Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
starwindconverter.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Config.Msi\64f25a.rbs
|
data
|
dropped
|
||
C:\Config.Msi\64f25e.rbs
|
data
|
modified
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\V2V_Converter.exe (copy)
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\V2V_ConverterConsole.exe (copy)
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-c-auth.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-c-cal.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-c-common.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-c-compression.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-c-event-stream.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-c-http.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-c-io.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-c-mqtt.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-c-s3.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-c-sdkutils.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-checksums.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-cpp-sdk-core.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-cpp-sdk-ec2.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-cpp-sdk-iam.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-cpp-sdk-s3.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-crt-cpp.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\cpprest140_2_9.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\gsoap.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-043UQ.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-0U75Q.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-239NR.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-2T9SC.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-3DPGP.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-9PTPC.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-C445H.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-DMGAR.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-DOD6O.tmp
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-HKUCL.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-JNOSU.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-JTGFU.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-LA1DS.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-NDNT1.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-NJRVA.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-OCF30.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-OCNA5.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-PM8AC.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-QH72R.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-QJJQG.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-QMAR7.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-QT18L.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-QVHTU.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-RRJPS.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-SRQKS.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-UHSSF.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\is-VPH09.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\AMD64\is-FDG2J.tmp
|
Windows setup INFormation
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\AMD64\is-HQLOK.tmp
|
data
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\AMD64\is-M84MS.tmp
|
PE32 executable (native) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\AMD64\is-MRML8.tmp
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\AMD64\is-T4VT0.tmp
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\AMD64\vstor2-mntapi20-shared.sys (copy)
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\AMD64\vstor2-x64.sys (copy)
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\AMD64\vstor2-x86.sys (copy)
|
PE32 executable (native) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\AMD64\vstor2.cat (copy)
|
data
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\AMD64\vstor2.inf (copy)
|
Windows setup INFormation
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\diskLibPlugin.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\expat.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\glib-2.0.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\gobject-2.0.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\gthread-2.0.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\gvmomi.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\iconv.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\intl.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-468L0.tmp
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-4G0NR.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-6QBCJ.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-6S65I.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-728T9.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-80TNO.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-9CMA4.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-BHS0U.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-ED59I.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-F99S5.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-FIGM0.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-G86Q6.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-GCANT.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-H973S.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-HGVAF.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-I6VGK.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-I8RA6.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-JUSQQ.tmp
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-LQIVE.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-MMA8U.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-NTL6D.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-OAJUU.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-PAU7U.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-QULGP.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-S80ND.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-SN4HU.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-U7152.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-VUIE8.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\libcurl.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\libeay32.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\liblber.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\libldap.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\libldap_r.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\libxml2.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\pcre.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\ssleay32.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\ssoclient.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\vddkReporter.exe (copy)
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\vim-types.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\vixDiskLib.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\vixDiskLibVim.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\vixMntapi.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\vmacore.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\vmomi.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\vmware-vdiskmanager.exe (copy)
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\vstor2install.bat (copy)
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\vstor2uninstall.bat (copy)
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\zlib1.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\libeay32MD.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\ssleay32MD.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\testing-resources.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\unins000.dat
|
InnoSetup Log StarWind V2V Converter (9.0.1.369), version 0x30, 9722 bytes, 473627\user, "C:\Program Files\StarWind Software\StarWind
V2V Converter"
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\unins000.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\unins000.msg
|
InnoSetup messages, version 5.5.3, 221 messages (ASCII), &About Setup...
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\vc\is-03KQM.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\vc\is-EOQIC.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\vc\vc_redist.x64.130.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\vc\vc_redist.x64.140.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\vcruntime140_1.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\wastorage.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x83a51d1a, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StarWind Software\StarWind V2V Converter\StarWind V2V Converter.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Fri Apr 26 14:49:40 2024, mtime=Fri Apr 26 14:49:40 2024, atime=Wed Nov 8 12:10:16 2023, length=3885672, window=hide
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StarWind Software\StarWind V2V Converter\Uninstall.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Fri Apr 26 14:49:40 2024, mtime=Fri Apr 26 14:49:40 2024, atime=Fri Apr 26 14:49:02 2024, length=1015912, window=hide
|
dropped
|
||
C:\ProgramData\Package Cache\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\state.rsm
|
data
|
dropped
|
||
C:\ProgramData\Package Cache\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\vcredist_x64.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\Public\Desktop\StarWind V2V Converter.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Fri Apr 26 14:49:40 2024, mtime=Fri Apr 26 14:49:54 2024, atime=Wed Nov 8 12:10:16 2023, length=3885672, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dd_vcredist_amd64_20240426175001.log
|
ASCII text, with very long lines (322), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dd_vcredist_amd64_20240426175001_0_vcRuntimeMinimum_x64.log
|
Unicode text, UTF-16, little-endian text, with very long lines (588), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dd_vcredist_amd64_20240426175001_1_vcRuntimeAdditional_x64.log
|
Unicode text, UTF-16, little-endian text, with very long lines (588), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dd_vcredist_amd64_20240426175040.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dd_vcredist_amd64_20240426175041.log
|
ASCII text, with very long lines (317), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-DTP8T.tmp\starwindconverter.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-UGUD3.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\.ba1\BootstrapperApplicationData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (561), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\.ba1\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\.ba1\logo.png
|
PNG image data, 64 x 64, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\.ba1\thm.wxl
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\.ba1\thm.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\.ba1\wixstdba.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\.be\vcredist_x64.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\cab2C04DDC374BD96EB5C8EB8208F2C7C92
|
Microsoft Cabinet archive data, 5572128 bytes, 14 files, at 0x44 +A "F_CENTRAL_mfc120_x64" +A "F_CENTRAL_mfc120chs_x64", flags
0x4, number 1, extra bytes 20 in head, 369 datablocks, 0x1 compression
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\cab5046A8AB272BF37297BB7928664C9503
|
Microsoft Cabinet archive data, 1018378 bytes, 5 files, at 0x44 +A "F_CENTRAL_msvcp120_x64" +A "F_CENTRAL_msvcr120_x64", flags
0x4, number 1, extra bytes 20 in head, 80 datablocks, 0x1 compression
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\vcRuntimeAdditional_x64
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2013 x64 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2013 x64 Additional Runtime - 12.0.21005.,
Template: x64;1033, Revision Number: {0990E7AB-85D7-456A-B8F8-1E1E56A29571}, Create Time/Date: Sat Oct 5 11:36:18 2013, Last
Saved Time/Date: Sat Oct 5 11:36:18 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML (3.7.1623.0), Security: 2
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\vcRuntimeMinimum_x64
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2013 x64 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2013 x64 Minimum Runtime - 12.0.21005.,
Template: x64;1033, Revision Number: {FE26E34E-F44B-4B4D-A2C9-878D87759F44}, Create Time/Date: Sat Oct 5 11:36:26 2013, Last
Saved Time/Date: Sat Oct 5 11:36:26 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML (3.7.1623.0), Security: 2
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1028\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1028\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1029\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1029\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1031\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1031\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1036\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1036\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1040\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1040\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1041\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1041\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1042\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1042\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1045\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1045\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1046\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1046\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1049\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1049\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1055\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1055\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\2052\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\2052\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\3082\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\3082\thm.wxl
|
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\BootstrapperApplicationData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (561), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\license.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\logo.png
|
PNG image data, 64 x 64, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\thm.wxl
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\thm.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\wixstdba.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\64f258.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2013 x64 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2013 x64 Minimum Runtime - 12.0.21005.,
Template: x64;1033, Revision Number: {FE26E34E-F44B-4B4D-A2C9-878D87759F44}, Create Time/Date: Sat Oct 5 11:36:26 2013, Last
Saved Time/Date: Sat Oct 5 11:36:26 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML (3.7.1623.0), Security: 2
|
dropped
|
||
C:\Windows\Installer\64f25b.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2013 x64 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2013 x64 Minimum Runtime - 12.0.21005.,
Template: x64;1033, Revision Number: {FE26E34E-F44B-4B4D-A2C9-878D87759F44}, Create Time/Date: Sat Oct 5 11:36:26 2013, Last
Saved Time/Date: Sat Oct 5 11:36:26 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML (3.7.1623.0), Security: 2
|
dropped
|
||
C:\Windows\Installer\64f25c.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2013 x64 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2013 x64 Additional Runtime - 12.0.21005.,
Template: x64;1033, Revision Number: {0990E7AB-85D7-456A-B8F8-1E1E56A29571}, Create Time/Date: Sat Oct 5 11:36:18 2013, Last
Saved Time/Date: Sat Oct 5 11:36:18 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML (3.7.1623.0), Security: 2
|
dropped
|
||
C:\Windows\Installer\64f25f.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2013 x64 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2013 x64 Additional Runtime - 12.0.21005.,
Template: x64;1033, Revision Number: {0990E7AB-85D7-456A-B8F8-1E1E56A29571}, Create Time/Date: Sat Oct 5 11:36:18 2013, Last
Saved Time/Date: Sat Oct 5 11:36:18 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows
Installer XML (3.7.1623.0), Security: 2
|
dropped
|
||
C:\Windows\Installer\MSIF594.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSIF97D.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\SourceHash{929FBD26-9020-399B-9A7A-751D61F0B942}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\SourceHash{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
C:\Windows\System32\drivers\vstor2-mntapi20-shared.sys
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc120chs.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc120cht.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc120deu.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc120enu.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc120esn.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc120fra.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc120ita.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc120jpn.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc120kor.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc120rus.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\vcamp120.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\vcomp120.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Temp\~DF1ED0CDFA3A663D46.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF20B13ED5A46CFD6A.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF2F7825B6A1632856.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF4064E05D88689530.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF41904B734E93B5F2.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF4FB675D4343A66D4.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF5BFF47EAC34AE126.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF5C89FC4524B029B4.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF5DB394C7BE65B253.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF6273930158FA6726.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF6B415F51396B138E.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF6E25CDFE56AB2CED.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF7CB20637BA7FDB2F.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF7F6B2EA59D255DC8.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF81190C071D3F5224.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFA220BC115BF5EE0C.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFA45C5A87F02E8805.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFAC508EA015BA8E99.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFB6CD0B4A6E3703E9.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFB7B704FB726FEEA1.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFC33A75C755FF963D.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFC3FD91E8C01D084D.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFE84AE1E77412CBFC.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFEC3130DD10466341.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
Chrome Cache Entry: 212
|
ASCII text, with very long lines (837)
|
downloaded
|
||
\Device\ConDrv
|
ASCII text, with CRLF, CR line terminators
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 227 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\starwindconverter.exe
|
"C:\Users\user\Desktop\starwindconverter.exe"
|
||
C:\Users\user\AppData\Local\Temp\is-DTP8T.tmp\starwindconverter.tmp
|
"C:\Users\user\AppData\Local\Temp\is-DTP8T.tmp\starwindconverter.tmp" /SL5="$10446,40015629,338944,C:\Users\user\Desktop\starwindconverter.exe"
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /C ""C:\Program Files\StarWind Software\StarWind V2V Converter\lib\vstor2install.bat""
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WMIC.exe
|
wmic OS get OSArchitecture
|
||
C:\Windows\System32\findstr.exe
|
findstr 64
|
||
C:\Windows\System32\sc.exe
|
sc query vstor2-mntapi20-shared
|
||
C:\Windows\System32\sc.exe
|
sc create vstor2-mntapi20-shared type= kernel start= auto error= normal binpath= System32\drivers\vstor2-mntapi20-shared.sys
DisplayName= "Vstor2 MntApi 2.0 Driver (shared)" group= System
|
||
C:\Windows\System32\sc.exe
|
sc start vstor2-mntapi20-shared
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\vc\vc_redist.x64.130.exe
|
"C:\Program Files\StarWind Software\StarWind V2V Converter\vc\vc_redist.x64.130.exe" /quiet
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\vc\vc_redist.x64.130.exe
|
"C:\Program Files\StarWind Software\StarWind V2V Converter\vc\vc_redist.x64.130.exe" /quiet -burn.unelevated BurnPipe.{D7692551-F3D1-4F96-B98C-6EA8EBCE2C29}
{99F278BD-B402-4D45-B367-3A71E4C78909} 4116
|
||
C:\Windows\System32\VSSVC.exe
|
C:\Windows\system32\vssvc.exe
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k swprv
|
||
C:\Windows\System32\SrTasks.exe
|
C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2220 --field-trial-handle=1904,i,7260468871230898073,3398952734327397412,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\ProgramData\Package Cache\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\vcredist_x64.exe
|
"C:\ProgramData\Package Cache\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\vcredist_x64.exe" /burn.runonce
|
||
C:\ProgramData\Package Cache\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\vcredist_x64.exe
|
"C:\ProgramData\Package Cache\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\vcredist_x64.exe"
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\vc\vc_redist.x64.140.exe
|
"C:\Program Files\StarWind Software\StarWind V2V Converter\vc\vc_redist.x64.140.exe" /quiet
|
||
C:\Program Files\StarWind Software\StarWind V2V Converter\vc\vc_redist.x64.140.exe
|
"C:\Program Files\StarWind Software\StarWind V2V Converter\vc\vc_redist.x64.140.exe" /quiet -burn.unelevated BurnPipe.{621695C5-B52A-43D6-BAAE-CEAD8A9F5342}
{3E01C30D-E9A5-4BF9-AFE0-A4D60C443091} 3452
|
There are 14 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.vmware.com/0
|
unknown
|
||
https://www.starwindsoftware.com/v2v-help/
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
|
unknown
|
||
http://wixtoolset.org/schemas/thmutil/2010
|
unknown
|
||
http://www.openssl.org/V
|
unknown
|
||
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
|
unknown
|
||
https://www.starwindsoftware.com/
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV2.C:
|
unknown
|
||
http://s3.amazonaws.com/doc/2006-03-01/
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
|
unknown
|
||
http://www.openssl.org/support/faq.html.
|
unknown
|
||
http://www.openssl.org/support/faq.html
|
unknown
|
||
https://www.starwindsoftware.com/terms
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/http://docs.oasis-open.org/wss:stringmustUnderstandxsi
|
unknown
|
||
https://g.live.com/odclientsettings/Prod.C:
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/Envelope
|
unknown
|
||
http://wixtoolset.org/schemas/thmutil/2010lureH
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV2
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://www.starwindsoftware.com/download-free-tools
|
unknown
|
||
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
|
142.250.64.196
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
|
unknown
|
||
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
|
unknown
|
||
https://www.starwindsoftware.com//
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/HeaderBody
|
unknown
|
||
http://www.innosetup.com/
|
unknown
|
||
https://www.starwindsoftware.com/:
|
unknown
|
||
https://www.starwindsoftware.com/privacy-policy
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://ocsp.thawte.com0
|
unknown
|
||
https://www.starwindsoftware.com/privacy-policy.
|
unknown
|
||
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline
|
unknown
|
||
http://www.vmware.com/0/
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://www.google.com/async/newtab_promos
|
142.250.64.196
|
||
https://www.starwindsoftware.com/starwind-nfr-license-users.
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/Body
|
unknown
|
||
http://www.symauth.com/cps0(
|
unknown
|
||
http://docs.oasis-open.org/wss
|
unknown
|
||
https://www.starwindsoftware.com/lT
|
unknown
|
||
https://www.google.com/async/ddljson?async=ntp:2
|
142.250.64.196
|
||
https://www.starwindsoftware.com/v2v-help/2
|
unknown
|
||
http://wixtoolset.org/schemas/thmutil/2010(
|
unknown
|
||
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
|
142.250.64.196
|
||
http://www.remobjects.com/psU
|
unknown
|
||
https://www.starwindsoftware.com/starwind-nfr-license-users
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
|
unknown
|
||
http://www.symauth.com/rpa00
|
unknown
|
||
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgRmgZjcGM-ar7EGIjAqkOFqfrWsUuYYc-cHY4mS2DMqZX8MiAbTgaXolWeyzV_Jwf75R-0hkajKDO7EEd0yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
|
142.250.64.196
|
||
http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
|
unknown
|
||
http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1647
|
unknown
|
||
http://wixtoolset.org/schemas/thmutil/2010and
|
unknown
|
||
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgRmgZjcGM-ar7EGIjDPDwLUDTsFOtyhKJAT5DyNT4-JYGy8AQvI_i61IsKnO-HCW4ZF9DcmjkgW5xqtABsyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
|
142.250.64.196
|
||
http://www.remobjects.com/ps
|
unknown
|
||
https://www.starwindsoftware.com/NT
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
|
unknown
|
There are 47 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.google.com
|
142.250.64.196
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
142.250.64.196
|
www.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
192.168.2.4
|
unknown
|
unknown
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
|
Inno Setup: Setup Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
|
Inno Setup: App Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
|
Inno Setup: Icon Group
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
|
Inno Setup: User
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
|
Inno Setup: Selected Tasks
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
|
Inno Setup: Deselected Tasks
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
|
Inno Setup: Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
|
DisplayIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
|
QuietUninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
|
AoACAPIError
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
|
AoACAPIResult
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
FirstRun
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
LastIndex
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
|
NestingLevel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
|
StartNesting
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
SRInitDone
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
|
SrCreateRp (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
|
SrCreateRp (Leave)
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
BundleCachePath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
BundleUpgradeCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
BundleAddonCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
BundleDetectCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
BundlePatchCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
BundleVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
BundleProviderKey
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
BundleTag
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
EngineVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
DisplayIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
NoElevateOnModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
QuietUninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
Resume
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
|
{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
BundleResumeCommandLine
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
Installed
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
RPSessionInterval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
|
LastIndex
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
|
Resume
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
IDENTIFY (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
IDENTIFY (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer
|
IDENTIFY (Enter)
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Description
|
FirmwareModified
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001
|
Element
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\12000002
|
Element
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{584f4cfd-61ca-11ee-8a62-e43725c6cdb7}\Elements\12000004
|
Element
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{584f4cfe-61ca-11ee-8a62-e43725c6cdb7}\Elements\12000004
|
Element
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{a5a30fa2-3d06-4e9f-b5f4-a01df9d1fcba}\Description
|
Type
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{a5a30fa2-3d06-4e9f-b5f4-a01df9d1fcba}\Elements\24000001
|
Element
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{a5a30fa2-3d06-4e9f-b5f4-a01df9d1fcba}\Elements\25000004
|
Element
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
IDENTIFY (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
IDENTIFY (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
IDENTIFY (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
IDENTIFY (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer
|
IDENTIFY (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_BEGINPREPARE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_BEGINPREPARE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
PREPAREBACKUP (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
PREPAREBACKUP (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
PREPAREBACKUP (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
PREPAREBACKUP (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
VSS_WS_STABLE (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
PREPAREBACKUP (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
VSS_WS_STABLE (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
PREPAREBACKUP (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
VSS_WS_STABLE (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
GETSTATE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
GETSTATE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
GETSTATE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
GETSTATE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
GETSTATE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
GETSTATE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_ENDPREPARE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_ENDPREPARE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
PREPARESNAPSHOT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
PREPARESNAPSHOT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
PREPARESNAPSHOT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
PREPARESNAPSHOT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
PREPARESNAPSHOT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
VSS_WS_WAITING_FOR_FREEZE (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
PREPARESNAPSHOT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
VSS_WS_WAITING_FOR_FREEZE (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
PREPARESNAPSHOT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
VSS_WS_WAITING_FOR_FREEZE (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
PREPARESNAPSHOT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
FREEZE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
FREEZE_FRONT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
FREEZE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
FREEZE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
VSS_WS_WAITING_FOR_THAW (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
BKGND_FREEZE_THREAD (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
FREEZE_FRONT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
FREEZE_BACK (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
FREEZE_BACK (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
FREEZE_SYSTEM (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
FREEZE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
FREEZE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
VSS_WS_WAITING_FOR_THAW (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
BKGND_FREEZE_THREAD (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
FREEZE_SYSTEM (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
FREEZE_KTM (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
FREEZE_KTM (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
FREEZE_RM (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
FREEZE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
FREEZE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
VSS_WS_WAITING_FOR_THAW (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
FREEZE_RM (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
BKGND_FREEZE_THREAD (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
FREEZE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_PRECOMMIT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_PRECOMMIT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
|
OPEN_VOLUME_HANDLE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
|
OPEN_VOLUME_HANDLE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
|
OPEN_VOLUME_HANDLE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
|
OPEN_VOLUME_HANDLE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
|
IOCTL_FLUSH_AND_HOLD (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
|
IOCTL_FLUSH_AND_HOLD (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
|
IOCTL_RELEASE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
|
IOCTL_RELEASE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
|
IOCTL_FLUSH_AND_HOLD (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
|
IOCTL_FLUSH_AND_HOLD (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
|
IOCTL_RELEASE (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
|
IOCTL_RELEASE (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_COMMIT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_COMMIT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_POSTCOMMIT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_POSTCOMMIT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
THAW_KTM (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
THAW_KTM (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
THAW (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
THAW (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
BKGND_FREEZE_THREAD (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
THAW (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
BKGND_FREEZE_THREAD (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
THAW (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
VSS_WS_WAITING_FOR_POST_SNAPSHOT (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
THAW (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
VSS_WS_WAITING_FOR_POST_SNAPSHOT (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
THAW (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
BKGND_FREEZE_THREAD (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
THAW (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
VSS_WS_WAITING_FOR_POST_SNAPSHOT (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
THAW (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_PREFINALCOMMIT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_PREFINALCOMMIT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
POSTSNAPSHOT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
POSTSNAPSHOT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
POSTSNAPSHOT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
POSTSNAPSHOT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
POSTSNAPSHOT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
VSS_WS_WAITING_FOR_BACKUP_COMPLETE (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
POSTSNAPSHOT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
VSS_WS_WAITING_FOR_BACKUP_COMPLETE (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
POSTSNAPSHOT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
VSS_WS_WAITING_FOR_BACKUP_COMPLETE (SetCurrentState)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
POSTSNAPSHOT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_POSTFINALCOMMIT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_POSTFINALCOMMIT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_ABORTSNAPSHOTS (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
|
PROVIDER_ABORTSNAPSHOTS (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
ABORT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
ABORT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
ABORT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
ABORT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
ABORT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
ABORT (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
ABORT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
ABORT (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
BACKUPSHUTDOWN (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
BACKUPSHUTDOWN (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
|
BACKUPSHUTDOWN (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
BACKUPSHUTDOWN (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
|
BACKUPSHUTDOWN (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
BACKUPSHUTDOWN (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
|
BACKUPSHUTDOWN (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
|
BACKUPSHUTDOWN (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppGetSnapshots (Leave)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Enter)
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
|
SppEnumGroups (Leave)
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\64f25a.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\64f25a.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1924F1CBA0F6BE8389E42C5E5538F71E
|
6E8D947A316B3EB3F8F540C548BE2AB9
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78
|
6E8D947A316B3EB3F8F540C548BE2AB9
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3
|
6E8D947A316B3EB3F8F540C548BE2AB9
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3
|
6E8D947A316B3EB3F8F540C548BE2AB9
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\vcamp120.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F6A327C410298D44EB570EB8D501F458
|
6E8D947A316B3EB3F8F540C548BE2AB9
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\vcomp120.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1A8F0AFED61F44E4E84EC28DE6D1214F
|
6E8D947A316B3EB3F8F540C548BE2AB9
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BE7FA62661CD24830B127381013A5C10
|
6E8D947A316B3EB3F8F540C548BE2AB9
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\651B38B7BBE8F03319CAA27790912C9C
|
6E8D947A316B3EB3F8F540C548BE2AB9
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E1A20017605E45A3CAE5DF61A6FC01C0
|
6E8D947A316B3EB3F8F540C548BE2AB9
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x64
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x64
|
Installed
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x64
|
Major
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x64
|
Minor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x64
|
Bld
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x64
|
Rbld
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_amd64,v12
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_amd64,v12
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_amd64,v12
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0
|
SP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0
|
SPIndex
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
|
Install
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
|
InstallerType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
|
SPName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
|
UpdateVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
SystemComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
SystemComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\0FC00402C7EDE723A94E0F3FD809588F
|
6E8D947A316B3EB3F8F540C548BE2AB9
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\6E8D947A316B3EB3F8F540C548BE2AB9
|
VC_Runtime_Minimum
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\Features
|
VC_Runtime_Minimum
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\6E8D947A316B3EB3F8F540C548BE2AB9
|
Provider
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\Features
|
Provider
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\6E8D947A316B3EB3F8F540C548BE2AB9
|
Servicing_Key
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\Features
|
Servicing_Key
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\0FC00402C7EDE723A94E0F3FD809588F
|
6E8D947A316B3EB3F8F540C548BE2AB9
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9\SourceList\Media
|
DiskPrompt
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9\SourceList
|
LastUsedSource
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\64f25e.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\64f25e.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\4ED6E1912B7E9EC34BB8520DFF3F8DE8
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2A50ACECC2D5F343B4B56106C7CD5B8
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfc120cht.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\52939EBA3FB6849409FFE1D41FB52B1D
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfc120chs.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\212F32761495F3A40A7C6D06026C9774
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfc120enu.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AC418779B85FEBA4AB8BD656FFE16834
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfc120deu.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B03A28739FC91464B88D752E8191270D
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfc120esn.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1DF56FED5BB223A4E8C8E26B82D26C1C
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfc120fra.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2A74805657EBC1D41A288A18C61CD783
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfc120ita.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\11D968317BDA58F44A517EE687079497
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfc120jpn.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F284FEF8CCFFEDE4F9B8C16375F652D9
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfc120kor.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\22FD453CD051C3946BA422364104DD50
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfc120rus.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D73E0AF5467CC934798AAF6082026BA5
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BE7FA62661CD24830B127381013A5C10
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\485D7CCFE75F6DE38BC516CCE4521DD9
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D482454A6C77E73CBF71CFDCCB1C88F
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5\62DBF9290209B993A9A757D1160F9B24
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5\62DBF9290209B993A9A757D1160F9B24
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5\62DBF9290209B993A9A757D1160F9B24
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5\62DBF9290209B993A9A757D1160F9B24
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5\62DBF9290209B993A9A757D1160F9B24
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5\62DBF9290209B993A9A757D1160F9B24
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5\62DBF9290209B993A9A757D1160F9B24
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5\62DBF9290209B993A9A757D1160F9B24
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5\62DBF9290209B993A9A757D1160F9B24
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5\62DBF9290209B993A9A757D1160F9B24
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2A50ACECC2D5F343B4B56106C7CD5B8\62DBF9290209B993A9A757D1160F9B24
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_amd64,v12
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_amd64,v12
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_amd64,v12
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
|
Install
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
|
InstallerType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
|
SP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
|
SPIndex
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
|
SPName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
|
UpdateVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
SystemComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
SystemComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\C05586832351A613E9FF58906A9EF297
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\62DBF9290209B993A9A757D1160F9B24
|
VC_Runtime_Additional
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\Features
|
VC_Runtime_Additional
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\62DBF9290209B993A9A757D1160F9B24
|
Provider
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\Features
|
Provider
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\62DBF9290209B993A9A757D1160F9B24
|
Servicing_Key
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\Features
|
Servicing_Key
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\C05586832351A613E9FF58906A9EF297
|
62DBF9290209B993A9A757D1160F9B24
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24\SourceList\Media
|
DiskPrompt
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24\SourceList
|
LastUsedSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\msvcr120.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\msvcp120.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\vccorlib120.dll
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfc120.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfc120u.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfcm120.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
C:\Windows\system32\mfcm120u.dll
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
There are 601 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2286DB0F000
|
trusted library allocation
|
page read and write
|
||
23D4CABA000
|
heap
|
page read and write
|
||
23D4CCE1000
|
trusted library allocation
|
page read and write
|
||
3280000
|
direct allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
EB0000
|
trusted library allocation
|
page read and write
|
||
23D4CA2E000
|
heap
|
page read and write
|
||
7C1000
|
unkown
|
page execute read
|
||
EB0000
|
trusted library allocation
|
page read and write
|
||
49DE7FE000
|
stack
|
page read and write
|
||
BA3000
|
heap
|
page read and write
|
||
1489000
|
heap
|
page read and write
|
||
2CF3000
|
trusted library allocation
|
page read and write
|
||
16F51575000
|
heap
|
page read and write
|
||
2286DB11000
|
trusted library allocation
|
page read and write
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
1D5457BB000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
3BEB000
|
stack
|
page read and write
|
||
2B1667D000
|
stack
|
page read and write
|
||
AAA000
|
unkown
|
page readonly
|
||
5F3000
|
heap
|
page read and write
|
||
2ED9000
|
trusted library allocation
|
page read and write
|
||
1D545D77000
|
heap
|
page read and write
|
||
3A77000
|
trusted library allocation
|
page read and write
|
||
1D545EF9000
|
heap
|
page read and write
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
9EE000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286D55B000
|
trusted library allocation
|
page read and write
|
||
2286D1F0000
|
trusted library allocation
|
page read and write
|
||
1D545ED8000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
A54000
|
heap
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
3A7E000
|
trusted library allocation
|
page read and write
|
||
16F52FF0000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
A66000
|
heap
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
1D54598E000
|
heap
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
23D4CC51000
|
trusted library allocation
|
page read and write
|
||
2286E7B0000
|
heap
|
page read and write
|
||
16F51562000
|
heap
|
page read and write
|
||
2286D0EC000
|
heap
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
16F5157C000
|
heap
|
page read and write
|
||
49DFCFB000
|
stack
|
page read and write
|
||
2AFA000
|
trusted library allocation
|
page read and write
|
||
7FE000
|
stack
|
page read and write
|
||
16F5155D000
|
heap
|
page read and write
|
||
2286E962000
|
heap
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
2286DABB000
|
heap
|
page read and write
|
||
49DF17E000
|
stack
|
page read and write
|
||
14D3000
|
heap
|
page read and write
|
||
1D545EC0000
|
heap
|
page read and write
|
||
2286E554000
|
heap
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
2286D54C000
|
trusted library allocation
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
A69000
|
heap
|
page read and write
|
||
2286D54E000
|
trusted library allocation
|
page read and write
|
||
A54000
|
heap
|
page read and write
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
2D45000
|
stack
|
page read and write
|
||
49DE2FE000
|
unkown
|
page readonly
|
||
1D545784000
|
heap
|
page read and write
|
||
484000
|
heap
|
page read and write
|
||
A0B000
|
heap
|
page read and write
|
||
2286D557000
|
trusted library allocation
|
page read and write
|
||
2286E51B000
|
heap
|
page read and write
|
||
427F000
|
stack
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
1D5457E5000
|
heap
|
page read and write
|
||
2286DA1D000
|
heap
|
page read and write
|
||
22FC000
|
direct allocation
|
page read and write
|
||
23D4CDA0000
|
trusted library allocation
|
page read and write
|
||
20C1000
|
direct allocation
|
page read and write
|
||
16F516B0000
|
heap
|
page read and write
|
||
2286E6F0000
|
heap
|
page read and write
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
2CF5000
|
trusted library allocation
|
page read and write
|
||
21EAE102000
|
trusted library allocation
|
page read and write
|
||
16F51578000
|
heap
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
2286DA1D000
|
heap
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
663000
|
heap
|
page read and write
|
||
2286E535000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DA1D000
|
heap
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
91000
|
stack
|
page read and write
|
||
16F5157A000
|
heap
|
page read and write
|
||
149E000
|
heap
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
2ED6000
|
trusted library allocation
|
page read and write
|
||
2286D390000
|
heap
|
page read and write
|
||
2286C5F4000
|
heap
|
page read and write
|
||
2286DB24000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
16F5155C000
|
heap
|
page read and write
|
||
2286DB12000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
2286DAB0000
|
heap
|
page read and write
|
||
2286DA72000
|
heap
|
page read and write
|
||
23D489C0000
|
trusted library allocation
|
page read and write
|
||
2286DAFA000
|
trusted library allocation
|
page read and write
|
||
2286DA1E000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
21EAE100000
|
trusted library allocation
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
D8E000
|
heap
|
page read and write
|
||
2286DA82000
|
heap
|
page read and write
|
||
16F51578000
|
heap
|
page read and write
|
||
2286DB1A000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1ABED222000
|
heap
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
2286DA86000
|
heap
|
page read and write
|
||
2286DAF8000
|
trusted library allocation
|
page read and write
|
||
2CF6000
|
trusted library allocation
|
page read and write
|
||
2286D54E000
|
trusted library allocation
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286E9F8000
|
heap
|
page read and write
|
||
2286E3F0000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286D50B000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
1FC000
|
stack
|
page read and write
|
||
2286D525000
|
trusted library allocation
|
page read and write
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
2286E7B0000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
1D545D7A000
|
heap
|
page read and write
|
||
2286DAB0000
|
heap
|
page read and write
|
||
16F51572000
|
heap
|
page read and write
|
||
95A000
|
heap
|
page read and write
|
||
2286DB0E000
|
trusted library allocation
|
page read and write
|
||
2286DAF6000
|
trusted library allocation
|
page read and write
|
||
21EAF000000
|
heap
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
35AC000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
35B3000
|
heap
|
page read and write
|
||
49DEDFE000
|
unkown
|
page readonly
|
||
2286DAF2000
|
trusted library allocation
|
page read and write
|
||
16F51573000
|
heap
|
page read and write
|
||
2286DB04000
|
trusted library allocation
|
page read and write
|
||
23D47674000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
2286E965000
|
heap
|
page read and write
|
||
2286E588000
|
heap
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
2630000
|
unkown
|
page read and write
|
||
412000
|
unkown
|
page readonly
|
||
2286DAB0000
|
heap
|
page read and write
|
||
2286E613000
|
heap
|
page read and write
|
||
2286D54A000
|
trusted library allocation
|
page read and write
|
||
1D54783E000
|
heap
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
98C000
|
heap
|
page read and write
|
||
16F51574000
|
heap
|
page read and write
|
||
2DC9279000
|
stack
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
2286E700000
|
heap
|
page read and write
|
||
2286DB15000
|
trusted library allocation
|
page read and write
|
||
49B000
|
unkown
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
2286DA97000
|
heap
|
page read and write
|
||
16F51572000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2D80000
|
trusted library section
|
page read and write
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
6A4F9FC000
|
stack
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
2286DB4C000
|
trusted library allocation
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
2286DA97000
|
heap
|
page read and write
|
||
2286E540000
|
heap
|
page read and write
|
||
1D545EE9000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286E61F000
|
heap
|
page read and write
|
||
2420000
|
heap
|
page read and write
|
||
1D545783000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
16F53362000
|
trusted library allocation
|
page read and write
|
||
16F53363000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DB03000
|
trusted library allocation
|
page read and write
|
||
2286E4F2000
|
heap
|
page read and write
|
||
2286E5D0000
|
heap
|
page read and write
|
||
2CF8000
|
trusted library allocation
|
page read and write
|
||
1D545EEC000
|
heap
|
page read and write
|
||
2286DB05000
|
trusted library allocation
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
16F51573000
|
heap
|
page read and write
|
||
2286DB0D000
|
trusted library allocation
|
page read and write
|
||
BD3000
|
heap
|
page read and write
|
||
2286E898000
|
heap
|
page read and write
|
||
1D547833000
|
heap
|
page read and write
|
||
2286D550000
|
trusted library allocation
|
page read and write
|
||
2286D55B000
|
trusted library allocation
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
2286E630000
|
heap
|
page read and write
|
||
2286DB20000
|
trusted library allocation
|
page read and write
|
||
2286DF21000
|
heap
|
page read and write
|
||
20C4000
|
direct allocation
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
3A7C000
|
trusted library allocation
|
page read and write
|
||
23D4CCB4000
|
trusted library allocation
|
page read and write
|
||
A32000
|
heap
|
page read and write
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
B82000
|
heap
|
page read and write
|
||
6C6DC000
|
unkown
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2ECD000
|
trusted library allocation
|
page read and write
|
||
16F51575000
|
heap
|
page read and write
|
||
2286D4E0000
|
heap
|
page read and write
|
||
23D47690000
|
heap
|
page read and write
|
||
1D545EF2000
|
heap
|
page read and write
|
||
14DD000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DB02000
|
trusted library allocation
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
23D475B0000
|
trusted library section
|
page read and write
|
||
DEB000
|
unkown
|
page readonly
|
||
982000
|
heap
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
2DC8EF8000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DB4A000
|
trusted library allocation
|
page read and write
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
2286DA84000
|
heap
|
page read and write
|
||
2C10000
|
trusted library allocation
|
page read and write
|
||
2286DA91000
|
heap
|
page read and write
|
||
23D47570000
|
heap
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
B664FCE000
|
stack
|
page read and write
|
||
2286DAF9000
|
trusted library allocation
|
page read and write
|
||
2286DB45000
|
trusted library allocation
|
page read and write
|
||
16F51572000
|
heap
|
page read and write
|
||
49DE5FC000
|
stack
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
18B000
|
stack
|
page read and write
|
||
3A78000
|
trusted library allocation
|
page read and write
|
||
49DDE7B000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2AF8000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
2286DB3B000
|
trusted library allocation
|
page read and write
|
||
3510000
|
heap
|
page read and write
|
||
2ECE000
|
trusted library allocation
|
page read and write
|
||
2286E536000
|
heap
|
page read and write
|
||
2286D551000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286E518000
|
heap
|
page read and write
|
||
1D545ECF000
|
heap
|
page read and write
|
||
2286DB35000
|
trusted library allocation
|
page read and write
|
||
A6E000
|
stack
|
page read and write
|
||
2286DADC000
|
heap
|
page read and write
|
||
B9A000
|
heap
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
2286DA2B000
|
heap
|
page read and write
|
||
1ABED302000
|
heap
|
page read and write
|
||
1D545D72000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
2286DA8E000
|
heap
|
page read and write
|
||
23D4C9C0000
|
trusted library allocation
|
page read and write
|
||
2286E62B000
|
heap
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
1D5457C0000
|
heap
|
page read and write
|
||
2286DB49000
|
trusted library allocation
|
page read and write
|
||
2EDA000
|
trusted library allocation
|
page read and write
|
||
3620000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F5155F000
|
heap
|
page read and write
|
||
2286DB42000
|
trusted library allocation
|
page read and write
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
DB1000
|
unkown
|
page execute read
|
||
BEF000
|
heap
|
page read and write
|
||
49DDF7E000
|
stack
|
page read and write
|
||
1D5457D8000
|
heap
|
page read and write
|
||
1ABED240000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
3938000
|
heap
|
page read and write
|
||
98C000
|
heap
|
page read and write
|
||
14DD000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F51573000
|
heap
|
page read and write
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
623000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286EAF0000
|
heap
|
page read and write
|
||
2286DB2D000
|
trusted library allocation
|
page read and write
|
||
23D4CC50000
|
trusted library allocation
|
page read and write
|
||
16F51575000
|
heap
|
page read and write
|
||
16F51572000
|
heap
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
2286DB12000
|
trusted library allocation
|
page read and write
|
||
2ED2000
|
trusted library allocation
|
page read and write
|
||
49A000
|
heap
|
page read and write
|
||
16F51578000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
23D4CA21000
|
heap
|
page read and write
|
||
1D5457E4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
9A2000
|
heap
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
23D4CC58000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
2286D549000
|
trusted library allocation
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
2286DAEB000
|
heap
|
page read and write
|
||
2286DB10000
|
trusted library allocation
|
page read and write
|
||
2286DAA1000
|
heap
|
page read and write
|
||
2ED4000
|
trusted library allocation
|
page read and write
|
||
2286E6F1000
|
heap
|
page read and write
|
||
2286D9F5000
|
heap
|
page read and write
|
||
16F51578000
|
heap
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
2286DA28000
|
heap
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
2ECA000
|
trusted library allocation
|
page read and write
|
||
9A2000
|
heap
|
page read and write
|
||
2286E6C3000
|
heap
|
page read and write
|
||
1D5457EB000
|
heap
|
page read and write
|
||
147F000
|
heap
|
page read and write
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
16F53376000
|
trusted library allocation
|
page read and write
|
||
2286DA9D000
|
heap
|
page read and write
|
||
16F5155D000
|
heap
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
2286DAB0000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
61D000
|
heap
|
page read and write
|
||
4770000
|
heap
|
page read and write
|
||
2286DAFB000
|
trusted library allocation
|
page read and write
|
||
16F5155B000
|
heap
|
page read and write
|
||
2286DA8A000
|
heap
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
65E000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
DEB000
|
unkown
|
page readonly
|
||
23D4CA82000
|
heap
|
page read and write
|
||
36D3000
|
heap
|
page read and write
|
||
2286E9B2000
|
heap
|
page read and write
|
||
2286EA07000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
7BE000
|
stack
|
page read and write
|
||
2286D536000
|
trusted library allocation
|
page read and write
|
||
23D4CC5E000
|
trusted library allocation
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
ACE000
|
stack
|
page read and write
|
||
2286E721000
|
heap
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
6A4F3FD000
|
stack
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
2286E644000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
35A0000
|
heap
|
page read and write
|
||
2286D547000
|
trusted library allocation
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
16F51571000
|
heap
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
2286D0FB000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286C645000
|
heap
|
page read and write
|
||
A6D000
|
heap
|
page read and write
|
||
26E0000
|
heap
|
page read and write
|
||
16F51620000
|
heap
|
page read and write
|
||
2B02000
|
trusted library allocation
|
page read and write
|
||
2286D55D000
|
trusted library allocation
|
page read and write
|
||
2286E588000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DB39000
|
trusted library allocation
|
page read and write
|
||
2286E700000
|
heap
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
1D5457C9000
|
heap
|
page read and write
|
||
14AE000
|
heap
|
page read and write
|
||
2286E579000
|
heap
|
page read and write
|
||
6383F7E000
|
stack
|
page read and write
|
||
16F53376000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
2286DA8F000
|
heap
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
A71000
|
unkown
|
page execute read
|
||
6C4000
|
heap
|
page read and write
|
||
2286E81A000
|
heap
|
page read and write
|
||
A70000
|
unkown
|
page readonly
|
||
2286DB17000
|
trusted library allocation
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
2286D554000
|
trusted library allocation
|
page read and write
|
||
23D47E15000
|
heap
|
page read and write
|
||
7C0000
|
unkown
|
page readonly
|
||
2286DAFC000
|
trusted library allocation
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
16F51575000
|
heap
|
page read and write
|
||
23D476A2000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
2EC4000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2EDC000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1D5457C4000
|
heap
|
page read and write
|
||
BA6000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
7C0000
|
unkown
|
page readonly
|
||
16F5155D000
|
heap
|
page read and write
|
||
2286DADD000
|
heap
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
20B0000
|
direct allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
23D4CDA0000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
16F51578000
|
heap
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
2286E847000
|
heap
|
page read and write
|
||
21EAE042000
|
heap
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
B6653FE000
|
stack
|
page read and write
|
||
21EADE70000
|
heap
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
47C000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
49DF2FE000
|
stack
|
page read and write
|
||
2286C645000
|
heap
|
page read and write
|
||
16F51572000
|
heap
|
page read and write
|
||
2286DA2A000
|
heap
|
page read and write
|
||
2490000
|
heap
|
page read and write
|
||
2286DA1A000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DB1C000
|
trusted library allocation
|
page read and write
|
||
2286DA83000
|
heap
|
page read and write
|
||
2286E827000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
623000
|
heap
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
2286DAB6000
|
heap
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
5E6000
|
heap
|
page read and write
|
||
2286D55F000
|
trusted library allocation
|
page read and write
|
||
3D2C000
|
stack
|
page read and write
|
||
1ABED130000
|
heap
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
5BA000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
23D4CD12000
|
trusted library allocation
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
B9A000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286C577000
|
heap
|
page read and write
|
||
2EC1000
|
trusted library allocation
|
page read and write
|
||
2286DA90000
|
heap
|
page read and write
|
||
1D5457E8000
|
heap
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
2286DAB0000
|
heap
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
2286D540000
|
trusted library allocation
|
page read and write
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
3F80000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F53364000
|
trusted library allocation
|
page read and write
|
||
49DDFFE000
|
unkown
|
page readonly
|
||
2286DB05000
|
trusted library allocation
|
page read and write
|
||
9EA000
|
heap
|
page read and write
|
||
2C15000
|
trusted library allocation
|
page read and write
|
||
2CFA000
|
trusted library allocation
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
16F5155C000
|
heap
|
page read and write
|
||
1D547844000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
20B4000
|
direct allocation
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F5155D000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
488000
|
heap
|
page read and write
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
2286DB16000
|
trusted library allocation
|
page read and write
|
||
6A4F07B000
|
stack
|
page read and write
|
||
1D5457E4000
|
heap
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
2286E509000
|
heap
|
page read and write
|
||
40E000
|
unkown
|
page write copy
|
||
2286DB09000
|
trusted library allocation
|
page read and write
|
||
16F51573000
|
heap
|
page read and write
|
||
6A4F6FE000
|
unkown
|
page readonly
|
||
2286DAB0000
|
heap
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
16F51575000
|
heap
|
page read and write
|
||
1D545D77000
|
heap
|
page read and write
|
||
16F5155C000
|
heap
|
page read and write
|
||
3936000
|
heap
|
page read and write
|
||
2286D543000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286D525000
|
trusted library allocation
|
page read and write
|
||
1D545794000
|
heap
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
5BF000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
23E0000
|
heap
|
page read and write
|
||
B7E000
|
heap
|
page read and write
|
||
16F53376000
|
trusted library allocation
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
A24000
|
heap
|
page read and write
|
||
22B8000
|
direct allocation
|
page read and write
|
||
F20000
|
trusted library allocation
|
page read and write
|
||
2286E6ED000
|
heap
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
2286DADC000
|
heap
|
page read and write
|
||
2286DA86000
|
heap
|
page read and write
|
||
14D3000
|
heap
|
page read and write
|
||
21EAF713000
|
heap
|
page read and write
|
||
35AB000
|
heap
|
page read and write
|
||
2CF2000
|
trusted library allocation
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F53376000
|
trusted library allocation
|
page read and write
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
ACA000
|
unkown
|
page readonly
|
||
2286D54D000
|
trusted library allocation
|
page read and write
|
||
20C8000
|
direct allocation
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
16F51578000
|
heap
|
page read and write
|
||
2286D128000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2AFC000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286D504000
|
trusted library allocation
|
page read and write
|
||
1D54783E000
|
heap
|
page read and write
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
2286DB18000
|
trusted library allocation
|
page read and write
|
||
5F3000
|
heap
|
page read and write
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
2286E54C000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
2286D55A000
|
trusted library allocation
|
page read and write
|
||
2286DB31000
|
trusted library allocation
|
page read and write
|
||
A6F000
|
heap
|
page read and write
|
||
16F51578000
|
heap
|
page read and write
|
||
2286DB0D000
|
trusted library allocation
|
page read and write
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
2C1C000
|
trusted library allocation
|
page read and write
|
||
2286E537000
|
heap
|
page read and write
|
||
2286DB28000
|
trusted library allocation
|
page read and write
|
||
23D4C9D0000
|
trusted library allocation
|
page read and write
|
||
2286DA14000
|
heap
|
page read and write
|
||
16F5155C000
|
heap
|
page read and write
|
||
16F53376000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286E630000
|
heap
|
page read and write
|
||
16F51573000
|
heap
|
page read and write
|
||
814000
|
unkown
|
page write copy
|
||
C40000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1D545EEA000
|
heap
|
page read and write
|
||
2286E5B8000
|
heap
|
page read and write
|
||
16F51575000
|
heap
|
page read and write
|
||
37FE000
|
stack
|
page read and write
|
||
16F51575000
|
heap
|
page read and write
|
||
14DD000
|
heap
|
page read and write
|
||
16F5155F000
|
heap
|
page read and write
|
||
2286DB21000
|
trusted library allocation
|
page read and write
|
||
623000
|
heap
|
page read and write
|
||
23D47F1A000
|
heap
|
page read and write
|
||
2286D4F0000
|
trusted library allocation
|
page read and write
|
||
2286E4FC000
|
heap
|
page read and write
|
||
A54000
|
heap
|
page read and write
|
||
2286DAE6000
|
heap
|
page read and write
|
||
2286E579000
|
heap
|
page read and write
|
||
2286C5EE000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
2660000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
2286DAFA000
|
trusted library allocation
|
page read and write
|
||
8FC000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
D7B000
|
heap
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
2286E646000
|
heap
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
2286E530000
|
heap
|
page read and write
|
||
14D8000
|
heap
|
page read and write
|
||
23D47F00000
|
heap
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
2286E756000
|
heap
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
1D545990000
|
trusted library allocation
|
page read and write
|
||
2286DB37000
|
trusted library allocation
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
A71000
|
unkown
|
page execute read
|
||
16F51531000
|
heap
|
page read and write
|
||
16F5157C000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
2286E6C3000
|
heap
|
page read and write
|
||
49E01FE000
|
unkown
|
page readonly
|
||
2B05000
|
trusted library allocation
|
page read and write
|
||
23D4CC80000
|
trusted library allocation
|
page read and write
|
||
1A4A88F0000
|
heap
|
page read and write
|
||
5D7000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
623000
|
heap
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
23D4CCF3000
|
trusted library allocation
|
page read and write
|
||
2286DA6D000
|
heap
|
page read and write
|
||
2286E81A000
|
heap
|
page read and write
|
||
2286DA1D000
|
heap
|
page read and write
|
||
16F51578000
|
heap
|
page read and write
|
||
2286DA0A000
|
heap
|
page read and write
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
623000
|
heap
|
page read and write
|
||
2286D54A000
|
trusted library allocation
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
2286D50A000
|
trusted library allocation
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
2286E588000
|
heap
|
page read and write
|
||
2286DAE7000
|
heap
|
page read and write
|
||
2286E678000
|
heap
|
page read and write
|
||
2286C750000
|
heap
|
page read and write
|
||
2A9E94A0000
|
heap
|
page read and write
|
||
A71000
|
unkown
|
page execute read
|
||
2286DB34000
|
trusted library allocation
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
23D4CD41000
|
trusted library allocation
|
page read and write
|
||
2286DA1D000
|
heap
|
page read and write
|
||
23D47F02000
|
heap
|
page read and write
|
||
3610000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
3A81000
|
trusted library allocation
|
page read and write
|
||
97B000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
3A30000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286E501000
|
heap
|
page read and write
|
||
2286DB3A000
|
trusted library allocation
|
page read and write
|
||
16F51572000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
21EAE066000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
2286E962000
|
heap
|
page read and write
|
||
2286E6E9000
|
heap
|
page read and write
|
||
2286E796000
|
heap
|
page read and write
|
||
1D54783D000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
2286DA23000
|
heap
|
page read and write
|
||
2286D50B000
|
trusted library allocation
|
page read and write
|
||
2286D522000
|
trusted library allocation
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
412000
|
unkown
|
page readonly
|
||
23D4CD20000
|
trusted library allocation
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
ACA000
|
unkown
|
page readonly
|
||
5FB8DFE000
|
stack
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
2286DB10000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
unkown
|
page read and write
|
||
312B000
|
stack
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
2286DB1C000
|
trusted library allocation
|
page read and write
|
||
2286E81E000
|
heap
|
page read and write
|
||
2286DA9C000
|
heap
|
page read and write
|
||
2286E796000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2D90000
|
trusted library section
|
page read and write
|
||
16F51573000
|
heap
|
page read and write
|
||
2370000
|
direct allocation
|
page read and write
|
||
1D5457B3000
|
heap
|
page read and write
|
||
14DE000
|
heap
|
page read and write
|
||
2286E51B000
|
heap
|
page read and write
|
||
6A4F4FE000
|
unkown
|
page readonly
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F53369000
|
trusted library allocation
|
page read and write
|
||
1D545860000
|
heap
|
page read and write
|
||
6383EFE000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F53366000
|
trusted library allocation
|
page read and write
|
||
973000
|
heap
|
page read and write
|
||
E0C000
|
unkown
|
page readonly
|
||
23D48620000
|
trusted library section
|
page readonly
|
||
14DD000
|
heap
|
page read and write
|
||
1D545792000
|
heap
|
page read and write
|
||
22E4000
|
direct allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DEF0000
|
heap
|
page read and write
|
||
6C6C1000
|
unkown
|
page execute read
|
||
2C1A000
|
trusted library allocation
|
page read and write
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
2286DA11000
|
heap
|
page read and write
|
||
2286DA1D000
|
heap
|
page read and write
|
||
2286C65B000
|
heap
|
page read and write
|
||
2286D53F000
|
trusted library allocation
|
page read and write
|
||
BD8000
|
heap
|
page read and write
|
||
103C000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2445000
|
heap
|
page read and write
|
||
2286D53A000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
unkown
|
page readonly
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
6A4F5FE000
|
stack
|
page read and write
|
||
16F51578000
|
heap
|
page read and write
|
||
2286D55C000
|
trusted library allocation
|
page read and write
|
||
16F5157C000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
BE9000
|
heap
|
page read and write
|
||
2DC8F78000
|
stack
|
page read and write
|
||
2286DB06000
|
trusted library allocation
|
page read and write
|
||
20C1000
|
direct allocation
|
page read and write
|
||
AA8000
|
heap
|
page read and write
|
||
3860000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286E85D000
|
heap
|
page read and write
|
||
8AE000
|
stack
|
page read and write
|
||
2286DAF1000
|
trusted library allocation
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286E8A0000
|
heap
|
page read and write
|
||
1D547844000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
14DA000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
2286DA8C000
|
heap
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
3591000
|
heap
|
page read and write
|
||
1006000
|
heap
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
7C0000
|
unkown
|
page readonly
|
||
23D4CC70000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
2B1677E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2286EA5A000
|
heap
|
page read and write
|
||
61A000
|
heap
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
21EAF7B5000
|
heap
|
page read and write
|
||
2286D50A000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286E69F000
|
heap
|
page read and write
|
||
2286D523000
|
trusted library allocation
|
page read and write
|
||
1D545EE9000
|
heap
|
page read and write
|
||
602000
|
heap
|
page read and write
|
||
2520000
|
heap
|
page read and write
|
||
2286D300000
|
heap
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
2286DB0E000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
BCB000
|
heap
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
23D4CAFD000
|
heap
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1D545785000
|
heap
|
page read and write
|
||
2286DAF7000
|
trusted library allocation
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
2286DAB2000
|
heap
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
1D5457E4000
|
heap
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286E6F5000
|
heap
|
page read and write
|
||
5E2000
|
heap
|
page read and write
|
||
1D54598B000
|
heap
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
1D545D73000
|
heap
|
page read and write
|
||
2286D542000
|
trusted library allocation
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
23D4CC80000
|
trusted library allocation
|
page read and write
|
||
5840000
|
trusted library allocation
|
page read and write
|
||
2286DAB0000
|
heap
|
page read and write
|
||
16F51571000
|
heap
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
2286DA8A000
|
heap
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1D5457E8000
|
heap
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
2286D545000
|
trusted library allocation
|
page read and write
|
||
5B9000
|
heap
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
BB1000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
49DEF7E000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286D53E000
|
trusted library allocation
|
page read and write
|
||
2DC8FF9000
|
stack
|
page read and write
|
||
1D54578E000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
2C17000
|
trusted library allocation
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
2286E693000
|
heap
|
page read and write
|
||
2286D127000
|
heap
|
page read and write
|
||
2286E534000
|
heap
|
page read and write
|
||
2286DA82000
|
heap
|
page read and write
|
||
16F5155D000
|
heap
|
page read and write
|
||
2286DB0B000
|
trusted library allocation
|
page read and write
|
||
16F51578000
|
heap
|
page read and write
|
||
2286DA2A000
|
heap
|
page read and write
|
||
1D5457AA000
|
heap
|
page read and write
|
||
2286E54B000
|
heap
|
page read and write
|
||
2CF0000
|
trusted library allocation
|
page read and write
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
2286DA2A000
|
heap
|
page read and write
|
||
2470000
|
direct allocation
|
page read and write
|
||
A49000
|
heap
|
page read and write
|
||
2286D53D000
|
trusted library allocation
|
page read and write
|
||
1D545ED3000
|
heap
|
page read and write
|
||
2286DADC000
|
heap
|
page read and write
|
||
2286D523000
|
trusted library allocation
|
page read and write
|
||
2286D555000
|
trusted library allocation
|
page read and write
|
||
1D5457AD000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F5155E000
|
heap
|
page read and write
|
||
23D4CD80000
|
trusted library allocation
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
16F51578000
|
heap
|
page read and write
|
||
23D4CA5A000
|
heap
|
page read and write
|
||
47D000
|
heap
|
page read and write
|
||
16F5157C000
|
heap
|
page read and write
|
||
4A2000
|
heap
|
page read and write
|
||
2C13000
|
trusted library allocation
|
page read and write
|
||
1D545D7E000
|
heap
|
page read and write
|
||
1D5457B3000
|
heap
|
page read and write
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
DB1000
|
unkown
|
page execute read
|
||
B66527F000
|
stack
|
page read and write
|
||
2286C65A000
|
heap
|
page read and write
|
||
5D08C7D000
|
stack
|
page read and write
|
||
2286DB38000
|
trusted library allocation
|
page read and write
|
||
1A4A8C50000
|
heap
|
page read and write
|
||
6383FFE000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
383A000
|
heap
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
22F4000
|
direct allocation
|
page read and write
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
2286D508000
|
trusted library allocation
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
23D48091000
|
trusted library allocation
|
page read and write
|
||
B9A000
|
heap
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286E4F1000
|
heap
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
2286DA8A000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
23B0000
|
direct allocation
|
page execute and read and write
|
||
35EF000
|
stack
|
page read and write
|
||
BCF000
|
heap
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
2286DB3E000
|
trusted library allocation
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
1D547836000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1D545980000
|
heap
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
7FA000
|
unkown
|
page readonly
|
||
6C5000
|
heap
|
page read and write
|
||
2286DA2A000
|
heap
|
page read and write
|
||
21EAE213000
|
heap
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
16F51578000
|
heap
|
page read and write
|
||
2308000
|
direct allocation
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
12EE000
|
stack
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
49A000
|
heap
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286D506000
|
trusted library allocation
|
page read and write
|
||
2286DA1D000
|
heap
|
page read and write
|
||
7C0000
|
unkown
|
page readonly
|
||
BAF000
|
heap
|
page read and write
|
||
2286DAF2000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
2286E54F000
|
heap
|
page read and write
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
16F5155C000
|
heap
|
page read and write
|
||
BD3587F000
|
stack
|
page read and write
|
||
2286DB1B000
|
trusted library allocation
|
page read and write
|
||
2286E646000
|
heap
|
page read and write
|
||
A58000
|
heap
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
2286DB47000
|
trusted library allocation
|
page read and write
|
||
2286E550000
|
heap
|
page read and write
|
||
AC8000
|
heap
|
page read and write
|
||
16F53100000
|
heap
|
page read and write
|
||
1D545767000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286E5D1000
|
heap
|
page read and write
|
||
16F51578000
|
heap
|
page read and write
|
||
16F51571000
|
heap
|
page read and write
|
||
2286E69F000
|
heap
|
page read and write
|
||
2286DB1B000
|
trusted library allocation
|
page read and write
|
||
2286E604000
|
heap
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
1D545ED8000
|
heap
|
page read and write
|
||
2286E530000
|
heap
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
623000
|
heap
|
page read and write
|
||
A18000
|
heap
|
page read and write
|
||
49DEFFE000
|
unkown
|
page readonly
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
unkown
|
page readonly
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
2B03000
|
trusted library allocation
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
23D4CB0A000
|
heap
|
page read and write
|
||
2286E6EE000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1D547831000
|
heap
|
page read and write
|
||
1ABED200000
|
heap
|
page read and write
|
||
3AAC000
|
stack
|
page read and write
|
||
2286D535000
|
trusted library allocation
|
page read and write
|
||
49DED7E000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DA75000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
2286DA8A000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
22D0000
|
direct allocation
|
page read and write
|
||
2286DB19000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
BD3577E000
|
stack
|
page read and write
|
||
2286DA95000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
14CF000
|
heap
|
page read and write
|
||
1D5457B1000
|
heap
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
A4D000
|
heap
|
page read and write
|
||
BD3000
|
heap
|
page read and write
|
||
2286E962000
|
heap
|
page read and write
|
||
61B000
|
heap
|
page read and write
|
||
2ECC000
|
trusted library allocation
|
page read and write
|
||
2286D54F000
|
trusted library allocation
|
page read and write
|
||
2286D552000
|
trusted library allocation
|
page read and write
|
||
16BBDA50000
|
heap
|
page read and write
|
||
2EC9000
|
trusted library allocation
|
page read and write
|
||
2286D53C000
|
trusted library allocation
|
page read and write
|
||
2304000
|
direct allocation
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
23D4CC9D000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286E89D000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
7E00000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F53377000
|
trusted library allocation
|
page read and write
|
||
2286DADC000
|
heap
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
2286E531000
|
heap
|
page read and write
|
||
16F51578000
|
heap
|
page read and write
|
||
16F5337A000
|
trusted library allocation
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
2286D220000
|
heap
|
page read and write
|
||
2ED5000
|
trusted library allocation
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
61D000
|
heap
|
page read and write
|
||
2AF5000
|
trusted library allocation
|
page read and write
|
||
14D3000
|
heap
|
page read and write
|
||
2286D505000
|
trusted library allocation
|
page read and write
|
||
23D4762B000
|
heap
|
page read and write
|
||
16F53376000
|
trusted library allocation
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
2286C629000
|
heap
|
page read and write
|
||
6A4FBFE000
|
stack
|
page read and write
|
||
16F51572000
|
heap
|
page read and write
|
||
2AFF000
|
trusted library allocation
|
page read and write
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
2286D538000
|
trusted library allocation
|
page read and write
|
||
292F000
|
stack
|
page read and write
|
||
2286DA8F000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
3A7F000
|
trusted library allocation
|
page read and write
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
5D08E7F000
|
stack
|
page read and write
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
2286E8A0000
|
heap
|
page read and write
|
||
A22000
|
heap
|
page read and write
|
||
2286E588000
|
heap
|
page read and write
|
||
B68000
|
heap
|
page read and write
|
||
ACA000
|
unkown
|
page readonly
|
||
2286DA87000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
2286C8C5000
|
heap
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
49A000
|
heap
|
page read and write
|
||
2286DA6D000
|
heap
|
page read and write
|
||
604000
|
heap
|
page read and write
|
||
3280000
|
direct allocation
|
page read and write
|
||
2286E54D000
|
heap
|
page read and write
|
||
2286DA7D000
|
heap
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
2286E534000
|
heap
|
page read and write
|
||
3590000
|
heap
|
page read and write
|
||
2286E4F0000
|
heap
|
page read and write
|
||
2286DADC000
|
heap
|
page read and write
|
||
20C8000
|
direct allocation
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
623000
|
heap
|
page read and write
|
||
21EAE013000
|
unkown
|
page read and write
|
||
994000
|
heap
|
page read and write
|
||
2DC947F000
|
stack
|
page read and write
|
||
2286DB13000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
A22000
|
heap
|
page read and write
|
||
2286E657000
|
heap
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
2286D549000
|
trusted library allocation
|
page read and write
|
||
49DF0FE000
|
unkown
|
page readonly
|
||
B8F000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
21EAF7A6000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1D547834000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
23D4CA42000
|
heap
|
page read and write
|
||
2286E568000
|
heap
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
2286D503000
|
trusted library allocation
|
page read and write
|
||
2286DAF7000
|
trusted library allocation
|
page read and write
|
||
23D4CD44000
|
trusted library allocation
|
page read and write
|
||
1D5457F1000
|
heap
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
21EAF7BE000
|
heap
|
page read and write
|
||
21EAE06D000
|
heap
|
page read and write
|
||
16F5337F000
|
trusted library allocation
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
2286DA0A000
|
heap
|
page read and write
|
||
2286DAE5000
|
heap
|
page read and write
|
||
2286DFF0000
|
trusted library allocation
|
page read and write
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
BCF000
|
heap
|
page read and write
|
||
5A8000
|
heap
|
page read and write
|
||
1D545940000
|
heap
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
2ED7000
|
trusted library allocation
|
page read and write
|
||
22A0000
|
direct allocation
|
page read and write
|
||
2286C63B000
|
heap
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
2DC91FB000
|
stack
|
page read and write
|
||
2286E679000
|
heap
|
page read and write
|
||
2286D244000
|
trusted library allocation
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
2286D556000
|
trusted library allocation
|
page read and write
|
||
BCF000
|
heap
|
page read and write
|
||
AC8000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DB3D000
|
trusted library allocation
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
23D4CB03000
|
heap
|
page read and write
|
||
23D48630000
|
trusted library section
|
page readonly
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
23D4CD20000
|
trusted library allocation
|
page read and write
|
||
2286DA9F000
|
heap
|
page read and write
|
||
16F53378000
|
trusted library allocation
|
page read and write
|
||
97D000
|
stack
|
page read and write
|
||
1D5457A1000
|
heap
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
AA4000
|
heap
|
page read and write
|
||
2AF1000
|
trusted library allocation
|
page read and write
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
16F5157A000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
16F5155C000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
5F9000
|
heap
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
814000
|
unkown
|
page read and write
|
||
23D4CC68000
|
trusted library allocation
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
2286D9F5000
|
heap
|
page read and write
|
||
2510000
|
heap
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
A8E000
|
stack
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
2286DADC000
|
heap
|
page read and write
|
||
2286D2A6000
|
trusted library allocation
|
page read and write
|
||
2286E5DA000
|
heap
|
page read and write
|
||
5DA000
|
heap
|
page read and write
|
||
A70000
|
unkown
|
page readonly
|
||
81A000
|
unkown
|
page readonly
|
||
49DEEFE000
|
unkown
|
page readonly
|
||
2286DAB5000
|
heap
|
page read and write
|
||
16F51572000
|
heap
|
page read and write
|
||
49F000
|
unkown
|
page write copy
|
||
6C5000
|
heap
|
page read and write
|
||
2286D0D0000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F53020000
|
heap
|
page read and write
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
2286D54D000
|
trusted library allocation
|
page read and write
|
||
2430000
|
unkown
|
page read and write
|
||
2286D558000
|
trusted library allocation
|
page read and write
|
||
21EAE065000
|
heap
|
page read and write
|
||
A67000
|
heap
|
page read and write
|
||
2286DA27000
|
heap
|
page read and write
|
||
16F53379000
|
trusted library allocation
|
page read and write
|
||
D8C000
|
heap
|
page read and write
|
||
A54000
|
heap
|
page read and write
|
||
2286DB07000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286C647000
|
heap
|
page read and write
|
||
16F51573000
|
heap
|
page read and write
|
||
2286E571000
|
heap
|
page read and write
|
||
2286D537000
|
trusted library allocation
|
page read and write
|
||
2286D9F1000
|
heap
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
1A4A8920000
|
heap
|
page read and write
|
||
4A2000
|
heap
|
page read and write
|
||
B8E000
|
heap
|
page read and write
|
||
5FB967C000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
21EAE060000
|
heap
|
page read and write
|
||
2286DB2B000
|
trusted library allocation
|
page read and write
|
||
49A0000
|
trusted library allocation
|
page read and write
|
||
8EE000
|
stack
|
page read and write
|
||
2286DB03000
|
trusted library allocation
|
page read and write
|
||
1D5457AE000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F51571000
|
heap
|
page read and write
|
||
2286DAE3000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286E5A8000
|
heap
|
page read and write
|
||
16F53376000
|
trusted library allocation
|
page read and write
|
||
23D4CAC0000
|
heap
|
page read and write
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
2286E589000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286E57C000
|
heap
|
page read and write
|
||
2286E921000
|
heap
|
page read and write
|
||
2286D524000
|
trusted library allocation
|
page read and write
|
||
20C8000
|
direct allocation
|
page read and write
|
||
4AD000
|
unkown
|
page readonly
|
||
5FC000
|
stack
|
page read and write
|
||
22A8000
|
direct allocation
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
623000
|
heap
|
page read and write
|
||
AB8000
|
heap
|
page read and write
|
||
A5A000
|
heap
|
page read and write
|
||
2430000
|
direct allocation
|
page read and write
|
||
21EAE02B000
|
heap
|
page read and write
|
||
A57000
|
heap
|
page read and write
|
||
F53000
|
heap
|
page read and write
|
||
49DE1F7000
|
stack
|
page read and write
|
||
16F53376000
|
trusted library allocation
|
page read and write
|
||
25E0000
|
trusted library allocation
|
page read and write
|
||
2286DB36000
|
trusted library allocation
|
page read and write
|
||
23D47613000
|
heap
|
page read and write
|
||
2286DA86000
|
heap
|
page read and write
|
||
1D54578E000
|
heap
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
F40000
|
unkown
|
page read and write
|
||
495000
|
heap
|
page read and write
|
||
49DE4FE000
|
unkown
|
page readonly
|
||
6C5000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
4774000
|
heap
|
page read and write
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
2286C570000
|
heap
|
page read and write
|
||
2286DB1D000
|
trusted library allocation
|
page read and write
|
||
34A0000
|
heap
|
page read and write
|
||
2286DAE3000
|
heap
|
page read and write
|
||
36E0000
|
trusted library allocation
|
page read and write
|
||
16F5155D000
|
heap
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
1D5457BE000
|
heap
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
2286E4F4000
|
heap
|
page read and write
|
||
3E70000
|
trusted library allocation
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
662000
|
heap
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
2286DA91000
|
heap
|
page read and write
|
||
1D545EE9000
|
heap
|
page read and write
|
||
1D545767000
|
heap
|
page read and write
|
||
2286E5CA000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
D8E000
|
heap
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
16F53376000
|
trusted library allocation
|
page read and write
|
||
16F51572000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
A54000
|
heap
|
page read and write
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
23D4CCDE000
|
trusted library allocation
|
page read and write
|
||
BE1000
|
heap
|
page read and write
|
||
2286DAFE000
|
trusted library allocation
|
page read and write
|
||
AAA000
|
unkown
|
page readonly
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
2286DB46000
|
trusted library allocation
|
page read and write
|
||
2286E796000
|
heap
|
page read and write
|
||
2286D2B0000
|
heap
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DAF9000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286E4F2000
|
heap
|
page read and write
|
||
B66537F000
|
stack
|
page read and write
|
||
14C9000
|
heap
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
23D4CD4C000
|
trusted library allocation
|
page read and write
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
16F53376000
|
trusted library allocation
|
page read and write
|
||
2286D53A000
|
trusted library allocation
|
page read and write
|
||
2286DB1A000
|
trusted library allocation
|
page read and write
|
||
2286D290000
|
trusted library allocation
|
page read and write
|
||
23D48610000
|
trusted library section
|
page readonly
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
35AC000
|
heap
|
page read and write
|
||
2AF4000
|
trusted library allocation
|
page read and write
|
||
994000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
2286E701000
|
heap
|
page read and write
|
||
16BBDAC0000
|
heap
|
page read and write
|
||
5FA000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
16F5155C000
|
heap
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
2286D0FC000
|
heap
|
page read and write
|
||
2286DA0A000
|
heap
|
page read and write
|
||
1D5457E8000
|
heap
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
2B3C000
|
heap
|
page read and write
|
||
2286D508000
|
trusted library allocation
|
page read and write
|
||
2286E796000
|
heap
|
page read and write
|
||
16F51562000
|
heap
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
2286D557000
|
trusted library allocation
|
page read and write
|
||
2286E898000
|
heap
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
23D4CAEA000
|
heap
|
page read and write
|
||
1D547844000
|
heap
|
page read and write
|
||
2286DB2E000
|
trusted library allocation
|
page read and write
|
||
14DD000
|
heap
|
page read and write
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
BDB000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286E734000
|
heap
|
page read and write
|
||
2286E51D000
|
heap
|
page read and write
|
||
2286DAEB000
|
heap
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
6A4FAFE000
|
unkown
|
page readonly
|
||
2286E60D000
|
heap
|
page read and write
|
||
23D4CD30000
|
trusted library allocation
|
page read and write
|
||
23D4CA54000
|
heap
|
page read and write
|
||
1003000
|
heap
|
page read and write
|
||
23D4CC90000
|
trusted library allocation
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DAF5000
|
trusted library allocation
|
page read and write
|
||
2286E54F000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
23D0000
|
trusted library allocation
|
page read and write
|
||
16F53376000
|
trusted library allocation
|
page read and write
|
||
2286DAEB000
|
heap
|
page read and write
|
||
2286D125000
|
heap
|
page read and write
|
||
2286C770000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286E578000
|
heap
|
page read and write
|
||
2286DAFF000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
2286D53D000
|
trusted library allocation
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
A12000
|
heap
|
page read and write
|
||
16F5155F000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286D55E000
|
trusted library allocation
|
page read and write
|
||
A54000
|
heap
|
page read and write
|
||
2286E549000
|
heap
|
page read and write
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
2286DB29000
|
trusted library allocation
|
page read and write
|
||
2286D115000
|
heap
|
page read and write
|
||
1ABED228000
|
heap
|
page read and write
|
||
1D5457BF000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
21EAE000000
|
unkown
|
page read and write
|
||
2286E5E2000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
2286DAB8000
|
heap
|
page read and write
|
||
A66000
|
heap
|
page read and write
|
||
47C000
|
heap
|
page read and write
|
||
14EE000
|
heap
|
page read and write
|
||
3E6B000
|
stack
|
page read and write
|
||
2286E630000
|
heap
|
page read and write
|
||
22E1000
|
direct allocation
|
page read and write
|
||
143A000
|
heap
|
page read and write
|
||
3850000
|
heap
|
page read and write
|
||
81A000
|
unkown
|
page readonly
|
||
2286E796000
|
heap
|
page read and write
|
||
23D47470000
|
heap
|
page read and write
|
||
2286DB30000
|
trusted library allocation
|
page read and write
|
||
1D5457B8000
|
heap
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
1D547830000
|
heap
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
2EC8000
|
trusted library allocation
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
23D4CAEE000
|
heap
|
page read and write
|
||
3A76000
|
trusted library allocation
|
page read and write
|
||
1D545D75000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
148D000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
23D47600000
|
heap
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
DB1000
|
unkown
|
page execute read
|
||
6C4000
|
heap
|
page read and write
|
||
2286DA8E000
|
heap
|
page read and write
|
||
2286E682000
|
heap
|
page read and write
|
||
21EAE06D000
|
heap
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
23D47F1A000
|
heap
|
page read and write
|
||
B84000
|
heap
|
page read and write
|
||
2286D527000
|
trusted library allocation
|
page read and write
|
||
A71000
|
unkown
|
page execute read
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
2430000
|
direct allocation
|
page read and write
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
2440000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
BB1000
|
heap
|
page read and write
|
||
3830000
|
heap
|
page read and write
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
2EDB000
|
trusted library allocation
|
page read and write
|
||
2EC5000
|
trusted library allocation
|
page read and write
|
||
16F53367000
|
trusted library allocation
|
page read and write
|
||
2286EA51000
|
heap
|
page read and write
|
||
1D545EC8000
|
heap
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
2C19000
|
trusted library allocation
|
page read and write
|
||
1D5457C5000
|
heap
|
page read and write
|
||
23D4CCC2000
|
trusted library allocation
|
page read and write
|
||
2C12000
|
trusted library allocation
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
2C16000
|
trusted library allocation
|
page read and write
|
||
3A82000
|
trusted library allocation
|
page read and write
|
||
2286DAF3000
|
trusted library allocation
|
page read and write
|
||
2449000
|
heap
|
page read and write
|
||
23D48340000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
BDE000
|
stack
|
page read and write
|
||
16F51573000
|
heap
|
page read and write
|
||
623000
|
heap
|
page read and write
|
||
2286E3FE000
|
heap
|
page read and write
|
||
2EC7000
|
trusted library allocation
|
page read and write
|
||
A54000
|
heap
|
page read and write
|
||
2286DB2C000
|
trusted library allocation
|
page read and write
|
||
2286D270000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
2286E6C8000
|
heap
|
page read and write
|
||
16F5155C000
|
heap
|
page read and write
|
||
23D4CD0A000
|
trusted library allocation
|
page read and write
|
||
2286DB26000
|
trusted library allocation
|
page read and write
|
||
2286DA83000
|
heap
|
page read and write
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
1D545793000
|
heap
|
page read and write
|
||
2286E549000
|
heap
|
page read and write
|
||
1D545D00000
|
heap
|
page read and write
|
||
2286E553000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
23D47E00000
|
heap
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
2286DA0D000
|
heap
|
page read and write
|
||
364E000
|
stack
|
page read and write
|
||
2286E8A0000
|
heap
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
16F51575000
|
heap
|
page read and write
|
||
23D4CE10000
|
remote allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286C657000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F53110000
|
heap
|
page read and write
|
||
23D48600000
|
trusted library section
|
page readonly
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
BA2000
|
heap
|
page read and write
|
||
16F51630000
|
heap
|
page read and write
|
||
2286D9F5000
|
heap
|
page read and write
|
||
D5E000
|
stack
|
page read and write
|
||
16F51572000
|
heap
|
page read and write
|
||
B7B000
|
heap
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
3590000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C6C0000
|
unkown
|
page readonly
|
||
16F5155C000
|
heap
|
page read and write
|
||
16F53376000
|
trusted library allocation
|
page read and write
|
||
2286E5E1000
|
heap
|
page read and write
|
||
2E60000
|
trusted library allocation
|
page read and write
|
||
16F5155C000
|
heap
|
page read and write
|
||
16F51571000
|
heap
|
page read and write
|
||
3A73000
|
trusted library allocation
|
page read and write
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
DCE000
|
heap
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
E06000
|
unkown
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
35AC000
|
heap
|
page read and write
|
||
F20000
|
trusted library allocation
|
page read and write
|
||
16F5155C000
|
heap
|
page read and write
|
||
16F51575000
|
heap
|
page read and write
|
||
2286D54C000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
21EAF75E000
|
heap
|
page read and write
|
||
2286E529000
|
heap
|
page read and write
|
||
49DE0FE000
|
unkown
|
page readonly
|
||
E06000
|
unkown
|
page write copy
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
16F51575000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2C1E000
|
trusted library allocation
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
2286E7B7000
|
heap
|
page read and write
|
||
16F51572000
|
heap
|
page read and write
|
||
BDB000
|
heap
|
page read and write
|
||
5FB9579000
|
stack
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
49B000
|
unkown
|
page write copy
|
||
2286D521000
|
trusted library allocation
|
page read and write
|
||
D0E000
|
stack
|
page read and write
|
||
AAA000
|
unkown
|
page readonly
|
||
49DE8FE000
|
unkown
|
page readonly
|
||
23D47640000
|
heap
|
page read and write
|
||
23D489A1000
|
trusted library allocation
|
page read and write
|
||
2286DAE1000
|
heap
|
page read and write
|
||
16F53376000
|
trusted library allocation
|
page read and write
|
||
16F53368000
|
trusted library allocation
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
2286DB48000
|
trusted library allocation
|
page read and write
|
||
2286DA72000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F51573000
|
heap
|
page read and write
|
||
2B04000
|
trusted library allocation
|
page read and write
|
||
2286E9B2000
|
heap
|
page read and write
|
||
6C6DF000
|
unkown
|
page readonly
|
||
2AF2000
|
trusted library allocation
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
A01000
|
heap
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
16F53114000
|
heap
|
page read and write
|
||
16F53376000
|
trusted library allocation
|
page read and write
|
||
2286E85D000
|
heap
|
page read and write
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
3A72000
|
trusted library allocation
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
9A1000
|
heap
|
page read and write
|
||
5E00000
|
direct allocation
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
2286DAFB000
|
trusted library allocation
|
page read and write
|
||
2286D533000
|
trusted library allocation
|
page read and write
|
||
BD3567D000
|
stack
|
page read and write
|
||
2286E553000
|
heap
|
page read and write
|
||
2286C647000
|
heap
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
2286E549000
|
heap
|
page read and write
|
||
2286DA18000
|
heap
|
page read and write
|
||
2C11000
|
trusted library allocation
|
page read and write
|
||
23D4CD90000
|
trusted library allocation
|
page read and write
|
||
1D545EC7000
|
heap
|
page read and write
|
||
623000
|
heap
|
page read and write
|
||
6383BFE000
|
stack
|
page read and write
|
||
16F51577000
|
heap
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
22EC000
|
direct allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
22F8000
|
direct allocation
|
page read and write
|
||
2286D2A0000
|
trusted library allocation
|
page read and write
|
||
2286DADC000
|
heap
|
page read and write
|
||
2286DA9F000
|
heap
|
page read and write
|
||
16F51572000
|
heap
|
page read and write
|
||
23D47F5A000
|
heap
|
page read and write
|
||
AC4000
|
unkown
|
page write copy
|
||
1D5457EC000
|
heap
|
page read and write
|
||
21EAE05A000
|
heap
|
page read and write
|
||
2424000
|
heap
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
BB6000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DB04000
|
trusted library allocation
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
16F53376000
|
trusted library allocation
|
page read and write
|
||
D48000
|
stack
|
page read and write
|
||
623000
|
heap
|
page read and write
|
||
21EAF78E000
|
heap
|
page read and write
|
||
623000
|
heap
|
page read and write
|
||
1D545D7E000
|
heap
|
page read and write
|
||
9A2000
|
heap
|
page read and write
|
||
2286E900000
|
heap
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
5FB927E000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
1A4A8929000
|
heap
|
page read and write
|
||
23D48640000
|
trusted library section
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
16F53376000
|
trusted library allocation
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
49DF3FE000
|
unkown
|
page readonly
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
16F51571000
|
heap
|
page read and write
|
||
2286D504000
|
trusted library allocation
|
page read and write
|
||
1D545EE9000
|
heap
|
page read and write
|
||
2286D1E0000
|
heap
|
page read and write
|
||
2CF7000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
23D47697000
|
heap
|
page read and write
|
||
16F51561000
|
heap
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
1D545990000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
23D4CCBC000
|
trusted library allocation
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
16F5155C000
|
heap
|
page read and write
|
||
2286C65B000
|
heap
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
9A2000
|
heap
|
page read and write
|
||
BDB000
|
heap
|
page read and write
|
||
16F53376000
|
trusted library allocation
|
page read and write
|
||
3A7B000
|
trusted library allocation
|
page read and write
|
||
2286E7B6000
|
heap
|
page read and write
|
||
BC1000
|
heap
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
16F51578000
|
heap
|
page read and write
|
||
16BBDA10000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
BB5000
|
heap
|
page read and write
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
5FB947B000
|
stack
|
page read and write
|
||
2286DADC000
|
heap
|
page read and write
|
||
2286C63B000
|
heap
|
page read and write
|
||
2286DB22000
|
trusted library allocation
|
page read and write
|
||
2286DA17000
|
heap
|
page read and write
|
||
2B01000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
1D54579E000
|
heap
|
page read and write
|
||
BEF000
|
heap
|
page read and write
|
||
AC8000
|
heap
|
page read and write
|
||
23D4CD4F000
|
trusted library allocation
|
page read and write
|
||
49DFAFE000
|
stack
|
page read and write
|
||
21EAF7B2000
|
heap
|
page read and write
|
||
1ABED160000
|
heap
|
page read and write
|
||
989000
|
heap
|
page read and write
|
||
6BC000
|
stack
|
page read and write
|
||
23D4CAF0000
|
heap
|
page read and write
|
||
16F53376000
|
trusted library allocation
|
page read and write
|
||
16BBDA20000
|
heap
|
page read and write
|
||
2286E534000
|
heap
|
page read and write
|
||
AC8000
|
heap
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
16F52E70000
|
heap
|
page read and write
|
||
5FB907F000
|
stack
|
page read and write
|
||
14AE000
|
heap
|
page read and write
|
||
A54000
|
heap
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
2286D1FA000
|
trusted library allocation
|
page read and write
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
2286DB44000
|
trusted library allocation
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
2286EA4B000
|
heap
|
page read and write
|
||
6800000
|
direct allocation
|
page read and write
|
||
16F51575000
|
heap
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
AC4000
|
unkown
|
page write copy
|
||
6C4000
|
heap
|
page read and write
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
49DF4FE000
|
unkown
|
page readonly
|
||
2286E547000
|
heap
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
2286DAF6000
|
trusted library allocation
|
page read and write
|
||
5D08D7E000
|
stack
|
page read and write
|
||
2EC6000
|
trusted library allocation
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
23D4CE10000
|
remote allocation
|
page read and write
|
||
21EAE202000
|
heap
|
page read and write
|
||
2286DAFD000
|
trusted library allocation
|
page read and write
|
||
23D47E02000
|
heap
|
page read and write
|
||
2286D8F0000
|
heap
|
page read and write
|
||
2286DAF0000
|
trusted library allocation
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
A85000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
49DF47E000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DA10000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286E530000
|
heap
|
page read and write
|
||
2286DADD000
|
heap
|
page read and write
|
||
16F51578000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286D9F5000
|
heap
|
page read and write
|
||
16F5337D000
|
trusted library allocation
|
page read and write
|
||
E0C000
|
unkown
|
page readonly
|
||
4AD000
|
unkown
|
page readonly
|
||
4180000
|
trusted library allocation
|
page read and write
|
||
2ED1000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
AA9000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1D545EF3000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16BBDA40000
|
heap
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
2286C5F0000
|
heap
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
1D54578E000
|
heap
|
page read and write
|
||
2286DA1E000
|
heap
|
page read and write
|
||
2286DADC000
|
heap
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
23D47702000
|
heap
|
page read and write
|
||
5AE000
|
stack
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2AF9000
|
trusted library allocation
|
page read and write
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
1D545EF5000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
DB1000
|
unkown
|
page execute read
|
||
BE3000
|
heap
|
page read and write
|
||
49C000
|
unkown
|
page write copy
|
||
2286D53B000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
36D0000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
BD3000
|
heap
|
page read and write
|
||
2286E5D0000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DB0A000
|
trusted library allocation
|
page read and write
|
||
16F51578000
|
heap
|
page read and write
|
||
2286D53C000
|
trusted library allocation
|
page read and write
|
||
1D545985000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
6A4FCFE000
|
unkown
|
page readonly
|
||
972000
|
heap
|
page read and write
|
||
2286D53E000
|
trusted library allocation
|
page read and write
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
2286E856000
|
heap
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286E61C000
|
heap
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
22E8000
|
direct allocation
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
2EDF000
|
trusted library allocation
|
page read and write
|
||
14ED000
|
heap
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
21EAF76A000
|
heap
|
page read and write
|
||
2286D9F5000
|
heap
|
page read and write
|
||
95E000
|
heap
|
page read and write
|
||
3A60000
|
heap
|
page read and write
|
||
2286E9A8000
|
heap
|
page read and write
|
||
2286DA1A000
|
heap
|
page read and write
|
||
814000
|
unkown
|
page write copy
|
||
2286DAF5000
|
trusted library allocation
|
page read and write
|
||
2600000
|
heap
|
page read and write
|
||
21EAE058000
|
heap
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
49DE07E000
|
stack
|
page read and write
|
||
2286E509000
|
heap
|
page read and write
|
||
16F51572000
|
heap
|
page read and write
|
||
2286E62B000
|
heap
|
page read and write
|
||
2C1B000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2AF7000
|
trusted library allocation
|
page read and write
|
||
16F5337C000
|
trusted library allocation
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
16F51525000
|
heap
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
21EADE50000
|
heap
|
page read and write
|
||
4B9E000
|
stack
|
page read and write
|
||
AAA000
|
unkown
|
page readonly
|
||
623000
|
heap
|
page read and write
|
||
1A4A8AF0000
|
heap
|
page read and write
|
||
16F51450000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
7FA000
|
unkown
|
page readonly
|
||
16F514E0000
|
heap
|
page read and write
|
||
16F51507000
|
heap
|
page read and write
|
||
2286DA0E000
|
heap
|
page read and write
|
||
2286DB11000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
2286D524000
|
trusted library allocation
|
page read and write
|
||
F09000
|
heap
|
page read and write
|
||
23D4767C000
|
heap
|
page read and write
|
||
49DF67E000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
B9A000
|
heap
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
20D4000
|
direct allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
34B6000
|
heap
|
page read and write
|
||
2286DAE6000
|
heap
|
page read and write
|
||
2286E644000
|
heap
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
16F51350000
|
heap
|
page read and write
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
142D000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DB23000
|
trusted library allocation
|
page read and write
|
||
2286E7B6000
|
heap
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
C05000
|
heap
|
page read and write
|
||
2286E6C4000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
2314000
|
direct allocation
|
page read and write
|
||
2286E5C0000
|
heap
|
page read and write
|
||
16F53360000
|
trusted library allocation
|
page read and write
|
||
2286DB0C000
|
trusted library allocation
|
page read and write
|
||
E8E000
|
stack
|
page read and write
|
||
2286DB1E000
|
trusted library allocation
|
page read and write
|
||
A54000
|
heap
|
page read and write
|
||
1489000
|
heap
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
2286DB14000
|
trusted library allocation
|
page read and write
|
||
1D545787000
|
heap
|
page read and write
|
||
BCF000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
2286D109000
|
heap
|
page read and write
|
||
113B000
|
stack
|
page read and write
|
||
2286DAEC000
|
heap
|
page read and write
|
||
2286D540000
|
trusted library allocation
|
page read and write
|
||
3934000
|
heap
|
page read and write
|
||
2286D539000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
2286D539000
|
trusted library allocation
|
page read and write
|
||
16F51575000
|
heap
|
page read and write
|
||
16F5155C000
|
heap
|
page read and write
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
7FA000
|
unkown
|
page readonly
|
||
A54000
|
heap
|
page read and write
|
||
14AE000
|
heap
|
page read and write
|
||
2286E588000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
2C1D000
|
trusted library allocation
|
page read and write
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
1D545EF2000
|
heap
|
page read and write
|
||
7BB000
|
stack
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
2286D558000
|
trusted library allocation
|
page read and write
|
||
23D47713000
|
heap
|
page read and write
|
||
22B8000
|
direct allocation
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
2286C61B000
|
heap
|
page read and write
|
||
23D4CAF2000
|
heap
|
page read and write
|
||
2286D542000
|
trusted library allocation
|
page read and write
|
||
2286E632000
|
heap
|
page read and write
|
||
D9C000
|
heap
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DB4F000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2286DA17000
|
heap
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
2286EA4A000
|
heap
|
page read and write
|
||
78FD000
|
direct allocation
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
2286DB00000
|
trusted library allocation
|
page read and write
|
||
2286DADC000
|
heap
|
page read and write
|
||
2286E5C9000
|
heap
|
page read and write
|
||
7C1000
|
unkown
|
page execute read
|
||
3670000
|
heap
|
page read and write
|
||
81A000
|
unkown
|
page readonly
|
||
81A000
|
unkown
|
page readonly
|
||
16F53376000
|
trusted library allocation
|
page read and write
|
||
16F53376000
|
trusted library allocation
|
page read and write
|
||
23D4CCF0000
|
trusted library allocation
|
page read and write
|
||
23D4CCA6000
|
trusted library allocation
|
page read and write
|
||
1D547832000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
3F6E000
|
stack
|
page read and write
|
||
1D545ED5000
|
heap
|
page read and write
|
||
4A2000
|
heap
|
page read and write
|
||
2A9E93F0000
|
heap
|
page read and write
|
||
1ABED190000
|
trusted library allocation
|
page read and write
|
||
2D70000
|
trusted library section
|
page read and write
|
||
2286E604000
|
heap
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
14AE000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
3F84000
|
heap
|
page read and write
|
||
A3E000
|
stack
|
page read and write
|
||
2286E6E8000
|
heap
|
page read and write
|
||
2286D55F000
|
trusted library allocation
|
page read and write
|
||
2286D523000
|
trusted library allocation
|
page read and write
|
||
2286E632000
|
heap
|
page read and write
|
||
5FB917A000
|
stack
|
page read and write
|
||
1ABEDA02000
|
trusted library allocation
|
page read and write
|
||
7FA000
|
unkown
|
page readonly
|
||
A70000
|
unkown
|
page readonly
|
||
2286DB1F000
|
trusted library allocation
|
page read and write
|
||
1D54579D000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
9BD000
|
stack
|
page read and write
|
||
2286EA5A000
|
heap
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
2286D526000
|
trusted library allocation
|
page read and write
|
||
DCD000
|
heap
|
page read and write
|
||
2286E6FC000
|
heap
|
page read and write
|
||
2286C639000
|
heap
|
page read and write
|
||
2286DAF4000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F5155B000
|
heap
|
page read and write
|
||
1D545ECC000
|
heap
|
page read and write
|
||
2286E54D000
|
heap
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
2286E538000
|
heap
|
page read and write
|
||
23D4767A000
|
heap
|
page read and write
|
||
B83000
|
heap
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
2286D0F1000
|
heap
|
page read and write
|
||
16F51578000
|
heap
|
page read and write
|
||
47E000
|
heap
|
page read and write
|
||
2286D555000
|
trusted library allocation
|
page read and write
|
||
21EADF50000
|
trusted library allocation
|
page read and write
|
||
13EF000
|
stack
|
page read and write
|
||
14D3000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
2286D9F0000
|
heap
|
page read and write
|
||
23D48650000
|
trusted library section
|
page readonly
|
||
16F51502000
|
heap
|
page read and write
|
||
2286E538000
|
heap
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
2286DB02000
|
trusted library allocation
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
2286DA1B000
|
heap
|
page read and write
|
||
1D545D7A000
|
heap
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
2286DB41000
|
trusted library allocation
|
page read and write
|
||
F06000
|
heap
|
page read and write
|
||
16F5155C000
|
heap
|
page read and write
|
||
2286E5B9000
|
heap
|
page read and write
|
||
1D5457BE000
|
heap
|
page read and write
|
||
2286DB0C000
|
trusted library allocation
|
page read and write
|
||
2CF4000
|
trusted library allocation
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
2286D54B000
|
trusted library allocation
|
page read and write
|
||
2EDE000
|
trusted library allocation
|
page read and write
|
||
23D4768D000
|
heap
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
2286E54B000
|
heap
|
page read and write
|
||
23D4CAD2000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C6D5000
|
unkown
|
page readonly
|
||
23D4CAF9000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286D53F000
|
trusted library allocation
|
page read and write
|
||
994000
|
heap
|
page read and write
|
||
2440000
|
heap
|
page read and write
|
||
16F51573000
|
heap
|
page read and write
|
||
5D3000
|
heap
|
page read and write
|
||
2286D559000
|
trusted library allocation
|
page read and write
|
||
489000
|
heap
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
2286D1F2000
|
trusted library allocation
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
7C1000
|
unkown
|
page execute read
|
||
2370000
|
direct allocation
|
page read and write
|
||
2E60000
|
trusted library allocation
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
2286DB06000
|
trusted library allocation
|
page read and write
|
||
623000
|
heap
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
3A7A000
|
trusted library allocation
|
page read and write
|
||
2286DAEE000
|
heap
|
page read and write
|
||
2286D541000
|
trusted library allocation
|
page read and write
|
||
316B000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
B88000
|
heap
|
page read and write
|
||
2A9E9400000
|
heap
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
2286D55D000
|
trusted library allocation
|
page read and write
|
||
7433000
|
direct allocation
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
2286E6C6000
|
heap
|
page read and write
|
||
1D5457BD000
|
heap
|
page read and write
|
||
2286E520000
|
heap
|
page read and write
|
||
6383B7E000
|
stack
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
21EAF726000
|
heap
|
page read and write
|
||
2286D534000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DA2A000
|
heap
|
page read and write
|
||
16F51573000
|
heap
|
page read and write
|
||
2286DB19000
|
trusted library allocation
|
page read and write
|
||
488000
|
heap
|
page read and write
|
||
5DB000
|
heap
|
page read and write
|
||
814000
|
unkown
|
page read and write
|
||
3A71000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
A32000
|
heap
|
page read and write
|
||
2286E5C0000
|
heap
|
page read and write
|
||
2CFB000
|
trusted library allocation
|
page read and write
|
||
1D545750000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
22E0000
|
direct allocation
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
2286DA04000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
49DE3FE000
|
stack
|
page read and write
|
||
2DC937B000
|
stack
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
16F5155D000
|
heap
|
page read and write
|
||
1D54783E000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F51430000
|
heap
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
16F51572000
|
heap
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
16F51578000
|
heap
|
page read and write
|
||
23D4CE10000
|
remote allocation
|
page read and write
|
||
16F53376000
|
trusted library allocation
|
page read and write
|
||
23D4CC50000
|
trusted library allocation
|
page read and write
|
||
23D4CA4F000
|
heap
|
page read and write
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
2ED0000
|
trusted library allocation
|
page read and write
|
||
2286DB14000
|
trusted library allocation
|
page read and write
|
||
2286E630000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
A5A000
|
heap
|
page read and write
|
||
4A9F000
|
stack
|
page read and write
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
3A79000
|
trusted library allocation
|
page read and write
|
||
D8C000
|
heap
|
page read and write
|
||
2286E8A0000
|
heap
|
page read and write
|
||
16F51571000
|
heap
|
page read and write
|
||
2286DAF1000
|
trusted library allocation
|
page read and write
|
||
2286DAB0000
|
heap
|
page read and write
|
||
1D545960000
|
heap
|
page read and write
|
||
2286EA5A000
|
heap
|
page read and write
|
||
B6652FE000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F51575000
|
heap
|
page read and write
|
||
2AF0000
|
trusted library allocation
|
page read and write
|
||
2A9E9810000
|
heap
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
5FB8D7D000
|
stack
|
page read and write
|
||
2DC90FC000
|
stack
|
page read and write
|
||
2286DAF3000
|
trusted library allocation
|
page read and write
|
||
22A7000
|
direct allocation
|
page read and write
|
||
2286D535000
|
trusted library allocation
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
2286C65F000
|
heap
|
page read and write
|
||
2EDD000
|
trusted library allocation
|
page read and write
|
||
1D545ED4000
|
heap
|
page read and write
|
||
2DC89FD000
|
stack
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
2286DAFE000
|
trusted library allocation
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
2286C659000
|
heap
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
16F53376000
|
trusted library allocation
|
page read and write
|
||
2286D524000
|
trusted library allocation
|
page read and write
|
||
49E037E000
|
stack
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
23D4CA00000
|
heap
|
page read and write
|
||
2286DAFD000
|
trusted library allocation
|
page read and write
|
||
1D5457B4000
|
heap
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
2ECB000
|
trusted library allocation
|
page read and write
|
||
2286D55E000
|
trusted library allocation
|
page read and write
|
||
2AF6000
|
trusted library allocation
|
page read and write
|
||
16F51525000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
BEF000
|
heap
|
page read and write
|
||
16F5155C000
|
heap
|
page read and write
|
||
49E03FE000
|
unkown
|
page readonly
|
||
4084000
|
heap
|
page read and write
|
||
1ABED150000
|
heap
|
page read and write
|
||
3710000
|
direct allocation
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
2286DB27000
|
trusted library allocation
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
661000
|
heap
|
page read and write
|
||
2286E6E8000
|
heap
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DB3F000
|
trusted library allocation
|
page read and write
|
||
16F51575000
|
heap
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
2286E518000
|
heap
|
page read and write
|
||
2AFD000
|
trusted library allocation
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
36EF000
|
stack
|
page read and write
|
||
623000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DA1D000
|
heap
|
page read and write
|
||
21EAE065000
|
heap
|
page read and write
|
||
1436000
|
heap
|
page read and write
|
||
2286E730000
|
heap
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
2650000
|
heap
|
page read and write
|
||
16F53210000
|
heap
|
page read and write
|
||
2286DA17000
|
heap
|
page read and write
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
B664F48000
|
stack
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
1D5457EC000
|
heap
|
page read and write
|
||
2286E962000
|
heap
|
page read and write
|
||
2286E588000
|
heap
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
2286D533000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
3A83000
|
trusted library allocation
|
page read and write
|
||
2286DADC000
|
heap
|
page read and write
|
||
3A7D000
|
trusted library allocation
|
page read and write
|
||
23D47F13000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
D6A000
|
heap
|
page read and write
|
||
2ECF000
|
trusted library allocation
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
48A0000
|
heap
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F51579000
|
heap
|
page read and write
|
||
23D4765B000
|
heap
|
page read and write
|
||
14C8000
|
heap
|
page read and write
|
||
1D545791000
|
heap
|
page read and write
|
||
49DF5FC000
|
stack
|
page read and write
|
||
16F5157C000
|
heap
|
page read and write
|
||
1D547846000
|
heap
|
page read and write
|
||
602000
|
heap
|
page read and write
|
||
2286D541000
|
trusted library allocation
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
2286D55A000
|
trusted library allocation
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
2286DB01000
|
trusted library allocation
|
page read and write
|
||
2E62000
|
trusted library allocation
|
page read and write
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
A54000
|
heap
|
page read and write
|
||
2286DB08000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
2286E518000
|
heap
|
page read and write
|
||
49DF7FE000
|
unkown
|
page readonly
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
49DE9FC000
|
stack
|
page read and write
|
||
35E0000
|
heap
|
page read and write
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
2286D544000
|
trusted library allocation
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
BA2000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
BDB000
|
heap
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
16F5155C000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DB3C000
|
trusted library allocation
|
page read and write
|
||
49DE6FE000
|
unkown
|
page readonly
|
||
2DC8E7E000
|
stack
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DA1D000
|
heap
|
page read and write
|
||
2286DA8A000
|
heap
|
page read and write
|
||
40C000
|
unkown
|
page read and write
|
||
16F5157C000
|
heap
|
page read and write
|
||
23D4E000000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
22F0000
|
direct allocation
|
page read and write
|
||
2286E509000
|
heap
|
page read and write
|
||
DEB000
|
unkown
|
page readonly
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
2286D54B000
|
trusted library allocation
|
page read and write
|
||
2286DB4D000
|
trusted library allocation
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
2286E645000
|
heap
|
page read and write
|
||
49E00FC000
|
stack
|
page read and write
|
||
2286DA0A000
|
heap
|
page read and write
|
||
16F5337B000
|
trusted library allocation
|
page read and write
|
||
AC4000
|
unkown
|
page read and write
|
||
1D545D7B000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
16BBDA45000
|
heap
|
page read and write
|
||
16F5156F000
|
heap
|
page read and write
|
||
1ABED202000
|
heap
|
page read and write
|
||
3280000
|
unkown
|
page read and write
|
||
A8F000
|
heap
|
page read and write
|
||
16F5155C000
|
heap
|
page read and write
|
||
EB2000
|
trusted library allocation
|
page read and write
|
||
2286E677000
|
heap
|
page read and write
|
||
14DD000
|
heap
|
page read and write
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
16F5311F000
|
heap
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
1D545D74000
|
heap
|
page read and write
|
||
3140000
|
trusted library allocation
|
page read and write
|
||
16F51573000
|
heap
|
page read and write
|
||
22D0000
|
direct allocation
|
page read and write
|
||
23D475A0000
|
trusted library allocation
|
page read and write
|
||
23D4CD57000
|
trusted library allocation
|
page read and write
|
||
16F5155D000
|
heap
|
page read and write
|
||
21EAF722000
|
heap
|
page read and write
|
||
1D54598D000
|
heap
|
page read and write
|
||
A54000
|
heap
|
page read and write
|
||
2286D546000
|
trusted library allocation
|
page read and write
|
||
23D4CA61000
|
heap
|
page read and write
|
||
1D5457C5000
|
heap
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
AC8000
|
heap
|
page read and write
|
||
2286DB25000
|
trusted library allocation
|
page read and write
|
||
A32000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286E6FC000
|
heap
|
page read and write
|
||
49DFBFE000
|
unkown
|
page readonly
|
||
16F51573000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286E9A9000
|
heap
|
page read and write
|
||
49DF1FE000
|
unkown
|
page readonly
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
DEB000
|
unkown
|
page readonly
|
||
3591000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2ED3000
|
trusted library allocation
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
1D545990000
|
trusted library allocation
|
page read and write
|
||
2286DA86000
|
heap
|
page read and write
|
||
2CFC000
|
trusted library allocation
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
2286DA84000
|
heap
|
page read and write
|
||
23D4CA11000
|
heap
|
page read and write
|
||
1468000
|
heap
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
DCD000
|
heap
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
2286DB2F000
|
trusted library allocation
|
page read and write
|
||
2286D506000
|
trusted library allocation
|
page read and write
|
||
2286D556000
|
trusted library allocation
|
page read and write
|
||
2B167FE000
|
unkown
|
page readonly
|
||
16F5155B000
|
heap
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
2286C670000
|
heap
|
page read and write
|
||
A58000
|
heap
|
page read and write
|
||
1D545D7A000
|
heap
|
page read and write
|
||
2286DB32000
|
trusted library allocation
|
page read and write
|
||
16F516C5000
|
heap
|
page read and write
|
||
3F70000
|
heap
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
BDC000
|
heap
|
page read and write
|
||
16F5155C000
|
heap
|
page read and write
|
||
2A9E94A7000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DB09000
|
trusted library allocation
|
page read and write
|
||
21EAF7BB000
|
heap
|
page read and write
|
||
2286DB2A000
|
trusted library allocation
|
page read and write
|
||
3A33000
|
heap
|
page read and write
|
||
2286D246000
|
trusted library allocation
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
2286E5C0000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
8F0000
|
trusted library allocation
|
page read and write
|
||
2286D507000
|
trusted library allocation
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
49DF9FE000
|
unkown
|
page readonly
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
2286E549000
|
heap
|
page read and write
|
||
623000
|
heap
|
page read and write
|
||
49DFDFE000
|
unkown
|
page readonly
|
||
1D5457E4000
|
heap
|
page read and write
|
||
23D47490000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
2AF3000
|
trusted library allocation
|
page read and write
|
||
2286D29E000
|
trusted library allocation
|
page read and write
|
||
2EC2000
|
trusted library allocation
|
page read and write
|
||
2AEC000
|
stack
|
page read and write
|
||
2286D543000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
363A000
|
stack
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
2286D526000
|
trusted library allocation
|
page read and write
|
||
2286D54F000
|
trusted library allocation
|
page read and write
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
unkown
|
page readonly
|
||
49D000
|
unkown
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
3BAF000
|
stack
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
2286DAB2000
|
heap
|
page read and write
|
||
2286E8E1000
|
heap
|
page read and write
|
||
2286E53D000
|
heap
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
E0C000
|
unkown
|
page readonly
|
||
2286C8C0000
|
heap
|
page read and write
|
||
2286E5D1000
|
heap
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
3610000
|
heap
|
page read and write
|
||
2286DAF4000
|
trusted library allocation
|
page read and write
|
||
21EAF7A2000
|
heap
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
2420000
|
heap
|
page read and write
|
||
2220000
|
heap
|
page read and write
|
||
2286EAF1000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
3590000
|
heap
|
page read and write
|
||
20D0000
|
direct allocation
|
page read and write
|
||
23D4CCBF000
|
trusted library allocation
|
page read and write
|
||
BE6000
|
heap
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
21EAE115000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F51572000
|
heap
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
1ABED213000
|
heap
|
page read and write
|
||
2286E64E000
|
heap
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
23D4CC40000
|
trusted library allocation
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
16F51575000
|
heap
|
page read and write
|
||
2AFB000
|
trusted library allocation
|
page read and write
|
||
2286DB07000
|
trusted library allocation
|
page read and write
|
||
2286DAFC000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F5337E000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
A04000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2640000
|
heap
|
page read and write
|
||
F1F000
|
stack
|
page read and write
|
||
16F53376000
|
trusted library allocation
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
926000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
DCA000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DAA1000
|
heap
|
page read and write
|
||
2286D547000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F5336E000
|
trusted library allocation
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
16F51570000
|
heap
|
page read and write
|
||
2DC8DF8000
|
stack
|
page read and write
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
49DF8FB000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DA8A000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286C657000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
5FB937A000
|
stack
|
page read and write
|
||
2C18000
|
trusted library allocation
|
page read and write
|
||
16F51578000
|
heap
|
page read and write
|
||
2286DAA1000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
16F5157C000
|
heap
|
page read and write
|
||
2C14000
|
trusted library allocation
|
page read and write
|
||
23D4CD6A000
|
trusted library allocation
|
page read and write
|
||
16F51575000
|
heap
|
page read and write
|
||
35AC000
|
heap
|
page read and write
|
||
2286E777000
|
heap
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
2286E6A4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F51531000
|
heap
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
1D5457E8000
|
heap
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
97A000
|
heap
|
page read and write
|
||
2286C65F000
|
heap
|
page read and write
|
||
16F53371000
|
trusted library allocation
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
2286DB13000
|
trusted library allocation
|
page read and write
|
||
2286DB33000
|
trusted library allocation
|
page read and write
|
||
16F5155D000
|
heap
|
page read and write
|
||
2286DAEA000
|
heap
|
page read and write
|
||
14EE000
|
heap
|
page read and write
|
||
2286DB17000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
E06000
|
unkown
|
page write copy
|
||
B40000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2286DB4B000
|
trusted library allocation
|
page read and write
|
||
2286DB15000
|
trusted library allocation
|
page read and write
|
||
D9C000
|
heap
|
page read and write
|
||
1D5457C5000
|
heap
|
page read and write
|
||
2286D53B000
|
trusted library allocation
|
page read and write
|
||
1D545EE9000
|
heap
|
page read and write
|
||
2CFE000
|
trusted library allocation
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
3A70000
|
trusted library allocation
|
page read and write
|
||
2286E558000
|
heap
|
page read and write
|
||
2A9E9420000
|
heap
|
page read and write
|
||
23D4CC65000
|
trusted library allocation
|
page read and write
|
||
2286D536000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F5155B000
|
heap
|
page read and write
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
D58000
|
heap
|
page read and write
|
||
16BBDAC7000
|
heap
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
49DEE7E000
|
stack
|
page read and write
|
||
21EAE002000
|
unkown
|
page read and write
|
||
2286DA99000
|
heap
|
page read and write
|
||
75B000
|
stack
|
page read and write
|
||
3A75000
|
trusted library allocation
|
page read and write
|
||
65F000
|
heap
|
page read and write
|
||
2286D548000
|
trusted library allocation
|
page read and write
|
||
49DFEFD000
|
stack
|
page read and write
|
||
93D000
|
stack
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
147C000
|
heap
|
page read and write
|
||
1D5457A0000
|
heap
|
page read and write
|
||
149E000
|
heap
|
page read and write
|
||
22AC000
|
direct allocation
|
page read and write
|
||
149E000
|
heap
|
page read and write
|
||
35AC000
|
heap
|
page read and write
|
||
1D5457A9000
|
heap
|
page read and write
|
||
2286E698000
|
heap
|
page read and write
|
||
2286D240000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286D546000
|
trusted library allocation
|
page read and write
|
||
16F51578000
|
heap
|
page read and write
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
2286DAE5000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
149E000
|
heap
|
page read and write
|
||
16F51572000
|
heap
|
page read and write
|
||
DB0000
|
unkown
|
page readonly
|
||
3935000
|
heap
|
page read and write
|
||
16F51573000
|
heap
|
page read and write
|
||
BBF000
|
heap
|
page read and write
|
||
2AFE000
|
trusted library allocation
|
page read and write
|
||
49DFFFE000
|
unkown
|
page readonly
|
||
16F53377000
|
trusted library allocation
|
page read and write
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
3590000
|
heap
|
page read and write
|
||
1D5457BB000
|
heap
|
page read and write
|
||
4890000
|
heap
|
page read and write
|
||
23D4CDB0000
|
trusted library allocation
|
page read and write
|
||
2286D559000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
5F3000
|
heap
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
2286E9B7000
|
heap
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
3934000
|
heap
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
16F5155B000
|
heap
|
page read and write
|
||
2286D55C000
|
trusted library allocation
|
page read and write
|
||
2286E6EE000
|
heap
|
page read and write
|
||
2A9E9815000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
1488000
|
heap
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
2EC3000
|
trusted library allocation
|
page read and write
|
||
6E77000
|
direct allocation
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
2EA0000
|
unkown
|
page read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
3A74000
|
trusted library allocation
|
page read and write
|
||
2286E8C1000
|
heap
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1A4A8C55000
|
heap
|
page read and write
|
||
1D5457BE000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
623000
|
heap
|
page read and write
|
||
49DEBFB000
|
stack
|
page read and write
|
||
23D48520000
|
trusted library allocation
|
page read and write
|
||
165D000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F5155D000
|
heap
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
2ED8000
|
trusted library allocation
|
page read and write
|
||
57B000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
49DF77E000
|
unkown
|
page readonly
|
||
7744000
|
direct allocation
|
page read and write
|
||
468000
|
heap
|
page read and write
|
||
2286DAFF000
|
trusted library allocation
|
page read and write
|
||
1D5457A9000
|
heap
|
page read and write
|
||
2286D553000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DA6C000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
2DC907A000
|
stack
|
page read and write
|
||
AC4000
|
unkown
|
page read and write
|
||
6383AFA000
|
stack
|
page read and write
|
||
16F51571000
|
heap
|
page read and write
|
||
2286D538000
|
trusted library allocation
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
2286D548000
|
trusted library allocation
|
page read and write
|
||
16F51640000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
2DC92F9000
|
stack
|
page read and write
|
||
16F5336D000
|
trusted library allocation
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
2286DB43000
|
trusted library allocation
|
page read and write
|
||
16F5155D000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
BA2000
|
heap
|
page read and write
|
||
21EAF710000
|
heap
|
page read and write
|
||
2286D534000
|
trusted library allocation
|
page read and write
|
||
2CFD000
|
trusted library allocation
|
page read and write
|
||
4080000
|
heap
|
page read and write
|
||
2286E588000
|
heap
|
page read and write
|
||
16F5336A000
|
trusted library allocation
|
page read and write
|
||
2286DB4E000
|
trusted library allocation
|
page read and write
|
||
3611000
|
heap
|
page read and write
|
||
21EAE207000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
16F51571000
|
heap
|
page read and write
|
||
2286DABB000
|
heap
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
CDE000
|
stack
|
page read and write
|
||
2286D544000
|
trusted library allocation
|
page read and write
|
||
20D8000
|
direct allocation
|
page read and write
|
||
23D47628000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
2286E6F1000
|
heap
|
page read and write
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
BD3000
|
heap
|
page read and write
|
||
23D4CB00000
|
heap
|
page read and write
|
||
25A0000
|
heap
|
page read and write
|
||
16F515E4000
|
trusted library allocation
|
page read and write
|
||
49DF07E000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
ACA000
|
unkown
|
page readonly
|
||
2286E737000
|
heap
|
page read and write
|
||
9A2000
|
heap
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
16F516C0000
|
heap
|
page read and write
|
||
2CF1000
|
trusted library allocation
|
page read and write
|
||
2286D50C000
|
trusted library allocation
|
page read and write
|
||
A70000
|
unkown
|
page readonly
|
||
16F51571000
|
heap
|
page read and write
|
||
65B000
|
stack
|
page read and write
|
||
16F5336C000
|
trusted library allocation
|
page read and write
|
||
BAF000
|
heap
|
page read and write
|
||
2286DB0F000
|
trusted library allocation
|
page read and write
|
||
1D5457BB000
|
heap
|
page read and write
|
||
16F51562000
|
heap
|
page read and write
|
||
2CF9000
|
trusted library allocation
|
page read and write
|
||
2286DB08000
|
trusted library allocation
|
page read and write
|
||
2286DA28000
|
heap
|
page read and write
|
||
A22000
|
heap
|
page read and write
|
||
2286D509000
|
trusted library allocation
|
page read and write
|
||
16F53374000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F5336B000
|
trusted library allocation
|
page read and write
|
||
23D4CC94000
|
trusted library allocation
|
page read and write
|
||
23D4CD35000
|
trusted library allocation
|
page read and write
|
||
16F5157C000
|
heap
|
page read and write
|
||
49DEAFE000
|
unkown
|
page readonly
|
||
2286E6EE000
|
heap
|
page read and write
|
||
16F51572000
|
heap
|
page read and write
|
||
2286DA1D000
|
heap
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
BD357FE000
|
unkown
|
page readonly
|
||
16F5155C000
|
heap
|
page read and write
|
||
1D545D70000
|
heap
|
page read and write
|
||
2DC93F9000
|
stack
|
page read and write
|
||
2286D503000
|
trusted library allocation
|
page read and write
|
||
B9A000
|
heap
|
page read and write
|
||
16F514E8000
|
heap
|
page read and write
|
||
21EAE200000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
A18000
|
heap
|
page read and write
|
||
2286DA0A000
|
heap
|
page read and write
|
||
1D547820000
|
heap
|
page read and write
|
||
16F51575000
|
heap
|
page read and write
|
||
2286DAF8000
|
trusted library allocation
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
16F53375000
|
trusted library allocation
|
page read and write
|
||
A4C000
|
heap
|
page read and write
|
||
16F5157C000
|
heap
|
page read and write
|
||
1D545ECE000
|
heap
|
page read and write
|
||
16F5155C000
|
heap
|
page read and write
|
||
1D545762000
|
heap
|
page read and write
|
||
2286D545000
|
trusted library allocation
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
A24000
|
heap
|
page read and write
|
||
2286DA28000
|
heap
|
page read and write
|
||
23D476FF000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
70D000
|
stack
|
page read and write
|
||
2286E588000
|
heap
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
2286DB40000
|
trusted library allocation
|
page read and write
|
||
16F53361000
|
trusted library allocation
|
page read and write
|
||
2286DB18000
|
trusted library allocation
|
page read and write
|
||
16F515E0000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
16F5155C000
|
heap
|
page read and write
|
||
623000
|
heap
|
page read and write
|
||
2900000
|
trusted library allocation
|
page read and write
|
||
23D4CD38000
|
trusted library allocation
|
page read and write
|
||
FC000
|
stack
|
page read and write
|
||
E0C000
|
unkown
|
page readonly
|
||
2286E61C000
|
heap
|
page read and write
|
||
2286DA8A000
|
heap
|
page read and write
|
||
16F53376000
|
trusted library allocation
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
23D4CC30000
|
trusted library allocation
|
page read and write
|
||
2286E6FC000
|
heap
|
page read and write
|
||
BDB000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
E06000
|
unkown
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
2286E578000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286D525000
|
trusted library allocation
|
page read and write
|
||
16F53372000
|
trusted library allocation
|
page read and write
|
||
16F53365000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2286DAF0000
|
trusted library allocation
|
page read and write
|
||
2286DAB0000
|
heap
|
page read and write
|
||
16F5336F000
|
trusted library allocation
|
page read and write
|
||
16F53370000
|
trusted library allocation
|
page read and write
|
||
2286E81E000
|
heap
|
page read and write
|
||
1D545990000
|
trusted library allocation
|
page read and write
|
||
16F53373000
|
trusted library allocation
|
page read and write
|
||
3E2E000
|
stack
|
page read and write
|
||
2286E642000
|
heap
|
page read and write
|
||
40C000
|
unkown
|
page write copy
|
||
2286DA0A000
|
heap
|
page read and write
|
||
1ABED22B000
|
heap
|
page read and write
|
||
605000
|
heap
|
page read and write
|
||
16F51515000
|
heap
|
page read and write
|
||
2286D526000
|
trusted library allocation
|
page read and write
|
||
1486000
|
heap
|
page read and write
|
||
2286E5C0000
|
heap
|
page read and write
|
||
2286D537000
|
trusted library allocation
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
2286C5F2000
|
heap
|
page read and write
|
||
16F5157C000
|
heap
|
page read and write
|
||
2286E7FA000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
F24000
|
trusted library allocation
|
page read and write
|
||
2286E5E4000
|
heap
|
page read and write
|
||
14EE000
|
heap
|
page read and write
|
||
623000
|
heap
|
page read and write
|
||
2286E51E000
|
heap
|
page read and write
|
||
2286DB16000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2ACC000
|
heap
|
page read and write
|
||
2B00000
|
trusted library allocation
|
page read and write
|
||
2286EA63000
|
heap
|
page read and write
|
||
7C1000
|
unkown
|
page execute read
|
||
3CEF000
|
stack
|
page read and write
|
||
16F51533000
|
heap
|
page read and write
|
||
49DECFE000
|
unkown
|
page readonly
|
||
2D00000
|
heap
|
page read and write
|
||
1A4A8900000
|
heap
|
page read and write
|
There are 2806 hidden memdumps, click here to show them.