D80000
heap
page read and write
1A27A5DD000
heap
page read and write
1A279F14000
heap
page read and write
1A279EA5000
heap
page read and write
1A279724000
heap
page read and write
139B0BA5000
heap
page read and write
E29AFFA000
stack
page read and write
1A279C38000
heap
page read and write
7FF7C0077000
unkown
page readonly
1A279C2C000
heap
page read and write
1F13B489000
heap
page read and write
100E000
heap
page read and write
1A277971000
heap
page read and write
28EB7E3E000
trusted library allocation
page read and write
264F4680000
heap
page read and write
C80D57D000
stack
page read and write
1B572DC9000
heap
page read and write
28EB7000000
heap
page read and write
28EB7E45000
trusted library allocation
page read and write
2DE8F870000
heap
page read and write
1602D9A0000
heap
page read and write
2A37D7E000
stack
page read and write
7FFECBDF2000
trusted library allocation
page read and write
1A27A3CB000
heap
page read and write
9BD37FE000
stack
page read and write
1A27A1D7000
heap
page read and write
1055000
heap
page read and write
5D17FFD000
stack
page read and write
28EB8131000
trusted library allocation
page read and write
7FFECBAF2000
trusted library allocation
page read and write
28260C5F000
trusted library allocation
page read and write
1A27A34A000
heap
page read and write
13A0E830000
heap
page read and write
C80AC7C000
stack
page read and write
F73BAF9000
stack
page read and write
1A279BB7000
heap
page read and write
FE0000
heap
page read and write
1F1C0455000
heap
page read and write
5D17C7E000
unkown
page readonly
58A000
heap
page read and write
2AF6C760000
unkown
page readonly
7FFECBAA0000
trusted library allocation
page read and write
500000
heap
page read and write
13A0E850000
heap
page read and write
EE563FE000
unkown
page readonly
19963B15000
heap
page read and write
1A277941000
heap
page read and write
1D0892C6000
heap
page read and write
28EC797B000
trusted library allocation
page read and write
1A279EC6000
heap
page read and write
1A27A4DA000
heap
page read and write
1A27A66D000
heap
page read and write
1A27A1CD000
heap
page read and write
181BB00B000
heap
page read and write
5D1728C000
stack
page read and write
1A279766000
heap
page read and write
7FFECB844000
trusted library allocation
page read and write
262DFFCB000
heap
page read and write
2825C780000
trusted library allocation
page read and write
7FFECBA60000
trusted library allocation
page read and write
405000
unkown
page read and write
292FD46C000
heap
page read and write
17313740000
heap
page read and write
A58B2FE000
stack
page read and write
1B47B939000
heap
page read and write
1B47B93D000
heap
page read and write
7FFECBA78000
trusted library allocation
page read and write
FC1000
heap
page read and write
7FFF23063000
unkown
page read and write
1A279DE8000
heap
page read and write
1A279AE9000
heap
page read and write
B4530FE000
stack
page read and write
1A279727000
heap
page read and write
1A27A28B000
heap
page read and write
1A27A550000
heap
page read and write
28ED0512000
unkown
page readonly
21930670000
heap
page read and write
1A279CC5000
heap
page read and write
8EF000
stack
page read and write
1C74B527000
heap
page read and write
1A27792F000
heap
page read and write
1A277B1D000
heap
page read and write
7FFECBAF0000
trusted library allocation
page read and write
282822FE000
heap
page read and write
7DE000
heap
page read and write
1A277992000
heap
page read and write
13A102E0000
heap
page read and write
28260C30000
trusted library allocation
page read and write
231C7630000
heap
page read and write
1D0892C8000
heap
page read and write
715171C000
stack
page read and write
17311DB8000
heap
page read and write
87B3EFE000
stack
page read and write
28EB7313000
heap
page read and write
C80B174000
stack
page read and write
139B2565000
heap
page read and write
1A279BDC000
heap
page read and write
1A27A583000
heap
page read and write
1A279AA0000
heap
page read and write
1A279C68000
heap
page read and write
245C4585000
heap
page read and write
1C83D38D000
heap
page read and write
16CE2620000
heap
page read and write
1EB47B78000
heap
page read and write
1A27A3D8000
heap
page read and write
1B572D50000
heap
page read and write
5D1807E000
unkown
page readonly
292FD477000
heap
page read and write
A11000
unkown
page execute read
7FFECBD47000
trusted library allocation
page read and write
1F1C02F0000
heap
page read and write
28ED0784000
heap
page read and write
28282110000
heap
page read and write
1D0892D9000
heap
page read and write
1F1C0449000
heap
page read and write
199656A0000
heap
page read and write
1B47C454000
heap
page read and write
EC950DC000
stack
page read and write
1A279D2E000
heap
page read and write
1AAF61B0000
heap
page read and write
288716E3000
heap
page read and write
1C74B540000
heap
page read and write
429000
unkown
page read and write
FE8000
heap
page read and write
1F1C046B000
heap
page read and write
245C44C5000
heap
page read and write
17311DC8000
heap
page read and write
1A27A4EA000
heap
page read and write
A97000
unkown
page read and write
1A279B41000
heap
page read and write
1A27A093000
heap
page read and write
2AF6B1C0000
trusted library allocation
page read and write
1A279892000
heap
page read and write
6C958FF000
stack
page read and write
C80A0FE000
stack
page read and write
28EB80E5000
trusted library allocation
page read and write
1945C170000
heap
page read and write
1A27A269000
heap
page read and write
28EB70B0000
trusted library allocation
page read and write
2AF6C762000
unkown
page readonly
28ED0D00000
unkown
page readonly
1A279FD1000
heap
page read and write
21BC5920000
heap
page read and write
28ED01D6000
unkown
page readonly
28ED0522000
unkown
page readonly
21BC3D3B000
heap
page read and write
A58B3FE000
stack
page read and write
1A27A0DA000
heap
page read and write
C80A67D000
stack
page read and write
7FFECBCE4000
trusted library allocation
page read and write
1A277B10000
heap
page read and write
1945C1F0000
heap
page read and write
F20000
heap
page read and write
1A279B25000
heap
page read and write
B3D000
heap
page read and write
F73B47E000
unkown
page readonly
28ED0510000
unkown
page readonly
1A279A04000
heap
page read and write
1A27A4EA000
heap
page read and write
2AF6BFD0000
heap
page read and write
2AF6C578000
heap
page read and write
2825CBC0000
trusted library allocation
page read and write
28EB7870000
unkown
page readonly
13A10170000
heap
page read and write
77F000
stack
page read and write
28EB712F000
heap
page read and write
2794278B000
heap
page read and write
1B47B933000
heap
page read and write
1A279B4A000
heap
page read and write
2AF6C58B000
heap
page read and write
2DE8F760000
heap
page read and write
1602DA12000
heap
page read and write
1F13B460000
heap
page read and write
7FFECC130000
trusted library allocation
page read and write
4A7E47E000
stack
page read and write
1602D9FA000
heap
page read and write
1B47B95C000
heap
page read and write
28ED02F8000
heap
page read and write
696EEFE000
stack
page read and write
1A279F8E000
heap
page read and write
1A279AB8000
heap
page read and write
264F4725000
heap
page read and write
7FFECC0FD000
trusted library allocation
page read and write
2825B770000
heap
page read and write
E29B838000
stack
page read and write
1C74B509000
heap
page read and write
7FF61EDD6000
unkown
page read and write
92E000
stack
page read and write
1A277975000
heap
page read and write
6CD41000
unkown
page execute read
1A279732000
heap
page read and write
1A279ACE000
heap
page read and write
1B572DB8000
heap
page read and write
1A279751000
heap
page read and write
1A279C48000
heap
page read and write
7FFECBB42000
trusted library allocation
page read and write
1A279B43000
heap
page read and write
1A27A3E0000
heap
page read and write
2AF52ABD000
heap
page read and write
7FF629966000
unkown
page read and write
1D0892CD000
heap
page read and write
1A27A135000
heap
page read and write
1A279A76000
heap
page read and write
1A27A0F2000
heap
page read and write
28260F49000
heap
page read and write
7FFF22FD6000
unkown
page readonly
28260C00000
trusted library allocation
page read and write
1A27A47D000
heap
page read and write
2825C113000
heap
page read and write
28EB7880000
unkown
page readonly
88B6B7E000
stack
page read and write
262E1AD0000
heap
page read and write
2AF52A40000
trusted library allocation
page read and write
1B47B8B8000
heap
page read and write
2A810300000
heap
page read and write
59E000
stack
page read and write
2AF6BF40000
unkown
page readonly
24926077000
heap
page read and write
1A279CD9000
heap
page read and write
7FFECC060000
trusted library allocation
page execute and read and write
2AF52AAA000
heap
page read and write
2825C11C000
heap
page read and write
1A279AB3000
heap
page read and write
1A27972B000
heap
page read and write
2DE8F932000
heap
page read and write
28871718000
heap
page read and write
1A279C25000
heap
page read and write
A1003FE000
stack
page read and write
262E1A90000
heap
page read and write
1A27A429000
heap
page read and write
1B47B93D000
heap
page read and write
7FFECBE35000
trusted library allocation
page read and write
A58B0FE000
stack
page read and write
7FFF22EB1000
unkown
page execute read
87B42FF000
stack
page read and write
1A279FAA000
heap
page read and write
2A80EA82000
heap
page read and write
70E000
stack
page read and write
2825CBA1000
trusted library allocation
page read and write
1F0EB17F000
heap
page read and write
2AF6C3F9000
heap
page read and write
28ED0020000
unkown
page readonly
1A279767000
heap
page read and write
7FFF23044000
unkown
page readonly
1A27A3E8000
heap
page read and write
7FFECB850000
trusted library allocation
page read and write
1B47B95A000
heap
page read and write
C1A01FE000
stack
page read and write
2DE8F920000
heap
page read and write
2DE8F967000
heap
page read and write
6CD12000
unkown
page execute read
1BD8CF00000
heap
page read and write
28261230000
trusted library allocation
page read and write
1A27A1C4000
heap
page read and write
5D39AFE000
stack
page read and write
2DE91380000
heap
page read and write
1A279A48000
heap
page read and write
1B47B917000
heap
page read and write
28ED0711000
heap
page read and write
1B47B7F0000
heap
page read and write
139B0B85000
heap
page read and write
17311DC4000
heap
page read and write
1A279AE0000
heap
page read and write
2AF6B950000
heap
page execute and read and write
2825B8A7000
heap
page read and write
6CDBE000
unkown
page read and write
1B47B954000
heap
page read and write
23FF5BFF000
heap
page read and write
1A279C46000
heap
page read and write
4A7ECFE000
unkown
page readonly
1A279AFA000
heap
page read and write
7FFECBAD0000
trusted library allocation
page read and write
1A279B81000
heap
page read and write
7FFECBB60000
trusted library allocation
page read and write
1040000
heap
page read and write
7FFECC0F0000
trusted library allocation
page read and write
7FFECBF1C000
trusted library allocation
page read and write
28EB81EB000
trusted library allocation
page read and write
EE570FE000
unkown
page readonly
1A27A0CA000
heap
page read and write
1035000
heap
page read and write
1A279A6D000
heap
page read and write
1B47C411000
heap
page read and write
1A27A0DF000
heap
page read and write
5D39EFF000
stack
page read and write
7FFECBD1C000
trusted library allocation
page read and write
7FFECB900000
trusted library allocation
page execute and read and write
1A279E7F000
heap
page read and write
7FF61EDD6000
unkown
page read and write
28EB6E92000
unkown
page readonly
1A279CAE000
heap
page read and write
E29C939000
stack
page read and write
2AF53680000
trusted library allocation
page read and write
1A279732000
heap
page read and write
1A277973000
heap
page read and write
2AF53AB0000
trusted library allocation
page read and write
C80D17D000
stack
page read and write
1A27799F000
heap
page read and write
1B574695000
heap
page read and write
A5B90B000
stack
page read and write
16CE2811000
heap
page read and write
1A27A003000
heap
page read and write
2AF6C563000
heap
page read and write
2AF6B953000
heap
page execute and read and write
1A279F04000
heap
page read and write
19963B82000
heap
page read and write
A314FE000
stack
page read and write
1A27976F000
heap
page read and write
1C74B537000
heap
page read and write
2AF6BCE0000
unkown
page readonly
28EB794A000
unkown
page readonly
9C000
stack
page read and write
1A279BFA000
heap
page read and write
1A279750000
heap
page read and write
7FFECC144000
trusted library allocation
page read and write
1C74B53A000
heap
page read and write
2AF53A86000
trusted library allocation
page read and write
2AF53C8E000
trusted library allocation
page read and write
1A27A063000
heap
page read and write
1A27A10D000
heap
page read and write
1A279BBB000
heap
page read and write
1A27A4BC000
heap
page read and write
1F1C03F0000
heap
page read and write
FE6000
heap
page read and write
181BAFA0000
heap
page read and write
7FF7E8853000
unkown
page readonly
EE565FE000
unkown
page readonly
AA0000
heap
page read and write
29ED620B000
heap
page read and write
FE3000
heap
page read and write
1BD8CE7B000
heap
page read and write
1A279B3F000
heap
page read and write
7FF61EDD6000
unkown
page read and write
7FF7C0086000
unkown
page read and write
7FFECBB42000
trusted library allocation
page read and write
1A27A5DA000
heap
page read and write
E29B53E000
stack
page read and write
219306E0000
heap
page read and write
1A279ACB000
heap
page read and write
7FF61EDD6000
unkown
page write copy
1A277961000
heap
page read and write
2AF6BE24000
heap
page read and write
1A279C14000
heap
page read and write
28ED047A000
heap
page read and write
5E0000
heap
page read and write
1A279FCC000
heap
page read and write
C35BFFE000
stack
page read and write
1A279B1F000
heap
page read and write
21242515000
heap
page read and write
1A27A541000
heap
page read and write
1A27A1C8000
heap
page read and write
4A7E3FE000
unkown
page readonly
1A27794F000
heap
page read and write
231C5CE5000
heap
page read and write
1A279FE9000
heap
page read and write
1AAF622B000
heap
page read and write
C80E17C000
stack
page read and write
1F13B4CA000
heap
page read and write
5BE000
stack
page read and write
1A27975A000
heap
page read and write
1A27AD60000
heap
page read and write
1A279B3C000
heap
page read and write
D55AEFE000
stack
page read and write
1A27A00C000
heap
page read and write
1A279736000
heap
page read and write
696EAFE000
stack
page read and write
B14C9FE000
stack
page read and write
28260F76000
heap
page read and write
7151CFE000
stack
page read and write
A5C0FE000
stack
page read and write
1A279A58000
heap
page read and write
C80A97E000
stack
page read and write
1A27976C000
heap
page read and write
1A27A18C000
heap
page read and write
17311DAA000
heap
page read and write
7FFECBE3D000
trusted library allocation
page read and write
EE56EFE000
unkown
page readonly
2AF53C1E000
trusted library allocation
page read and write
2AF6C4B3000
heap
page read and write
1A27A184000
heap
page read and write
F73B67E000
unkown
page readonly
2825C000000
heap
page read and write
FF4000
heap
page read and write
282822DD000
heap
page read and write
1C83D300000
heap
page read and write
2AF6C536000
heap
page read and write
1A279739000
heap
page read and write
1F0EB18A000
heap
page read and write
1A27A1D7000
heap
page read and write
EC951DE000
stack
page read and write
1A279C4B000
heap
page read and write
2825C10F000
heap
page read and write
1A27A3F5000
heap
page read and write
2AF6BE10000
heap
page read and write
1A279B1F000
heap
page read and write
7FF62996A000
unkown
page read and write
EE561FD000
stack
page read and write
A1002FE000
stack
page read and write
2825B902000
heap
page read and write
7FF62996A000
unkown
page read and write
1A279FF7000
heap
page read and write
720000
heap
page read and write
21240A50000
heap
page read and write
C80DE7C000
stack
page read and write
7FFECBF20000
trusted library allocation
page read and write
1A279E78000
heap
page read and write
7FF62996A000
unkown
page read and write
1B572DD1000
heap
page read and write
7FFECBEE0000
trusted library allocation
page read and write
9BD3BFF000
stack
page read and write
E29CA39000
stack
page read and write
1A27A312000
heap
page read and write
2825B813000
heap
page read and write
1032000
heap
page read and write
10001000
unkown
page execute read
1A27A117000
heap
page read and write
7FF61EDDA000
unkown
page read and write
28ECF990000
trusted library allocation
page read and write
1F13B4C8000
heap
page read and write
1F1C045E000
heap
page read and write
28260F24000
heap
page read and write
1A279EF8000
heap
page read and write
CED47FE000
stack
page read and write
16CE2730000
heap
page read and write
2AF6C50B000
heap
page read and write
7FFECB930000
trusted library allocation
page execute and read and write
1A279CF0000
heap
page read and write
262DFFC2000
heap
page read and write
1602F385000
heap
page read and write
696ECFF000
stack
page read and write
28260E21000
heap
page read and write
1D089290000
heap
page read and write
7FFECBDE0000
trusted library allocation
page execute and read and write
1B47B943000
heap
page read and write
27759FE000
stack
page read and write
FEF000
heap
page read and write
1A27A07C000
heap
page read and write
181BB007000
heap
page read and write
292FD45A000
heap
page read and write
1A279727000
heap
page read and write
1A27798F000
heap
page read and write
1A27A5FA000
heap
page read and write
1A279C48000
heap
page read and write
7FF629966000
unkown
page read and write
4F0000
heap
page read and write
9EF63FE000
stack
page read and write
1A279761000
heap
page read and write
1A27976F000
heap
page read and write
1A279A41000
heap
page read and write
262E1920000
heap
page read and write
7FF62996A000
unkown
page read and write
28261260000
trusted library allocation
page read and write
28EC7993000
trusted library allocation
page read and write
7FFECBD60000
trusted library allocation
page execute and read and write
7FF7C008A000
unkown
page read and write
1A27A05C000
heap
page read and write
6CC30000
unkown
page readonly
1AAF622B000
heap
page read and write
1A279D39000
heap
page read and write
FEB000
heap
page read and write
F73B17E000
unkown
page readonly
7FFECBB85000
trusted library allocation
page read and write
9DF000
stack
page read and write
2DE8F964000
heap
page read and write
2AF52A50000
trusted library allocation
page read and write
1A279C48000
heap
page read and write
28EB7119000
heap
page read and write
1753C1C0000
heap
page read and write
28260C03000
trusted library allocation
page read and write
1F1C045A000
heap
page read and write
B4534FE000
stack
page read and write
2AF6CBC0000
heap
page read and write
1A279CFB000
heap
page read and write
28EB7113000
heap
page read and write
28EC7961000
trusted library allocation
page read and write
28EB7115000
heap
page read and write
1A2779A6000
heap
page read and write
264F471A000
heap
page read and write
1B47C479000
heap
page read and write
A5BDF9000
stack
page read and write
1A279B78000
heap
page read and write
A129FFE000
stack
page read and write
1A279EF5000
heap
page read and write
1A27A224000
heap
page read and write
1A277953000
heap
page read and write
1A277B19000
heap
page read and write
196000
stack
page read and write
7FFECB8FC000
trusted library allocation
page execute and read and write
A685D8B000
stack
page read and write
2226FC000
stack
page read and write
21930712000
heap
page read and write
1AAF6230000
heap
page read and write
7FFECBD09000
trusted library allocation
page read and write
16CE2816000
heap
page read and write
1B47C45E000
heap
page read and write
2AF6C12E000
heap
page read and write
1B47C47E000
heap
page read and write
1A27A645000
heap
page read and write
17311DBE000
heap
page read and write
2AF6BC00000
unkown
page readonly
28EB7E31000
trusted library allocation
page read and write
440000
heap
page read and write
1A279C5A000
heap
page read and write
282822B0000
heap
page read and write
1A279FE9000
heap
page read and write
E29A724000
stack
page read and write
1A279F9A000
heap
page read and write
1A277941000
heap
page read and write
1A279B2B000
heap
page read and write
7FFECBA50000
trusted library allocation
page read and write
28EB7040000
heap
page read and write
7151EFE000
stack
page read and write
A313FE000
stack
page read and write
1B47B917000
heap
page read and write
1A27A687000
heap
page read and write
21BC3D61000
heap
page read and write
5D3A0FE000
stack
page read and write
1F0ECCD0000
heap
page read and write
FDE000
heap
page read and write
1A279F74000
heap
page read and write
7FFECBD00000
trusted library allocation
page read and write
1A279895000
heap
page read and write
139B0B9B000
heap
page read and write
7FF62996A000
unkown
page read and write
24926015000
heap
page read and write
1A279FE1000
heap
page read and write
1A27972E000
heap
page read and write
EE56F7E000
stack
page read and write
1F13B4C8000
heap
page read and write
1050000
heap
page read and write
10D5000
heap
page read and write
28ED007D000
heap
page read and write
7FFECBA80000
trusted library allocation
page execute and read and write
28ED01F0000
unkown
page readonly
1A27A35D000
heap
page read and write
1A27A654000
heap
page read and write
1B47C478000
heap
page read and write
1FC21216000
heap
page read and write
1B572DBE000
heap
page read and write
1A279728000
heap
page read and write
28EB7872000
unkown
page readonly
FD2000
heap
page read and write
1A27A0AD000
heap
page read and write
A5BE7C000
stack
page read and write
2AF6C15C000
heap
page read and write
21BC3CE0000
heap
page read and write
28EB7830000
unkown
page readonly
7E0000
heap
page read and write
1A279750000
heap
page read and write
1C74B490000
heap
page read and write
1A279C8F000
heap
page read and write
27942750000
heap
page read and write
7FF7C008A000
unkown
page read and write
2DE91385000
heap
page read and write
F73AB8F000
stack
page read and write
1A279AEE000
heap
page read and write
1016000
heap
page read and write
1A279C70000
heap
page read and write
1BD8CDA0000
heap
page read and write
EE5707E000
stack
page read and write
13A0E88B000
heap
page read and write
1EB47B30000
heap
page read and write
1F1C0481000
heap
page read and write
7FFECC140000
trusted library allocation
page read and write
1A279D24000
heap
page read and write
1F0EB17B000
heap
page read and write
1B572D97000
heap
page read and write
There are 3543 hidden memdumps, click here to show them.