IOC Report
starwindconverter.exe

loading gif

Files

File Path
Type
Category
Malicious
starwindconverter.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Config.Msi\64f25a.rbs
data
dropped
C:\Config.Msi\64f25e.rbs
data
modified
C:\Program Files\StarWind Software\StarWind V2V Converter\V2V_Converter.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\V2V_ConverterConsole.exe (copy)
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-c-auth.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-c-cal.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-c-common.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-c-compression.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-c-event-stream.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-c-http.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-c-io.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-c-mqtt.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-c-s3.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-c-sdkutils.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-checksums.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-cpp-sdk-core.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-cpp-sdk-ec2.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-cpp-sdk-iam.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-cpp-sdk-s3.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\aws-crt-cpp.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\cpprest140_2_9.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\gsoap.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-043UQ.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-0U75Q.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-239NR.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-2T9SC.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-3DPGP.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-9PTPC.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-C445H.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-DMGAR.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-DOD6O.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-HKUCL.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-JNOSU.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-JTGFU.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-LA1DS.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-NDNT1.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-NJRVA.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-OCF30.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-OCNA5.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-PM8AC.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-QH72R.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-QJJQG.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-QMAR7.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-QT18L.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-QVHTU.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-RRJPS.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-SRQKS.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-UHSSF.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\is-VPH09.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\AMD64\is-FDG2J.tmp
Windows setup INFormation
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\AMD64\is-HQLOK.tmp
data
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\AMD64\is-M84MS.tmp
PE32 executable (native) Intel 80386, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\AMD64\is-MRML8.tmp
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\AMD64\is-T4VT0.tmp
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\AMD64\vstor2-mntapi20-shared.sys (copy)
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\AMD64\vstor2-x64.sys (copy)
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\AMD64\vstor2-x86.sys (copy)
PE32 executable (native) Intel 80386, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\AMD64\vstor2.cat (copy)
data
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\AMD64\vstor2.inf (copy)
Windows setup INFormation
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\diskLibPlugin.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\expat.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\glib-2.0.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\gobject-2.0.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\gthread-2.0.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\gvmomi.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\iconv.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\intl.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-468L0.tmp
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-4G0NR.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-6QBCJ.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-6S65I.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-728T9.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-80TNO.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-9CMA4.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-BHS0U.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-ED59I.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-F99S5.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-FIGM0.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-G86Q6.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-GCANT.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-H973S.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-HGVAF.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-I6VGK.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-I8RA6.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-JUSQQ.tmp
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-LQIVE.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-MMA8U.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-NTL6D.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-OAJUU.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-PAU7U.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-QULGP.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-S80ND.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-SN4HU.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-U7152.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\is-VUIE8.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\libcurl.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\libeay32.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\liblber.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\libldap.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\libldap_r.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\libxml2.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\pcre.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\ssleay32.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\ssoclient.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\vddkReporter.exe (copy)
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\vim-types.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\vixDiskLib.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\vixDiskLibVim.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\vixMntapi.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\vmacore.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\vmomi.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\vmware-vdiskmanager.exe (copy)
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\vstor2install.bat (copy)
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\vstor2uninstall.bat (copy)
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\lib\zlib1.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\libeay32MD.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\ssleay32MD.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\testing-resources.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\unins000.dat
InnoSetup Log StarWind V2V Converter (9.0.1.369), version 0x30, 9722 bytes, 473627\user, "C:\Program Files\StarWind Software\StarWind V2V Converter"
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\unins000.msg
InnoSetup messages, version 5.5.3, 221 messages (ASCII), &About Setup...
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\vc\is-03KQM.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\vc\is-EOQIC.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\vc\vc_redist.x64.130.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\vc\vc_redist.x64.140.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\vcruntime140_1.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files\StarWind Software\StarWind V2V Converter\wastorage.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x83a51d1a, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StarWind Software\StarWind V2V Converter\StarWind V2V Converter.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Fri Apr 26 14:49:40 2024, mtime=Fri Apr 26 14:49:40 2024, atime=Wed Nov 8 12:10:16 2023, length=3885672, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StarWind Software\StarWind V2V Converter\Uninstall.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Fri Apr 26 14:49:40 2024, mtime=Fri Apr 26 14:49:40 2024, atime=Fri Apr 26 14:49:02 2024, length=1015912, window=hide
dropped
C:\ProgramData\Package Cache\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\state.rsm
data
dropped
C:\ProgramData\Package Cache\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\vcredist_x64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\Public\Desktop\StarWind V2V Converter.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Fri Apr 26 14:49:40 2024, mtime=Fri Apr 26 14:49:54 2024, atime=Wed Nov 8 12:10:16 2023, length=3885672, window=hide
dropped
C:\Users\user\AppData\Local\Temp\dd_vcredist_amd64_20240426175001.log
ASCII text, with very long lines (322), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\dd_vcredist_amd64_20240426175001_0_vcRuntimeMinimum_x64.log
Unicode text, UTF-16, little-endian text, with very long lines (588), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\dd_vcredist_amd64_20240426175001_1_vcRuntimeAdditional_x64.log
Unicode text, UTF-16, little-endian text, with very long lines (588), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\dd_vcredist_amd64_20240426175040.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\dd_vcredist_amd64_20240426175041.log
ASCII text, with very long lines (317), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-DTP8T.tmp\starwindconverter.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-UGUD3.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\.ba1\BootstrapperApplicationData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (561), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\.ba1\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\.ba1\logo.png
PNG image data, 64 x 64, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\.ba1\thm.wxl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\.ba1\thm.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\.ba1\wixstdba.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\.be\vcredist_x64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\cab2C04DDC374BD96EB5C8EB8208F2C7C92
Microsoft Cabinet archive data, 5572128 bytes, 14 files, at 0x44 +A "F_CENTRAL_mfc120_x64" +A "F_CENTRAL_mfc120chs_x64", flags 0x4, number 1, extra bytes 20 in head, 369 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\Local\Temp\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\cab5046A8AB272BF37297BB7928664C9503
Microsoft Cabinet archive data, 1018378 bytes, 5 files, at 0x44 +A "F_CENTRAL_msvcp120_x64" +A "F_CENTRAL_msvcr120_x64", flags 0x4, number 1, extra bytes 20 in head, 80 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\Local\Temp\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\vcRuntimeAdditional_x64
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2013 x64 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 x64 Additional Runtime - 12.0.21005., Template: x64;1033, Revision Number: {0990E7AB-85D7-456A-B8F8-1E1E56A29571}, Create Time/Date: Sat Oct 5 11:36:18 2013, Last Saved Time/Date: Sat Oct 5 11:36:18 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.7.1623.0), Security: 2
dropped
C:\Users\user\AppData\Local\Temp\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\vcRuntimeMinimum_x64
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2013 x64 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 x64 Minimum Runtime - 12.0.21005., Template: x64;1033, Revision Number: {FE26E34E-F44B-4B4D-A2C9-878D87759F44}, Create Time/Date: Sat Oct 5 11:36:26 2013, Last Saved Time/Date: Sat Oct 5 11:36:26 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.7.1623.0), Security: 2
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1028\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1028\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1029\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1029\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1031\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1031\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1036\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1036\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1040\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1040\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1041\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1041\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1042\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1042\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1045\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1045\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1046\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1046\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1049\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1049\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1055\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\1055\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\2052\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\2052\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\3082\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\3082\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\BootstrapperApplicationData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (561), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\logo.png
PNG image data, 64 x 64, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\thm.wxl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\thm.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\wixstdba.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\64f258.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2013 x64 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 x64 Minimum Runtime - 12.0.21005., Template: x64;1033, Revision Number: {FE26E34E-F44B-4B4D-A2C9-878D87759F44}, Create Time/Date: Sat Oct 5 11:36:26 2013, Last Saved Time/Date: Sat Oct 5 11:36:26 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.7.1623.0), Security: 2
dropped
C:\Windows\Installer\64f25b.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2013 x64 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 x64 Minimum Runtime - 12.0.21005., Template: x64;1033, Revision Number: {FE26E34E-F44B-4B4D-A2C9-878D87759F44}, Create Time/Date: Sat Oct 5 11:36:26 2013, Last Saved Time/Date: Sat Oct 5 11:36:26 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.7.1623.0), Security: 2
dropped
C:\Windows\Installer\64f25c.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2013 x64 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 x64 Additional Runtime - 12.0.21005., Template: x64;1033, Revision Number: {0990E7AB-85D7-456A-B8F8-1E1E56A29571}, Create Time/Date: Sat Oct 5 11:36:18 2013, Last Saved Time/Date: Sat Oct 5 11:36:18 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.7.1623.0), Security: 2
dropped
C:\Windows\Installer\64f25f.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2013 x64 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 x64 Additional Runtime - 12.0.21005., Template: x64;1033, Revision Number: {0990E7AB-85D7-456A-B8F8-1E1E56A29571}, Create Time/Date: Sat Oct 5 11:36:18 2013, Last Saved Time/Date: Sat Oct 5 11:36:18 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.7.1623.0), Security: 2
dropped
C:\Windows\Installer\MSIF594.tmp
data
dropped
C:\Windows\Installer\MSIF97D.tmp
data
dropped
C:\Windows\Installer\SourceHash{929FBD26-9020-399B-9A7A-751D61F0B942}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\SourceHash{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\System32\drivers\vstor2-mntapi20-shared.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc120chs.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc120cht.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc120deu.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc120enu.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc120esn.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc120fra.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc120ita.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc120jpn.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc120kor.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc120rus.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\vcamp120.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\vcomp120.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Temp\~DF1ED0CDFA3A663D46.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF20B13ED5A46CFD6A.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF2F7825B6A1632856.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF4064E05D88689530.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF41904B734E93B5F2.TMP
data
dropped
C:\Windows\Temp\~DF4FB675D4343A66D4.TMP
data
dropped
C:\Windows\Temp\~DF5BFF47EAC34AE126.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF5C89FC4524B029B4.TMP
data
dropped
C:\Windows\Temp\~DF5DB394C7BE65B253.TMP
data
dropped
C:\Windows\Temp\~DF6273930158FA6726.TMP
data
dropped
C:\Windows\Temp\~DF6B415F51396B138E.TMP
data
dropped
C:\Windows\Temp\~DF6E25CDFE56AB2CED.TMP
data
dropped
C:\Windows\Temp\~DF7CB20637BA7FDB2F.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF7F6B2EA59D255DC8.TMP
data
dropped
C:\Windows\Temp\~DF81190C071D3F5224.TMP
data
dropped
C:\Windows\Temp\~DFA220BC115BF5EE0C.TMP
data
dropped
C:\Windows\Temp\~DFA45C5A87F02E8805.TMP
data
dropped
C:\Windows\Temp\~DFAC508EA015BA8E99.TMP
data
dropped
C:\Windows\Temp\~DFB6CD0B4A6E3703E9.TMP
data
dropped
C:\Windows\Temp\~DFB7B704FB726FEEA1.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFC33A75C755FF963D.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFC3FD91E8C01D084D.TMP
data
dropped
C:\Windows\Temp\~DFE84AE1E77412CBFC.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFEC3130DD10466341.TMP
Composite Document File V2 Document, Cannot read section info
dropped
Chrome Cache Entry: 212
ASCII text, with very long lines (837)
downloaded
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 227 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\starwindconverter.exe
"C:\Users\user\Desktop\starwindconverter.exe"
C:\Users\user\AppData\Local\Temp\is-DTP8T.tmp\starwindconverter.tmp
"C:\Users\user\AppData\Local\Temp\is-DTP8T.tmp\starwindconverter.tmp" /SL5="$10446,40015629,338944,C:\Users\user\Desktop\starwindconverter.exe"
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /C ""C:\Program Files\StarWind Software\StarWind V2V Converter\lib\vstor2install.bat""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WMIC.exe
wmic OS get OSArchitecture
C:\Windows\System32\findstr.exe
findstr 64
C:\Windows\System32\sc.exe
sc query vstor2-mntapi20-shared
C:\Windows\System32\sc.exe
sc create vstor2-mntapi20-shared type= kernel start= auto error= normal binpath= System32\drivers\vstor2-mntapi20-shared.sys DisplayName= "Vstor2 MntApi 2.0 Driver (shared)" group= System
C:\Windows\System32\sc.exe
sc start vstor2-mntapi20-shared
C:\Program Files\StarWind Software\StarWind V2V Converter\vc\vc_redist.x64.130.exe
"C:\Program Files\StarWind Software\StarWind V2V Converter\vc\vc_redist.x64.130.exe" /quiet
C:\Program Files\StarWind Software\StarWind V2V Converter\vc\vc_redist.x64.130.exe
"C:\Program Files\StarWind Software\StarWind V2V Converter\vc\vc_redist.x64.130.exe" /quiet -burn.unelevated BurnPipe.{D7692551-F3D1-4F96-B98C-6EA8EBCE2C29} {99F278BD-B402-4D45-B367-3A71E4C78909} 4116
C:\Windows\System32\VSSVC.exe
C:\Windows\system32\vssvc.exe
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k swprv
C:\Windows\System32\SrTasks.exe
C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 --field-trial-handle=1904,i,7260468871230898073,3398952734327397412,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\ProgramData\Package Cache\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\vcredist_x64.exe
"C:\ProgramData\Package Cache\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\vcredist_x64.exe" /burn.runonce
C:\ProgramData\Package Cache\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\vcredist_x64.exe
"C:\ProgramData\Package Cache\{050d4fc8-5d48-4b8f-8972-47c82c46020f}\vcredist_x64.exe"
C:\Program Files\StarWind Software\StarWind V2V Converter\vc\vc_redist.x64.140.exe
"C:\Program Files\StarWind Software\StarWind V2V Converter\vc\vc_redist.x64.140.exe" /quiet
C:\Program Files\StarWind Software\StarWind V2V Converter\vc\vc_redist.x64.140.exe
"C:\Program Files\StarWind Software\StarWind V2V Converter\vc\vc_redist.x64.140.exe" /quiet -burn.unelevated BurnPipe.{621695C5-B52A-43D6-BAAE-CEAD8A9F5342} {3E01C30D-E9A5-4BF9-AFE0-A4D60C443091} 3452
There are 14 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.vmware.com/0
unknown
https://www.starwindsoftware.com/v2v-help/
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://wixtoolset.org/schemas/thmutil/2010
unknown
http://www.openssl.org/V
unknown
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
https://www.starwindsoftware.com/
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
http://s3.amazonaws.com/doc/2006-03-01/
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://www.openssl.org/support/faq.html.
unknown
http://www.openssl.org/support/faq.html
unknown
https://www.starwindsoftware.com/terms
unknown
http://schemas.xmlsoap.org/soap/envelope/http://docs.oasis-open.org/wss:stringmustUnderstandxsi
unknown
https://g.live.com/odclientsettings/Prod.C:
unknown
http://schemas.xmlsoap.org/soap/envelope/Envelope
unknown
http://wixtoolset.org/schemas/thmutil/2010lureH
unknown
https://g.live.com/odclientsettings/ProdV2
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.starwindsoftware.com/download-free-tools
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.64.196
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
unknown
https://www.starwindsoftware.com//
unknown
http://schemas.xmlsoap.org/soap/envelope/HeaderBody
unknown
http://www.innosetup.com/
unknown
https://www.starwindsoftware.com/:
unknown
https://www.starwindsoftware.com/privacy-policy
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://ocsp.thawte.com0
unknown
https://www.starwindsoftware.com/privacy-policy.
unknown
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline
unknown
http://www.vmware.com/0/
unknown
http://crl.ver)
unknown
https://www.google.com/async/newtab_promos
142.250.64.196
https://www.starwindsoftware.com/starwind-nfr-license-users.
unknown
http://schemas.xmlsoap.org/soap/envelope/Body
unknown
http://www.symauth.com/cps0(
unknown
http://docs.oasis-open.org/wss
unknown
https://www.starwindsoftware.com/lT
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.64.196
https://www.starwindsoftware.com/v2v-help/2
unknown
http://wixtoolset.org/schemas/thmutil/2010(
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.64.196
http://www.remobjects.com/psU
unknown
https://www.starwindsoftware.com/starwind-nfr-license-users
unknown
https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
unknown
http://www.symauth.com/rpa00
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgRmgZjcGM-ar7EGIjAqkOFqfrWsUuYYc-cHY4mS2DMqZX8MiAbTgaXolWeyzV_Jwf75R-0hkajKDO7EEd0yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.250.64.196
http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
unknown
http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1647
unknown
http://wixtoolset.org/schemas/thmutil/2010and
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgRmgZjcGM-ar7EGIjDPDwLUDTsFOtyhKJAT5DyNT4-JYGy8AQvI_i61IsKnO-HCW4ZF9DcmjkgW5xqtABsyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.250.64.196
http://www.remobjects.com/ps
unknown
https://www.starwindsoftware.com/NT
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
unknown
There are 47 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
142.250.64.196

IPs

IP
Domain
Country
Malicious
142.250.64.196
www.google.com
United States
239.255.255.250
unknown
Reserved
192.168.2.4
unknown
unknown
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
Inno Setup: Selected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
Inno Setup: Deselected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
Inno Setup: Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\StarWind V2V Converter (9.0.1.369)_is1
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
AoACAPIError
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
AoACAPIResult
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
FirstRun
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
LastIndex
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
NestingLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
StartNesting
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore
SRInitDone
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
SrCreateRp (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
SrCreateRp (Leave)
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
BundleCachePath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
BundleUpgradeCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
BundleAddonCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
BundleDetectCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
BundlePatchCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
BundleVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
BundleProviderKey
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
BundleTag
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
EngineVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
NoElevateOnModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
Resume
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
{050d4fc8-5d48-4b8f-8972-47c82c46020f}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
BundleResumeCommandLine
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
Installed
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
RPSessionInterval
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
LastIndex
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{050d4fc8-5d48-4b8f-8972-47c82c46020f}
Resume
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
IDENTIFY (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
IDENTIFY (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer
IDENTIFY (Enter)
HKEY_LOCAL_MACHINE\BCD00000000\Description
FirmwareModified
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001
Element
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\12000002
Element
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{584f4cfd-61ca-11ee-8a62-e43725c6cdb7}\Elements\12000004
Element
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{584f4cfe-61ca-11ee-8a62-e43725c6cdb7}\Elements\12000004
Element
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{a5a30fa2-3d06-4e9f-b5f4-a01df9d1fcba}\Description
Type
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{a5a30fa2-3d06-4e9f-b5f4-a01df9d1fcba}\Elements\24000001
Element
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{a5a30fa2-3d06-4e9f-b5f4-a01df9d1fcba}\Elements\25000004
Element
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
IDENTIFY (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
IDENTIFY (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
IDENTIFY (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
IDENTIFY (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer
IDENTIFY (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_BEGINPREPARE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_BEGINPREPARE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
PREPAREBACKUP (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
PREPAREBACKUP (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
PREPAREBACKUP (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
PREPAREBACKUP (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
VSS_WS_STABLE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
PREPAREBACKUP (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
VSS_WS_STABLE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
PREPAREBACKUP (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
VSS_WS_STABLE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
GETSTATE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
GETSTATE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
GETSTATE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
GETSTATE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
GETSTATE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
GETSTATE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_ENDPREPARE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_ENDPREPARE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
PREPARESNAPSHOT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
PREPARESNAPSHOT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
PREPARESNAPSHOT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
PREPARESNAPSHOT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
PREPARESNAPSHOT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
VSS_WS_WAITING_FOR_FREEZE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
PREPARESNAPSHOT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
VSS_WS_WAITING_FOR_FREEZE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
PREPARESNAPSHOT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
VSS_WS_WAITING_FOR_FREEZE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
PREPARESNAPSHOT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_FRONT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
FREEZE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
FREEZE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
VSS_WS_WAITING_FOR_THAW (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
BKGND_FREEZE_THREAD (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_FRONT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_BACK (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_BACK (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_SYSTEM (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
FREEZE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
FREEZE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
VSS_WS_WAITING_FOR_THAW (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
BKGND_FREEZE_THREAD (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_SYSTEM (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_KTM (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_KTM (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_RM (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
FREEZE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
FREEZE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
VSS_WS_WAITING_FOR_THAW (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_RM (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
BKGND_FREEZE_THREAD (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_PRECOMMIT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_PRECOMMIT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
OPEN_VOLUME_HANDLE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
OPEN_VOLUME_HANDLE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
OPEN_VOLUME_HANDLE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
OPEN_VOLUME_HANDLE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
IOCTL_FLUSH_AND_HOLD (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
IOCTL_FLUSH_AND_HOLD (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
IOCTL_RELEASE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
IOCTL_RELEASE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
IOCTL_FLUSH_AND_HOLD (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
IOCTL_FLUSH_AND_HOLD (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
IOCTL_RELEASE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
IOCTL_RELEASE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_COMMIT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_COMMIT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_POSTCOMMIT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_POSTCOMMIT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
THAW_KTM (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
THAW_KTM (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
THAW (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
THAW (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
BKGND_FREEZE_THREAD (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
THAW (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
BKGND_FREEZE_THREAD (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
THAW (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
VSS_WS_WAITING_FOR_POST_SNAPSHOT (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
THAW (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
VSS_WS_WAITING_FOR_POST_SNAPSHOT (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
THAW (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
BKGND_FREEZE_THREAD (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
THAW (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
VSS_WS_WAITING_FOR_POST_SNAPSHOT (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
THAW (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_PREFINALCOMMIT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_PREFINALCOMMIT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
POSTSNAPSHOT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
POSTSNAPSHOT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
POSTSNAPSHOT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
POSTSNAPSHOT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
POSTSNAPSHOT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
VSS_WS_WAITING_FOR_BACKUP_COMPLETE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
POSTSNAPSHOT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
VSS_WS_WAITING_FOR_BACKUP_COMPLETE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
POSTSNAPSHOT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
VSS_WS_WAITING_FOR_BACKUP_COMPLETE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
POSTSNAPSHOT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_POSTFINALCOMMIT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_POSTFINALCOMMIT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_ABORTSNAPSHOTS (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_ABORTSNAPSHOTS (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
ABORT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
ABORT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
ABORT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
ABORT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
ABORT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
ABORT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
ABORT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
ABORT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
BACKUPSHUTDOWN (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
BACKUPSHUTDOWN (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
BACKUPSHUTDOWN (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
BACKUPSHUTDOWN (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
BACKUPSHUTDOWN (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
BACKUPSHUTDOWN (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
BACKUPSHUTDOWN (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
BACKUPSHUTDOWN (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\64f25a.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\64f25a.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1924F1CBA0F6BE8389E42C5E5538F71E
6E8D947A316B3EB3F8F540C548BE2AB9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78
6E8D947A316B3EB3F8F540C548BE2AB9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3
6E8D947A316B3EB3F8F540C548BE2AB9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3
6E8D947A316B3EB3F8F540C548BE2AB9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\vcamp120.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F6A327C410298D44EB570EB8D501F458
6E8D947A316B3EB3F8F540C548BE2AB9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\vcomp120.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1A8F0AFED61F44E4E84EC28DE6D1214F
6E8D947A316B3EB3F8F540C548BE2AB9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BE7FA62661CD24830B127381013A5C10
6E8D947A316B3EB3F8F540C548BE2AB9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\651B38B7BBE8F03319CAA27790912C9C
6E8D947A316B3EB3F8F540C548BE2AB9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E1A20017605E45A3CAE5DF61A6FC01C0
6E8D947A316B3EB3F8F540C548BE2AB9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x64
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x64
Installed
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x64
Major
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x64
Minor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x64
Bld
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x64
Rbld
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_amd64,v12
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_amd64,v12
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_amd64,v12
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0
SP
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0
SPIndex
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
Install
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
InstallerType
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
SPName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
UpdateVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\0FC00402C7EDE723A94E0F3FD809588F
6E8D947A316B3EB3F8F540C548BE2AB9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\6E8D947A316B3EB3F8F540C548BE2AB9
VC_Runtime_Minimum
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\Features
VC_Runtime_Minimum
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\6E8D947A316B3EB3F8F540C548BE2AB9
Provider
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\Features
Provider
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\6E8D947A316B3EB3F8F540C548BE2AB9
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\Features
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\0FC00402C7EDE723A94E0F3FD809588F
6E8D947A316B3EB3F8F540C548BE2AB9
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9\SourceList\Media
DiskPrompt
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9\SourceList
LastUsedSource
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\64f25e.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\64f25e.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\4ED6E1912B7E9EC34BB8520DFF3F8DE8
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2A50ACECC2D5F343B4B56106C7CD5B8
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfc120cht.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\52939EBA3FB6849409FFE1D41FB52B1D
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfc120chs.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\212F32761495F3A40A7C6D06026C9774
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfc120enu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AC418779B85FEBA4AB8BD656FFE16834
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfc120deu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B03A28739FC91464B88D752E8191270D
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfc120esn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1DF56FED5BB223A4E8C8E26B82D26C1C
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfc120fra.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2A74805657EBC1D41A288A18C61CD783
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfc120ita.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\11D968317BDA58F44A517EE687079497
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfc120jpn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F284FEF8CCFFEDE4F9B8C16375F652D9
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfc120kor.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\22FD453CD051C3946BA422364104DD50
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfc120rus.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D73E0AF5467CC934798AAF6082026BA5
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BE7FA62661CD24830B127381013A5C10
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\485D7CCFE75F6DE38BC516CCE4521DD9
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D482454A6C77E73CBF71CFDCCB1C88F
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5\62DBF9290209B993A9A757D1160F9B24
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5\62DBF9290209B993A9A757D1160F9B24
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5\62DBF9290209B993A9A757D1160F9B24
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5\62DBF9290209B993A9A757D1160F9B24
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5\62DBF9290209B993A9A757D1160F9B24
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5\62DBF9290209B993A9A757D1160F9B24
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5\62DBF9290209B993A9A757D1160F9B24
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5\62DBF9290209B993A9A757D1160F9B24
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5\62DBF9290209B993A9A757D1160F9B24
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5\62DBF9290209B993A9A757D1160F9B24
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2A50ACECC2D5F343B4B56106C7CD5B8\62DBF9290209B993A9A757D1160F9B24
File
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_amd64,v12
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_amd64,v12
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_amd64,v12
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
Install
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
InstallerType
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
SP
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
SPIndex
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
SPName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
UpdateVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\C05586832351A613E9FF58906A9EF297
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{929FBD26-9020-399B-9A7A-751D61F0B942}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\62DBF9290209B993A9A757D1160F9B24
VC_Runtime_Additional
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\Features
VC_Runtime_Additional
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\62DBF9290209B993A9A757D1160F9B24
Provider
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\Features
Provider
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\62DBF9290209B993A9A757D1160F9B24
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\Features
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\62DBF9290209B993A9A757D1160F9B24\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\C05586832351A613E9FF58906A9EF297
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24\SourceList\Media
DiskPrompt
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\62DBF9290209B993A9A757D1160F9B24\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\msvcr120.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\msvcp120.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\vccorlib120.dll
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfc120.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfc120u.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfcm120.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfcm120u.dll
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 601 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2286DB0F000
trusted library allocation
page read and write
23D4CABA000
heap
page read and write
23D4CCE1000
trusted library allocation
page read and write
3280000
direct allocation
page read and write
6C4000
heap
page read and write
EB0000
trusted library allocation
page read and write
23D4CA2E000
heap
page read and write
7C1000
unkown
page execute read
EB0000
trusted library allocation
page read and write
49DE7FE000
stack
page read and write
BA3000
heap
page read and write
1489000
heap
page read and write
2CF3000
trusted library allocation
page read and write
16F51575000
heap
page read and write
2286DB11000
trusted library allocation
page read and write
16F53374000
trusted library allocation
page read and write
16F53375000
trusted library allocation
page read and write
1D5457BB000
heap
page read and write
6C4000
heap
page read and write
3BEB000
stack
page read and write
2B1667D000
stack
page read and write
AAA000
unkown
page readonly
5F3000
heap
page read and write
2ED9000
trusted library allocation
page read and write
1D545D77000
heap
page read and write
3A77000
trusted library allocation
page read and write
1D545EF9000
heap
page read and write
16F53370000
trusted library allocation
page read and write
9EE000
heap
page read and write
6C4000
heap
page read and write
2286D55B000
trusted library allocation
page read and write
2286D1F0000
trusted library allocation
page read and write
1D545ED8000
heap
page read and write
6C4000
heap
page read and write
A54000
heap
page read and write
16F51515000
heap
page read and write
3A7E000
trusted library allocation
page read and write
16F52FF0000
heap
page read and write
930000
heap
page read and write
A66000
heap
page read and write
16F5336C000
trusted library allocation
page read and write
16F5336B000
trusted library allocation
page read and write
1D54598E000
heap
page read and write
900000
heap
page read and write
23D4CC51000
trusted library allocation
page read and write
2286E7B0000
heap
page read and write
16F51562000
heap
page read and write
2286D0EC000
heap
page read and write
16F515E4000
trusted library allocation
page read and write
16F5157C000
heap
page read and write
49DFCFB000
stack
page read and write
2AFA000
trusted library allocation
page read and write
7FE000
stack
page read and write
16F5155D000
heap
page read and write
2286E962000
heap
page read and write
33CF000
stack
page read and write
2286DABB000
heap
page read and write
49DF17E000
stack
page read and write
14D3000
heap
page read and write
1D545EC0000
heap
page read and write
2286E554000
heap
page read and write
16F5336E000
trusted library allocation
page read and write
16F51515000
heap
page read and write
2286D54C000
trusted library allocation
page read and write
6C5000
heap
page read and write
A69000
heap
page read and write
2286D54E000
trusted library allocation
page read and write
A54000
heap
page read and write
16F53372000
trusted library allocation
page read and write
2D45000
stack
page read and write
49DE2FE000
unkown
page readonly
1D545784000
heap
page read and write
484000
heap
page read and write
A0B000
heap
page read and write
2286D557000
trusted library allocation
page read and write
2286E51B000
heap
page read and write
427F000
stack
page read and write
820000
heap
page read and write
1D5457E5000
heap
page read and write
2286DA1D000
heap
page read and write
22FC000
direct allocation
page read and write
23D4CDA0000
trusted library allocation
page read and write
20C1000
direct allocation
page read and write
16F516B0000
heap
page read and write
2286E6F0000
heap
page read and write
16F53374000
trusted library allocation
page read and write
2CF5000
trusted library allocation
page read and write
21EAE102000
trusted library allocation
page read and write
16F51578000
heap
page read and write
16F51533000
heap
page read and write
2286DA1D000
heap
page read and write
16F515E4000
trusted library allocation
page read and write
16F51515000
heap
page read and write
663000
heap
page read and write
2286E535000
heap
page read and write
6C4000
heap
page read and write
2286DA1D000
heap
page read and write
16F53371000
trusted library allocation
page read and write
91000
stack
page read and write
16F5157A000
heap
page read and write
149E000
heap
page read and write
16F5336A000
trusted library allocation
page read and write
2ED6000
trusted library allocation
page read and write
2286D390000
heap
page read and write
2286C5F4000
heap
page read and write
2286DB24000
trusted library allocation
page read and write
BB0000
heap
page read and write
16F5155C000
heap
page read and write
2286DB12000
trusted library allocation
page read and write
6C4000
heap
page read and write
2D60000
heap
page read and write
2286DAB0000
heap
page read and write
2286DA72000
heap
page read and write
23D489C0000
trusted library allocation
page read and write
2286DAFA000
trusted library allocation
page read and write
2286DA1E000
heap
page read and write
6C4000
heap
page read and write
21EAE100000
trusted library allocation
page read and write
16F5336D000
trusted library allocation
page read and write
16F53370000
trusted library allocation
page read and write
D8E000
heap
page read and write
2286DA82000
heap
page read and write
16F51578000
heap
page read and write
2286DB1A000
trusted library allocation
page read and write
6C4000
heap
page read and write
1ABED222000
heap
page read and write
16F515E0000
trusted library allocation
page read and write
2286DA86000
heap
page read and write
2286DAF8000
trusted library allocation
page read and write
2CF6000
trusted library allocation
page read and write
2286D54E000
trusted library allocation
page read and write
6C5000
heap
page read and write
6C4000
heap
page read and write
2286E9F8000
heap
page read and write
2286E3F0000
heap
page read and write
6C4000
heap
page read and write
2286D50B000
trusted library allocation
page read and write
6C4000
heap
page read and write
5D0000
heap
page read and write
1FC000
stack
page read and write
2286D525000
trusted library allocation
page read and write
16F53374000
trusted library allocation
page read and write
2286E7B0000
heap
page read and write
D74000
heap
page read and write
16F51533000
heap
page read and write
1D545D7A000
heap
page read and write
2286DAB0000
heap
page read and write
16F51572000
heap
page read and write
95A000
heap
page read and write
2286DB0E000
trusted library allocation
page read and write
2286DAF6000
trusted library allocation
page read and write
21EAF000000
heap
page read and write
16F5336C000
trusted library allocation
page read and write
35AC000
heap
page read and write
6C4000
heap
page read and write
35B3000
heap
page read and write
49DEDFE000
unkown
page readonly
2286DAF2000
trusted library allocation
page read and write
16F51573000
heap
page read and write
2286DB04000
trusted library allocation
page read and write
23D47674000
heap
page read and write
6C4000
heap
page read and write
16F53375000
trusted library allocation
page read and write
16F53371000
trusted library allocation
page read and write
2286E965000
heap
page read and write
2286E588000
heap
page read and write
16F5336B000
trusted library allocation
page read and write
2630000
unkown
page read and write
412000
unkown
page readonly
2286DAB0000
heap
page read and write
2286E613000
heap
page read and write
2286D54A000
trusted library allocation
page read and write
1D54783E000
heap
page read and write
16F51533000
heap
page read and write
98C000
heap
page read and write
16F51574000
heap
page read and write
2DC9279000
stack
page read and write
950000
heap
page read and write
16F5336E000
trusted library allocation
page read and write
2286E700000
heap
page read and write
2286DB15000
trusted library allocation
page read and write
49B000
unkown
page read and write
A9A000
heap
page read and write
2286DA97000
heap
page read and write
16F51572000
heap
page read and write
6C4000
heap
page read and write
2D80000
trusted library section
page read and write
16F53372000
trusted library allocation
page read and write
6A4F9FC000
stack
page read and write
16F51515000
heap
page read and write
16F515E4000
trusted library allocation
page read and write
2286DB4C000
trusted library allocation
page read and write
16F51531000
heap
page read and write
16F51515000
heap
page read and write
2286DA97000
heap
page read and write
2286E540000
heap
page read and write
1D545EE9000
heap
page read and write
6C4000
heap
page read and write
2286E61F000
heap
page read and write
2420000
heap
page read and write
1D545783000
heap
page read and write
BB0000
heap
page read and write
16F53362000
trusted library allocation
page read and write
16F53363000
trusted library allocation
page read and write
6C4000
heap
page read and write
2286DB03000
trusted library allocation
page read and write
2286E4F2000
heap
page read and write
2286E5D0000
heap
page read and write
2CF8000
trusted library allocation
page read and write
1D545EEC000
heap
page read and write
2286DB05000
trusted library allocation
page read and write
16F515E4000
trusted library allocation
page read and write
16F51573000
heap
page read and write
2286DB0D000
trusted library allocation
page read and write
BD3000
heap
page read and write
2286E898000
heap
page read and write
1D547833000
heap
page read and write
2286D550000
trusted library allocation
page read and write
2286D55B000
trusted library allocation
page read and write
437F000
stack
page read and write
2286E630000
heap
page read and write
2286DB20000
trusted library allocation
page read and write
2286DF21000
heap
page read and write
20C4000
direct allocation
page read and write
16F53373000
trusted library allocation
page read and write
16F5336B000
trusted library allocation
page read and write
3A7C000
trusted library allocation
page read and write
23D4CCB4000
trusted library allocation
page read and write
A32000
heap
page read and write
16F53375000
trusted library allocation
page read and write
B82000
heap
page read and write
6C6DC000
unkown
page read and write
6C4000
heap
page read and write
2ECD000
trusted library allocation
page read and write
16F51575000
heap
page read and write
2286D4E0000
heap
page read and write
23D47690000
heap
page read and write
1D545EF2000
heap
page read and write
14DD000
heap
page read and write
6C4000
heap
page read and write
2286DB02000
trusted library allocation
page read and write
16F51515000
heap
page read and write
23D475B0000
trusted library section
page read and write
DEB000
unkown
page readonly
982000
heap
page read and write
16F5336E000
trusted library allocation
page read and write
470000
heap
page read and write
2DC8EF8000
stack
page read and write
6C4000
heap
page read and write
2286DB4A000
trusted library allocation
page read and write
16F53374000
trusted library allocation
page read and write
2286DA84000
heap
page read and write
2C10000
trusted library allocation
page read and write
2286DA91000
heap
page read and write
23D47570000
heap
page read and write
16F51531000
heap
page read and write
B664FCE000
stack
page read and write
2286DAF9000
trusted library allocation
page read and write
2286DB45000
trusted library allocation
page read and write
16F51572000
heap
page read and write
49DE5FC000
stack
page read and write
16F5336E000
trusted library allocation
page read and write
18B000
stack
page read and write
3A78000
trusted library allocation
page read and write
49DDE7B000
stack
page read and write
401000
unkown
page execute read
2AF8000
trusted library allocation
page read and write
6C4000
heap
page read and write
16F5336C000
trusted library allocation
page read and write
16F5336B000
trusted library allocation
page read and write
2286DB3B000
trusted library allocation
page read and write
3510000
heap
page read and write
2ECE000
trusted library allocation
page read and write
2286E536000
heap
page read and write
2286D551000
trusted library allocation
page read and write
6C4000
heap
page read and write
2286E518000
heap
page read and write
1D545ECF000
heap
page read and write
2286DB35000
trusted library allocation
page read and write
A6E000
stack
page read and write
2286DADC000
heap
page read and write
B9A000
heap
page read and write
16F5336C000
trusted library allocation
page read and write
B80000
heap
page read and write
2286DA2B000
heap
page read and write
1ABED302000
heap
page read and write
1D545D72000
heap
page read and write
F60000
heap
page read and write
2286DA8E000
heap
page read and write
23D4C9C0000
trusted library allocation
page read and write
2286E62B000
heap
page read and write
16F53373000
trusted library allocation
page read and write
6C4000
heap
page read and write
16F51533000
heap
page read and write
1D5457C0000
heap
page read and write
2286DB49000
trusted library allocation
page read and write
2EDA000
trusted library allocation
page read and write
3620000
trusted library allocation
page read and write
6C4000
heap
page read and write
16F5155F000
heap
page read and write
2286DB42000
trusted library allocation
page read and write
16F53370000
trusted library allocation
page read and write
DB1000
unkown
page execute read
BEF000
heap
page read and write
49DDF7E000
stack
page read and write
1D5457D8000
heap
page read and write
1ABED240000
heap
page read and write
6C4000
heap
page read and write
16F53373000
trusted library allocation
page read and write
3938000
heap
page read and write
98C000
heap
page read and write
14DD000
heap
page read and write
6C4000
heap
page read and write
16F51573000
heap
page read and write
16F53374000
trusted library allocation
page read and write
623000
heap
page read and write
6C4000
heap
page read and write
2286EAF0000
heap
page read and write
2286DB2D000
trusted library allocation
page read and write
23D4CC50000
trusted library allocation
page read and write
16F51575000
heap
page read and write
16F51572000
heap
page read and write
6C0000
heap
page read and write
2286DB12000
trusted library allocation
page read and write
2ED2000
trusted library allocation
page read and write
49A000
heap
page read and write
16F51578000
heap
page read and write
4A0000
heap
page read and write
23D4CA21000
heap
page read and write
1D5457E4000
heap
page read and write
6C4000
heap
page read and write
2EF0000
heap
page read and write
9A2000
heap
page read and write
16F5336E000
trusted library allocation
page read and write
23D4CC58000
trusted library allocation
page read and write
FE0000
heap
page read and write
2286D549000
trusted library allocation
page read and write
16F5336E000
trusted library allocation
page read and write
2286DAEB000
heap
page read and write
2286DB10000
trusted library allocation
page read and write
2286DAA1000
heap
page read and write
2ED4000
trusted library allocation
page read and write
2286E6F1000
heap
page read and write
2286D9F5000
heap
page read and write
16F51578000
heap
page read and write
1280000
heap
page read and write
2286DA28000
heap
page read and write
16F515E4000
trusted library allocation
page read and write
2ECA000
trusted library allocation
page read and write
9A2000
heap
page read and write
2286E6C3000
heap
page read and write
1D5457EB000
heap
page read and write
147F000
heap
page read and write
16F53374000
trusted library allocation
page read and write
16F53376000
trusted library allocation
page read and write
2286DA9D000
heap
page read and write
16F5155D000
heap
page read and write
16F5336D000
trusted library allocation
page read and write
2286DAB0000
heap
page read and write
610000
heap
page read and write
61D000
heap
page read and write
4770000
heap
page read and write
2286DAFB000
trusted library allocation
page read and write
16F5155B000
heap
page read and write
2286DA8A000
heap
page read and write
16F515E0000
trusted library allocation
page read and write
65E000
heap
page read and write
6C4000
heap
page read and write
16F53371000
trusted library allocation
page read and write
DEB000
unkown
page readonly
23D4CA82000
heap
page read and write
36D3000
heap
page read and write
2286E9B2000
heap
page read and write
2286EA07000
heap
page read and write
6C4000
heap
page read and write
7BE000
stack
page read and write
2286D536000
trusted library allocation
page read and write
23D4CC5E000
trusted library allocation
page read and write
16F5336A000
trusted library allocation
page read and write
ACE000
stack
page read and write
2286E721000
heap
page read and write
340E000
stack
page read and write
6A4F3FD000
stack
page read and write
16F51515000
heap
page read and write
2286E644000
heap
page read and write
B50000
heap
page read and write
16F5336A000
trusted library allocation
page read and write
35A0000
heap
page read and write
2286D547000
trusted library allocation
page read and write
6C5000
heap
page read and write
16F51571000
heap
page read and write
16F51515000
heap
page read and write
2286D0FB000
heap
page read and write
6C4000
heap
page read and write
2286C645000
heap
page read and write
A6D000
heap
page read and write
26E0000
heap
page read and write
16F51620000
heap
page read and write
2B02000
trusted library allocation
page read and write
2286D55D000
trusted library allocation
page read and write
2286E588000
heap
page read and write
6C4000
heap
page read and write
2286DB39000
trusted library allocation
page read and write
2286E700000
heap
page read and write
1430000
heap
page read and write
35AF000
stack
page read and write
1D5457C9000
heap
page read and write
14AE000
heap
page read and write
2286E579000
heap
page read and write
6383F7E000
stack
page read and write
16F53376000
trusted library allocation
page read and write
61E000
heap
page read and write
2286DA8F000
heap
page read and write
16F515E4000
trusted library allocation
page read and write
A71000
unkown
page execute read
6C4000
heap
page read and write
2286E81A000
heap
page read and write
A70000
unkown
page readonly
2286DB17000
trusted library allocation
page read and write
B60000
heap
page read and write
2286D554000
trusted library allocation
page read and write
23D47E15000
heap
page read and write
7C0000
unkown
page readonly
2286DAFC000
trusted library allocation
page read and write
16F51531000
heap
page read and write
16F51575000
heap
page read and write
23D476A2000
heap
page read and write
B90000
heap
page read and write
2EC4000
trusted library allocation
page read and write
6C4000
heap
page read and write
2EDC000
trusted library allocation
page read and write
6C4000
heap
page read and write
1D5457C4000
heap
page read and write
BA6000
heap
page read and write
A20000
heap
page read and write
7C0000
unkown
page readonly
16F5155D000
heap
page read and write
2286DADD000
heap
page read and write
16F5336E000
trusted library allocation
page read and write
16F5336C000
trusted library allocation
page read and write
20B0000
direct allocation
page read and write
6C4000
heap
page read and write
23D4CDA0000
trusted library allocation
page read and write
2CC0000
heap
page read and write
16F51578000
heap
page read and write
16F5336A000
trusted library allocation
page read and write
6C5000
heap
page read and write
2286E847000
heap
page read and write
21EAE042000
heap
page read and write
16F515E4000
trusted library allocation
page read and write
6C4000
heap
page read and write
B6653FE000
stack
page read and write
21EADE70000
heap
page read and write
16F5336E000
trusted library allocation
page read and write
47C000
stack
page read and write
6C4000
heap
page read and write
5E0000
heap
page read and write
49DF2FE000
stack
page read and write
2286C645000
heap
page read and write
16F51572000
heap
page read and write
2286DA2A000
heap
page read and write
2490000
heap
page read and write
2286DA1A000
heap
page read and write
6C4000
heap
page read and write
2286DB1C000
trusted library allocation
page read and write
2286DA83000
heap
page read and write
2286E827000
heap
page read and write
BE0000
heap
page read and write
623000
heap
page read and write
16F515E4000
trusted library allocation
page read and write
2286DAB6000
heap
page read and write
16F5336A000
trusted library allocation
page read and write
16F5336E000
trusted library allocation
page read and write
5E6000
heap
page read and write
2286D55F000
trusted library allocation
page read and write
3D2C000
stack
page read and write
1ABED130000
heap
page read and write
2AE0000
heap
page read and write
5BA000
heap
page read and write
6C4000
heap
page read and write
23D4CD12000
trusted library allocation
page read and write
16F53373000
trusted library allocation
page read and write
B9A000
heap
page read and write
6C4000
heap
page read and write
2286C577000
heap
page read and write
2EC1000
trusted library allocation
page read and write
2286DA90000
heap
page read and write
1D5457E8000
heap
page read and write
16F51515000
heap
page read and write
2286DAB0000
heap
page read and write
16F51533000
heap
page read and write
2286D540000
trusted library allocation
page read and write
16F53372000
trusted library allocation
page read and write
3F80000
heap
page read and write
6C4000
heap
page read and write
16F53364000
trusted library allocation
page read and write
49DDFFE000
unkown
page readonly
2286DB05000
trusted library allocation
page read and write
9EA000
heap
page read and write
2C15000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page read and write
16F5336A000
trusted library allocation
page read and write
16F5155C000
heap
page read and write
1D547844000
heap
page read and write
401000
unkown
page execute read
20B4000
direct allocation
page read and write
16F5336A000
trusted library allocation
page read and write
372E000
stack
page read and write
16F5336F000
trusted library allocation
page read and write
16F51515000
heap
page read and write
6C4000
heap
page read and write
6C4000
heap
page read and write
16F5155D000
heap
page read and write
820000
heap
page read and write
488000
heap
page read and write
16F53370000
trusted library allocation
page read and write
2286DB16000
trusted library allocation
page read and write
6A4F07B000
stack
page read and write
1D5457E4000
heap
page read and write
16F51515000
heap
page read and write
2286E509000
heap
page read and write
40E000
unkown
page write copy
2286DB09000
trusted library allocation
page read and write
16F51573000
heap
page read and write
6A4F6FE000
unkown
page readonly
2286DAB0000
heap
page read and write
16F5336B000
trusted library allocation
page read and write
16F51575000
heap
page read and write
1D545D77000
heap
page read and write
16F5155C000
heap
page read and write
3936000
heap
page read and write
2286D543000
trusted library allocation
page read and write
6C4000
heap
page read and write
2286D525000
trusted library allocation
page read and write
1D545794000
heap
page read and write
16F53373000
trusted library allocation
page read and write
5BF000
heap
page read and write
6C4000
heap
page read and write
23E0000
heap
page read and write
B7E000
heap
page read and write
16F53376000
trusted library allocation
page read and write
6C5000
heap
page read and write
A24000
heap
page read and write
22B8000
direct allocation
page read and write
F20000
trusted library allocation
page read and write
2286E6ED000
heap
page read and write
16F5336C000
trusted library allocation
page read and write
2286DADC000
heap
page read and write
2286DA86000
heap
page read and write
14D3000
heap
page read and write
21EAF713000
heap
page read and write
35AB000
heap
page read and write
2CF2000
trusted library allocation
page read and write
16F5336C000
trusted library allocation
page read and write
6C4000
heap
page read and write
16F53376000
trusted library allocation
page read and write
16F53370000
trusted library allocation
page read and write
ACA000
unkown
page readonly
2286D54D000
trusted library allocation
page read and write
20C8000
direct allocation
page read and write
16F51531000
heap
page read and write
16F51578000
heap
page read and write
2286D128000
heap
page read and write
6C4000
heap
page read and write
2AFC000
trusted library allocation
page read and write
6C4000
heap
page read and write
2286D504000
trusted library allocation
page read and write
1D54783E000
heap
page read and write
16F53375000
trusted library allocation
page read and write
2286DB18000
trusted library allocation
page read and write
5F3000
heap
page read and write
16F53370000
trusted library allocation
page read and write
2286E54C000
heap
page read and write
970000
heap
page read and write
6C4000
heap
page read and write
B60000
heap
page read and write
2286D55A000
trusted library allocation
page read and write
2286DB31000
trusted library allocation
page read and write
A6F000
heap
page read and write
16F51578000
heap
page read and write
2286DB0D000
trusted library allocation
page read and write
16F53375000
trusted library allocation
page read and write
A90000
heap
page read and write
2C1C000
trusted library allocation
page read and write
2286E537000
heap
page read and write
2286DB28000
trusted library allocation
page read and write
23D4C9D0000
trusted library allocation
page read and write
2286DA14000
heap
page read and write
16F5155C000
heap
page read and write
16F53376000
trusted library allocation
page read and write
6C4000
heap
page read and write
2286E630000
heap
page read and write
16F51573000
heap
page read and write
814000
unkown
page write copy
C40000
heap
page read and write
6C4000
heap
page read and write
1D545EEA000
heap
page read and write
2286E5B8000
heap
page read and write
16F51575000
heap
page read and write
37FE000
stack
page read and write
16F51575000
heap
page read and write
14DD000
heap
page read and write
16F5155F000
heap
page read and write
2286DB21000
trusted library allocation
page read and write
623000
heap
page read and write
23D47F1A000
heap
page read and write
2286D4F0000
trusted library allocation
page read and write
2286E4FC000
heap
page read and write
A54000
heap
page read and write
2286DAE6000
heap
page read and write
2286E579000
heap
page read and write
2286C5EE000
heap
page read and write
FF0000
heap
page read and write
2660000
heap
page read and write
6C4000
heap
page read and write
16F53372000
trusted library allocation
page read and write
2286DAFA000
trusted library allocation
page read and write
8FC000
stack
page read and write
6C4000
heap
page read and write
D7B000
heap
page read and write
16F51533000
heap
page read and write
2286E646000
heap
page read and write
16F5336D000
trusted library allocation
page read and write
2286E530000
heap
page read and write
14D8000
heap
page read and write
23D47F00000
heap
page read and write
16F53373000
trusted library allocation
page read and write
2286E756000
heap
page read and write
16F5336C000
trusted library allocation
page read and write
1D545990000
trusted library allocation
page read and write
2286DB37000
trusted library allocation
page read and write
16F5336F000
trusted library allocation
page read and write
16F5336B000
trusted library allocation
page read and write
A71000
unkown
page execute read
16F51531000
heap
page read and write
16F5157C000
heap
page read and write
6C4000
heap
page read and write
16F51531000
heap
page read and write
2286E6C3000
heap
page read and write
49E01FE000
unkown
page readonly
2B05000
trusted library allocation
page read and write
23D4CC80000
trusted library allocation
page read and write
1A4A88F0000
heap
page read and write
5D7000
heap
page read and write
6C4000
heap
page read and write
623000
heap
page read and write
16F5336B000
trusted library allocation
page read and write
23D4CCF3000
trusted library allocation
page read and write
2286DA6D000
heap
page read and write
2286E81A000
heap
page read and write
2286DA1D000
heap
page read and write
16F51578000
heap
page read and write
2286DA0A000
heap
page read and write
16F53374000
trusted library allocation
page read and write
623000
heap
page read and write
2286D54A000
trusted library allocation
page read and write
16F53371000
trusted library allocation
page read and write
2286D50A000
trusted library allocation
page read and write
6C5000
heap
page read and write
2286E588000
heap
page read and write
2286DAE7000
heap
page read and write
2286E678000
heap
page read and write
2286C750000
heap
page read and write
2A9E94A0000
heap
page read and write
A71000
unkown
page execute read
2286DB34000
trusted library allocation
page read and write
960000
heap
page read and write
16F5336B000
trusted library allocation
page read and write
23D4CD41000
trusted library allocation
page read and write
2286DA1D000
heap
page read and write
23D47F02000
heap
page read and write
3610000
heap
page read and write
6C4000
heap
page read and write
3A81000
trusted library allocation
page read and write
97B000
heap
page read and write
6C4000
heap
page read and write
3A30000
heap
page read and write
6C4000
heap
page read and write
2286E501000
heap
page read and write
2286DB3A000
trusted library allocation
page read and write
16F51572000
heap
page read and write
820000
heap
page read and write
21EAE066000
heap
page read and write
19D000
stack
page read and write
6C4000
heap
page read and write
34EF000
stack
page read and write
16F53375000
trusted library allocation
page read and write
2286E962000
heap
page read and write
2286E6E9000
heap
page read and write
2286E796000
heap
page read and write
1D54783D000
heap
page read and write
6C5000
heap
page read and write
16F53373000
trusted library allocation
page read and write
2286DA23000
heap
page read and write
2286D50B000
trusted library allocation
page read and write
2286D522000
trusted library allocation
page read and write
16F515E0000
trusted library allocation
page read and write
16F51533000
heap
page read and write
16F5336E000
trusted library allocation
page read and write
412000
unkown
page readonly
23D4CD20000
trusted library allocation
page read and write
920000
heap
page read and write
16F53370000
trusted library allocation
page read and write
6C4000
heap
page read and write
ACA000
unkown
page readonly
5FB8DFE000
stack
page read and write
16F5336D000
trusted library allocation
page read and write
16F51533000
heap
page read and write
2286DB10000
trusted library allocation
page read and write
EF0000
unkown
page read and write
312B000
stack
page read and write
31AE000
stack
page read and write
16F515E4000
trusted library allocation
page read and write
2286DB1C000
trusted library allocation
page read and write
2286E81E000
heap
page read and write
2286DA9C000
heap
page read and write
2286E796000
heap
page read and write
6C4000
heap
page read and write
2D90000
trusted library section
page read and write
16F51573000
heap
page read and write
2370000
direct allocation
page read and write
1D5457B3000
heap
page read and write
14DE000
heap
page read and write
2286E51B000
heap
page read and write
6A4F4FE000
unkown
page readonly
6C4000
heap
page read and write
6C4000
heap
page read and write
16F53369000
trusted library allocation
page read and write
1D545860000
heap
page read and write
6383EFE000
stack
page read and write
6C4000
heap
page read and write
6C4000
heap
page read and write
16F53366000
trusted library allocation
page read and write
973000
heap
page read and write
E0C000
unkown
page readonly
23D48620000
trusted library section
page readonly
14DD000
heap
page read and write
1D545792000
heap
page read and write
22E4000
direct allocation
page read and write
6C4000
heap
page read and write
6C4000
heap
page read and write
2286DEF0000
heap
page read and write
6C6C1000
unkown
page execute read
2C1A000
trusted library allocation
page read and write
16F53370000
trusted library allocation
page read and write
2286DA11000
heap
page read and write
2286DA1D000
heap
page read and write
2286C65B000
heap
page read and write
2286D53F000
trusted library allocation
page read and write
BD8000
heap
page read and write
103C000
stack
page read and write
6C4000
heap
page read and write
2445000
heap
page read and write
2286D53A000
trusted library allocation
page read and write
DB0000
unkown
page readonly
16F53375000
trusted library allocation
page read and write
16F53374000
trusted library allocation
page read and write
6A4F5FE000
stack
page read and write
16F51578000
heap
page read and write
2286D55C000
trusted library allocation
page read and write
16F5157C000
heap
page read and write
2EB0000
heap
page read and write
16F53371000
trusted library allocation
page read and write
BE9000
heap
page read and write
2DC8F78000
stack
page read and write
2286DB06000
trusted library allocation
page read and write
20C1000
direct allocation
page read and write
AA8000
heap
page read and write
3860000
heap
page read and write
6C4000
heap
page read and write
2286E85D000
heap
page read and write
8AE000
stack
page read and write
2286DAF1000
trusted library allocation
page read and write
16F53371000
trusted library allocation
page read and write
6C4000
heap
page read and write
2286E8A0000
heap
page read and write
1D547844000
heap
page read and write
6C4000
heap
page read and write
6C4000
heap
page read and write
14DA000
heap
page read and write
6C4000
heap
page read and write
9E0000
heap
page read and write
2286DA8C000
heap
page read and write
2BEE000
stack
page read and write
3591000
heap
page read and write
1006000
heap
page read and write
2DA0000
heap
page read and write
6C5000
heap
page read and write
7C0000
unkown
page readonly
23D4CC70000
trusted library allocation
page read and write
BA0000
heap
page read and write
2B1677E000
stack
page read and write
400000
unkown
page readonly
2286EA5A000
heap
page read and write
61A000
heap
page read and write
2A00000
trusted library allocation
page read and write
21EAF7B5000
heap
page read and write
2286D50A000
trusted library allocation
page read and write
6C4000
heap
page read and write
2286E69F000
heap
page read and write
2286D523000
trusted library allocation
page read and write
1D545EE9000
heap
page read and write
602000
heap
page read and write
2520000
heap
page read and write
2286D300000
heap
page read and write
16F515E0000
trusted library allocation
page read and write
2286DB0E000
trusted library allocation
page read and write
6C4000
heap
page read and write
BCB000
heap
page read and write
16F51515000
heap
page read and write
6C4000
heap
page read and write
23D4CAFD000
heap
page read and write
16F515E4000
trusted library allocation
page read and write
6C4000
heap
page read and write
1D545785000
heap
page read and write
2286DAF7000
trusted library allocation
page read and write
16F5336C000
trusted library allocation
page read and write
16F5336C000
trusted library allocation
page read and write
2286DAB2000
heap
page read and write
16F51531000
heap
page read and write
1D5457E4000
heap
page read and write
16F515E4000
trusted library allocation
page read and write
6C4000
heap
page read and write
6C4000
heap
page read and write
2286E6F5000
heap
page read and write
5E2000
heap
page read and write
1D54598B000
heap
page read and write
16F5336E000
trusted library allocation
page read and write
16F53372000
trusted library allocation
page read and write
1D545D73000
heap
page read and write
2286D542000
trusted library allocation
page read and write
16F5336D000
trusted library allocation
page read and write
16F51531000
heap
page read and write
23D4CC80000
trusted library allocation
page read and write
5840000
trusted library allocation
page read and write
2286DAB0000
heap
page read and write
16F51571000
heap
page read and write
16F51533000
heap
page read and write
2286DA8A000
heap
page read and write
2AC0000
heap
page read and write
6C0000
heap
page read and write
6C4000
heap
page read and write
1D5457E8000
heap
page read and write
2A00000
trusted library allocation
page read and write
6C5000
heap
page read and write
16F5336D000
trusted library allocation
page read and write
2286D545000
trusted library allocation
page read and write
5B9000
heap
page read and write
16F515E4000
trusted library allocation
page read and write
BB1000
heap
page read and write
6C4000
heap
page read and write
16F53370000
trusted library allocation
page read and write
49DEF7E000
stack
page read and write
6C4000
heap
page read and write
2286D53E000
trusted library allocation
page read and write
2DC8FF9000
stack
page read and write
1D54578E000
heap
page read and write
A90000
heap
page read and write
6C5000
heap
page read and write
2C17000
trusted library allocation
page read and write
2AC0000
heap
page read and write
2286E693000
heap
page read and write
2286D127000
heap
page read and write
2286E534000
heap
page read and write
2286DA82000
heap
page read and write
16F5155D000
heap
page read and write
2286DB0B000
trusted library allocation
page read and write
16F51578000
heap
page read and write
2286DA2A000
heap
page read and write
1D5457AA000
heap
page read and write
2286E54B000
heap
page read and write
2CF0000
trusted library allocation
page read and write
16F53375000
trusted library allocation
page read and write
16F53370000
trusted library allocation
page read and write
3130000
heap
page read and write
16F53373000
trusted library allocation
page read and write
16F515E4000
trusted library allocation
page read and write
6C4000
heap
page read and write
16F53375000
trusted library allocation
page read and write
2286DA2A000
heap
page read and write
2470000
direct allocation
page read and write
A49000
heap
page read and write
2286D53D000
trusted library allocation
page read and write
1D545ED3000
heap
page read and write
2286DADC000
heap
page read and write
2286D523000
trusted library allocation
page read and write
2286D555000
trusted library allocation
page read and write
1D5457AD000
heap
page read and write
6C4000
heap
page read and write
16F5155E000
heap
page read and write
23D4CD80000
trusted library allocation
page read and write
A70000
heap
page read and write
16F51578000
heap
page read and write
23D4CA5A000
heap
page read and write
47D000
heap
page read and write
16F5157C000
heap
page read and write
4A2000
heap
page read and write
2C13000
trusted library allocation
page read and write
1D545D7E000
heap
page read and write
1D5457B3000
heap
page read and write
16F53370000
trusted library allocation
page read and write
BA0000
heap
page read and write
6C4000
heap
page read and write
DB1000
unkown
page execute read
B66527F000
stack
page read and write
2286C65A000
heap
page read and write
5D08C7D000
stack
page read and write
2286DB38000
trusted library allocation
page read and write
1A4A8C50000
heap
page read and write
6383FFE000
stack
page read and write
6C4000
heap
page read and write
6C4000
heap
page read and write
560000
heap
page read and write
383A000
heap
page read and write
16F5336E000
trusted library allocation
page read and write
16F51531000
heap
page read and write
16F5336C000
trusted library allocation
page read and write
22F4000
direct allocation
page read and write
16F53374000
trusted library allocation
page read and write
2286D508000
trusted library allocation
page read and write
16F51531000
heap
page read and write
23D48091000
trusted library allocation
page read and write
B9A000
heap
page read and write
16F5336A000
trusted library allocation
page read and write
6C4000
heap
page read and write
2286E4F1000
heap
page read and write
2A00000
trusted library allocation
page read and write
2286DA8A000
heap
page read and write
6C4000
heap
page read and write
6C4000
heap
page read and write
16F53374000
trusted library allocation
page read and write
23B0000
direct allocation
page execute and read and write
35EF000
stack
page read and write
BCF000
heap
page read and write
16F5336A000
trusted library allocation
page read and write
2286DB3E000
trusted library allocation
page read and write
6C5000
heap
page read and write
1D547836000
heap
page read and write
FD0000
heap
page read and write
6C4000
heap
page read and write
6C4000
heap
page read and write
1D545980000
heap
page read and write
16F5336B000
trusted library allocation
page read and write
7FA000
unkown
page readonly
6C5000
heap
page read and write
2286DA2A000
heap
page read and write
21EAE213000
heap
page read and write
16F5336D000
trusted library allocation
page read and write
16F51578000
heap
page read and write
2308000
direct allocation
page read and write
6C5000
heap
page read and write
12EE000
stack
page read and write
16F515E0000
trusted library allocation
page read and write
49A000
heap
page read and write
16F51533000
heap
page read and write
6C4000
heap
page read and write
2286D506000
trusted library allocation
page read and write
2286DA1D000
heap
page read and write
7C0000
unkown
page readonly
BAF000
heap
page read and write
2286DAF2000
trusted library allocation
page read and write
6C4000
heap
page read and write
11A0000
heap
page read and write
6C4000
heap
page read and write
16F5336A000
trusted library allocation
page read and write
2286E54F000
heap
page read and write
16F53375000
trusted library allocation
page read and write
16F5155C000
heap
page read and write
BD3587F000
stack
page read and write
2286DB1B000
trusted library allocation
page read and write
2286E646000
heap
page read and write
A58000
heap
page read and write
16F5336F000
trusted library allocation
page read and write
2286DB47000
trusted library allocation
page read and write
2286E550000
heap
page read and write
AC8000
heap
page read and write
16F53100000
heap
page read and write
1D545767000
heap
page read and write
6C4000
heap
page read and write
2286E5D1000
heap
page read and write
16F51578000
heap
page read and write
16F51571000
heap
page read and write
2286E69F000
heap
page read and write
2286DB1B000
trusted library allocation
page read and write
2286E604000
heap
page read and write
16F53373000
trusted library allocation
page read and write
16F51515000
heap
page read and write
1D545ED8000
heap
page read and write
2286E530000
heap
page read and write
16F515E4000
trusted library allocation
page read and write
623000
heap
page read and write
A18000
heap
page read and write
49DEFFE000
unkown
page readonly
16F5336A000
trusted library allocation
page read and write
DB0000
unkown
page readonly
16F53370000
trusted library allocation
page read and write
6C5000
heap
page read and write
2B03000
trusted library allocation
page read and write
820000
heap
page read and write
16F5336D000
trusted library allocation
page read and write
16F53374000
trusted library allocation
page read and write
23D4CB0A000
heap
page read and write
2286E6EE000
heap
page read and write
6C4000
heap
page read and write
1D547831000
heap
page read and write
1ABED200000
heap
page read and write
3AAC000
stack
page read and write
2286D535000
trusted library allocation
page read and write
49DED7E000
stack
page read and write
6C4000
heap
page read and write
16F5336A000
trusted library allocation
page read and write
6C4000
heap
page read and write
2286DA75000
heap
page read and write
BA0000
heap
page read and write
2286DA8A000
heap
page read and write
9B000
stack
page read and write
3430000
heap
page read and write
22D0000
direct allocation
page read and write
2286DB19000
trusted library allocation
page read and write
6C4000
heap
page read and write
BD3577E000
stack
page read and write
2286DA95000
heap
page read and write
6C4000
heap
page read and write
14CF000
heap
page read and write
1D5457B1000
heap
page read and write
16F53371000
trusted library allocation
page read and write
A4D000
heap
page read and write
BD3000
heap
page read and write
2286E962000
heap
page read and write
61B000
heap
page read and write
2ECC000
trusted library allocation
page read and write
2286D54F000
trusted library allocation
page read and write
2286D552000
trusted library allocation
page read and write
16BBDA50000
heap
page read and write
2EC9000
trusted library allocation
page read and write
2286D53C000
trusted library allocation
page read and write
2304000
direct allocation
page read and write
16F5336C000
trusted library allocation
page read and write
16F53373000
trusted library allocation
page read and write
16F53373000
trusted library allocation
page read and write
23D4CC9D000
trusted library allocation
page read and write
6C4000
heap
page read and write
2286E89D000
heap
page read and write
6C5000
heap
page read and write
6C4000
heap
page read and write
7E00000
heap
page read and write
6C4000
heap
page read and write
16F53377000
trusted library allocation
page read and write
2286DADC000
heap
page read and write
16F5336C000
trusted library allocation
page read and write
2286E531000
heap
page read and write
16F51578000
heap
page read and write
16F5337A000
trusted library allocation
page read and write
16F51531000
heap
page read and write
16F53371000
trusted library allocation
page read and write
16F53371000
trusted library allocation
page read and write
2286D220000
heap
page read and write
2ED5000
trusted library allocation
page read and write
16F5336F000
trusted library allocation
page read and write
61D000
heap
page read and write
2AF5000
trusted library allocation
page read and write
14D3000
heap
page read and write
2286D505000
trusted library allocation
page read and write
23D4762B000
heap
page read and write
16F53376000
trusted library allocation
page read and write
16F53371000
trusted library allocation
page read and write
2286C629000
heap
page read and write
6A4FBFE000
stack
page read and write
16F51572000
heap
page read and write
2AFF000
trusted library allocation
page read and write
16F53374000
trusted library allocation
page read and write
16F5336D000
trusted library allocation
page read and write
1460000
heap
page read and write
16F51531000
heap
page read and write
2286D538000
trusted library allocation
page read and write
292F000
stack
page read and write
2286DA8F000
heap
page read and write
6C4000
heap
page read and write
3A7F000
trusted library allocation
page read and write
16F53370000
trusted library allocation
page read and write
16F5336C000
trusted library allocation
page read and write
5D08E7F000
stack
page read and write
16F53370000
trusted library allocation
page read and write
2286E8A0000
heap
page read and write
A22000
heap
page read and write
2286E588000
heap
page read and write
B68000
heap
page read and write
ACA000
unkown
page readonly
2286DA87000
heap
page read and write
6C4000
heap
page read and write
14D7000
heap
page read and write
2286C8C5000
heap
page read and write
16F51531000
heap
page read and write
49A000
heap
page read and write
2286DA6D000
heap
page read and write
604000
heap
page read and write
3280000
direct allocation
page read and write
2286E54D000
heap
page read and write
2286DA7D000
heap
page read and write
2A40000
heap
page read and write
16F5336A000
trusted library allocation
page read and write
2286E534000
heap
page read and write
3590000
heap
page read and write
2286E4F0000
heap
page read and write
2286DADC000
heap
page read and write
20C8000
direct allocation
page read and write
16F5336F000
trusted library allocation
page read and write
623000
heap
page read and write
21EAE013000
unkown
page read and write
994000
heap
page read and write
2DC947F000
stack
page read and write
2286DB13000
trusted library allocation
page read and write
6C4000
heap
page read and write
6C4000
heap
page read and write
A22000
heap
page read and write
2286E657000
heap
page read and write
16F53371000
trusted library allocation
page read and write
2286D549000
trusted library allocation
page read and write
49DF0FE000
unkown
page readonly
B8F000
heap
page read and write
6C4000
heap
page read and write
21EAF7A6000
heap
page read and write
6C4000
heap
page read and write
1D547834000
heap
page read and write
6C4000
heap
page read and write
23D4CA42000
heap
page read and write
2286E568000
heap
page read and write
16F53371000
trusted library allocation
page read and write
2286D503000
trusted library allocation
page read and write
2286DAF7000
trusted library allocation
page read and write
23D4CD44000
trusted library allocation
page read and write
1D5457F1000
heap
page read and write
16F5336C000
trusted library allocation
page read and write
16F515E4000
trusted library allocation
page read and write
21EAF7BE000
heap
page read and write
21EAE06D000
heap
page read and write
16F5337F000
trusted library allocation
page read and write
16F5336D000
trusted library allocation
page read and write
2286DA0A000
heap
page read and write
2286DAE5000
heap
page read and write
2286DFF0000
trusted library allocation
page read and write
16F53375000
trusted library allocation
page read and write
BCF000
heap
page read and write
5A8000
heap
page read and write
1D545940000
heap
page read and write
14D7000
heap
page read and write
2ED7000
trusted library allocation
page read and write
22A0000
direct allocation
page read and write
2286C63B000
heap
page read and write
16F515E0000
trusted library allocation
page read and write
16F53371000
trusted library allocation
page read and write
2DC91FB000
stack
page read and write
2286E679000
heap
page read and write
2286D244000
trusted library allocation
page read and write
460000
heap
page read and write
2286D556000
trusted library allocation
page read and write
BCF000
heap
page read and write
AC8000
heap
page read and write
6C4000
heap
page read and write
2286DB3D000
trusted library allocation
page read and write
16F515E0000
trusted library allocation
page read and write
23D4CB03000
heap
page read and write
23D48630000
trusted library section
page readonly
16F53373000
trusted library allocation
page read and write
23D4CD20000
trusted library allocation
page read and write
2286DA9F000
heap
page read and write
16F53378000
trusted library allocation
page read and write
97D000
stack
page read and write
1D5457A1000
heap
page read and write
16F515E4000
trusted library allocation
page read and write
6C4000
heap
page read and write
AA4000
heap
page read and write
2AF1000
trusted library allocation
page read and write
16F53374000
trusted library allocation
page read and write
16F5157A000
heap
page read and write
2EA0000
heap
page read and write
16F5155C000
heap
page read and write
12A0000
heap
page read and write
16F5336F000
trusted library allocation
page read and write
5F9000
heap
page read and write
16F515E0000
trusted library allocation
page read and write
16F515E0000
trusted library allocation
page read and write
6C4000
heap
page read and write
16F5336A000
trusted library allocation
page read and write
814000
unkown
page read and write
23D4CC68000
trusted library allocation
page read and write
16F5336A000
trusted library allocation
page read and write
2286D9F5000
heap
page read and write
2510000
heap
page read and write
16F5336E000
trusted library allocation
page read and write
16F51531000
heap
page read and write
6C4000
heap
page read and write
16F515E0000
trusted library allocation
page read and write
A8E000
stack
page read and write
16F51515000
heap
page read and write
2286DADC000
heap
page read and write
2286D2A6000
trusted library allocation
page read and write
2286E5DA000
heap
page read and write
5DA000
heap
page read and write
A70000
unkown
page readonly
81A000
unkown
page readonly
49DEEFE000
unkown
page readonly
2286DAB5000
heap
page read and write
16F51572000
heap
page read and write
49F000
unkown
page write copy
6C5000
heap
page read and write
2286D0D0000
heap
page read and write
6C4000
heap
page read and write
16F53020000
heap
page read and write
16F53375000
trusted library allocation
page read and write
2286D54D000
trusted library allocation
page read and write
2430000
unkown
page read and write
2286D558000
trusted library allocation
page read and write
21EAE065000
heap
page read and write
A67000
heap
page read and write
2286DA27000
heap
page read and write
16F53379000
trusted library allocation
page read and write
D8C000
heap
page read and write
A54000
heap
page read and write
2286DB07000
trusted library allocation
page read and write
6C4000
heap
page read and write
2286C647000
heap
page read and write
16F51573000
heap
page read and write
2286E571000
heap
page read and write
2286D537000
trusted library allocation
page read and write
2286D9F1000
heap
page read and write
A5E000
heap
page read and write
1A4A8920000
heap
page read and write
4A2000
heap
page read and write
B8E000
heap
page read and write
5FB967C000
stack
page read and write
6C4000
heap
page read and write
21EAE060000
heap
page read and write
2286DB2B000
trusted library allocation
page read and write
49A0000
trusted library allocation
page read and write
8EE000
stack
page read and write
2286DB03000
trusted library allocation
page read and write
1D5457AE000
heap
page read and write
6C5000
heap
page read and write
6C4000
heap
page read and write
16F51571000
heap
page read and write
2286DAE3000
heap
page read and write
1E0000
heap
page read and write
16F5336E000
trusted library allocation
page read and write
6C4000
heap
page read and write
2286E5A8000
heap
page read and write
16F53376000
trusted library allocation
page read and write
23D4CAC0000
heap
page read and write
16F53370000
trusted library allocation
page read and write
2286E589000
heap
page read and write
6C4000
heap
page read and write
2286E57C000
heap
page read and write
2286E921000
heap
page read and write
2286D524000
trusted library allocation
page read and write
20C8000
direct allocation
page read and write
4AD000
unkown
page readonly
5FC000
stack
page read and write
22A8000
direct allocation
page read and write
32CE000
stack
page read and write
623000
heap
page read and write
AB8000
heap
page read and write
A5A000
heap
page read and write
2430000
direct allocation
page read and write
21EAE02B000
heap
page read and write
A57000
heap
page read and write
F53000
heap
page read and write
49DE1F7000
stack
page read and write
16F53376000
trusted library allocation
page read and write
25E0000
trusted library allocation
page read and write
2286DB36000
trusted library allocation
page read and write
23D47613000
heap
page read and write
2286DA86000
heap
page read and write
1D54578E000
heap
page read and write
16F51531000
heap
page read and write
16F53374000
trusted library allocation
page read and write
F40000
unkown
page read and write
495000
heap
page read and write
49DE4FE000
unkown
page readonly
6C5000
heap
page read and write
6C4000
heap
page read and write
4774000
heap
page read and write
16F53375000
trusted library allocation
page read and write
2286C570000
heap
page read and write
2286DB1D000
trusted library allocation
page read and write
34A0000
heap
page read and write
2286DAE3000
heap
page read and write
36E0000
trusted library allocation
page read and write
16F5155D000
heap
page read and write
16F5336E000
trusted library allocation
page read and write
1D5457BE000
heap
page read and write
350F000
stack
page read and write
16F51515000
heap
page read and write
2286E4F4000
heap
page read and write
3E70000
trusted library allocation
page read and write
16F5336F000
trusted library allocation
page read and write
662000
heap
page read and write
16F51533000
heap
page read and write
2286DA91000
heap
page read and write
1D545EE9000
heap
page read and write
1D545767000
heap
page read and write
2286E5CA000
heap
page read and write
6C4000
heap
page read and write
D8E000
heap
page read and write
16F5336F000
trusted library allocation
page read and write
16F515E0000
trusted library allocation
page read and write
16F53376000
trusted library allocation
page read and write
16F51572000
heap
page read and write
6C4000
heap
page read and write
A54000
heap
page read and write
16F53374000
trusted library allocation
page read and write
23D4CCDE000
trusted library allocation
page read and write
BE1000
heap
page read and write
2286DAFE000
trusted library allocation
page read and write
AAA000
unkown
page readonly
16F53371000
trusted library allocation
page read and write
2286DB46000
trusted library allocation
page read and write
2286E796000
heap
page read and write
2286D2B0000
heap
page read and write
16F5336E000
trusted library allocation
page read and write
6C4000
heap
page read and write
6C5000
heap
page read and write
6C4000
heap
page read and write
7B0000
heap
page read and write
6C4000
heap
page read and write
2286DAF9000
trusted library allocation
page read and write
6C4000
heap
page read and write
2286E4F2000
heap
page read and write
B66537F000
stack
page read and write
14C9000
heap
page read and write
16F515E0000
trusted library allocation
page read and write
16F5336D000
trusted library allocation
page read and write
23D4CD4C000
trusted library allocation
page read and write
16F53375000
trusted library allocation
page read and write
16F53371000
trusted library allocation
page read and write
16F53376000
trusted library allocation
page read and write
2286D53A000
trusted library allocation
page read and write
2286DB1A000
trusted library allocation
page read and write
2286D290000
trusted library allocation
page read and write
23D48610000
trusted library section
page readonly
16F53375000
trusted library allocation
page read and write
35AC000
heap
page read and write
2AF4000
trusted library allocation
page read and write
994000
heap
page read and write
992000
heap
page read and write
2286E701000
heap
page read and write
16BBDAC0000
heap
page read and write
5FA000
heap
page read and write
B20000
heap
page read and write
16F5155C000
heap
page read and write
2A20000
heap
page read and write
2286D0FC000
heap
page read and write
2286DA0A000
heap
page read and write
1D5457E8000
heap
page read and write
16F5336F000
trusted library allocation
page read and write
2B3C000
heap
page read and write
2286D508000
trusted library allocation
page read and write
2286E796000
heap
page read and write
16F51562000
heap
page read and write
490000
heap
page read and write
2286D557000
trusted library allocation
page read and write
2286E898000
heap
page read and write
4B0000
heap
page read and write
16F53372000
trusted library allocation
page read and write
23D4CAEA000
heap
page read and write
1D547844000
heap
page read and write
2286DB2E000
trusted library allocation
page read and write
14DD000
heap
page read and write
16F53372000
trusted library allocation
page read and write
BDB000
heap
page read and write
6C4000
heap
page read and write
2286E734000
heap
page read and write
2286E51D000
heap
page read and write
2286DAEB000
heap
page read and write
16F5336A000
trusted library allocation
page read and write
6A4FAFE000
unkown
page readonly
2286E60D000
heap
page read and write
23D4CD30000
trusted library allocation
page read and write
23D4CA54000
heap
page read and write
1003000
heap
page read and write
23D4CC90000
trusted library allocation
page read and write
16F5336B000
trusted library allocation
page read and write
2D70000
heap
page read and write
6C4000
heap
page read and write
2286DAF5000
trusted library allocation
page read and write
2286E54F000
heap
page read and write
6C5000
heap
page read and write
16F53373000
trusted library allocation
page read and write
23D0000
trusted library allocation
page read and write
16F53376000
trusted library allocation
page read and write
2286DAEB000
heap
page read and write
2286D125000
heap
page read and write
2286C770000
heap
page read and write
6C4000
heap
page read and write
2286E578000
heap
page read and write
2286DAFF000
trusted library allocation
page read and write
6C4000
heap
page read and write
BA0000
heap
page read and write
2286D53D000
trusted library allocation
page read and write
6A0000
heap
page read and write
A12000
heap
page read and write
16F5155F000
heap
page read and write
6C4000
heap
page read and write
6C4000
heap
page read and write
2286D55E000
trusted library allocation
page read and write
A54000
heap
page read and write
2286E549000
heap
page read and write
16F53372000
trusted library allocation
page read and write
16F5336E000
trusted library allocation
page read and write
2286DB29000
trusted library allocation
page read and write
2286D115000
heap
page read and write
1ABED228000
heap
page read and write
1D5457BF000
heap
page read and write
6C4000
heap
page read and write
21EAE000000
unkown
page read and write
2286E5E2000
heap
page read and write
992000
heap
page read and write
2286DAB8000
heap
page read and write
A66000
heap
page read and write
47C000
heap
page read and write
14EE000
heap
page read and write
3E6B000
stack
page read and write
2286E630000
heap
page read and write
22E1000
direct allocation
page read and write
143A000
heap
page read and write
3850000
heap
page read and write
81A000
unkown
page readonly
2286E796000
heap
page read and write
23D47470000
heap
page read and write
2286DB30000
trusted library allocation
page read and write
1D5457B8000
heap
page read and write
16F51533000
heap
page read and write
1D547830000
heap
page read and write
AD0000
heap
page read and write
2EC8000
trusted library allocation
page read and write
16F51533000
heap
page read and write
23D4CAEE000
heap
page read and write
3A76000
trusted library allocation
page read and write
1D545D75000
heap
page read and write
6C5000
heap
page read and write
148D000
heap
page read and write
2CE0000
heap
page read and write
23D47600000
heap
page read and write
16F51531000
heap
page read and write
DB1000
unkown
page execute read
6C4000
heap
page read and write
2286DA8E000
heap
page read and write
2286E682000
heap
page read and write
21EAE06D000
heap
page read and write
16F53373000
trusted library allocation
page read and write
23D47F1A000
heap
page read and write
B84000
heap
page read and write
2286D527000
trusted library allocation
page read and write
A71000
unkown
page execute read
6C4000
heap
page read and write
6C4000
heap
page read and write
16F5336B000
trusted library allocation
page read and write
2430000
direct allocation
page read and write
16F53372000
trusted library allocation
page read and write
2440000
heap
page read and write
6C5000
heap
page read and write
F50000
heap
page read and write
16F5336C000
trusted library allocation
page read and write
BB1000
heap
page read and write
3830000
heap
page read and write
16F53372000
trusted library allocation
page read and write
2EDB000
trusted library allocation
page read and write
2EC5000
trusted library allocation
page read and write
16F53367000
trusted library allocation
page read and write
2286EA51000
heap
page read and write
1D545EC8000
heap
page read and write
16F5336A000
trusted library allocation
page read and write
2C19000
trusted library allocation
page read and write
1D5457C5000
heap
page read and write
23D4CCC2000
trusted library allocation
page read and write
2C12000
trusted library allocation
page read and write
16F5336E000
trusted library allocation
page read and write
2C16000
trusted library allocation
page read and write
3A82000
trusted library allocation
page read and write
2286DAF3000
trusted library allocation
page read and write
2449000
heap
page read and write
23D48340000
trusted library allocation
page read and write
6C4000
heap
page read and write
BDE000
stack
page read and write
16F51573000
heap
page read and write
623000
heap
page read and write
2286E3FE000
heap
page read and write
2EC7000
trusted library allocation
page read and write
A54000
heap
page read and write
2286DB2C000
trusted library allocation
page read and write
2286D270000
heap
page read and write
6C4000
heap
page read and write
16F53372000
trusted library allocation
page read and write
2286E6C8000
heap
page read and write
16F5155C000
heap
page read and write
23D4CD0A000
trusted library allocation
page read and write
2286DB26000
trusted library allocation
page read and write
2286DA83000
heap
page read and write
16F53375000
trusted library allocation
page read and write
1D545793000
heap
page read and write
2286E549000
heap
page read and write
1D545D00000
heap
page read and write
2286E553000
heap
page read and write
510000
heap
page read and write
23D47E00000
heap
page read and write
16F5336E000
trusted library allocation
page read and write
2286DA0D000
heap
page read and write
364E000
stack
page read and write
2286E8A0000
heap
page read and write
16F53371000
trusted library allocation
page read and write
16F53375000
trusted library allocation
page read and write
16F51575000
heap
page read and write
23D4CE10000
remote allocation
page read and write
6C4000
heap
page read and write
2286C657000
heap
page read and write
6C4000
heap
page read and write
16F53110000
heap
page read and write
23D48600000
trusted library section
page readonly
16F5336C000
trusted library allocation
page read and write
16F53374000
trusted library allocation
page read and write
BA2000
heap
page read and write
16F51630000
heap
page read and write
2286D9F5000
heap
page read and write
D5E000
stack
page read and write
16F51572000
heap
page read and write
B7B000
heap
page read and write
16F5336D000
trusted library allocation
page read and write
16F515E4000
trusted library allocation
page read and write
3590000
heap
page read and write
6C4000
heap
page read and write
16F53375000
trusted library allocation
page read and write
6C4000
heap
page read and write
6C4000
heap
page read and write
6C6C0000
unkown
page readonly
16F5155C000
heap
page read and write
16F53376000
trusted library allocation
page read and write
2286E5E1000
heap
page read and write
2E60000
trusted library allocation
page read and write
16F5155C000
heap
page read and write
16F51571000
heap
page read and write
3A73000
trusted library allocation
page read and write
16F53374000
trusted library allocation
page read and write
DCE000
heap
page read and write
16F51533000
heap
page read and write
16F53375000
trusted library allocation
page read and write
2EE0000
heap
page read and write
E06000
unkown
page read and write
6C4000
heap
page read and write
6C4000
heap
page read and write
34B0000
heap
page read and write
16F5336A000
trusted library allocation
page read and write
16F5336D000
trusted library allocation
page read and write
35AC000
heap
page read and write
F20000
trusted library allocation
page read and write
16F5155C000
heap
page read and write
16F51575000
heap
page read and write
2286D54C000
trusted library allocation
page read and write
D50000
heap
page read and write
21EAF75E000
heap
page read and write
2286E529000
heap
page read and write
49DE0FE000
unkown
page readonly
E06000
unkown
page write copy
16F53372000
trusted library allocation
page read and write
16F51575000
heap
page read and write
6C4000
heap
page read and write
2C1E000
trusted library allocation
page read and write
16F5336B000
trusted library allocation
page read and write
2286E7B7000
heap
page read and write
16F51572000
heap
page read and write
BDB000
heap
page read and write
5FB9579000
stack
page read and write
16F53371000
trusted library allocation
page read and write
49B000
unkown
page write copy
2286D521000
trusted library allocation
page read and write
D0E000
stack
page read and write
AAA000
unkown
page readonly
49DE8FE000
unkown
page readonly
23D47640000
heap
page read and write
23D489A1000
trusted library allocation
page read and write
2286DAE1000
heap
page read and write
16F53376000
trusted library allocation
page read and write
16F53368000
trusted library allocation
page read and write
16F51533000
heap
page read and write
16F53373000
trusted library allocation
page read and write
2286DB48000
trusted library allocation
page read and write
2286DA72000
heap
page read and write
6C4000
heap
page read and write
16F51573000
heap
page read and write
2B04000
trusted library allocation
page read and write
2286E9B2000
heap
page read and write
6C6DF000
unkown
page readonly
2AF2000
trusted library allocation
page read and write
16F5336A000
trusted library allocation
page read and write
16F51533000
heap
page read and write
16F51533000
heap
page read and write
A01000
heap
page read and write
16F51515000
heap
page read and write
16F53114000
heap
page read and write
16F53376000
trusted library allocation
page read and write
2286E85D000
heap
page read and write
16F53370000
trusted library allocation
page read and write
3A72000
trusted library allocation
page read and write
16F5336D000
trusted library allocation
page read and write
9A1000
heap
page read and write
5E00000
direct allocation
page read and write
16F51533000
heap
page read and write
2286DAFB000
trusted library allocation
page read and write
2286D533000
trusted library allocation
page read and write
BD3567D000
stack
page read and write
2286E553000
heap
page read and write
2286C647000
heap
page read and write
16F51531000
heap
page read and write
2286E549000
heap
page read and write
2286DA18000
heap
page read and write
2C11000
trusted library allocation
page read and write
23D4CD90000
trusted library allocation
page read and write
1D545EC7000
heap
page read and write
623000
heap
page read and write
6383BFE000
stack
page read and write
16F51577000
heap
page read and write
8FE000
stack
page read and write
16F53371000
trusted library allocation
page read and write
22EC000
direct allocation
page read and write
6C4000
heap
page read and write
22F8000
direct allocation
page read and write
2286D2A0000
trusted library allocation
page read and write
2286DADC000
heap
page read and write
2286DA9F000
heap
page read and write
16F51572000
heap
page read and write
23D47F5A000
heap
page read and write
AC4000
unkown
page write copy
1D5457EC000
heap
page read and write
21EAE05A000
heap
page read and write
2424000
heap
page read and write
16F5336E000
trusted library allocation
page read and write
BB6000
heap
page read and write
6C4000
heap
page read and write
2286DB04000
trusted library allocation
page read and write
29F0000
heap
page read and write
16F5336D000
trusted library allocation
page read and write
16F53376000
trusted library allocation
page read and write
D48000
stack
page read and write
623000
heap
page read and write
21EAF78E000
heap
page read and write
623000
heap
page read and write
1D545D7E000
heap
page read and write
9A2000
heap
page read and write
2286E900000
heap
page read and write
16F5336F000
trusted library allocation
page read and write
5FB927E000
stack
page read and write
6C4000
heap
page read and write
16F51531000
heap
page read and write
16F5336B000
trusted library allocation
page read and write
16F515E0000
trusted library allocation
page read and write
1A4A8929000
heap
page read and write
23D48640000
trusted library section
page readonly
401000
unkown
page execute read
16F53376000
trusted library allocation
page read and write
2F40000
heap
page read and write
49DF3FE000
unkown
page readonly
16F5336E000
trusted library allocation
page read and write
16F51515000
heap
page read and write
30E0000
heap
page read and write
16F51571000
heap
page read and write
2286D504000
trusted library allocation
page read and write
1D545EE9000
heap
page read and write
2286D1E0000
heap
page read and write
2CF7000
trusted library allocation
page read and write
6C4000
heap
page read and write
23D47697000
heap
page read and write
16F51561000
heap
page read and write
16F51515000
heap
page read and write
480000
heap
page read and write
16F51531000
heap
page read and write
1D545990000
trusted library allocation
page read and write
6C4000
heap
page read and write
6C4000
heap
page read and write
4A0000
heap
page read and write
23D4CCBC000
trusted library allocation
page read and write
16F5336E000
trusted library allocation
page read and write
2B30000
heap
page read and write
16F5336C000
trusted library allocation
page read and write
16F5155C000
heap
page read and write
2286C65B000
heap
page read and write
A5E000
heap
page read and write
9A2000
heap
page read and write
BDB000
heap
page read and write
16F53376000
trusted library allocation
page read and write
3A7B000
trusted library allocation
page read and write
2286E7B6000
heap
page read and write
BC1000
heap
page read and write
16F51533000
heap
page read and write
16F51578000
heap
page read and write
16BBDA10000
heap
page read and write
6C4000
heap
page read and write
BB5000
heap
page read and write
16F53370000
trusted library allocation
page read and write
5FB947B000
stack
page read and write
2286DADC000
heap
page read and write
2286C63B000
heap
page read and write
2286DB22000
trusted library allocation
page read and write
2286DA17000
heap
page read and write
2B01000
trusted library allocation
page read and write
401000
unkown
page execute read
16F5336D000
trusted library allocation
page read and write
16F53371000
trusted library allocation
page read and write
1D54579E000
heap
page read and write
BEF000
heap
page read and write
AC8000
heap
page read and write
23D4CD4F000
trusted library allocation
page read and write
49DFAFE000
stack
page read and write
21EAF7B2000
heap
page read and write
1ABED160000
heap
page read and write
989000
heap
page read and write
6BC000
stack
page read and write
23D4CAF0000
heap
page read and write
16F53376000
trusted library allocation
page read and write
16BBDA20000
heap
page read and write
2286E534000
heap
page read and write
AC8000
heap
page read and write
16F5336F000
trusted library allocation
page read and write
16F52E70000
heap
page read and write
5FB907F000
stack
page read and write
14AE000
heap
page read and write
A54000
heap
page read and write
16F51515000
heap
page read and write
6C4000
heap
page read and write
6C4000
heap
page read and write
6C4000
heap
page read and write
2ED0000
heap
page read and write
16F53371000
trusted library allocation
page read and write
2286D1FA000
trusted library allocation
page read and write
16F53372000
trusted library allocation
page read and write
2286DB44000
trusted library allocation
page read and write
16F515E0000
trusted library allocation
page read and write
2286EA4B000
heap
page read and write
6800000
direct allocation
page read and write
16F51575000
heap
page read and write
16F5336A000
trusted library allocation
page read and write
16F5336B000
trusted library allocation
page read and write
16F53371000
trusted library allocation
page read and write
AC4000
unkown
page write copy
6C4000
heap
page read and write
16F53370000
trusted library allocation
page read and write
49DF4FE000
unkown
page readonly
2286E547000
heap
page read and write
16F5336F000
trusted library allocation
page read and write
2286DAF6000
trusted library allocation
page read and write
5D08D7E000
stack
page read and write
2EC6000
trusted library allocation
page read and write
4B0000
heap
page read and write
6C5000
heap
page read and write
23D4CE10000
remote allocation
page read and write
21EAE202000
heap
page read and write
2286DAFD000
trusted library allocation
page read and write
23D47E02000
heap
page read and write
2286D8F0000
heap
page read and write
2286DAF0000
trusted library allocation
page read and write
EA0000
heap
page read and write
A85000
heap
page read and write
6C4000
heap
page read and write
16F5336B000
trusted library allocation
page read and write
49DF47E000
stack
page read and write
6C4000
heap
page read and write
2286DA10000
heap
page read and write
5A0000
heap
page read and write
6C4000
heap
page read and write
6C4000
heap
page read and write
2286E530000
heap
page read and write
2286DADD000
heap
page read and write
16F51578000
heap
page read and write
6C4000
heap
page read and write
2286D9F5000
heap
page read and write
16F5337D000
trusted library allocation
page read and write
E0C000
unkown
page readonly
4AD000
unkown
page readonly
4180000
trusted library allocation
page read and write
2ED1000
trusted library allocation
page read and write
6C4000
heap
page read and write
AA9000
heap
page read and write
6C4000
heap
page read and write
1D545EF3000
heap
page read and write
6C4000
heap
page read and write
16F53374000
trusted library allocation
page read and write
6C4000
heap
page read and write
16BBDA40000
heap
page read and write
16F51515000
heap
page read and write
2286C5F0000
heap
page read and write
16F515E0000
trusted library allocation
page read and write
1D54578E000
heap
page read and write
2286DA1E000
heap
page read and write
2286DADC000
heap
page read and write
16F515E4000
trusted library allocation
page read and write
16F51531000
heap
page read and write
23D47702000
heap
page read and write
5AE000
stack
page read and write
16F53373000
trusted library allocation
page read and write
6C4000
heap
page read and write
2AF9000
trusted library allocation
page read and write
16F53370000
trusted library allocation
page read and write
8D0000
heap
page read and write
1D545EF5000
heap
page read and write
6C4000
heap
page read and write
DB1000
unkown
page execute read
BE3000
heap
page read and write
49C000
unkown
page write copy
2286D53B000
trusted library allocation
page read and write
2AE0000
heap
page read and write
36D0000
heap
page read and write
6C4000
heap
page read and write
16F53370000
trusted library allocation
page read and write
BD3000
heap
page read and write
2286E5D0000
heap
page read and write
6C4000
heap
page read and write
6C4000
heap
page read and write
2286DB0A000
trusted library allocation
page read and write
16F51578000
heap
page read and write
2286D53C000
trusted library allocation
page read and write
1D545985000
heap
page read and write
6C5000
heap
page read and write
16F515E4000
trusted library allocation
page read and write
6A4FCFE000
unkown
page readonly
972000
heap
page read and write
2286D53E000
trusted library allocation
page read and write
16F53370000
trusted library allocation
page read and write
2286E856000
heap
page read and write
16F515E4000
trusted library allocation
page read and write
6C4000
heap
page read and write
2286E61C000
heap
page read and write
23F0000
heap
page read and write
14A0000
heap
page read and write
6C4000
heap
page read and write
22E8000
direct allocation
page read and write
6C5000
heap
page read and write
16F515E0000
trusted library allocation
page read and write
16F53375000
trusted library allocation
page read and write
2EDF000
trusted library allocation
page read and write
14ED000
heap
page read and write
16F5336A000
trusted library allocation
page read and write
16F5336A000
trusted library allocation
page read and write
16F5336D000
trusted library allocation
page read and write
5E5000
heap
page read and write
21EAF76A000
heap
page read and write
2286D9F5000
heap
page read and write
95E000
heap
page read and write
3A60000
heap
page read and write
2286E9A8000
heap
page read and write
2286DA1A000
heap
page read and write
814000
unkown
page write copy
2286DAF5000
trusted library allocation
page read and write
2600000
heap
page read and write
21EAE058000
heap
page read and write
16F5336D000
trusted library allocation
page read and write
49DE07E000
stack
page read and write
2286E509000
heap
page read and write
16F51572000
heap
page read and write
2286E62B000
heap
page read and write
2C1B000
trusted library allocation
page read and write
6C4000
heap
page read and write
2AF7000
trusted library allocation
page read and write
16F5337C000
trusted library allocation
page read and write
16F5336B000
trusted library allocation
page read and write
16F51525000
heap
page read and write
16F51533000
heap
page read and write
21EADE50000
heap
page read and write
4B9E000
stack
page read and write
AAA000
unkown
page readonly
623000
heap
page read and write
1A4A8AF0000
heap
page read and write
16F51450000
heap
page read and write
2CF0000
heap
page read and write
16F51531000
heap
page read and write
16F5336A000
trusted library allocation
page read and write
7FA000
unkown
page readonly
16F514E0000
heap
page read and write
16F51507000
heap
page read and write
2286DA0E000
heap
page read and write
2286DB11000
trusted library allocation
page read and write
6C4000
heap
page read and write
6C5000
heap
page read and write
2286D524000
trusted library allocation
page read and write
F09000
heap
page read and write
23D4767C000
heap
page read and write
49DF67E000
stack
page read and write
6C4000
heap
page read and write
B9A000
heap
page read and write
16F51533000
heap
page read and write
6C5000
heap
page read and write
3A80000
trusted library allocation
page read and write
20D4000
direct allocation
page read and write
6C4000
heap
page read and write
34B6000
heap
page read and write
2286DAE6000
heap
page read and write
2286E644000
heap
page read and write
16F51531000
heap
page read and write
16F51350000
heap
page read and write
16F53375000
trusted library allocation
page read and write
16F515E0000
trusted library allocation
page read and write
142D000
stack
page read and write
6C4000
heap
page read and write
2286DB23000
trusted library allocation
page read and write
2286E7B6000
heap
page read and write
16F5336D000
trusted library allocation
page read and write
2FE0000
heap
page read and write
6C5000
heap
page read and write
C05000
heap
page read and write
2286E6C4000
heap
page read and write
6C5000
heap
page read and write
2314000
direct allocation
page read and write
2286E5C0000
heap
page read and write
16F53360000
trusted library allocation
page read and write
2286DB0C000
trusted library allocation
page read and write
E8E000
stack
page read and write
2286DB1E000
trusted library allocation
page read and write
A54000
heap
page read and write
1489000
heap
page read and write
16F5336B000
trusted library allocation
page read and write
2286DB14000
trusted library allocation
page read and write
1D545787000
heap
page read and write
BCF000
heap
page read and write
6C5000
heap
page read and write
2286D109000
heap
page read and write
113B000
stack
page read and write
2286DAEC000
heap
page read and write
2286D540000
trusted library allocation
page read and write
3934000
heap
page read and write
2286D539000
trusted library allocation
page read and write
FC0000
heap
page read and write
2286D539000
trusted library allocation
page read and write
16F51575000
heap
page read and write
16F5155C000
heap
page read and write
16F53372000
trusted library allocation
page read and write
7FA000
unkown
page readonly
A54000
heap
page read and write
14AE000
heap
page read and write
2286E588000
heap
page read and write
930000
heap
page read and write
2C1D000
trusted library allocation
page read and write
16F53374000
trusted library allocation
page read and write
16F5336F000
trusted library allocation
page read and write
7A0000
heap
page read and write
1D545EF2000
heap
page read and write
7BB000
stack
page read and write
16F5336D000
trusted library allocation
page read and write
16F51533000
heap
page read and write
2286D558000
trusted library allocation
page read and write
23D47713000
heap
page read and write
22B8000
direct allocation
page read and write
6C5000
heap
page read and write
2286C61B000
heap
page read and write
23D4CAF2000
heap
page read and write
2286D542000
trusted library allocation
page read and write
2286E632000
heap
page read and write
D9C000
heap
page read and write
16F5336C000
trusted library allocation
page read and write
6C4000
heap
page read and write
2286DB4F000
trusted library allocation
page read and write
400000
unkown
page readonly
2286DA17000
heap
page read and write
16F51533000
heap
page read and write
2286EA4A000
heap
page read and write
78FD000
direct allocation
page read and write
16F51531000
heap
page read and write
2286DB00000
trusted library allocation
page read and write
2286DADC000
heap
page read and write
2286E5C9000
heap
page read and write
7C1000
unkown
page execute read
3670000
heap
page read and write
81A000
unkown
page readonly
81A000
unkown
page readonly
16F53376000
trusted library allocation
page read and write
16F53376000
trusted library allocation
page read and write
23D4CCF0000
trusted library allocation
page read and write
23D4CCA6000
trusted library allocation
page read and write
1D547832000
heap
page read and write
6C4000
heap
page read and write
3F6E000
stack
page read and write
1D545ED5000
heap
page read and write
4A2000
heap
page read and write
2A9E93F0000
heap
page read and write
1ABED190000
trusted library allocation
page read and write
2D70000
trusted library section
page read and write
2286E604000
heap
page read and write
16F515E0000
trusted library allocation
page read and write
6C4000
heap
page read and write
14AE000
heap
page read and write
6C5000
heap
page read and write
3F84000
heap
page read and write
A3E000
stack
page read and write
2286E6E8000
heap
page read and write
2286D55F000
trusted library allocation
page read and write
2286D523000
trusted library allocation
page read and write
2286E632000
heap
page read and write
5FB917A000
stack
page read and write
1ABEDA02000
trusted library allocation
page read and write
7FA000
unkown
page readonly
A70000
unkown
page readonly
2286DB1F000
trusted library allocation
page read and write
1D54579D000
heap
page read and write
5D0000
heap
page read and write
9BD000
stack
page read and write
2286EA5A000
heap
page read and write
16F5336F000
trusted library allocation
page read and write
16F5336E000
trusted library allocation
page read and write
2286D526000
trusted library allocation
page read and write
DCD000
heap
page read and write
2286E6FC000
heap
page read and write
2286C639000
heap
page read and write
2286DAF4000
trusted library allocation
page read and write
6C4000
heap
page read and write
16F5155B000
heap
page read and write
1D545ECC000
heap
page read and write
2286E54D000
heap
page read and write
16F53371000
trusted library allocation
page read and write
2286E538000
heap
page read and write
23D4767A000
heap
page read and write
B83000
heap
page read and write
2D00000
heap
page read and write
16F51531000
heap
page read and write
16F53374000
trusted library allocation
page read and write
16F53372000
trusted library allocation
page read and write
2286D0F1000
heap
page read and write
16F51578000
heap
page read and write
47E000
heap
page read and write
2286D555000
trusted library allocation
page read and write
21EADF50000
trusted library allocation
page read and write
13EF000
stack
page read and write
14D3000
heap
page read and write
6C5000
heap
page read and write
2286D9F0000
heap
page read and write
23D48650000
trusted library section
page readonly
16F51502000
heap
page read and write
2286E538000
heap
page read and write
337E000
stack
page read and write
2286DB02000
trusted library allocation
page read and write
6C5000
heap
page read and write
2286DA1B000
heap
page read and write
1D545D7A000
heap
page read and write
16F515E0000
trusted library allocation
page read and write
2286DB41000
trusted library allocation
page read and write
F06000
heap
page read and write
16F5155C000
heap
page read and write
2286E5B9000
heap
page read and write
1D5457BE000
heap
page read and write
2286DB0C000
trusted library allocation
page read and write
2CF4000
trusted library allocation
page read and write
16F5336F000
trusted library allocation
page read and write
2286D54B000
trusted library allocation
page read and write
2EDE000
trusted library allocation
page read and write
23D4768D000
heap
page read and write
16F515E4000
trusted library allocation
page read and write
16F53370000
trusted library allocation
page read and write
16F5336F000
trusted library allocation
page read and write
2286E54B000
heap
page read and write
23D4CAD2000
heap
page read and write
6C4000
heap
page read and write
6C6D5000
unkown
page readonly
23D4CAF9000
heap
page read and write
6C4000
heap
page read and write
2286D53F000
trusted library allocation
page read and write
994000
heap
page read and write
2440000
heap
page read and write
16F51573000
heap
page read and write
5D3000
heap
page read and write
2286D559000
trusted library allocation
page read and write
489000
heap
page read and write
16F5336C000
trusted library allocation
page read and write
2286D1F2000
trusted library allocation
page read and write
6C5000
heap
page read and write
6C4000
heap
page read and write
7C1000
unkown
page execute read
2370000
direct allocation
page read and write
2E60000
trusted library allocation
page read and write
16F51533000
heap
page read and write
2286DB06000
trusted library allocation
page read and write
623000
heap
page read and write
16F515E0000
trusted library allocation
page read and write
3A7A000
trusted library allocation
page read and write
2286DAEE000
heap
page read and write
2286D541000
trusted library allocation
page read and write
316B000
stack
page read and write
6C4000
heap
page read and write
B88000
heap
page read and write
2A9E9400000
heap
page read and write
16F51533000
heap
page read and write
2286D55D000
trusted library allocation
page read and write
7433000
direct allocation
page read and write
16F53371000
trusted library allocation
page read and write
2286E6C6000
heap
page read and write
1D5457BD000
heap
page read and write
2286E520000
heap
page read and write
6383B7E000
stack
page read and write
16F5336B000
trusted library allocation
page read and write
21EAF726000
heap
page read and write
2286D534000
trusted library allocation
page read and write
6C4000
heap
page read and write
2286DA2A000
heap
page read and write
16F51573000
heap
page read and write
2286DB19000
trusted library allocation
page read and write
488000
heap
page read and write
5DB000
heap
page read and write
814000
unkown
page read and write
3A71000
trusted library allocation
page read and write
6C4000
heap
page read and write
6C4000
heap
page read and write
A32000
heap
page read and write
2286E5C0000
heap
page read and write
2CFB000
trusted library allocation
page read and write
1D545750000
heap
page read and write
6C4000
heap
page read and write
22E0000
direct allocation
page read and write
4B0000
heap
page read and write
2286DA04000
heap
page read and write
6C4000
heap
page read and write
49DE3FE000
stack
page read and write
2DC937B000
stack
page read and write
16F5336C000
trusted library allocation
page read and write
16F5155D000
heap
page read and write
1D54783E000
heap
page read and write
6C4000
heap
page read and write
16F51430000
heap
page read and write
16F5336F000
trusted library allocation
page read and write
16F51572000
heap
page read and write
16F5336F000
trusted library allocation
page read and write
16F51578000
heap
page read and write
23D4CE10000
remote allocation
page read and write
16F53376000
trusted library allocation
page read and write
23D4CC50000
trusted library allocation
page read and write
23D4CA4F000
heap
page read and write
16F53375000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
2286DB14000
trusted library allocation
page read and write
2286E630000
heap
page read and write
6C4000
heap
page read and write
16F515E0000
trusted library allocation
page read and write
A5A000
heap
page read and write
4A9F000
stack
page read and write
16F53375000
trusted library allocation
page read and write
16F515E0000
trusted library allocation
page read and write
3A79000
trusted library allocation
page read and write
D8C000
heap
page read and write
2286E8A0000
heap
page read and write
16F51571000
heap
page read and write
2286DAF1000
trusted library allocation
page read and write
2286DAB0000
heap
page read and write
1D545960000
heap
page read and write
2286EA5A000
heap
page read and write
B6652FE000
stack
page read and write
6C4000
heap
page read and write
14D7000
heap
page read and write
4B0000
heap
page read and write
6C4000
heap
page read and write
16F51575000
heap
page read and write
2AF0000
trusted library allocation
page read and write
2A9E9810000
heap
page read and write
16F515E4000
trusted library allocation
page read and write
5FB8D7D000
stack
page read and write
2DC90FC000
stack
page read and write
2286DAF3000
trusted library allocation
page read and write
22A7000
direct allocation
page read and write
2286D535000
trusted library allocation
page read and write
16F51533000
heap
page read and write
2286C65F000
heap
page read and write
2EDD000
trusted library allocation
page read and write
1D545ED4000
heap
page read and write
2DC89FD000
stack
page read and write
16F53371000
trusted library allocation
page read and write
2286DAFE000
trusted library allocation
page read and write
16F5336F000
trusted library allocation
page read and write
5B0000
heap
page read and write
2286C659000
heap
page read and write
16F5336B000
trusted library allocation
page read and write
16F53376000
trusted library allocation
page read and write
2286D524000
trusted library allocation
page read and write
49E037E000
stack
page read and write
16F51531000
heap
page read and write
23D4CA00000
heap
page read and write
2286DAFD000
trusted library allocation
page read and write
1D5457B4000
heap
page read and write
16F53373000
trusted library allocation
page read and write
2ECB000
trusted library allocation
page read and write
2286D55E000
trusted library allocation
page read and write
2AF6000
trusted library allocation
page read and write
16F51525000
heap
page read and write
6C4000
heap
page read and write
BEF000
heap
page read and write
16F5155C000
heap
page read and write
49E03FE000
unkown
page readonly
4084000
heap
page read and write
1ABED150000
heap
page read and write
3710000
direct allocation
page read and write
16F51515000
heap
page read and write
2286DB27000
trusted library allocation
page read and write
16F51515000
heap
page read and write
16F515E4000
trusted library allocation
page read and write
16F5336B000
trusted library allocation
page read and write
16F53372000
trusted library allocation
page read and write
661000
heap
page read and write
2286E6E8000
heap
page read and write
16F515E0000
trusted library allocation
page read and write
16F53372000
trusted library allocation
page read and write
6C4000
heap
page read and write
2286DB3F000
trusted library allocation
page read and write
16F51575000
heap
page read and write
16F51533000
heap
page read and write
C00000
heap
page read and write
2286E518000
heap
page read and write
2AFD000
trusted library allocation
page read and write
16F51515000
heap
page read and write
36EF000
stack
page read and write
623000
heap
page read and write
6C4000
heap
page read and write
2286DA1D000
heap
page read and write
21EAE065000
heap
page read and write
1436000
heap
page read and write
2286E730000
heap
page read and write
16F5336C000
trusted library allocation
page read and write
2650000
heap
page read and write
16F53210000
heap
page read and write
2286DA17000
heap
page read and write
16F53372000
trusted library allocation
page read and write
B664F48000
stack
page read and write
16F5336D000
trusted library allocation
page read and write
1D5457EC000
heap
page read and write
2286E962000
heap
page read and write
2286E588000
heap
page read and write
16F53373000
trusted library allocation
page read and write
2286D533000
trusted library allocation
page read and write
BA0000
heap
page read and write
3A83000
trusted library allocation
page read and write
2286DADC000
heap
page read and write
3A7D000
trusted library allocation
page read and write
23D47F13000
heap
page read and write
6C5000
heap
page read and write
D6A000
heap
page read and write
2ECF000
trusted library allocation
page read and write
16F51531000
heap
page read and write
16F5336A000
trusted library allocation
page read and write
48A0000
heap
page read and write
16F5336C000
trusted library allocation
page read and write
6C4000
heap
page read and write
16F51579000
heap
page read and write
23D4765B000
heap
page read and write
14C8000
heap
page read and write
1D545791000
heap
page read and write
49DF5FC000
stack
page read and write
16F5157C000
heap
page read and write
1D547846000
heap
page read and write
602000
heap
page read and write
2286D541000
trusted library allocation
page read and write
16F5336B000
trusted library allocation
page read and write
2286D55A000
trusted library allocation
page read and write
16F53373000
trusted library allocation
page read and write
BB0000
heap
page read and write
2286DB01000
trusted library allocation
page read and write
2E62000
trusted library allocation
page read and write
16F53375000
trusted library allocation
page read and write
A54000
heap
page read and write
2286DB08000
trusted library allocation
page read and write
5E0000
heap
page read and write
6C5000
heap
page read and write
6C5000
heap
page read and write
2286E518000
heap
page read and write
49DF7FE000
unkown
page readonly
16F53374000
trusted library allocation
page read and write
49DE9FC000
stack
page read and write
35E0000
heap
page read and write
16F53374000
trusted library allocation
page read and write
2286D544000
trusted library allocation
page read and write
2CBE000
stack
page read and write
620000
heap
page read and write
BA2000
heap
page read and write
6C4000
heap
page read and write
6C4000
heap
page read and write
BDB000
heap
page read and write
16F51515000
heap
page read and write
16F5155C000
heap
page read and write
6C4000
heap
page read and write
2286DB3C000
trusted library allocation
page read and write
49DE6FE000
unkown
page readonly
2DC8E7E000
stack
page read and write
2F10000
heap
page read and write
16F51533000
heap
page read and write
6C4000
heap
page read and write
2286DA1D000
heap
page read and write
2286DA8A000
heap
page read and write
40C000
unkown
page read and write
16F5157C000
heap
page read and write
23D4E000000
heap
page read and write
6C4000
heap
page read and write
22F0000
direct allocation
page read and write
2286E509000
heap
page read and write
DEB000
unkown
page readonly
16F5336F000
trusted library allocation
page read and write
2286D54B000
trusted library allocation
page read and write
2286DB4D000
trusted library allocation
page read and write
16F5336B000
trusted library allocation
page read and write
2286E645000
heap
page read and write
49E00FC000
stack
page read and write
2286DA0A000
heap
page read and write
16F5337B000
trusted library allocation
page read and write
AC4000
unkown
page read and write
1D545D7B000
heap
page read and write
992000
heap
page read and write
16F5336B000
trusted library allocation
page read and write
16F53373000
trusted library allocation
page read and write
16BBDA45000
heap
page read and write
16F5156F000
heap
page read and write
1ABED202000
heap
page read and write
3280000
unkown
page read and write
A8F000
heap
page read and write
16F5155C000
heap
page read and write
EB2000
trusted library allocation
page read and write
2286E677000
heap
page read and write
14DD000
heap
page read and write
16F53374000
trusted library allocation
page read and write
16F5311F000
heap
page read and write
992000
heap
page read and write
B30000
heap
page read and write
1D545D74000
heap
page read and write
3140000
trusted library allocation
page read and write
16F51573000
heap
page read and write
22D0000
direct allocation
page read and write
23D475A0000
trusted library allocation
page read and write
23D4CD57000
trusted library allocation
page read and write
16F5155D000
heap
page read and write
21EAF722000
heap
page read and write
1D54598D000
heap
page read and write
A54000
heap
page read and write
2286D546000
trusted library allocation
page read and write
23D4CA61000
heap
page read and write
1D5457C5000
heap
page read and write
2BF0000
heap
page read and write
AC8000
heap
page read and write
2286DB25000
trusted library allocation
page read and write
A32000
heap
page read and write
6C4000
heap
page read and write
2286E6FC000
heap
page read and write
49DFBFE000
unkown
page readonly
16F51573000
heap
page read and write
6C4000
heap
page read and write
2286E9A9000
heap
page read and write
49DF1FE000
unkown
page readonly
16F53372000
trusted library allocation
page read and write
DEB000
unkown
page readonly
3591000
heap
page read and write
6C4000
heap
page read and write
2ED3000
trusted library allocation
page read and write
16F515E0000
trusted library allocation
page read and write
1D545990000
trusted library allocation
page read and write
2286DA86000
heap
page read and write
2CFC000
trusted library allocation
page read and write
33EF000
stack
page read and write
2286DA84000
heap
page read and write
23D4CA11000
heap
page read and write
1468000
heap
page read and write
16F5336B000
trusted library allocation
page read and write
16F53373000
trusted library allocation
page read and write
16F51531000
heap
page read and write
DCD000
heap
page read and write
16F5336D000
trusted library allocation
page read and write
2286DB2F000
trusted library allocation
page read and write
2286D506000
trusted library allocation
page read and write
2286D556000
trusted library allocation
page read and write
2B167FE000
unkown
page readonly
16F5155B000
heap
page read and write
16F53373000
trusted library allocation
page read and write
2286C670000
heap
page read and write
A58000
heap
page read and write
1D545D7A000
heap
page read and write
2286DB32000
trusted library allocation
page read and write
16F516C5000
heap
page read and write
3F70000
heap
page read and write
16F515E4000
trusted library allocation
page read and write
BDC000
heap
page read and write
16F5155C000
heap
page read and write
2A9E94A7000
heap
page read and write
6C4000
heap
page read and write
2286DB09000
trusted library allocation
page read and write
21EAF7BB000
heap
page read and write
2286DB2A000
trusted library allocation
page read and write
3A33000
heap
page read and write
2286D246000
trusted library allocation
page read and write
16F53371000
trusted library allocation
page read and write
2286E5C0000
heap
page read and write
6C4000
heap
page read and write
16F515E4000
trusted library allocation
page read and write
16F51515000
heap
page read and write
8F0000
trusted library allocation
page read and write
2286D507000
trusted library allocation
page read and write
16F515E0000
trusted library allocation
page read and write
16F51531000
heap
page read and write
6C4000
heap
page read and write
49DF9FE000
unkown
page readonly
16F53374000
trusted library allocation
page read and write
2286E549000
heap
page read and write
623000
heap
page read and write
49DFDFE000
unkown
page readonly
1D5457E4000
heap
page read and write
23D47490000
heap
page read and write
BA0000
heap
page read and write
2AF3000
trusted library allocation
page read and write
2286D29E000
trusted library allocation
page read and write
2EC2000
trusted library allocation
page read and write
2AEC000
stack
page read and write
2286D543000
trusted library allocation
page read and write
6C4000
heap
page read and write
363A000
stack
page read and write
F00000
heap
page read and write
16F5336D000
trusted library allocation
page read and write
2286D526000
trusted library allocation
page read and write
2286D54F000
trusted library allocation
page read and write
16F53370000
trusted library allocation
page read and write
DB0000
unkown
page readonly
49D000
unkown
page read and write
16F5336E000
trusted library allocation
page read and write
6C4000
heap
page read and write
3BAF000
stack
page read and write
16F5336F000
trusted library allocation
page read and write
5C0000
heap
page read and write
2286DAB2000
heap
page read and write
2286E8E1000
heap
page read and write
2286E53D000
heap
page read and write
16F5336F000
trusted library allocation
page read and write
E0C000
unkown
page readonly
2286C8C0000
heap
page read and write
2286E5D1000
heap
page read and write
16F51531000
heap
page read and write
3610000
heap
page read and write
2286DAF4000
trusted library allocation
page read and write
21EAF7A2000
heap
page read and write
23F0000
heap
page read and write
2420000
heap
page read and write
2220000
heap
page read and write
2286EAF1000
heap
page read and write
6C4000
heap
page read and write
6C4000
heap
page read and write
3590000
heap
page read and write
20D0000
direct allocation
page read and write
23D4CCBF000
trusted library allocation
page read and write
BE6000
heap
page read and write
16F5336E000
trusted library allocation
page read and write
B40000
heap
page read and write
5D0000
heap
page read and write
6C4000
heap
page read and write
21EAE115000
trusted library allocation
page read and write
6C4000
heap
page read and write
16F51572000
heap
page read and write
16F51533000
heap
page read and write
1000000
heap
page read and write
1ABED213000
heap
page read and write
2286E64E000
heap
page read and write
16F51531000
heap
page read and write
23D4CC40000
trusted library allocation
page read and write
16F5336F000
trusted library allocation
page read and write
16F51575000
heap
page read and write
2AFB000
trusted library allocation
page read and write
2286DB07000
trusted library allocation
page read and write
2286DAFC000
trusted library allocation
page read and write
6C4000
heap
page read and write
16F5337E000
trusted library allocation
page read and write
6C4000
heap
page read and write
16F5336D000
trusted library allocation
page read and write
A04000
heap
page read and write
6C4000
heap
page read and write
2640000
heap
page read and write
F1F000
stack
page read and write
16F53376000
trusted library allocation
page read and write
A90000
heap
page read and write
16F5336A000
trusted library allocation
page read and write
6C5000
heap
page read and write
926000
heap
page read and write
400000
unkown
page readonly
16F53370000
trusted library allocation
page read and write
31E0000
heap
page read and write
DCA000
heap
page read and write
6C4000
heap
page read and write
2286DAA1000
heap
page read and write
2286D547000
trusted library allocation
page read and write
6C4000
heap
page read and write
16F5336E000
trusted library allocation
page read and write
4B0000
heap
page read and write
16F51570000
heap
page read and write
2DC8DF8000
stack
page read and write
16F53372000
trusted library allocation
page read and write
49DF8FB000
stack
page read and write
6C4000
heap
page read and write
2286DA8A000
heap
page read and write
6C4000
heap
page read and write
2286C657000
heap
page read and write
6C5000
heap
page read and write
5FB937A000
stack
page read and write
2C18000
trusted library allocation
page read and write
16F51578000
heap
page read and write
2286DAA1000
heap
page read and write
6C4000
heap
page read and write
16F53372000
trusted library allocation
page read and write
6C4000
heap
page read and write
F70000
heap
page read and write
16F5157C000
heap
page read and write
2C14000
trusted library allocation
page read and write
23D4CD6A000
trusted library allocation
page read and write
16F51575000
heap
page read and write
35AC000
heap
page read and write
2286E777000
heap
page read and write
16F5336F000
trusted library allocation
page read and write
2286E6A4000
heap
page read and write
6C4000
heap
page read and write
16F51531000
heap
page read and write
16F53373000
trusted library allocation
page read and write
1D5457E8000
heap
page read and write
16F5336C000
trusted library allocation
page read and write
97A000
heap
page read and write
2286C65F000
heap
page read and write
16F53371000
trusted library allocation
page read and write
312E000
stack
page read and write
2286DB13000
trusted library allocation
page read and write
2286DB33000
trusted library allocation
page read and write
16F5155D000
heap
page read and write
2286DAEA000
heap
page read and write
14EE000
heap
page read and write
2286DB17000
trusted library allocation
page read and write
6C4000
heap
page read and write
16F515E4000
trusted library allocation
page read and write
E06000
unkown
page write copy
B40000
heap
page read and write
400000
unkown
page readonly
2286DB4B000
trusted library allocation
page read and write
2286DB15000
trusted library allocation
page read and write
D9C000
heap
page read and write
1D5457C5000
heap
page read and write
2286D53B000
trusted library allocation
page read and write
1D545EE9000
heap
page read and write
2CFE000
trusted library allocation
page read and write
4A0000
heap
page read and write
3A70000
trusted library allocation
page read and write
2286E558000
heap
page read and write
2A9E9420000
heap
page read and write
23D4CC65000
trusted library allocation
page read and write
2286D536000
trusted library allocation
page read and write
6C4000
heap
page read and write
16F5155B000
heap
page read and write
16F53370000
trusted library allocation
page read and write
D58000
heap
page read and write
16BBDAC7000
heap
page read and write
16F5336F000
trusted library allocation
page read and write
49DEE7E000
stack
page read and write
21EAE002000
unkown
page read and write
2286DA99000
heap
page read and write
75B000
stack
page read and write
3A75000
trusted library allocation
page read and write
65F000
heap
page read and write
2286D548000
trusted library allocation
page read and write
49DFEFD000
stack
page read and write
93D000
stack
page read and write
14F0000
heap
page read and write
16F5336D000
trusted library allocation
page read and write
147C000
heap
page read and write
1D5457A0000
heap
page read and write
149E000
heap
page read and write
22AC000
direct allocation
page read and write
149E000
heap
page read and write
35AC000
heap
page read and write
1D5457A9000
heap
page read and write
2286E698000
heap
page read and write
2286D240000
trusted library allocation
page read and write
6C4000
heap
page read and write
2286D546000
trusted library allocation
page read and write
16F51578000
heap
page read and write
16F53372000
trusted library allocation
page read and write
2286DAE5000
heap
page read and write
6C4000
heap
page read and write
14D7000
heap
page read and write
B90000
heap
page read and write
16F5336B000
trusted library allocation
page read and write
149E000
heap
page read and write
16F51572000
heap
page read and write
DB0000
unkown
page readonly
3935000
heap
page read and write
16F51573000
heap
page read and write
BBF000
heap
page read and write
2AFE000
trusted library allocation
page read and write
49DFFFE000
unkown
page readonly
16F53377000
trusted library allocation
page read and write
16F53372000
trusted library allocation
page read and write
3590000
heap
page read and write
1D5457BB000
heap
page read and write
4890000
heap
page read and write
23D4CDB0000
trusted library allocation
page read and write
2286D559000
trusted library allocation
page read and write
6C4000
heap
page read and write
5F3000
heap
page read and write
16F515E4000
trusted library allocation
page read and write
2286E9B7000
heap
page read and write
16F515E0000
trusted library allocation
page read and write
3934000
heap
page read and write
16F51515000
heap
page read and write
16F5155B000
heap
page read and write
2286D55C000
trusted library allocation
page read and write
2286E6EE000
heap
page read and write
2A9E9815000
heap
page read and write
6C5000
heap
page read and write
1488000
heap
page read and write
16F51533000
heap
page read and write
2EC3000
trusted library allocation
page read and write
6E77000
direct allocation
page read and write
382F000
stack
page read and write
2EA0000
unkown
page read and write
2EC0000
trusted library allocation
page read and write
3A74000
trusted library allocation
page read and write
2286E8C1000
heap
page read and write
14A0000
heap
page read and write
6C4000
heap
page read and write
1A4A8C55000
heap
page read and write
1D5457BE000
heap
page read and write
6C4000
heap
page read and write
623000
heap
page read and write
49DEBFB000
stack
page read and write
23D48520000
trusted library allocation
page read and write
165D000
stack
page read and write
6C4000
heap
page read and write
16F5155D000
heap
page read and write
16F5336A000
trusted library allocation
page read and write
2ED8000
trusted library allocation
page read and write
57B000
stack
page read and write
6C4000
heap
page read and write
49DF77E000
unkown
page readonly
7744000
direct allocation
page read and write
468000
heap
page read and write
2286DAFF000
trusted library allocation
page read and write
1D5457A9000
heap
page read and write
2286D553000
trusted library allocation
page read and write
6C4000
heap
page read and write
2286DA6C000
heap
page read and write
6C4000
heap
page read and write
6C4000
heap
page read and write
A80000
heap
page read and write
2DC907A000
stack
page read and write
AC4000
unkown
page read and write
6383AFA000
stack
page read and write
16F51571000
heap
page read and write
2286D538000
trusted library allocation
page read and write
16F5336D000
trusted library allocation
page read and write
2286D548000
trusted library allocation
page read and write
16F51640000
heap
page read and write
6C4000
heap
page read and write
16F53374000
trusted library allocation
page read and write
2DC92F9000
stack
page read and write
16F5336D000
trusted library allocation
page read and write
16F5336C000
trusted library allocation
page read and write
2286DB43000
trusted library allocation
page read and write
16F5155D000
heap
page read and write
6C4000
heap
page read and write
6C4000
heap
page read and write
BA2000
heap
page read and write
21EAF710000
heap
page read and write
2286D534000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
4080000
heap
page read and write
2286E588000
heap
page read and write
16F5336A000
trusted library allocation
page read and write
2286DB4E000
trusted library allocation
page read and write
3611000
heap
page read and write
21EAE207000
heap
page read and write
6C5000
heap
page read and write
16F51571000
heap
page read and write
2286DABB000
heap
page read and write
16F5336C000
trusted library allocation
page read and write
16F5336B000
trusted library allocation
page read and write
CDE000
stack
page read and write
2286D544000
trusted library allocation
page read and write
20D8000
direct allocation
page read and write
23D47628000
heap
page read and write
B90000
heap
page read and write
2286E6F1000
heap
page read and write
16F53372000
trusted library allocation
page read and write
BD3000
heap
page read and write
23D4CB00000
heap
page read and write
25A0000
heap
page read and write
16F515E4000
trusted library allocation
page read and write
49DF07E000
stack
page read and write
6C4000
heap
page read and write
ACA000
unkown
page readonly
2286E737000
heap
page read and write
9A2000
heap
page read and write
16F515E0000
trusted library allocation
page read and write
16F516C0000
heap
page read and write
2CF1000
trusted library allocation
page read and write
2286D50C000
trusted library allocation
page read and write
A70000
unkown
page readonly
16F51571000
heap
page read and write
65B000
stack
page read and write
16F5336C000
trusted library allocation
page read and write
BAF000
heap
page read and write
2286DB0F000
trusted library allocation
page read and write
1D5457BB000
heap
page read and write
16F51562000
heap
page read and write
2CF9000
trusted library allocation
page read and write
2286DB08000
trusted library allocation
page read and write
2286DA28000
heap
page read and write
A22000
heap
page read and write
2286D509000
trusted library allocation
page read and write
16F53374000
trusted library allocation
page read and write
6C4000
heap
page read and write
16F5336B000
trusted library allocation
page read and write
23D4CC94000
trusted library allocation
page read and write
23D4CD35000
trusted library allocation
page read and write
16F5157C000
heap
page read and write
49DEAFE000
unkown
page readonly
2286E6EE000
heap
page read and write
16F51572000
heap
page read and write
2286DA1D000
heap
page read and write
16F515E0000
trusted library allocation
page read and write
BD357FE000
unkown
page readonly
16F5155C000
heap
page read and write
1D545D70000
heap
page read and write
2DC93F9000
stack
page read and write
2286D503000
trusted library allocation
page read and write
B9A000
heap
page read and write
16F514E8000
heap
page read and write
21EAE200000
heap
page read and write
6C4000
heap
page read and write
3410000
heap
page read and write
5BC000
heap
page read and write
6C4000
heap
page read and write
5D4000
heap
page read and write
A18000
heap
page read and write
2286DA0A000
heap
page read and write
1D547820000
heap
page read and write
16F51575000
heap
page read and write
2286DAF8000
trusted library allocation
page read and write
16F51515000
heap
page read and write
16F53375000
trusted library allocation
page read and write
A4C000
heap
page read and write
16F5157C000
heap
page read and write
1D545ECE000
heap
page read and write
16F5155C000
heap
page read and write
1D545762000
heap
page read and write
2286D545000
trusted library allocation
page read and write
6C5000
heap
page read and write
A24000
heap
page read and write
2286DA28000
heap
page read and write
23D476FF000
heap
page read and write
6C4000
heap
page read and write
16F51515000
heap
page read and write
70D000
stack
page read and write
2286E588000
heap
page read and write
16F53373000
trusted library allocation
page read and write
2286DB40000
trusted library allocation
page read and write
16F53361000
trusted library allocation
page read and write
2286DB18000
trusted library allocation
page read and write
16F515E0000
trusted library allocation
page read and write
BB0000
heap
page read and write
16F5155C000
heap
page read and write
623000
heap
page read and write
2900000
trusted library allocation
page read and write
23D4CD38000
trusted library allocation
page read and write
FC000
stack
page read and write
E0C000
unkown
page readonly
2286E61C000
heap
page read and write
2286DA8A000
heap
page read and write
16F53376000
trusted library allocation
page read and write
4A0000
heap
page read and write
6C4000
heap
page read and write
23D4CC30000
trusted library allocation
page read and write
2286E6FC000
heap
page read and write
BDB000
heap
page read and write
6C4000
heap
page read and write
16F53372000
trusted library allocation
page read and write
E06000
unkown
page read and write
16F53373000
trusted library allocation
page read and write
2286E578000
heap
page read and write
6C4000
heap
page read and write
2286D525000
trusted library allocation
page read and write
16F53372000
trusted library allocation
page read and write
16F53365000
trusted library allocation
page read and write
6C4000
heap
page read and write
2286DAF0000
trusted library allocation
page read and write
2286DAB0000
heap
page read and write
16F5336F000
trusted library allocation
page read and write
16F53370000
trusted library allocation
page read and write
2286E81E000
heap
page read and write
1D545990000
trusted library allocation
page read and write
16F53373000
trusted library allocation
page read and write
3E2E000
stack
page read and write
2286E642000
heap
page read and write
40C000
unkown
page write copy
2286DA0A000
heap
page read and write
1ABED22B000
heap
page read and write
605000
heap
page read and write
16F51515000
heap
page read and write
2286D526000
trusted library allocation
page read and write
1486000
heap
page read and write
2286E5C0000
heap
page read and write
2286D537000
trusted library allocation
page read and write
30CE000
stack
page read and write
2286C5F2000
heap
page read and write
16F5157C000
heap
page read and write
2286E7FA000
heap
page read and write
A90000
heap
page read and write
F24000
trusted library allocation
page read and write
2286E5E4000
heap
page read and write
14EE000
heap
page read and write
623000
heap
page read and write
2286E51E000
heap
page read and write
2286DB16000
trusted library allocation
page read and write
6C4000
heap
page read and write
6C4000
heap
page read and write
2ACC000
heap
page read and write
2B00000
trusted library allocation
page read and write
2286EA63000
heap
page read and write
7C1000
unkown
page execute read
3CEF000
stack
page read and write
16F51533000
heap
page read and write
49DECFE000
unkown
page readonly
2D00000
heap
page read and write
1A4A8900000
heap
page read and write
There are 2806 hidden memdumps, click here to show them.