IOC Report
OnLine_Install_Dialog_UI_SSL.exe

loading gif

Files

File Path
Type
Category
Malicious
OnLine_Install_Dialog_UI_SSL.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\{01D63416-83E7-40B7-AE24-D6A69AAB6DCA}\setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\FORCS\OZWebLauncher\MimD4C6.tmp
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\MimeTypes.config (copy)
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\OZGD4D8.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\OZGetUserToken.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\OZWD537.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\OZWD558.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\OZWD559.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\OZWD579.tmp
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\OZWD57A.tmp (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\OZWD57B.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\OZWD5DA.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\OZWD629.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\OZWD678.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\OZWD6D7.tmp
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\OZWLBridge.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\OZWLBridgeForUAC.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\OZWLNotify.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\OZWLService.exe (copy)
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\OZWebLauncher.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\OZWebLauncher.exe.config (copy)
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\OZWebLauncherUtil.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\OZWebLauncherUtil.exe.config (copy)
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\SysD707.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\System.Net.Json.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\WebD708.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\WebSockets.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\ZTUACControl.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\ZTUD813.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\ZTrD718.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\ZTransferLib.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\forD4C5.tmp
data
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\forcscert.pfx (copy)
data
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\ozcD4D7.tmp
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\ozcert.js (copy)
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\ozvD4F8.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FORCS\OZWebLauncher\ozverify.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\InstallShield Installation Information\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\0x0409.ini (copy)
Unicode text, UTF-16, little-endian text, with very long lines (308), with CRLF line terminators
dropped
C:\Program Files (x86)\InstallShield Installation Information\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\0x0411.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\InstallShield Installation Information\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\0x0412.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\InstallShield Installation Information\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\0x0C416.tmp
Unicode text, UTF-16, little-endian text, with very long lines (308), with CRLF line terminators
dropped
C:\Program Files (x86)\InstallShield Installation Information\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\0x0C427.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\InstallShield Installation Information\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\0x0C9B6.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\InstallShield Installation Information\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\ISSC3E7.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
dropped
C:\Program Files (x86)\InstallShield Installation Information\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\ISSetup.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
dropped
C:\Program Files (x86)\InstallShield Installation Information\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\datC309.tmp
InstallShield CAB
dropped
C:\Program Files (x86)\InstallShield Installation Information\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\datC319.tmp
InstallShield CAB
dropped
C:\Program Files (x86)\InstallShield Installation Information\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\data1.cab (copy)
InstallShield CAB
dropped
C:\Program Files (x86)\InstallShield Installation Information\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\data1.hdr (copy)
InstallShield CAB
dropped
C:\Program Files (x86)\InstallShield Installation Information\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\layC2E9.tmp
data
dropped
C:\Program Files (x86)\InstallShield Installation Information\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\layout.bin (copy)
data
dropped
C:\Program Files (x86)\InstallShield Installation Information\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\setC3A7.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\InstallShield Installation Information\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\setC9C7.tmp
data
dropped
C:\Program Files (x86)\InstallShield Installation Information\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\setD495.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\InstallShield Installation Information\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\setup.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\InstallShield Installation Information\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\setup.ilg (copy)
Composite Document File V2 Document, Cannot read section info
dropped
C:\Program Files (x86)\InstallShield Installation Information\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\setup.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\InstallShield Installation Information\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\setup.inx (copy)
data
dropped
C:\Program Files\Mozilla Firefox\defaults\pref\ozcE786.tmp
ASCII text, with no line terminators
modified
C:\Program Files\Mozilla Firefox\defaults\pref\ozcert.js (copy)
ASCII text, with no line terminators
dropped
C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\d740f826251dfc26466d955613f5a1ba_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xc2e66c4a, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\OZWLBridge.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Fri Apr 26 16:32:30 2024, mtime=Fri Apr 26 16:32:30 2024, atime=Thu Jun 16 08:28:22 2022, length=1872672, window=hide
dropped
C:\Users\user\AppData\Local\Temp\491D.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\ozweblauncher_1.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{01D63416-83E7-40B7-AE24-D6A69AAB6DCA}\0x0409.ini
Unicode text, UTF-16, little-endian text, with very long lines (308), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{01D63416-83E7-40B7-AE24-D6A69AAB6DCA}\0x0411.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{01D63416-83E7-40B7-AE24-D6A69AAB6DCA}\0x0412.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{01D63416-83E7-40B7-AE24-D6A69AAB6DCA}\Disk1\0x0409.ini
Unicode text, UTF-16, little-endian text, with very long lines (308), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{01D63416-83E7-40B7-AE24-D6A69AAB6DCA}\Disk1\0x0411.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{01D63416-83E7-40B7-AE24-D6A69AAB6DCA}\Disk1\0x0412.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{01D63416-83E7-40B7-AE24-D6A69AAB6DCA}\Disk1\ISSetup.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
dropped
C:\Users\user\AppData\Local\Temp\{01D63416-83E7-40B7-AE24-D6A69AAB6DCA}\Disk1\data1.cab
InstallShield CAB
dropped
C:\Users\user\AppData\Local\Temp\{01D63416-83E7-40B7-AE24-D6A69AAB6DCA}\Disk1\data1.hdr
InstallShield CAB
dropped
C:\Users\user\AppData\Local\Temp\{01D63416-83E7-40B7-AE24-D6A69AAB6DCA}\Disk1\layout.bin
data
dropped
C:\Users\user\AppData\Local\Temp\{01D63416-83E7-40B7-AE24-D6A69AAB6DCA}\Disk1\setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{01D63416-83E7-40B7-AE24-D6A69AAB6DCA}\Disk1\setup.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{01D63416-83E7-40B7-AE24-D6A69AAB6DCA}\Disk1\setup.inx
data
dropped
C:\Users\user\AppData\Local\Temp\{01D63416-83E7-40B7-AE24-D6A69AAB6DCA}\ISSetup.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
dropped
C:\Users\user\AppData\Local\Temp\{01D63416-83E7-40B7-AE24-D6A69AAB6DCA}\setup.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\ISB4A97.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\ISBEW64.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\cor4A65.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\corecomp.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\dot4A95.tmp
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\dot4A96.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\dotnetinstaller.exe (copy)
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\dotnetinstaller.exe.config (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\Clo494E.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\Clo49EF.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\CloseOZWLBridge.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\CloseOZWebLauncher.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\DIF4A64.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\DIFxData.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\Fon4A53.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\FontData.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\Str4AB7.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\StringTable_0x0409.ips (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\ZTU49AD.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\ZTU49AE.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\ZTUACControl.bat (copy)
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\ZTUACControl.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\ZTr49EE.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\ZTransferXUAC.bat (copy)
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\_is4AD9.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\_isres_0x0409.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\add4A40.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\add4A41.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\addfirewall.bat (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\addfirewall32.bat (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\def4AD8.tmp
RIFF (little-endian) data, palette, 1168 bytes, data size 1028, 256 entries, extra bytes 0x6f66666c
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\default.pal (copy)
RIFF (little-endian) data, palette, 1168 bytes, data size 1028, 256 entries, extra bytes 0x6f66666c
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\del4A51.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\del4A52.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\deletefirewall.bat (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\deletefirewall32.bat (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\dot49BF.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\dotNetFx_45.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\isr4AC8.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\isrt.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\ozc4A3F.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\ozcert.js (copy)
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\set493E.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\setup.inx (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\97e828cd0105f5dc8974dc728e950457_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\Temp\OZWLService.log
data
dropped
C:\Windows\Temp\OZWebLauncherUtil.log
ASCII text, with CRLF line terminators
dropped
C:\Windows\ZTUACControl.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ZTUE4B7.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CR, LF line terminators
dropped
There are 124 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\Temp\{01D63416-83E7-40B7-AE24-D6A69AAB6DCA}\setup.exe
C:\Users\user\AppData\Local\Temp\{01D63416-83E7-40B7-AE24-D6A69AAB6DCA}\setup.exe -package:"C:\Users\user\Desktop\OnLine_Install_Dialog_UI_SSL.exe" -no_selfdeleter -IS_temp -media_path:"C:\Users\user\AppData\Local\Temp\{01D63416-83E7-40B7-AE24-D6A69AAB6DCA}\Disk1\" -tempdisk1folder:"C:\Users\user\AppData\Local\Temp\{01D63416-83E7-40B7-AE24-D6A69AAB6DCA}\" -IS_OriginalLauncher:"C:\Users\user\AppData\Local\Temp\{01D63416-83E7-40B7-AE24-D6A69AAB6DCA}\Disk1\setup.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\addfirewall.bat /s /v/q
malicious
C:\Windows\SysWOW64\netsh.exe
netsh advfirewall firewall add rule name="OZWebLauncherFireWall" dir=in program="C:\Program Files (x86)\Forcs\OZWebLauncher\OZWebLauncher.exe" action=allow
malicious
C:\Windows\SysWOW64\netsh.exe
netsh advfirewall firewall add rule name="OZWebLauncherUtilFireWall" dir=in program="C:\Program Files (x86)\Forcs\OZWebLauncher\OZWebLauncherUtil.exe" action=allow
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\ZTUACControl.bat /s /v/q
malicious
C:\Program Files (x86)\FORCS\OZWebLauncher\OZWebLauncher.exe
"C:\Program Files (x86)\FORCS\OZWebLauncher\OZWebLauncher.exe"
malicious
C:\Users\user\Desktop\OnLine_Install_Dialog_UI_SSL.exe
"C:\Users\user\Desktop\OnLine_Install_Dialog_UI_SSL.exe"
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{5E314697-D110-4002-B63C-61B432079D77}
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{1856CA6F-3A7F-472E-B337-2E3FA07FC85C}
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0F0A08E8-A0D1-45AD-AF2B-F10D703CD02A}
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{BAB69511-4FCB-4C17-80A3-43394505337C}
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{10BFDE1A-F312-4E1F-BEA2-24F4DCA4D57F}
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\ISBEW64.exe
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{54B59A05-F3F9-4E3A-8D72-1C938585C9B4}
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\CloseOZWLBridge.exe
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\CloseOZWLBridge.exe
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\CloseOZWebLauncher.exe
C:\Users\user\AppData\Local\Temp\{FA31C5CE-E965-4705-8F4B-CC3E0950E560}\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}\CloseOZWebLauncher.exe
C:\Windows\System32\VSSVC.exe
C:\Windows\system32\vssvc.exe
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k swprv
C:\Windows\System32\SrTasks.exe
C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\CheckNetIsolation.exe
CheckNetIsolation LoopbackExempt -a -n="Microsoft.MicrosoftEdge_8wekyb3d8bbwe"
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\SysWOW64\regsvr32 /s /uC:\Windows\ZTUACControl.dll
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\SysWOW64\regsvr32 /s C:\Windows\ZTUACControl.dll
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\regsvr32.exe
regsvr32 /s c:\Windows\ZTUACControl.dll
C:\Windows\SysWOW64\timeout.exe
timeout /t 5
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files (x86)\FORCS\OZWebLauncher\OZWLService.exe
"C:\Program Files (x86)\FORCS\OZWebLauncher\OZWLService.exe"
C:\Program Files (x86)\FORCS\OZWebLauncher\OZWebLauncherUtil.exe
"C:\Program Files (x86)\FORCS\OZWebLauncher\OZWebLauncherUtil.exe"
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\SysWOW64\timeout.exe
timeout /t 5
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 22 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://=0x%04x.iniMS
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://ocsp.thawte.com0
unknown
http://deviis4.installshield.com/NetNirvana/
unknown
http://www.tiro.com
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
http://www.fontbureau.com/designers
unknown
http://www.installshield.com/isetup/ProErrorCentral.asp?ErrorCode=%d
unknown
http://www.goodfont.co.kr
unknown
http://www.symauth.com/cps0(
unknown
https://.8T)
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
https://g.live.com/odclientsettings/Prod.C:
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://foo/bar/mainwindow.baml
unknown
http://foo/bar/mainwindow.bamld
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://g.live.com/odclientsettings/ProdV2
unknown
http://defaultcontainer/MainWindow.xamld
unknown
http://foo/MainWindow.xaml
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
unknown
http://www.symauth.com/rpa00
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://https://.././SOFTWARE
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.flexerasoftware.com0
unknown
http://www.sakkal.com
unknown
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
unknown
There are 34 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\717D6C878B0B3041D21EA17EADD7ADD47C44DF25
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
AoACAPIError
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
AoACAPIResult
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
FirstRun
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
LastIndex
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
NestingLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
StartNesting
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore
SRInitDone
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
SrCreateRp (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
SrCreateRp (Leave)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}
AppID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}
LocalizedString
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\Control
*
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\Elevation
Enabled
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\MiscStatus
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\MiscStatus\1
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\ProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\Programmable
*
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\ToolboxBitmap32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\Version
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\VersionIndependentProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\StartupFolder
OZWebLauncher.lnk
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}
LogFile
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}
ProductGuid
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}
RegOwner
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E57AA2E7-1A7E-47FB-B362-ED04768595E6}
LogMode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ozwl
URL Protocol
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ozwl\shell\open\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
RPSessionInterval
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
LastIndex
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
NestingLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
StartNesting
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
NestingLevel
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
IDENTIFY (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
IDENTIFY (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer
IDENTIFY (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
IDENTIFY (Enter)
HKEY_LOCAL_MACHINE\BCD00000000\Description
FirmwareModified
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001
Element
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\12000002
Element
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{584f4cfd-61ca-11ee-8a62-e43725c6cdb7}\Elements\12000004
Element
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
IDENTIFY (Leave)
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{584f4cfe-61ca-11ee-8a62-e43725c6cdb7}\Elements\12000004
Element
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{a5a30fa2-3d06-4e9f-b5f4-a01df9d1fcba}\Description
Type
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{a5a30fa2-3d06-4e9f-b5f4-a01df9d1fcba}\Elements\24000001
Element
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
IDENTIFY (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
IDENTIFY (Leave)
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{a5a30fa2-3d06-4e9f-b5f4-a01df9d1fcba}\Elements\25000004
Element
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer
IDENTIFY (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_BEGINPREPARE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_BEGINPREPARE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
PREPAREBACKUP (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
PREPAREBACKUP (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
PREPAREBACKUP (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
PREPAREBACKUP (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
VSS_WS_STABLE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
PREPAREBACKUP (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
VSS_WS_STABLE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
PREPAREBACKUP (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
VSS_WS_STABLE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
GETSTATE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
GETSTATE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
GETSTATE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
GETSTATE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
GETSTATE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
GETSTATE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_ENDPREPARE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_ENDPREPARE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
PREPARESNAPSHOT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
PREPARESNAPSHOT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
PREPARESNAPSHOT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
PREPARESNAPSHOT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
PREPARESNAPSHOT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
VSS_WS_WAITING_FOR_FREEZE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
PREPARESNAPSHOT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
VSS_WS_WAITING_FOR_FREEZE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
PREPARESNAPSHOT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
VSS_WS_WAITING_FOR_FREEZE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
PREPARESNAPSHOT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_FRONT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
FREEZE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
FREEZE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
VSS_WS_WAITING_FOR_THAW (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
BKGND_FREEZE_THREAD (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_FRONT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_BACK (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_BACK (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_SYSTEM (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
FREEZE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
FREEZE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
VSS_WS_WAITING_FOR_THAW (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
BKGND_FREEZE_THREAD (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_SYSTEM (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_KTM (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_KTM (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_RM (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
FREEZE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
FREEZE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
VSS_WS_WAITING_FOR_THAW (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE_RM (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
FREEZE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_PRECOMMIT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
BKGND_FREEZE_THREAD (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_PRECOMMIT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
OPEN_VOLUME_HANDLE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
OPEN_VOLUME_HANDLE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
OPEN_VOLUME_HANDLE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
OPEN_VOLUME_HANDLE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
IOCTL_FLUSH_AND_HOLD (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
IOCTL_FLUSH_AND_HOLD (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
IOCTL_RELEASE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace(__?_Volume{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}_)
IOCTL_RELEASE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
IOCTL_FLUSH_AND_HOLD (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
IOCTL_FLUSH_AND_HOLD (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
IOCTL_RELEASE (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Lovelace
IOCTL_RELEASE (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_COMMIT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_COMMIT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_POSTCOMMIT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_POSTCOMMIT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
THAW_KTM (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
THAW_KTM (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
THAW (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
THAW (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
BKGND_FREEZE_THREAD (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
THAW (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
BKGND_FREEZE_THREAD (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
THAW (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
BKGND_FREEZE_THREAD (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
THAW (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
VSS_WS_WAITING_FOR_POST_SNAPSHOT (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
THAW (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
VSS_WS_WAITING_FOR_POST_SNAPSHOT (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
THAW (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
VSS_WS_WAITING_FOR_POST_SNAPSHOT (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
THAW (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_PREFINALCOMMIT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_PREFINALCOMMIT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
POSTSNAPSHOT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
POSTSNAPSHOT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
POSTSNAPSHOT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
POSTSNAPSHOT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
POSTSNAPSHOT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
VSS_WS_WAITING_FOR_BACKUP_COMPLETE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
POSTSNAPSHOT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
VSS_WS_WAITING_FOR_BACKUP_COMPLETE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
POSTSNAPSHOT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
VSS_WS_WAITING_FOR_BACKUP_COMPLETE (SetCurrentState)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
POSTSNAPSHOT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_POSTFINALCOMMIT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_POSTFINALCOMMIT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_ABORTSNAPSHOTS (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_ABORTSNAPSHOTS (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
ABORT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
ABORT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
ABORT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
ABORT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
ABORT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
ABORT (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
ABORT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
ABORT (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
BACKUPSHUTDOWN (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
BACKUPSHUTDOWN (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
BACKUPSHUTDOWN (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
BACKUPSHUTDOWN (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
BACKUPSHUTDOWN (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
BACKUPSHUTDOWN (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
BACKUPSHUTDOWN (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssvcPublisher
BACKUPSHUTDOWN (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{B152CEE4-4106-4e81-A288-69097069B582}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{B152CEE4-4106-4e81-A288-69097069B582}
DllSurrogate
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\ZtransferForVistaEx.DLL
AppID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ZtransferForVista1.ZTUACBroker.1
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ZtransferForVista1.ZTUACBroker.1\CLSID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ZtransferForVista1.ZTUACBroker
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ZtransferForVista1.ZTUACBroker\CLSID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ZtransferForVista1.ZTUACBroker\CurVer
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\ProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\VersionIndependentProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}
AppID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\ToolboxBitmap32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\MiscStatus
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\MiscStatus\1
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\Elevation
Enabled
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}
LocalizedString
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\Version
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{1740349F-8DF9-484D-A062-06E402F94972}\0.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{1740349F-8DF9-484D-A062-06E402F94972}\0.0\FLAGS
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{1740349F-8DF9-484D-A062-06E402F94972}\0.0\0\win32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{1740349F-8DF9-484D-A062-06E402F94972}\0.0\HELPDIR
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{236EAE34-616D-43D8-B18D-9AA074932AA6}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{236EAE34-616D-43D8-B18D-9AA074932AA6}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{236EAE34-616D-43D8-B18D-9AA074932AA6}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{236EAE34-616D-43D8-B18D-9AA074932AA6}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{236EAE34-616D-43D8-B18D-9AA074932AA6}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{236EAE34-616D-43D8-B18D-9AA074932AA6}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{236EAE34-616D-43D8-B18D-9AA074932AA6}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{236EAE34-616D-43D8-B18D-9AA074932AA6}\TypeLib
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{236EAE34-616D-43D8-B18D-9AA074932AA6}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{236EAE34-616D-43D8-B18D-9AA074932AA6}\InProcServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{236EAE34-616D-43D8-B18D-9AA074932AA6}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{236EAE34-616D-43D8-B18D-9AA074932AA6}\NumMethods
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{236EAE34-616D-43D8-B18D-9AA074932AA6}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\ProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\VersionIndependentProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}
AppID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\ToolboxBitmap32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\MiscStatus
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\MiscStatus\1
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\TypeLib
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\Elevation
Enabled
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}
LocalizedString
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3031E58D-AB35-4AB1-A84A-9A63637D289C}\Version
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{236EAE34-616D-43D8-B18D-9AA074932AA6}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{236EAE34-616D-43D8-B18D-9AA074932AA6}\InProcServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{236EAE34-616D-43D8-B18D-9AA074932AA6}\ProxyStubClsid32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 356 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5C0000
trusted library allocation
page read and write
2640000
heap
page read and write
30BF000
stack
page read and write
7FF7D9456000
unkown
page read and write
34C7000
heap
page read and write
2848FE96000
trusted library allocation
page read and write
2730000
heap
page read and write
1500000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
17AD2F17000
heap
page read and write
5C0000
trusted library allocation
page read and write
775EEFF000
stack
page read and write
5C0000
trusted library allocation
page read and write
88A000
heap
page read and write
2848DDBE000
heap
page read and write
1150000
trusted library allocation
page read and write
2848DDCA000
heap
page read and write
4A3E000
heap
page read and write
17AD332A000
heap
page read and write
17AD26DE000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848FE97000
trusted library allocation
page read and write
7FF7D945A000
unkown
page read and write
4260000
trusted library allocation
page read and write
5B03A7D000
stack
page read and write
280CD0F0000
heap
page read and write
E01E1FF000
stack
page read and write
4C24000
heap
page read and write
27A0000
heap
page read and write
17AD2E91000
heap
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
509000
unkown
page readonly
59CE000
trusted library allocation
page read and write
22FDCB00000
heap
page read and write
89E000
heap
page read and write
5C0000
trusted library allocation
page read and write
878000
heap
page read and write
5C0000
trusted library allocation
page read and write
1403000
trusted library allocation
page execute and read and write
59B0000
trusted library allocation
page read and write
610000
heap
page read and write
857000
heap
page read and write
4E20000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD2F89000
heap
page read and write
2848DD91000
heap
page read and write
277A000
heap
page read and write
31EE000
stack
page read and write
17AD26D4000
trusted library allocation
page read and write
2848FE90000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
17AD26C2000
trusted library allocation
page read and write
17AD381E000
heap
page read and write
2848FE94000
trusted library allocation
page read and write
E6767FE000
stack
page read and write
2C5532D1000
trusted library allocation
page read and write
17AD2EA0000
heap
page read and write
4E30000
heap
page read and write
674E000
stack
page read and write
17AD26D3000
trusted library allocation
page read and write
E675C7D000
stack
page read and write
33E4000
heap
page read and write
17AD32B8000
heap
page read and write
5C0000
trusted library allocation
page read and write
970000
heap
page read and write
7FF7D9456000
unkown
page read and write
2768000
heap
page read and write
2848FE8C000
trusted library allocation
page read and write
7FF7D9431000
unkown
page execute read
17AD26FD000
trusted library allocation
page read and write
7D3E000
heap
page read and write
F0404FE000
stack
page read and write
4A5E000
heap
page read and write
5C0000
trusted library allocation
page read and write
400000
unkown
page readonly
2848FE96000
trusted library allocation
page read and write
17AD3CB0000
trusted library allocation
page read and write
3180000
heap
page read and write
17AD26C0000
trusted library allocation
page read and write
2848FE94000
trusted library allocation
page read and write
27A7000
heap
page read and write
E67547E000
unkown
page readonly
1150000
trusted library allocation
page read and write
8A3000
heap
page read and write
1500000
trusted library allocation
page read and write
7FF7D9431000
unkown
page execute read
1500000
trusted library allocation
page read and write
2C5533F0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
17AD2AAC000
trusted library allocation
page read and write
17AD32E8000
heap
page read and write
2848FE8F000
trusted library allocation
page read and write
17AD2701000
trusted library allocation
page read and write
2848FE8B000
trusted library allocation
page read and write
849000
heap
page read and write
17AD2734000
trusted library allocation
page read and write
28CF000
heap
page read and write
830000
heap
page read and write
17AD2EA3000
heap
page read and write
2848DD85000
heap
page read and write
2848FE95000
trusted library allocation
page read and write
17AD26F7000
trusted library allocation
page read and write
1D80000
heap
page read and write
C28000
heap
page read and write
2848FE96000
trusted library allocation
page read and write
7FF7D945A000
unkown
page read and write
4AE000
unkown
page readonly
1500000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
17AD3245000
heap
page read and write
2848DDBD000
heap
page read and write
5B04079000
stack
page read and write
32A8000
heap
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848FE96000
trusted library allocation
page read and write
2848FE94000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
14FC000
stack
page read and write
5C0000
trusted library allocation
page read and write
2848FE90000
trusted library allocation
page read and write
278B000
heap
page read and write
17AD2F8E000
heap
page read and write
17AD3CCA000
trusted library allocation
page read and write
3220000
heap
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
17AD33EB000
heap
page read and write
838000
heap
page read and write
2848FE92000
trusted library allocation
page read and write
17AD2712000
trusted library allocation
page read and write
F50000
unkown
page readonly
280CCFE0000
heap
page read and write
17AD337B000
heap
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
34D6000
heap
page read and write
5CE25FE000
stack
page read and write
17AD330A000
heap
page read and write
2848DDBD000
heap
page read and write
2848DDBE000
heap
page read and write
1150000
trusted library allocation
page read and write
2848FE91000
trusted library allocation
page read and write
E674F7C000
stack
page read and write
2C55360E000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
2C553240000
trusted library allocation
page read and write
17AD3610000
heap
page read and write
2925000
heap
page read and write
2848FE93000
trusted library allocation
page read and write
1078000
unkown
page readonly
4B6D000
heap
page read and write
1500000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
17AD2F14000
heap
page read and write
17AD34D7000
heap
page read and write
2848DF20000
trusted library allocation
page read and write
17AD26F9000
trusted library allocation
page read and write
17AD2AAF000
trusted library allocation
page read and write
2848DDD1000
heap
page read and write
87E000
heap
page read and write
4BC0000
heap
page read and write
5C0000
trusted library allocation
page read and write
7FF7D945B000
unkown
page readonly
2848FE90000
trusted library allocation
page read and write
21F17855000
heap
page read and write
2848FE8B000
trusted library allocation
page read and write
2848DF20000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
2848FE8E000
trusted library allocation
page read and write
2848FE90000
trusted library allocation
page read and write
17AD34D7000
heap
page read and write
21F1786B000
heap
page read and write
17AD3227000
heap
page read and write
1D202EB0000
heap
page read and write
4260000
trusted library allocation
page read and write
2848DD93000
heap
page read and write
844000
heap
page read and write
334E000
stack
page read and write
2848FE93000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
7FF7D9431000
unkown
page execute read
7FF7D945B000
unkown
page readonly
2848FE92000
trusted library allocation
page read and write
822000
heap
page read and write
1150000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848DDD1000
heap
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
17AD3559000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD26FD000
trusted library allocation
page read and write
7FF7D9430000
unkown
page readonly
5C0000
trusted library allocation
page read and write
2C54DE93000
heap
page read and write
32FE000
stack
page read and write
830000
heap
page read and write
1500000
trusted library allocation
page read and write
81C000
heap
page read and write
1435000
trusted library allocation
page execute and read and write
17AD1871000
heap
page read and write
2848F950000
heap
page read and write
295D000
heap
page read and write
1C10000
trusted library allocation
page read and write
4A20000
trusted library allocation
page read and write
32AE000
unkown
page read and write
DC8000
stack
page read and write
1500000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
27D9000
heap
page read and write
530000
heap
page read and write
4A93000
heap
page read and write
17AD3376000
heap
page read and write
17AD26F2000
trusted library allocation
page read and write
730000
heap
page read and write
1500000
trusted library allocation
page read and write
82E000
heap
page read and write
2C553390000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
27AB000
heap
page read and write
2848FA70000
heap
page read and write
17AD3CC0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
2848DFB0000
heap
page read and write
21F1780B000
unkown
page read and write
80E000
heap
page read and write
17AD2F38000
heap
page read and write
37F0000
heap
page read and write
7FF7D9430000
unkown
page readonly
17AD3287000
heap
page read and write
17AD2AAA000
trusted library allocation
page read and write
295A000
heap
page read and write
2C54EED0000
trusted library section
page readonly
2848FE95000
trusted library allocation
page read and write
2848FE8E000
trusted library allocation
page read and write
3120000
heap
page read and write
1500000
trusted library allocation
page read and write
2848FE90000
trusted library allocation
page read and write
31E0000
heap
page read and write
1213000
trusted library allocation
page execute and read and write
17AD319F000
heap
page read and write
2848FE8F000
trusted library allocation
page read and write
827000
heap
page read and write
5DCF000
stack
page read and write
1500000
trusted library allocation
page read and write
17AD3CB6000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
17AD2730000
trusted library allocation
page read and write
2747000
heap
page read and write
2848FE92000
trusted library allocation
page read and write
2C553707000
trusted library allocation
page read and write
1419000
trusted library allocation
page read and write
2848DDD1000
heap
page read and write
2848FE91000
trusted library allocation
page read and write
236E000
stack
page read and write
2848DD7C000
heap
page read and write
5C0000
trusted library allocation
page read and write
877000
heap
page read and write
2C553600000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
8A6000
heap
page read and write
12F0000
heap
page read and write
28E7000
heap
page read and write
11C1000
heap
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5D3E000
stack
page read and write
2848FE96000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
21F17902000
trusted library allocation
page read and write
2C5534FE000
heap
page read and write
1150000
trusted library allocation
page read and write
E6759FE000
stack
page read and write
7FF7D9447000
unkown
page readonly
1150000
trusted library allocation
page read and write
E674977000
stack
page read and write
820000
heap
page read and write
17AD3CC0000
trusted library allocation
page read and write
17AD2F08000
heap
page read and write
1500000
trusted library allocation
page read and write
17AD26EB000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
4A5E000
heap
page read and write
17AD3790000
heap
page read and write
59DD000
trusted library allocation
page read and write
854000
heap
page read and write
17AD3223000
heap
page read and write
1500000
trusted library allocation
page read and write
17AD1828000
heap
page read and write
2848DF20000
trusted library allocation
page read and write
17AD2AA1000
trusted library allocation
page read and write
17AD2F5D000
heap
page read and write
140D000
heap
page read and write
2848FE96000
trusted library allocation
page read and write
2961000
heap
page read and write
17AD26DC000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
7FF7D9430000
unkown
page readonly
2F10000
heap
page read and write
2848DD7F000
heap
page read and write
2848DDBB000
heap
page read and write
21F17C0B000
heap
page read and write
1500000
trusted library allocation
page read and write
1644000
heap
page read and write
17AD32D7000
heap
page read and write
1500000
trusted library allocation
page read and write
17AD26D2000
trusted library allocation
page read and write
2848DD93000
heap
page read and write
86F000
heap
page read and write
17AD270F000
trusted library allocation
page read and write
17AD3CA7000
trusted library allocation
page read and write
400000
unkown
page readonly
1150000
trusted library allocation
page read and write
690000
heap
page read and write
2848DF24000
trusted library allocation
page read and write
2848DF24000
trusted library allocation
page read and write
2848FE92000
trusted library allocation
page read and write
17AD34B5000
heap
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848DD91000
heap
page read and write
1150000
trusted library allocation
page read and write
17AD33EA000
heap
page read and write
17AD26F8000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
7FF7D9447000
unkown
page readonly
4A5C000
heap
page read and write
1AB1BFF4000
heap
page read and write
2E90000
heap
page read and write
2848FE95000
trusted library allocation
page read and write
17AD1871000
heap
page read and write
838000
heap
page read and write
7641DF9000
stack
page read and write
7FF7D9430000
unkown
page readonly
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
17AD359F000
heap
page read and write
17AD1DF0000
heap
page read and write
2848DDBB000
heap
page read and write
50130FE000
stack
page read and write
21F17800000
unkown
page read and write
5C0000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
28A1000
heap
page read and write
2848DD85000
heap
page read and write
1150000
trusted library allocation
page read and write
2848FE8A000
trusted library allocation
page read and write
142A000
trusted library allocation
page execute and read and write
17AD2F38000
heap
page read and write
17AD2F13000
heap
page read and write
17AD26FB000
trusted library allocation
page read and write
1EDC4F39000
heap
page read and write
4A5E000
heap
page read and write
2848FE96000
trusted library allocation
page read and write
17AD1828000
heap
page read and write
12D4000
heap
page read and write
17AD34E4000
heap
page read and write
2848DD85000
heap
page read and write
27C5000
heap
page read and write
2C54DE22000
heap
page read and write
5C0000
trusted library allocation
page read and write
2848FE91000
trusted library allocation
page read and write
81A000
heap
page read and write
5C0000
trusted library allocation
page read and write
1AB1C000000
heap
page read and write
82E000
heap
page read and write
5C0000
trusted library allocation
page read and write
2848FE8E000
trusted library allocation
page read and write
4A32000
heap
page read and write
1500000
trusted library allocation
page read and write
2848FE8F000
trusted library allocation
page read and write
2848DF20000
trusted library allocation
page read and write
3991000
heap
page read and write
7FF7D9431000
unkown
page execute read
1B0000
unkown
page readonly
55C0000
trusted library allocation
page read and write
822000
heap
page read and write
2848FE8C000
trusted library allocation
page read and write
17AD270A000
trusted library allocation
page read and write
1379000
heap
page read and write
2848FE95000
trusted library allocation
page read and write
33E3000
heap
page read and write
1500000
trusted library allocation
page read and write
17AD26ED000
trusted library allocation
page read and write
E6754FE000
stack
page read and write
81C000
heap
page read and write
5C0000
trusted library allocation
page read and write
C0477FE000
stack
page read and write
50131FE000
stack
page read and write
1150000
trusted library allocation
page read and write
893000
heap
page read and write
9A0000
heap
page read and write
2848DD40000
heap
page read and write
2848FE92000
trusted library allocation
page read and write
17AD2F17000
heap
page read and write
5C0000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
869000
heap
page read and write
17AD1824000
heap
page read and write
519000
unkown
page readonly
875000
heap
page read and write
81B000
heap
page read and write
825000
heap
page read and write
1150000
trusted library allocation
page read and write
17AD32FA000
heap
page read and write
2848FE91000
trusted library allocation
page read and write
291E000
heap
page read and write
17AD2F0B000
heap
page read and write
1500000
trusted library allocation
page read and write
E675DFE000
unkown
page readonly
17AD3203000
heap
page read and write
17AD26EA000
trusted library allocation
page read and write
1AB1BFC0000
heap
page read and write
A1F000
stack
page read and write
17AD2720000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
4AE000
unkown
page readonly
17AD3CA0000
trusted library allocation
page read and write
2848FE93000
trusted library allocation
page read and write
A84000
heap
page read and write
17AD319E000
heap
page read and write
878000
heap
page read and write
34D3000
heap
page read and write
2848DF20000
trusted library allocation
page read and write
1BF08110000
heap
page read and write
17AD26C5000
trusted library allocation
page read and write
17AD2310000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
280CE9A0000
heap
page read and write
17AD2A9B000
trusted library allocation
page read and write
2848FE95000
trusted library allocation
page read and write
17AD3203000
heap
page read and write
28A1000
heap
page read and write
2848FE97000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
17AD3CA5000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
7930000
trusted library allocation
page read and write
297A000
heap
page read and write
5C0000
trusted library allocation
page read and write
2848DDBB000
heap
page read and write
4AE000
unkown
page readonly
17AD26A1000
trusted library allocation
page read and write
2A20000
heap
page read and write
17AD26E2000
trusted library allocation
page read and write
2848DD85000
heap
page read and write
1D2047E0000
heap
page read and write
17AD3CB3000
trusted library allocation
page read and write
17AD3CB7000
trusted library allocation
page read and write
2848FE90000
trusted library allocation
page read and write
227F000
stack
page read and write
17AD3279000
heap
page read and write
2848FE95000
trusted library allocation
page read and write
2C54DE9E000
heap
page read and write
17AD3245000
heap
page read and write
17AD1828000
heap
page read and write
2848FE94000
trusted library allocation
page read and write
2848FE8D000
trusted library allocation
page read and write
21F19710000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD334F000
heap
page read and write
17AD32F7000
heap
page read and write
4C2B000
heap
page read and write
89E000
heap
page read and write
2848FE8A000
trusted library allocation
page read and write
301E000
stack
page read and write
7FF7D9447000
unkown
page readonly
2C54DEFF000
heap
page read and write
1500000
trusted library allocation
page read and write
2C5536A3000
trusted library allocation
page read and write
17AD26F4000
trusted library allocation
page read and write
17AD3375000
heap
page read and write
2777000
heap
page read and write
1150000
trusted library allocation
page read and write
323D000
stack
page read and write
1500000
trusted library allocation
page read and write
2914000
heap
page read and write
1500000
trusted library allocation
page read and write
2C553462000
heap
page read and write
17AD26E1000
trusted library allocation
page read and write
17AD26EF000
trusted library allocation
page read and write
2DA1000
trusted library allocation
page read and write
2848DDD1000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD3CBE000
trusted library allocation
page read and write
2848FE8E000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848DDBD000
heap
page read and write
22FDE4E0000
heap
page read and write
7FF7D945B000
unkown
page readonly
17AD2739000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
17AD32C5000
heap
page read and write
17AD3376000
heap
page read and write
835000
heap
page read and write
50129CB000
stack
page read and write
83E000
heap
page read and write
33BC000
heap
page read and write
690000
heap
page read and write
3020000
heap
page read and write
2848DDBF000
heap
page read and write
1500000
trusted library allocation
page read and write
2848FE8F000
trusted library allocation
page read and write
2848FE96000
trusted library allocation
page read and write
839000
heap
page read and write
1500000
trusted library allocation
page read and write
2848FE8A000
trusted library allocation
page read and write
4AC7000
heap
page read and write
17AD3611000
heap
page read and write
17AD2709000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
2C54DF02000
heap
page read and write
2848FE8F000
trusted library allocation
page read and write
2848DF24000
trusted library allocation
page read and write
17AD2F3D000
heap
page read and write
2C554000000
heap
page read and write
17AD26DD000
trusted library allocation
page read and write
17AD2729000
trusted library allocation
page read and write
E6743EC000
stack
page read and write
1500000
trusted library allocation
page read and write
1AB1C004000
heap
page read and write
401000
unkown
page execute read
4A2A000
heap
page read and write
1500000
trusted library allocation
page read and write
7FF7D9431000
unkown
page execute read
2848FE93000
trusted library allocation
page read and write
17AD26C1000
trusted library allocation
page read and write
4A94000
heap
page read and write
572F000
stack
page read and write
22FDCB01000
heap
page read and write
A84000
heap
page read and write
2EAD000
stack
page read and write
2F50000
heap
page read and write
854000
heap
page read and write
1D2E000
stack
page read and write
17AD2722000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
17AD2274000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
17AD22E2000
trusted library allocation
page read and write
17AD2F3A000
heap
page read and write
17AD3480000
heap
page read and write
17AD32E4000
heap
page read and write
1D91000
trusted library allocation
page read and write
2970000
heap
page read and write
1B0000
unkown
page readonly
2848DF24000
trusted library allocation
page read and write
17AD270C000
trusted library allocation
page read and write
511E000
stack
page read and write
E674E7E000
unkown
page readonly
823000
heap
page read and write
17AD3CAF000
trusted library allocation
page read and write
822000
heap
page read and write
1500000
trusted library allocation
page read and write
2848FE92000
trusted library allocation
page read and write
2FE0000
heap
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848FE93000
trusted library allocation
page read and write
4AC7000
heap
page read and write
2848FE90000
trusted library allocation
page read and write
17AD272A000
trusted library allocation
page read and write
17AD1880000
heap
page read and write
2848DDD1000
heap
page read and write
2848DDBE000
heap
page read and write
1500000
trusted library allocation
page read and write
17AD2F77000
heap
page read and write
2848DF24000
trusted library allocation
page read and write
17AD31EF000
heap
page read and write
1150000
trusted library allocation
page read and write
2EED000
stack
page read and write
2898000
heap
page read and write
2848FE8C000
trusted library allocation
page read and write
8CE000
heap
page read and write
59B4000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848DDBE000
heap
page read and write
2848FE94000
trusted library allocation
page read and write
4095000
trusted library allocation
page read and write
4AFF000
heap
page read and write
17AD2F84000
heap
page read and write
2848DD79000
heap
page read and write
2A09000
heap
page read and write
1150000
trusted library allocation
page read and write
59BB000
trusted library allocation
page read and write
2848FE90000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
BEE000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD32E0000
heap
page read and write
2B70000
heap
page read and write
308C000
stack
page read and write
1150000
trusted library allocation
page read and write
3F2E000
stack
page read and write
17AD26E9000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
3207000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2902000
heap
page read and write
2848FE94000
trusted library allocation
page read and write
86D000
heap
page read and write
2848FE8B000
trusted library allocation
page read and write
28CF000
heap
page read and write
2C5534BB000
heap
page read and write
17AD2316000
trusted library allocation
page read and write
5F25000
heap
page read and write
36E0000
heap
page read and write
17AD3727000
heap
page read and write
2848FE91000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
17AD26D6000
trusted library allocation
page read and write
4A84000
heap
page read and write
1500000
trusted library allocation
page read and write
1AB1BFF4000
heap
page read and write
17AD3706000
heap
page read and write
59D6000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
BE0000
heap
page read and write
277A000
heap
page read and write
1150000
trusted library allocation
page read and write
2848FE9E000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
4A2B000
heap
page read and write
2848FE93000
trusted library allocation
page read and write
2848DF24000
trusted library allocation
page read and write
2848FE96000
trusted library allocation
page read and write
844000
heap
page read and write
17AD26E7000
trusted library allocation
page read and write
17AD26D7000
trusted library allocation
page read and write
21F17C02000
heap
page read and write
22FDCAA0000
heap
page read and write
4C22000
heap
page read and write
17AD3CC2000
trusted library allocation
page read and write
2970000
heap
page read and write
678E000
heap
page read and write
4B2B000
heap
page read and write
297B000
heap
page read and write
2848FE8C000
trusted library allocation
page read and write
2848DD91000
heap
page read and write
21F17813000
unkown
page read and write
1463000
heap
page read and write
17AD26DF000
trusted library allocation
page read and write
7FF7D9431000
unkown
page execute read
2848FE93000
trusted library allocation
page read and write
13F0000
heap
page read and write
5C0000
trusted library allocation
page read and write
872000
heap
page read and write
17AD26A7000
trusted library allocation
page read and write
2848FE8E000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
E675CFE000
stack
page read and write
830000
heap
page read and write
825000
heap
page read and write
2F9E000
stack
page read and write
2848DDD1000
heap
page read and write
1500000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
4C24000
heap
page read and write
2848FE8B000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848DDD1000
heap
page read and write
17AD269B000
trusted library allocation
page read and write
2848DF24000
trusted library allocation
page read and write
3140000
trusted library allocation
page read and write
2C553618000
trusted library allocation
page read and write
D1E000
stack
page read and write
5EF0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848DF20000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
4051000
trusted library allocation
page read and write
1AB1D9D0000
heap
page read and write
27F5000
heap
page read and write
825000
heap
page read and write
2848DD91000
heap
page read and write
2C553504000
heap
page read and write
31D000
unkown
page read and write
2A2B000
heap
page read and write
851000
heap
page read and write
17AD3CA4000
trusted library allocation
page read and write
7FF7D9431000
unkown
page execute read
2848FE92000
trusted library allocation
page read and write
850000
heap
page read and write
1EDC68C4000
heap
page read and write
2848DD91000
heap
page read and write
36D0000
heap
page read and write
7FF7D9430000
unkown
page readonly
17AD32DE000
heap
page read and write
21F17C07000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD2A9C000
trusted library allocation
page read and write
17AD32DE000
heap
page read and write
1150000
trusted library allocation
page read and write
2848FE90000
trusted library allocation
page read and write
17AD2F3F000
heap
page read and write
17AD2ABA000
trusted library allocation
page read and write
276A000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD2AB5000
trusted library allocation
page read and write
7641C79000
stack
page read and write
17AD3666000
heap
page read and write
17AD2AAC000
trusted library allocation
page read and write
2848FE8E000
trusted library allocation
page read and write
2848FE8B000
trusted library allocation
page read and write
2848FE8F000
trusted library allocation
page read and write
34D3000
heap
page read and write
846000
heap
page read and write
21F19713000
heap
page read and write
5B03C7A000
stack
page read and write
7FF7D945B000
unkown
page readonly
5C0000
trusted library allocation
page read and write
4AAD000
heap
page read and write
2848FE8D000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
76419F8000
stack
page read and write
2C54DF29000
heap
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
17AD3CCC000
trusted library allocation
page read and write
2848FE94000
trusted library allocation
page read and write
59E2000
trusted library allocation
page read and write
17AD3CB8000
trusted library allocation
page read and write
17AD2A93000
trusted library allocation
page read and write
17AD2721000
trusted library allocation
page read and write
2848FE90000
trusted library allocation
page read and write
5C0000
unclassified section
page read and write
1150000
trusted library allocation
page read and write
17AD2ABD000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2C54DE73000
heap
page read and write
1500000
trusted library allocation
page read and write
17AD3CAE000
trusted library allocation
page read and write
831000
heap
page read and write
1500000
trusted library allocation
page read and write
4C5D000
heap
page read and write
1AB1BFC9000
heap
page read and write
1150000
trusted library allocation
page read and write
17AD271A000
trusted library allocation
page read and write
2848DF24000
trusted library allocation
page read and write
27CC000
heap
page read and write
17AD26D4000
trusted library allocation
page read and write
2848DDD1000
heap
page read and write
2848FE91000
trusted library allocation
page read and write
17AD2735000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
17AD16F5000
heap
page read and write
2848DD91000
heap
page read and write
1AB1C001000
heap
page read and write
4A8F000
heap
page read and write
4BD2000
heap
page read and write
2C54E700000
heap
page read and write
2C54DCE0000
heap
page read and write
4A4B000
heap
page read and write
5C0000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
17AD26DA000
trusted library allocation
page read and write
2848FE90000
trusted library allocation
page read and write
2776000
heap
page read and write
8CE000
heap
page read and write
28F6000
heap
page read and write
C15ADFF000
stack
page read and write
5C0000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
843000
heap
page read and write
5C0000
trusted library allocation
page read and write
4A15000
heap
page read and write
17AD2AA5000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5F00000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
4BAE000
heap
page read and write
1300000
heap
page read and write
2848DDBB000
heap
page read and write
17AD32DB000
heap
page read and write
2848FE8A000
trusted library allocation
page read and write
2848FE8C000
trusted library allocation
page read and write
289A000
heap
page read and write
2848DF20000
trusted library allocation
page read and write
17AD26E5000
trusted library allocation
page read and write
17AD32E7000
heap
page read and write
17AD3CA3000
trusted library allocation
page read and write
2848FE8D000
trusted library allocation
page read and write
17AD3CC2000
trusted library allocation
page read and write
2848DDBD000
heap
page read and write
17AD26F3000
trusted library allocation
page read and write
17AD3CC7000
trusted library allocation
page read and write
889000
heap
page read and write
832000
heap
page read and write
2848FE92000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
BF8000
unkown
page readonly
821000
heap
page read and write
1BF08219000
heap
page read and write
17AD2AA2000
trusted library allocation
page read and write
17AD273F000
trusted library allocation
page read and write
811000
heap
page read and write
5C0000
trusted library allocation
page read and write
10CA000
unkown
page readonly
17AD3CA9000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
8B7000
heap
page read and write
17AD31EF000
heap
page read and write
1150000
trusted library allocation
page read and write
17AD2F5E000
heap
page read and write
5C0000
trusted library allocation
page read and write
2848FE8A000
trusted library allocation
page read and write
4ABF000
heap
page read and write
4265000
trusted library section
page read and write
1500000
trusted library allocation
page read and write
1AB1BE40000
heap
page read and write
17AD3284000
heap
page read and write
5C0000
trusted library allocation
page read and write
2848DD7C000
heap
page read and write
2848DDBE000
heap
page read and write
2848DD79000
heap
page read and write
2848DD91000
heap
page read and write
2848FE90000
trusted library allocation
page read and write
1EDC4F73000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD2F81000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD26F2000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848DD91000
heap
page read and write
17AD3CCB000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
2848FE94000
trusted library allocation
page read and write
14ED000
heap
page read and write
2848FE81000
trusted library allocation
page read and write
84C000
heap
page read and write
4C28000
heap
page read and write
297B000
heap
page read and write
17AD31B2000
heap
page read and write
5C0000
trusted library allocation
page read and write
2C553608000
trusted library allocation
page read and write
17AD2F7E000
heap
page read and write
36F0000
heap
page read and write
280CEAB0000
heap
page read and write
278C000
heap
page read and write
6750000
heap
page read and write
7FF7D9456000
unkown
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
276D000
heap
page read and write
21F1978E000
heap
page read and write
1500000
trusted library allocation
page read and write
17AD2F39000
heap
page read and write
7FF7D945B000
unkown
page readonly
1500000
trusted library allocation
page read and write
81E000
heap
page read and write
1150000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
8C0000
heap
page read and write
5C0000
trusted library allocation
page read and write
2880000
heap
page read and write
2C40000
heap
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
21F177B0000
heap
page read and write
2848FE8F000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848DF20000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
2848FE90000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
17AD3372000
heap
page read and write
65D4000
heap
page read and write
2C54E75A000
heap
page read and write
17AD3289000
heap
page read and write
17AD32E0000
heap
page read and write
141A000
heap
page read and write
4C2B000
heap
page read and write
7FF7D945A000
unkown
page read and write
1EDC4F51000
heap
page read and write
1500000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848FE8E000
trusted library allocation
page read and write
6D5000
heap
page read and write
17AD2A99000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848FE94000
trusted library allocation
page read and write
17AD3CC9000
trusted library allocation
page read and write
7641F7A000
stack
page read and write
E67507E000
unkown
page readonly
FA8000
stack
page read and write
BDE000
stack
page read and write
83C000
heap
page read and write
E67537E000
unkown
page readonly
1150000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
43C000
stack
page read and write
5C0000
trusted library allocation
page read and write
1426000
trusted library allocation
page execute and read and write
59AF000
stack
page read and write
1BF08255000
heap
page read and write
17AD2AB2000
trusted library allocation
page read and write
17AD2719000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848FE8C000
trusted library allocation
page read and write
835000
heap
page read and write
7FF7D9431000
unkown
page execute read
807000
heap
page read and write
7FF7D9456000
unkown
page read and write
17AD338E000
heap
page read and write
2848DD7D000
heap
page read and write
277B000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD272B000
trusted library allocation
page read and write
17AD26E7000
trusted library allocation
page read and write
17AD26F1000
trusted library allocation
page read and write
17AD3CBC000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848FE8A000
trusted library allocation
page read and write
2848FE93000
trusted library allocation
page read and write
2C5532F0000
trusted library allocation
page read and write
7FC80000
trusted library allocation
page execute and read and write
2848FE91000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848DF24000
trusted library allocation
page read and write
6760000
heap
page read and write
17AD3601000
heap
page read and write
4A78000
heap
page read and write
2848FE96000
trusted library allocation
page read and write
17AD1E09000
heap
page read and write
17AD2540000
heap
page read and write
17AD32FA000
heap
page read and write
1150000
trusted library allocation
page read and write
2A04000
heap
page read and write
1150000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
7FF7D9431000
unkown
page execute read
886000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD2272000
trusted library allocation
page read and write
17AD3257000
heap
page read and write
2848DF24000
trusted library allocation
page read and write
4BA7000
heap
page read and write
2848FE8E000
trusted library allocation
page read and write
22FDCA70000
heap
page read and write
17AD3791000
heap
page read and write
C08000
unkown
page readonly
1500000
trusted library allocation
page read and write
2C54DEB0000
heap
page read and write
854000
heap
page read and write
277A000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD26D5000
trusted library allocation
page read and write
849000
heap
page read and write
1500000
trusted library allocation
page read and write
664B000
stack
page read and write
17AD26F3000
trusted library allocation
page read and write
17AD33DB000
heap
page read and write
1500000
trusted library allocation
page read and write
2848DD85000
heap
page read and write
27FE000
heap
page read and write
17AD26F1000
trusted library allocation
page read and write
17AD26F6000
trusted library allocation
page read and write
2848FE8E000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848DD91000
heap
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
4C22000
heap
page read and write
2848FE85000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848FE8D000
trusted library allocation
page read and write
2848FE92000
trusted library allocation
page read and write
17AD2A9E000
trusted library allocation
page read and write
17AD26A8000
trusted library allocation
page read and write
750000
heap
page read and write
4BA6000
heap
page read and write
1500000
trusted library allocation
page read and write
17AD3376000
heap
page read and write
304F000
stack
page read and write
1500000
trusted library allocation
page read and write
F0406FF000
stack
page read and write
636000
stack
page read and write
1150000
trusted library allocation
page read and write
2848FE8E000
trusted library allocation
page read and write
17AD3CBD000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
2C5534F5000
heap
page read and write
1150000
trusted library allocation
page read and write
1D202F10000
heap
page read and write
4A2C000
heap
page read and write
83D000
heap
page read and write
5C0000
trusted library allocation
page read and write
4A5E000
heap
page read and write
33D0000
heap
page read and write
2848DD93000
heap
page read and write
2848DD91000
heap
page read and write
2848FE91000
trusted library allocation
page read and write
2848FE95000
trusted library allocation
page read and write
17AD2A9F000
trusted library allocation
page read and write
28E2000
heap
page read and write
5C0000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
F51000
unkown
page execute read
881000
heap
page read and write
835000
heap
page read and write
2813000
heap
page read and write
17AD2723000
trusted library allocation
page read and write
28BE000
heap
page read and write
17AD2AA9000
trusted library allocation
page read and write
2C54EDB0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2C5536BA000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848FE8B000
trusted library allocation
page read and write
17AD2F38000
heap
page read and write
2848FE8A000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848FE96000
trusted library allocation
page read and write
17AD26E4000
trusted library allocation
page read and write
17AD3503000
heap
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
C02000
unkown
page write copy
17AD1E46000
heap
page read and write
17AD31C8000
heap
page read and write
1350000
trusted library allocation
page read and write
67A3000
heap
page read and write
2FF0000
heap
page read and write
5C0000
trusted library allocation
page read and write
22FDCB03000
heap
page read and write
2848FE95000
trusted library allocation
page read and write
17AD371D000
heap
page read and write
2848FE96000
trusted library allocation
page read and write
2848DD85000
heap
page read and write
17AD26F8000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
277F000
heap
page read and write
1150000
trusted library allocation
page read and write
4A3E000
heap
page read and write
1340000
heap
page read and write
1150000
trusted library allocation
page read and write
277C000
heap
page read and write
843000
heap
page read and write
17AD40A0000
heap
page read and write
2848FE90000
trusted library allocation
page read and write
2848FE8D000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
401000
unkown
page execute read
17AD33EA000
heap
page read and write
2C54E580000
trusted library section
page read and write
2848FE93000
trusted library allocation
page read and write
886000
heap
page read and write
27D0000
heap
page read and write
17AD3CA6000
trusted library allocation
page read and write
295C000
heap
page read and write
7641AF7000
stack
page read and write
7641A7F000
stack
page read and write
17AD26D9000
trusted library allocation
page read and write
509000
unkown
page readonly
5C0000
trusted library allocation
page read and write
F50000
unkown
page readonly
5C0000
trusted library allocation
page read and write
6D0000
heap
page read and write
4D7000
unkown
page write copy
3EDE000
stack
page read and write
2FE0000
heap
page read and write
2848DD7D000
heap
page read and write
1150000
trusted library allocation
page read and write
4322000
unkown
page readonly
81E000
heap
page read and write
1EDC4ED0000
heap
page read and write
1BF08240000
heap
page read and write
2C553656000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
2848FE8C000
trusted library allocation
page read and write
17AD3268000
heap
page read and write
2848DDBD000
heap
page read and write
17AD26A2000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848FE8C000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
13A8000
heap
page read and write
1078000
unkown
page readonly
852000
heap
page read and write
875000
heap
page read and write
1150000
trusted library allocation
page read and write
2848DD63000
heap
page read and write
2848FE8F000
trusted library allocation
page read and write
17AD269F000
trusted library allocation
page read and write
5B03D7E000
stack
page read and write
17AD3CC9000
trusted library allocation
page read and write
21F17915000
trusted library allocation
page read and write
2848DD85000
heap
page read and write
2C553615000
trusted library allocation
page read and write
4C2B000
heap
page read and write
2C55351D000
heap
page read and write
17AD3CB2000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848DDE2000
heap
page read and write
81C000
heap
page read and write
1EDC4F66000
heap
page read and write
17AD3495000
heap
page read and write
17AD26A3000
trusted library allocation
page read and write
17AD2F3E000
heap
page read and write
4A28000
heap
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
7641EF9000
stack
page read and write
31E8000
heap
page read and write
854000
heap
page read and write
7FF7D9447000
unkown
page readonly
22FDC990000
heap
page read and write
280CCFE6000
heap
page read and write
1150000
trusted library allocation
page read and write
17AD32DE000
heap
page read and write
700000
direct allocation
page execute and read and write
17AD3513000
heap
page read and write
5B03F7B000
stack
page read and write
17AD26EA000
trusted library allocation
page read and write
2848DF20000
trusted library allocation
page read and write
17AD3287000
heap
page read and write
3E90000
trusted library allocation
page read and write
2848FE8A000
trusted library allocation
page read and write
2C54DE78000
heap
page read and write
4C28000
heap
page read and write
2848FE87000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848FE95000
trusted library allocation
page read and write
2848FE8F000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848FE8E000
trusted library allocation
page read and write
17AD272F000
trusted library allocation
page read and write
2848FE91000
trusted library allocation
page read and write
4A5C000
heap
page read and write
1500000
trusted library allocation
page read and write
282C000
heap
page read and write
2848FE91000
trusted library allocation
page read and write
4A36000
heap
page read and write
17AD26FA000
trusted library allocation
page read and write
822000
heap
page read and write
2848FE90000
trusted library allocation
page read and write
17AD273C000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
2C5532A0000
trusted library allocation
page read and write
22FDCAE0000
heap
page read and write
3517000
heap
page read and write
27A9000
heap
page read and write
2830000
heap
page read and write
7641E7B000
stack
page read and write
17AD26DE000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
4A22000
heap
page read and write
1500000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
2848FE8A000
trusted library allocation
page read and write
2775000
heap
page read and write
2848DD7C000
heap
page read and write
4A81000
heap
page read and write
17AD2F0C000
heap
page read and write
1150000
trusted library allocation
page read and write
7FF7D9447000
unkown
page readonly
1500000
trusted library allocation
page read and write
2C55366C000
trusted library allocation
page read and write
2F00000
heap
page read and write
5C0000
trusted library allocation
page read and write
4A8F000
heap
page read and write
17AD26C6000
trusted library allocation
page read and write
2828000
heap
page read and write
2C5536F1000
trusted library allocation
page read and write
808000
heap
page read and write
17AD338E000
heap
page read and write
2848FE91000
trusted library allocation
page read and write
852000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD2380000
heap
page read and write
2848DD77000
heap
page read and write
2848DD91000
heap
page read and write
835000
heap
page read and write
2848DD93000
heap
page read and write
2848FE9F000
trusted library allocation
page read and write
519000
unkown
page readonly
7FF7D9456000
unkown
page write copy
298D000
heap
page read and write
2DE0000
heap
page read and write
17AD31C8000
heap
page read and write
2960000
heap
page read and write
415E000
stack
page read and write
5C0000
trusted library allocation
page read and write
4991000
heap
page read and write
2848DDBB000
heap
page read and write
2848FE8B000
trusted library allocation
page read and write
4C28000
heap
page read and write
2C54F230000
trusted library allocation
page read and write
1EDC4DC0000
heap
page read and write
1500000
trusted library allocation
page read and write
17AD1834000
heap
page read and write
27FD000
heap
page read and write
2848DD7D000
heap
page read and write
4870000
heap
page read and write
2C5532F0000
trusted library allocation
page read and write
1432000
trusted library allocation
page read and write
2848FE8E000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
17AD1E70000
heap
page read and write
1500000
trusted library allocation
page read and write
22FDE400000
heap
page read and write
88D000
heap
page read and write
17AD3257000
heap
page read and write
2848DDBD000
heap
page read and write
2848FE8D000
trusted library allocation
page read and write
2C54E600000
heap
page read and write
2E3B000
stack
page read and write
2C54DE7D000
heap
page read and write
820000
heap
page read and write
2A04000
heap
page read and write
1500000
trusted library allocation
page read and write
2848DF24000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848FE8E000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
17AD2738000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
4F5E000
stack
page read and write
1386000
heap
page read and write
17AD2F49000
heap
page read and write
17AD31F2000
heap
page read and write
2848FE95000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
DC0000
unkown
page readonly
17AD2F39000
heap
page read and write
5C0000
trusted library allocation
page read and write
28D1000
heap
page read and write
5C0000
trusted library allocation
page read and write
867000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD3383000
heap
page read and write
2A04000
heap
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
17AD327B000
heap
page read and write
31D5000
heap
page read and write
17AD32E0000
heap
page read and write
17AD2A9D000
trusted library allocation
page read and write
1BF08245000
heap
page read and write
1500000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848DD85000
heap
page read and write
1500000
trusted library allocation
page read and write
857000
heap
page read and write
2848FE95000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
530000
heap
page read and write
33E4000
heap
page read and write
17AD3CC3000
trusted library allocation
page read and write
33E4000
heap
page read and write
2848DDBB000
heap
page read and write
17AD2727000
trusted library allocation
page read and write
7641FFB000
stack
page read and write
E67607E000
unkown
page readonly
4300000
trusted library allocation
page read and write
307E000
stack
page read and write
2818000
heap
page read and write
17AD2725000
trusted library allocation
page read and write
2848FE8C000
trusted library allocation
page read and write
8BE000
heap
page read and write
7FF7D9447000
unkown
page readonly
17AD26FC000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
17AD26DB000
trusted library allocation
page read and write
4C52000
heap
page read and write
837000
heap
page read and write
17AD330A000
heap
page read and write
E6757FE000
stack
page read and write
199000
stack
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
8A9000
heap
page read and write
2848FE96000
trusted library allocation
page read and write
2848FE8B000
trusted library allocation
page read and write
17AD26E1000
trusted library allocation
page read and write
2848FE94000
trusted library allocation
page read and write
2848FE94000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2759000
heap
page read and write
1150000
trusted library allocation
page read and write
2848FE8A000
trusted library allocation
page read and write
3390000
heap
page read and write
2848FE8A000
trusted library allocation
page read and write
17AD26E6000
trusted library allocation
page read and write
14E0000
heap
page read and write
4A26000
heap
page read and write
17AD31CA000
heap
page read and write
4C5D000
heap
page read and write
17AD35BF000
heap
page read and write
2848FE94000
trusted library allocation
page read and write
17AD2AA1000
trusted library allocation
page read and write
E67597B000
stack
page read and write
1500000
trusted library allocation
page read and write
E67527E000
unkown
page readonly
1500000
trusted library allocation
page read and write
6A0000
heap
page read and write
5A00000
trusted library allocation
page read and write
2848FE8E000
trusted library allocation
page read and write
2848FE8F000
trusted library allocation
page read and write
17AD3460000
heap
page read and write
4A4B000
heap
page read and write
1405000
heap
page read and write
2848FE89000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
36F0000
heap
page read and write
17AD34D7000
heap
page read and write
2C54DE00000
heap
page read and write
1500000
trusted library allocation
page read and write
1AB1D9D4000
heap
page read and write
2848DDBB000
heap
page read and write
7FF7D9430000
unkown
page readonly
A80000
heap
page read and write
28CF000
heap
page read and write
7641CFC000
stack
page read and write
2848DDBE000
heap
page read and write
119B000
stack
page read and write
2848FE93000
trusted library allocation
page read and write
4430000
heap
page read and write
1500000
trusted library allocation
page read and write
2848FCCF000
heap
page read and write
17AD1871000
heap
page read and write
2848FE94000
trusted library allocation
page read and write
822000
heap
page read and write
2848DDBB000
heap
page read and write
5C0000
trusted library allocation
page read and write
79F000
stack
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
E67617B000
stack
page read and write
83D000
heap
page read and write
8CE000
heap
page read and write
830000
heap
page read and write
4A81000
heap
page read and write
83C000
heap
page read and write
1150000
trusted library allocation
page read and write
1D202F15000
heap
page read and write
2848DD93000
heap
page read and write
870000
heap
page read and write
880000
heap
page read and write
17AD31C3000
heap
page read and write
17AD26C3000
trusted library allocation
page read and write
2848DDBE000
heap
page read and write
1500000
trusted library allocation
page read and write
2848FE8C000
trusted library allocation
page read and write
22FDCAE5000
heap
page read and write
1500000
trusted library allocation
page read and write
17AD32DE000
heap
page read and write
2C54E702000
heap
page read and write
1500000
trusted library allocation
page read and write
B4F000
stack
page read and write
17AD26FF000
trusted library allocation
page read and write
28E2000
heap
page read and write
1500000
trusted library allocation
page read and write
2848FE90000
trusted library allocation
page read and write
2848FE96000
trusted library allocation
page read and write
775EBA8000
stack
page read and write
2967000
heap
page read and write
27D1000
heap
page read and write
17AD371D000
heap
page read and write
2848DD85000
heap
page read and write
87A000
heap
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848DDD1000
heap
page read and write
2848DD85000
heap
page read and write
85C000
heap
page read and write
2848DF24000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2F0C000
stack
page read and write
1150000
trusted library allocation
page read and write
2848DDD1000
heap
page read and write
5B40000
heap
page read and write
5C0000
trusted library allocation
page read and write
4A3E000
heap
page read and write
1150000
trusted library allocation
page read and write
4BA6000
heap
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848FE8D000
trusted library allocation
page read and write
834000
heap
page read and write
17AD340D000
heap
page read and write
65C6000
heap
page read and write
2848FE91000
trusted library allocation
page read and write
2848FE94000
trusted library allocation
page read and write
17AD2F39000
heap
page read and write
4C6D000
heap
page read and write
1150000
trusted library allocation
page read and write
2848DDBB000
heap
page read and write
2848FE8C000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
17AD3CCA000
trusted library allocation
page read and write
7902000
unkown
page readonly
2848DD85000
heap
page read and write
17AD2AA2000
trusted library allocation
page read and write
17AD26F0000
trusted library allocation
page read and write
17AD182B000
heap
page read and write
2848DD91000
heap
page read and write
5A0000
heap
page read and write
17AD31EF000
heap
page read and write
4320000
unkown
page readonly
276D000
heap
page read and write
5C0000
trusted library allocation
page read and write
2848DDD1000
heap
page read and write
2764000
heap
page read and write
17AD2290000
heap
page read and write
1150000
trusted library allocation
page read and write
2849000
heap
page read and write
1150000
trusted library allocation
page read and write
33C0000
heap
page read and write
1230000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
27C2000
heap
page read and write
2848FE8C000
trusted library allocation
page read and write
7FF7D945A000
unkown
page read and write
1AB1BFF4000
heap
page read and write
2C5532C0000
trusted library allocation
page read and write
2848DDD1000
heap
page read and write
1843000
heap
page read and write
17AD2AA4000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
4BDC000
heap
page read and write
18C000
stack
page read and write
2848DF24000
trusted library allocation
page read and write
37F0000
heap
page read and write
2848FA80000
heap
page read and write
17AD3352000
heap
page read and write
2848FE8F000
trusted library allocation
page read and write
280CD1D0000
heap
page read and write
1150000
trusted library allocation
page read and write
7FF7D9456000
unkown
page read and write
5C0000
trusted library allocation
page read and write
2848DD91000
heap
page read and write
2C54DE13000
heap
page read and write
2C5536F4000
trusted library allocation
page read and write
2848DF24000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
17AD332B000
heap
page read and write
2848FE8F000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
273A000
heap
page read and write
276F000
heap
page read and write
2848DDD1000
heap
page read and write
17AD2F38000
heap
page read and write
519000
unkown
page readonly
5C0000
trusted library allocation
page read and write
17AD2AB0000
trusted library allocation
page read and write
1BFE000
stack
page read and write
2848DDBB000
heap
page read and write
5C0000
trusted library allocation
page read and write
4A24000
heap
page read and write
1AB1D9A0000
heap
page read and write
7FF7D9431000
unkown
page execute read
4A2C000
heap
page read and write
2775000
heap
page read and write
13B3000
heap
page read and write
34AC000
heap
page read and write
4C5A000
heap
page read and write
2848FE93000
trusted library allocation
page read and write
6538000
heap
page read and write
17AD359F000
heap
page read and write
1500000
trusted library allocation
page read and write
7952000
trusted library allocation
page read and write
17AD1800000
heap
page read and write
180B000
heap
page read and write
2C553610000
trusted library allocation
page read and write
2848FE91000
trusted library allocation
page read and write
35AF000
unkown
page read and write
2848FE92000
trusted library allocation
page read and write
4A5E000
heap
page read and write
1200000
trusted library allocation
page read and write
2848FE8D000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848DDBD000
heap
page read and write
1150000
trusted library allocation
page read and write
2777000
heap
page read and write
2848DDC2000
heap
page read and write
2848FE8A000
trusted library allocation
page read and write
17AD2F38000
heap
page read and write
2848FE92000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2C5532B0000
trusted library allocation
page read and write
2848FE96000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848FE8E000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
32A000
unkown
page readonly
17AD3703000
heap
page read and write
1484000
heap
page read and write
C15B1FE000
stack
page read and write
17AD2731000
trusted library allocation
page read and write
1D202F24000
heap
page read and write
17AD1E70000
heap
page read and write
2848DDC4000
heap
page read and write
2848FE94000
trusted library allocation
page read and write
1EDC6A40000
heap
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
4A2C000
heap
page read and write
E675F7E000
stack
page read and write
17AD2717000
trusted library allocation
page read and write
141D000
trusted library allocation
page execute and read and write
2848DD7C000
heap
page read and write
122D000
trusted library allocation
page execute and read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
BC0000
unkown
page readonly
835000
heap
page read and write
2848FE8D000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848DD91000
heap
page read and write
17AD3CCD000
trusted library allocation
page read and write
E6756FE000
stack
page read and write
1500000
trusted library allocation
page read and write
2C553691000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
17AD2AB1000
trusted library allocation
page read and write
2848DD85000
heap
page read and write
2848DD79000
heap
page read and write
17AD3224000
heap
page read and write
1500000
trusted library allocation
page read and write
2848FE8B000
trusted library allocation
page read and write
1C00000
trusted library allocation
page execute and read and write
5C0000
trusted library allocation
page read and write
17AD31A3000
heap
page read and write
33E7000
heap
page read and write
34D4000
heap
page read and write
2848FE8F000
trusted library allocation
page read and write
21F17C00000
heap
page read and write
17AD2AA9000
trusted library allocation
page read and write
840000
heap
page read and write
4BAE000
heap
page read and write
2848DF20000
trusted library allocation
page read and write
2848FE8F000
trusted library allocation
page read and write
4B1C000
heap
page read and write
2848FE96000
trusted library allocation
page read and write
81E000
heap
page read and write
2848FE91000
trusted library allocation
page read and write
17AD1880000
heap
page read and write
17AD2AA7000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2D8000
unkown
page readonly
4BD2000
heap
page read and write
2C553506000
heap
page read and write
17AD2A9A000
trusted library allocation
page read and write
17AD1880000
heap
page read and write
1500000
trusted library allocation
page read and write
17AD3CC8000
trusted library allocation
page read and write
BC2000
unkown
page readonly
34A0000
heap
page read and write
5C0000
trusted library allocation
page read and write
2848FE93000
trusted library allocation
page read and write
2775000
heap
page read and write
17AD227A000
trusted library allocation
page read and write
505F000
stack
page read and write
17AD319A000
heap
page read and write
21F1976A000
heap
page read and write
5C0000
trusted library allocation
page read and write
124B000
trusted library allocation
page execute and read and write
2848DF20000
trusted library allocation
page read and write
2C5533A0000
trusted library allocation
page read and write
2970000
heap
page read and write
2848FE96000
trusted library allocation
page read and write
3990000
heap
page read and write
17AD31DA000
heap
page read and write
1500000
trusted library allocation
page read and write
80B000
heap
page read and write
17AD2F87000
heap
page read and write
27F9000
heap
page read and write
83A000
heap
page read and write
1BF08253000
heap
page read and write
2831000
heap
page read and write
17AD2718000
trusted library allocation
page read and write
17AD2FF0000
heap
page read and write
2630000
heap
page read and write
17AD3518000
heap
page read and write
13AA000
heap
page read and write
2848DF24000
trusted library allocation
page read and write
2848FE8F000
trusted library allocation
page read and write
17AD3CC6000
trusted library allocation
page read and write
2848FE95000
trusted library allocation
page read and write
4BA6000
heap
page read and write
10CA000
unkown
page readonly
835000
heap
page read and write
37B0000
heap
page read and write
2792000
heap
page read and write
822000
heap
page read and write
1150000
trusted library allocation
page read and write
7FF7D945B000
unkown
page readonly
17AD2F3D000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD2F88000
heap
page read and write
26E0000
trusted library allocation
page read and write
4A4B000
heap
page read and write
4A5F000
heap
page read and write
28E2000
heap
page read and write
5C0000
trusted library allocation
page read and write
2848FE92000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
33D2000
heap
page read and write
2848FE91000
trusted library allocation
page read and write
17AD3610000
heap
page read and write
17AD2F7F000
heap
page read and write
2848FE8B000
trusted library allocation
page read and write
8C2000
heap
page read and write
1500000
trusted library allocation
page read and write
17AD3191000
heap
page read and write
2848DD91000
heap
page read and write
1500000
trusted library allocation
page read and write
4A28000
heap
page read and write
2848FE8A000
trusted library allocation
page read and write
33D7000
heap
page read and write
2C5534C0000
heap
page read and write
1BF09C30000
heap
page read and write
2848DD91000
heap
page read and write
2848FE95000
trusted library allocation
page read and write
8AF000
heap
page read and write
2848DF20000
trusted library allocation
page read and write
17AD2F15000
heap
page read and write
90C000
stack
page read and write
2C54DEB4000
heap
page read and write
5C0000
trusted library allocation
page read and write
1352000
heap
page read and write
32B0000
heap
page read and write
17AD371D000
heap
page read and write
1030000
heap
page read and write
5C0000
trusted library allocation
page read and write
1242000
trusted library allocation
page read and write
17AD1E0B000
heap
page read and write
4A36000
heap
page read and write
4A21000
heap
page read and write
2848DDD1000
heap
page read and write
4A26000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD269E000
trusted library allocation
page read and write
2848DDD1000
heap
page read and write
830000
heap
page read and write
2848DDBD000
heap
page read and write
2848DF24000
trusted library allocation
page read and write
17AD271D000
trusted library allocation
page read and write
2848FE8E000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
217F000
stack
page read and write
2848FE96000
trusted library allocation
page read and write
4C2A000
heap
page read and write
436E000
stack
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848DD93000
heap
page read and write
21F197B5000
heap
page read and write
4A90000
heap
page read and write
324000
unkown
page read and write
2848DD7F000
heap
page read and write
17AD2AB8000
trusted library allocation
page read and write
17AD26DD000
trusted library allocation
page read and write
1BF08252000
heap
page read and write
22FDCB03000
heap
page read and write
2848FE95000
trusted library allocation
page read and write
2848DD67000
heap
page read and write
1500000
trusted library allocation
page read and write
2848FE8C000
trusted library allocation
page read and write
17AD26EC000
trusted library allocation
page read and write
17AD372E000
heap
page read and write
2848FE91000
trusted library allocation
page read and write
84E000
heap
page read and write
2848FE93000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
17AD3226000
heap
page read and write
1150000
trusted library allocation
page read and write
2961000
heap
page read and write
2848DD86000
heap
page read and write
1150000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
2848DD91000
heap
page read and write
2848FE95000
trusted library allocation
page read and write
2848DF24000
trusted library allocation
page read and write
17AD24F0000
heap
page read and write
5C0000
trusted library allocation
page read and write
7900000
unkown
page readonly
2848DDD1000
heap
page read and write
4F20000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
852000
heap
page read and write
5C0000
trusted library allocation
page read and write
2C5536FC000
trusted library allocation
page read and write
2848FE90000
trusted library allocation
page read and write
2848DD79000
heap
page read and write
2848FE96000
trusted library allocation
page read and write
2848DDBE000
heap
page read and write
2848DF20000
trusted library allocation
page read and write
869000
heap
page read and write
27FC000
heap
page read and write
5C0000
trusted library allocation
page read and write
22FDCAEF000
heap
page read and write
17AD2F08000
heap
page read and write
17AD3244000
heap
page read and write
7FF7D9447000
unkown
page readonly
2848DF24000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2C54DE5C000
heap
page read and write
319B000
heap
page read and write
1150000
trusted library allocation
page read and write
2848DDBB000
heap
page read and write
1150000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
21F17900000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
8AC000
heap
page read and write
5C0000
trusted library allocation
page read and write
4A8E000
heap
page read and write
17AD341E000
heap
page read and write
28E2000
heap
page read and write
2848FE8A000
trusted library allocation
page read and write
17AD3CC1000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
4A4B000
heap
page read and write
17AD3382000
heap
page read and write
4B4C000
heap
page read and write
835000
heap
page read and write
844000
heap
page read and write
1D202EF0000
heap
page read and write
5F40000
trusted library section
page readonly
17AD3376000
heap
page read and write
E67557E000
unkown
page readonly
1500000
trusted library allocation
page read and write
4443000
heap
page execute and read and write
1644000
heap
page read and write
851000
heap
page read and write
E674D79000
stack
page read and write
7FF7D9430000
unkown
page readonly
1214000
trusted library allocation
page read and write
2848FE96000
trusted library allocation
page read and write
2848FCC0000
heap
page read and write
17AD32AE000
heap
page read and write
2848DDD1000
heap
page read and write
17AD327B000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD3CCC000
trusted library allocation
page read and write
2848DDBB000
heap
page read and write
5C0000
trusted library allocation
page read and write
2848FE93000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2C553660000
remote allocation
page read and write
17AD3703000
heap
page read and write
2620000
heap
page read and write
3390000
heap
page read and write
2848FE94000
trusted library allocation
page read and write
3510000
heap
page read and write
28EF000
heap
page read and write
17AD328B000
heap
page read and write
17AD2716000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
519000
unkown
page readonly
1150000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
17AD3203000
heap
page read and write
17AD26E0000
trusted library allocation
page read and write
2848FE93000
trusted library allocation
page read and write
17AD3CB4000
trusted library allocation
page read and write
2C5532D0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
1232000
trusted library allocation
page read and write
17AD2A90000
trusted library allocation
page read and write
2730000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
19D000
stack
page read and write
2848DDBE000
heap
page read and write
17AD2A95000
trusted library allocation
page read and write
2848DD79000
heap
page read and write
1210000
trusted library allocation
page read and write
17AD273D000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
17AD22E6000
trusted library allocation
page read and write
2848DD7C000
heap
page read and write
2848FE91000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
835000
heap
page read and write
2848FE98000
trusted library allocation
page read and write
30F0000
heap
page read and write
37D0000
heap
page read and write
2848DD93000
heap
page read and write
17AD26EC000
trusted library allocation
page read and write
3021000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
17AD32DB000
heap
page read and write
7FF7D9447000
unkown
page readonly
2848FE90000
trusted library allocation
page read and write
28E2000
heap
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
28AF000
heap
page read and write
2867000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD3CB1000
trusted library allocation
page read and write
37E0000
heap
page read and write
4A8E000
heap
page read and write
275F000
heap
page read and write
17AD2A98000
trusted library allocation
page read and write
2C55341E000
heap
page read and write
17AD334C000
heap
page read and write
2902000
heap
page read and write
17AD3380000
heap
page read and write
58AE000
stack
page read and write
1150000
trusted library allocation
page read and write
81C000
heap
page read and write
1150000
trusted library allocation
page read and write
17AD343F000
heap
page read and write
1500000
trusted library allocation
page read and write
1360000
heap
page read and write
2848FE8D000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
838000
heap
page read and write
5C0000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
5CE21FF000
stack
page read and write
17AD3728000
heap
page read and write
401000
unkown
page execute read
5C0000
trusted library allocation
page read and write
22FDCB02000
heap
page read and write
401E000
stack
page read and write
17AD26EB000
trusted library allocation
page read and write
278C000
heap
page read and write
6DE000
stack
page read and write
7FB000
heap
page read and write
2848FE96000
trusted library allocation
page read and write
4A5E000
heap
page read and write
17AD1E0B000
heap
page read and write
844000
heap
page read and write
1500000
trusted library allocation
page read and write
2848DDBB000
heap
page read and write
32A0000
heap
page read and write
5CE24FF000
stack
page read and write
1150000
trusted library allocation
page read and write
17AD3203000
heap
page read and write
84F000
heap
page read and write
87F000
heap
page read and write
775F2FE000
stack
page read and write
5012DFF000
stack
page read and write
17AD2300000
heap
page read and write
5C0000
trusted library allocation
page read and write
37E0000
heap
page read and write
839000
heap
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848DD7C000
heap
page read and write
7FF7D9431000
unkown
page execute read
84D000
heap
page read and write
1150000
trusted library allocation
page read and write
2848FE8E000
trusted library allocation
page read and write
17AD2AA3000
trusted library allocation
page read and write
2C54DDE0000
heap
page read and write
2848DDBF000
heap
page read and write
4A28000
heap
page read and write
21F197BB000
heap
page read and write
17AD3CA8000
trusted library allocation
page read and write
17AD26E9000
trusted library allocation
page read and write
2848FE94000
trusted library allocation
page read and write
12B0000
trusted library allocation
page execute and read and write
870000
heap
page read and write
1EDC68C0000
heap
page read and write
1500000
trusted library allocation
page read and write
327E000
stack
page read and write
17AD3CCB000
trusted library allocation
page read and write
4C20000
heap
page read and write
5C0000
trusted library allocation
page read and write
65E0000
heap
page read and write
2848FE8E000
trusted library allocation
page read and write
81F000
heap
page read and write
4C26000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD2F90000
heap
page read and write
17AD3CC3000
trusted library allocation
page read and write
2C553660000
remote allocation
page read and write
8BE000
heap
page read and write
1500000
trusted library allocation
page read and write
17AD32C4000
heap
page read and write
7FF7D945A000
unkown
page read and write
2848DD91000
heap
page read and write
317E000
stack
page read and write
5C0000
trusted library allocation
page read and write
1BF08245000
heap
page read and write
1150000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
85C000
heap
page read and write
1150000
trusted library allocation
page read and write
2C55344F000
heap
page read and write
E01E5FE000
stack
page read and write
2964000
heap
page read and write
4B7E000
stack
page read and write
4BC1000
heap
page read and write
2848DDD1000
heap
page read and write
2848FE88000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848FE94000
trusted library allocation
page read and write
2848FE90000
trusted library allocation
page read and write
17AD345F000
heap
page read and write
2848FE8B000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848DDBC000
heap
page read and write
780000
heap
page read and write
1500000
trusted library allocation
page read and write
88A000
heap
page read and write
1150000
trusted library allocation
page read and write
1BF08030000
heap
page read and write
1800000
heap
page read and write
27D1000
heap
page read and write
3110000
heap
page read and write
C21000
heap
page read and write
1150000
trusted library allocation
page read and write
7FF7D945B000
unkown
page readonly
840000
heap
page read and write
3400000
heap
page read and write
838000
heap
page read and write
784000
heap
page read and write
2C553664000
trusted library allocation
page read and write
143B000
trusted library allocation
page execute and read and write
17AD1824000
heap
page read and write
5C0000
trusted library allocation
page read and write
2E50000
heap
page execute and read and write
2E30000
heap
page execute and read and write
2848FE8E000
trusted library allocation
page read and write
17AD26D8000
trusted library allocation
page read and write
28A0000
heap
page read and write
1150000
trusted library allocation
page read and write
2848FE92000
trusted library allocation
page read and write
881000
heap
page read and write
4ACF000
heap
page read and write
55DF000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5DD0000
trusted library allocation
page execute and read and write
5C0000
trusted library allocation
page read and write
17AD319E000
heap
page read and write
21F19722000
heap
page read and write
2EFD000
stack
page read and write
17AD33DA000
heap
page read and write
1500000
trusted library allocation
page read and write
2848FE8F000
trusted library allocation
page read and write
7FF7D9456000
unkown
page write copy
3190000
heap
page read and write
425E000
stack
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
17AD31C7000
heap
page read and write
280CE9E0000
heap
page read and write
17AD328E000
heap
page read and write
31DC000
trusted library allocation
page read and write
17AD2F65000
heap
page read and write
2848DDCA000
heap
page read and write
2848FE8A000
trusted library allocation
page read and write
34D7000
heap
page read and write
4A20000
trusted library allocation
page read and write
3260000
heap
page read and write
17AD2F87000
heap
page read and write
2848FE93000
trusted library allocation
page read and write
17AD270D000
trusted library allocation
page read and write
878000
heap
page read and write
2848DDBB000
heap
page read and write
5C0000
trusted library allocation
page read and write
2C5532C0000
trusted library allocation
page read and write
17AD17E7000
heap
page read and write
847000
heap
page read and write
17AD2F38000
heap
page read and write
4B80000
heap
page read and write
17AD36AD000
heap
page read and write
17AD355C000
heap
page read and write
2848FE8D000
trusted library allocation
page read and write
17AD2AA8000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
22FDCAF4000
heap
page read and write
2740000
heap
page read and write
27D1000
heap
page read and write
835000
heap
page read and write
17AD36C1000
heap
page read and write
276D000
heap
page read and write
17AD2AA4000
trusted library allocation
page read and write
830000
heap
page read and write
17AD26DA000
trusted library allocation
page read and write
2848DDD1000
heap
page read and write
17AD2AA7000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
34D6000
heap
page read and write
2848DF24000
trusted library allocation
page read and write
2C55366F000
trusted library allocation
page read and write
17AD3CC5000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
17AD272C000
trusted library allocation
page read and write
11F0000
heap
page read and write
2848FE8F000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
4390000
heap
page read and write
5C0000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
21F197B2000
heap
page read and write
87D000
heap
page read and write
837000
heap
page read and write
5012CFF000
stack
page read and write
2C54EE90000
trusted library section
page readonly
17AD31A1000
heap
page read and write
296A000
heap
page read and write
84A000
heap
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5012FFF000
stack
page read and write
2848DD7C000
heap
page read and write
1150000
trusted library allocation
page read and write
854000
heap
page read and write
2848FE8D000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
1400000
trusted library allocation
page read and write
2848DD85000
heap
page read and write
2848DD93000
heap
page read and write
294F000
heap
page read and write
2848DF24000
trusted library allocation
page read and write
2610000
heap
page read and write
2848FE95000
trusted library allocation
page read and write
282C000
heap
page read and write
1500000
trusted library allocation
page read and write
2848DDBE000
heap
page read and write
883000
heap
page read and write
2C553502000
heap
page read and write
87F000
heap
page read and write
30FC000
stack
page read and write
2848DDBE000
heap
page read and write
17AD3CA1000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
80B000
heap
page read and write
17AD32F7000
heap
page read and write
2848DF20000
trusted library allocation
page read and write
2848FE8E000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
E674C7E000
unkown
page readonly
2848FE82000
trusted library allocation
page read and write
825000
heap
page read and write
2848DF20000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
4A3E000
heap
page read and write
29FD000
heap
page read and write
2848DDBB000
heap
page read and write
2848DDBD000
heap
page read and write
1500000
trusted library allocation
page read and write
7FF7D9430000
unkown
page readonly
2B60000
direct allocation
page execute and read and write
2848DD91000
heap
page read and write
2848DF24000
trusted library allocation
page read and write
17AD26E4000
trusted library allocation
page read and write
BD0000
unkown
page readonly
400000
unkown
page readonly
1150000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
11A0000
heap
page read and write
2C55371A000
trusted library allocation
page read and write
17AD2AB9000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2A22000
heap
page read and write
1500000
trusted library allocation
page read and write
4C5D000
heap
page read and write
17AD2713000
trusted library allocation
page read and write
140F000
heap
page read and write
ADE000
stack
page read and write
835000
heap
page read and write
837000
heap
page read and write
586F000
stack
page read and write
2848FE91000
trusted library allocation
page read and write
2848DD93000
heap
page read and write
246F000
stack
page read and write
81E000
heap
page read and write
2848DD93000
heap
page read and write
34D3000
heap
page read and write
852000
heap
page read and write
17AD26F6000
trusted library allocation
page read and write
2848DDBB000
heap
page read and write
869000
heap
page read and write
17AD1880000
heap
page read and write
17AD33ED000
heap
page read and write
17AD2F75000
heap
page read and write
830000
heap
page read and write
7641B78000
stack
page read and write
17AD2F0A000
heap
page read and write
2C553400000
heap
page read and write
4E20000
trusted library allocation
page read and write
17AD182B000
heap
page read and write
2848DDD1000
heap
page read and write
5CE1D5B000
stack
page read and write
17AD2AB6000
trusted library allocation
page read and write
1C20000
heap
page execute and read and write
1150000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2876000
heap
page read and write
5C0000
trusted library allocation
page read and write
2855000
heap
page read and write
2F4E000
stack
page read and write
17AD2EC2000
heap
page read and write
5C0000
trusted library allocation
page read and write
E675AFE000
unkown
page readonly
E674A7E000
unkown
page readonly
891000
heap
page read and write
1500000
trusted library allocation
page read and write
2848FE8D000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
81C000
heap
page read and write
9B000
stack
page read and write
1150000
trusted library allocation
page read and write
1BF0825A000
heap
page read and write
1500000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
17AD2F7B000
heap
page read and write
5C0000
trusted library allocation
page read and write
7FF7D9456000
unkown
page read and write
1500000
trusted library allocation
page read and write
7E40000
trusted library allocation
page read and write
2848FE92000
trusted library allocation
page read and write
31AE000
unkown
page read and write
2848FE8A000
trusted library allocation
page read and write
2FFC000
stack
page read and write
17AD2F3B000
heap
page read and write
5C0000
trusted library allocation
page read and write
2848DDBB000
heap
page read and write
17AD26C2000
trusted library allocation
page read and write
17AD3CA2000
trusted library allocation
page read and write
17AD26ED000
trusted library allocation
page read and write
2C54E71A000
heap
page read and write
2848DCB0000
heap
page read and write
5C0000
trusted library allocation
page read and write
4B96000
heap
page read and write
1150000
trusted library allocation
page read and write
17AD3CC4000
trusted library allocation
page read and write
870000
heap
page read and write
2C5536FF000
trusted library allocation
page read and write
36D0000
heap
page read and write
1150000
trusted library allocation
page read and write
17AD26D9000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
2848FE9C000
trusted library allocation
page read and write
2848DD85000
heap
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848DF20000
trusted library allocation
page read and write
2848DF24000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
17AD1874000
heap
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
17AD26C1000
trusted library allocation
page read and write
2848FE8B000
trusted library allocation
page read and write
17AD32B2000
heap
page read and write
2C54E615000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD36B2000
heap
page read and write
81E000
heap
page read and write
2848FE95000
trusted library allocation
page read and write
1D202F1D000
heap
page read and write
17AD2ABC000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
36E0000
heap
page read and write
280CE9E4000
heap
page read and write
134B000
heap
page read and write
17AD34D7000
heap
page read and write
17AD1826000
heap
page read and write
17AD2F84000
heap
page read and write
4440000
heap
page execute and read and write
1EDC4F56000
heap
page read and write
1492000
heap
page read and write
2848DD79000
heap
page read and write
2848DDD1000
heap
page read and write
2848DD7D000
heap
page read and write
1500000
trusted library allocation
page read and write
2848FE8D000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
17AD3287000
heap
page read and write
400000
unkown
page readonly
17AD26E8000
trusted library allocation
page read and write
4B11000
heap
page read and write
2848FE8C000
trusted library allocation
page read and write
2848FE94000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848FE91000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
17AD2F3D000
heap
page read and write
88D000
heap
page read and write
2848FE8C000
trusted library allocation
page read and write
17AD32F9000
heap
page read and write
17AD2AA0000
trusted library allocation
page read and write
2848DD76000
heap
page read and write
2848FE92000
trusted library allocation
page read and write
25C0000
direct allocation
page execute and read and write
17AD2230000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848DD79000
heap
page read and write
4A28000
heap
page read and write
4DC000
unkown
page readonly
4F20000
trusted library allocation
page read and write
2A2B000
heap
page read and write
17AD2AA8000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
4C26000
heap
page read and write
2C55368E000
trusted library allocation
page read and write
22FDCAED000
heap
page read and write
285C000
heap
page read and write
7FF7D945B000
unkown
page readonly
5F20000
heap
page read and write
E675E7E000
unkown
page readonly
2C553230000
trusted library allocation
page read and write
2C5534E4000
heap
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
83B000
heap
page read and write
17AD3287000
heap
page read and write
17AD26E3000
trusted library allocation
page read and write
17AD2A96000
trusted library allocation
page read and write
833000
heap
page read and write
2848DD93000
heap
page read and write
4A81000
heap
page read and write
1150000
trusted library allocation
page read and write
2C5534F0000
heap
page read and write
1500000
trusted library allocation
page read and write
2C54DD00000
heap
page read and write
17AD2726000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848FE8C000
trusted library allocation
page read and write
3EB000
stack
page read and write
59F0000
trusted library allocation
page read and write
89F000
heap
page read and write
2848DDBE000
heap
page read and write
A60000
heap
page read and write
17AD2F78000
heap
page read and write
277A000
heap
page read and write
17AD15C0000
heap
page read and write
2848DD7B000
heap
page read and write
1150000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
2848DF20000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2C54E470000
trusted library allocation
page read and write
1236000
trusted library allocation
page execute and read and write
846000
heap
page read and write
80B000
heap
page read and write
22FDCAC9000
heap
page read and write
277A000
heap
page read and write
17AD3387000
heap
page read and write
1150000
trusted library allocation
page read and write
17AD366C000
heap
page read and write
1247000
trusted library allocation
page execute and read and write
5C0000
trusted library allocation
page read and write
2848FE9A000
trusted library allocation
page read and write
7FF7D9456000
unkown
page write copy
17AD2F64000
heap
page read and write
21F17863000
heap
page read and write
2848FE90000
trusted library allocation
page read and write
2A11000
heap
page read and write
2848FE8A000
trusted library allocation
page read and write
2848FE8D000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2967000
heap
page read and write
7FF7D9447000
unkown
page readonly
2961000
heap
page read and write
17AD2724000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
850000
heap
page read and write
4D7000
unkown
page read and write
2848FE93000
trusted library allocation
page read and write
21F177D0000
heap
page read and write
F0405FE000
stack
page read and write
5C0000
trusted library allocation
page read and write
2848FE8A000
trusted library allocation
page read and write
2848FE92000
trusted library allocation
page read and write
17AD2286000
trusted library allocation
page read and write
2848DF24000
trusted library allocation
page read and write
E67627E000
unkown
page readonly
12C0000
trusted library allocation
page read and write
4A8F000
heap
page read and write
17AD3377000
heap
page read and write
4B8D000
heap
page read and write
17AD23F0000
heap
page read and write
17AD2AB4000
trusted library allocation
page read and write
17AD3602000
heap
page read and write
2848DD93000
heap
page read and write
273A000
heap
page read and write
5C0000
trusted library allocation
page read and write
980000
heap
page read and write
4A24000
heap
page read and write
860000
heap
page read and write
1BF0823E000
heap
page read and write
1AB1C005000
heap
page read and write
17AD3610000
heap
page read and write
36AF000
stack
page read and write
17AD31D3000
heap
page read and write
1500000
trusted library allocation
page read and write
2D8000
unkown
page readonly
1500000
trusted library allocation
page read and write
17AD2AAA000
trusted library allocation
page read and write
17AD3387000
heap
page read and write
17AD32FA000
heap
page read and write
2848DF20000
trusted library allocation
page read and write
E67517B000
stack
page read and write
2741000
heap
page read and write
1EDC4F66000
heap
page read and write
848000
heap
page read and write
4A20000
trusted library allocation
page read and write
21F17862000
heap
page read and write
1EDC4F6A000
heap
page read and write
32DF000
stack
page read and write
485B000
stack
page read and write
2848DF20000
trusted library allocation
page read and write
650000
heap
page read and write
59D1000
trusted library allocation
page read and write
2A2B000
heap
page read and write
2848DDBE000
heap
page read and write
1150000
trusted library allocation
page read and write
2848DDBB000
heap
page read and write
17AD3CC4000
trusted library allocation
page read and write
83B000
heap
page read and write
17AD3195000
heap
page read and write
17AD3246000
heap
page read and write
17AD2F17000
heap
page read and write
2848FE91000
trusted library allocation
page read and write
17AD355A000
heap
page read and write
17AD357E000
heap
page read and write
17AD272E000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
17AD3713000
heap
page read and write
1D202EB4000
heap
page read and write
17AD1877000
heap
page read and write
2979000
heap
page read and write
C0478FE000
stack
page read and write
2848FE94000
trusted library allocation
page read and write
17AD33EA000
heap
page read and write
17AD3CC1000
trusted library allocation
page read and write
837000
heap
page read and write
2848FE8D000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
851000
heap
page read and write
17AD26D7000
trusted library allocation
page read and write
17AD3190000
heap
page read and write
1AB1BF50000
heap
page read and write
295F000
heap
page read and write
1150000
trusted library allocation
page read and write
17AD33B1000
heap
page read and write
1150000
trusted library allocation
page read and write
17AD2710000
trusted library allocation
page read and write
2848DF20000
trusted library allocation
page read and write
2848FE8B000
trusted library allocation
page read and write
E01E3FF000
stack
page read and write
2C553600000
trusted library allocation
page read and write
2FC0000
heap
page read and write
2848FE94000
trusted library allocation
page read and write
295C000
heap
page read and write
7FF7D945B000
unkown
page readonly
2848DD91000
heap
page read and write
2848DDBB000
heap
page read and write
1610000
heap
page read and write
2866000
heap
page read and write
123A000
trusted library allocation
page execute and read and write
17AD32B0000
heap
page read and write
280CCFEC000
heap
page read and write
5C0000
trusted library allocation
page read and write
4C2B000
heap
page read and write
1EDC4F30000
heap
page read and write
4A36000
heap
page read and write
854000
heap
page read and write
1150000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
27F3000
heap
page read and write
5C0000
trusted library allocation
page read and write
832000
heap
page read and write
2848DDBD000
heap
page read and write
2848FE8B000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1210000
heap
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
454E000
stack
page read and write
2848DDBB000
heap
page read and write
850000
heap
page read and write
2785000
heap
page read and write
278D000
heap
page read and write
5C0000
trusted library allocation
page read and write
4B18000
heap
page read and write
2848F780000
heap
page read and write
1150000
trusted library allocation
page read and write
4A5A000
heap
page read and write
2961000
heap
page read and write
276C000
heap
page read and write
2848DD91000
heap
page read and write
2C54E602000
heap
page read and write
E675B7E000
unkown
page readonly
1500000
trusted library allocation
page read and write
F04047E000
stack
page read and write
12AE000
stack
page read and write
2848DD85000
heap
page read and write
5C0000
trusted library allocation
page read and write
21F19726000
heap
page read and write
2848FE8B000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
830000
heap
page read and write
5C0000
trusted library allocation
page read and write
29F9000
heap
page read and write
2848FE8D000
trusted library allocation
page read and write
EAA000
stack
page read and write
17AD3703000
heap
page read and write
17AD26EE000
trusted library allocation
page read and write
2848FE8C000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
33B0000
heap
page read and write
2520000
heap
page read and write
28E2000
heap
page read and write
28F6000
heap
page read and write
7E8C000
stack
page read and write
33EE000
stack
page read and write
2848DDD1000
heap
page read and write
764187C000
stack
page read and write
29D4000
heap
page read and write
17AD334C000
heap
page read and write
2848DF20000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1D202E50000
heap
page read and write
4C78000
heap
page read and write
2848FE92000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
29D4000
heap
page read and write
2848DD91000
heap
page read and write
2C553672000
trusted library allocation
page read and write
5D8D000
stack
page read and write
830000
heap
page read and write
9A000
stack
page read and write
2848FE94000
trusted library allocation
page read and write
885000
heap
page read and write
2848FE91000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
294E000
heap
page read and write
17AD31DB000
heap
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848DF20000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
4B85000
heap
page read and write
F04067F000
stack
page read and write
27FC000
heap
page read and write
1500000
trusted library allocation
page read and write
84D000
heap
page read and write
1150000
trusted library allocation
page read and write
7FF7D9430000
unkown
page readonly
22FDCAE5000
heap
page read and write
17AD1E09000
heap
page read and write
1500000
trusted library allocation
page read and write
84E000
heap
page read and write
17AD3CC6000
trusted library allocation
page read and write
4A81000
heap
page read and write
5C0000
trusted library allocation
page read and write
562E000
stack
page read and write
1BF08254000
heap
page read and write
837000
heap
page read and write
1150000
trusted library allocation
page read and write
17AD2A97000
trusted library allocation
page read and write
2848FE80000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
A84000
heap
page read and write
8BE000
heap
page read and write
2FDF000
stack
page read and write
1500000
trusted library allocation
page read and write
17AD31C7000
heap
page read and write
17AD3CAB000
trusted library allocation
page read and write
2767000
heap
page read and write
1150000
trusted library allocation
page read and write
21F17859000
heap
page read and write
17AD22D0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
4C28000
heap
page read and write
17AD1834000
heap
page read and write
2848FE8E000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
2848FE94000
trusted library allocation
page read and write
2848FE91000
trusted library allocation
page read and write
17AD26D2000
trusted library allocation
page read and write
83B000
heap
page read and write
8BF000
heap
page read and write
69E000
stack
page read and write
1500000
trusted library allocation
page read and write
A65000
heap
page read and write
27D9000
heap
page read and write
5C0000
trusted library allocation
page read and write
4A81000
heap
page read and write
1500000
trusted library allocation
page read and write
2953000
heap
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
846000
heap
page read and write
1500000
trusted library allocation
page read and write
17AD17D6000
heap
page read and write
2C54EEB0000
trusted library section
page readonly
1150000
trusted library allocation
page read and write
2963000
heap
page read and write
2848DFD4000
heap
page read and write
4021000
trusted library allocation
page read and write
C15B2FE000
stack
page read and write
576E000
stack
page read and write
1500000
trusted library allocation
page read and write
1B1000
unkown
page execute read
5C0000
trusted library allocation
page read and write
2848FE9D000
trusted library allocation
page read and write
2848DDBE000
heap
page read and write
2BE0000
heap
page read and write
464E000
stack
page read and write
2775000
heap
page read and write
2848DD77000
heap
page read and write
2C54DF13000
heap
page read and write
1500000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
7D30000
heap
page read and write
2848DF24000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
17AD3CC8000
trusted library allocation
page read and write
195000
stack
page read and write
1500000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
830000
heap
page read and write
17AD2728000
trusted library allocation
page read and write
4E20000
trusted library allocation
page read and write
17AD31B2000
heap
page read and write
E67687E000
unkown
page readonly
369F000
unkown
page read and write
2848DD93000
heap
page read and write
65B9000
heap
page read and write
5C0000
trusted library allocation
page read and write
2848FE92000
trusted library allocation
page read and write
17AD3305000
heap
page read and write
2848DD78000
heap
page read and write
1500000
trusted library allocation
page read and write
7FF7D9447000
unkown
page readonly
835000
heap
page read and write
1500000
trusted library allocation
page read and write
2848FE93000
trusted library allocation
page read and write
17AD26FE000
trusted library allocation
page read and write
2848FE8B000
trusted library allocation
page read and write
17AD2F59000
heap
page read and write
2848FE84000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848FE8C000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
844000
heap
page read and write
85B000
heap
page read and write
3030000
heap
page read and write
2848FE91000
trusted library allocation
page read and write
870000
heap
page read and write
2848DD7C000
heap
page read and write
835000
heap
page read and write
1150000
trusted library allocation
page read and write
17AD2AA0000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
34D3000
heap
page read and write
1D202F1F000
heap
page read and write
17AD2702000
trusted library allocation
page read and write
2848DFD0000
heap
page read and write
1500000
trusted library allocation
page read and write
2EE0000
heap
page read and write
2848FE8C000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
132E000
stack
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
32A000
unkown
page readonly
2848FE93000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
1644000
heap
page read and write
17AD2737000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
8CE000
heap
page read and write
1150000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
474F000
stack
page read and write
5C0000
trusted library allocation
page read and write
7FF7D945B000
unkown
page readonly
21F1786B000
heap
page read and write
2848FE8D000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
17AD2E90000
heap
page read and write
775F1FE000
stack
page read and write
2A2B000
heap
page read and write
2848FE8F000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
4A5E000
heap
page read and write
2848DF20000
trusted library allocation
page read and write
1528000
heap
page read and write
87E000
heap
page read and write
1500000
trusted library allocation
page read and write
1BF08200000
heap
page read and write
17AD2AAE000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
10BD000
unkown
page read and write
830000
heap
page read and write
2848DDBB000
heap
page read and write
2C54DEAC000
heap
page read and write
2773000
heap
page read and write
1422000
trusted library allocation
page read and write
17AD1E71000
heap
page read and write
5B0000
heap
page read and write
5C0000
trusted library allocation
page read and write
1EDC4F5E000
heap
page read and write
2848FE9B000
trusted library allocation
page read and write
17AD26F5000
trusted library allocation
page read and write
17AD3352000
heap
page read and write
1150000
trusted library allocation
page read and write
17AD26A0000
trusted library allocation
page read and write
4A2C000
heap
page read and write
C15AEFE000
stack
page read and write
17AD3610000
heap
page read and write
1500000
trusted library allocation
page read and write
2848FE8D000
trusted library allocation
page read and write
2848FE8C000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
843000
heap
page read and write
847000
heap
page read and write
2848DDD1000
heap
page read and write
5C0000
trusted library allocation
page read and write
7641BFB000
stack
page read and write
2757000
heap
page read and write
12D0000
heap
page read and write
2848FE8E000
trusted library allocation
page read and write
1110000
heap
page read and write
4A36000
heap
page read and write
17AD26FB000
trusted library allocation
page read and write
4A10000
heap
page read and write
1500000
trusted library allocation
page read and write
5F50000
heap
page read and write
17AD1790000
heap
page read and write
83E000
heap
page read and write
31F0000
heap
page read and write
17AD2F7E000
heap
page read and write
2848DF20000
trusted library allocation
page read and write
17AD3CC7000
trusted library allocation
page read and write
F51000
unkown
page execute read
2848FE8C000
trusted library allocation
page read and write
2764000
heap
page read and write
2E33000
heap
page execute and read and write
17AD26D8000
trusted library allocation
page read and write
2730000
trusted library allocation
page read and write
2C553660000
remote allocation
page read and write
1150000
trusted library allocation
page read and write
2995000
heap
page read and write
5C0000
trusted library allocation
page read and write
81E000
stack
page read and write
1150000
trusted library allocation
page read and write
CC9000
stack
page read and write
2848DF24000
trusted library allocation
page read and write
17AD2AB7000
trusted library allocation
page read and write
17AD2F7E000
heap
page read and write
17AD3580000
heap
page read and write
1AB1BF20000
heap
page read and write
4ADE000
heap
page read and write
2C54E71A000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD224E000
trusted library allocation
page read and write
379F000
stack
page read and write
4310000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
17AD3203000
heap
page read and write
2848FE8F000
trusted library allocation
page read and write
4260000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848FE94000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
1BF08140000
heap
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
17AD2ABB000
trusted library allocation
page read and write
93C000
stack
page read and write
1500000
trusted library allocation
page read and write
29F5000
heap
page read and write
1150000
trusted library allocation
page read and write
2848DF24000
trusted library allocation
page read and write
78E0000
trusted library allocation
page read and write
2848FE8C000
trusted library allocation
page read and write
277A000
heap
page read and write
830000
heap
page read and write
8CC000
stack
page read and write
5C0000
trusted library allocation
page read and write
83B000
stack
page read and write
5C0000
trusted library allocation
page read and write
1AB1BFED000
heap
page read and write
17AD3503000
heap
page read and write
12E0000
heap
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
E6752FE000
stack
page read and write
2848FE8A000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
E6753FE000
stack
page read and write
5C0000
trusted library allocation
page read and write
2C54EB40000
trusted library allocation
page read and write
17AD2AA3000
trusted library allocation
page read and write
17AD2A9E000
trusted library allocation
page read and write
2848DDE2000
heap
page read and write
7FF7D9447000
unkown
page readonly
2848DDBD000
heap
page read and write
4C28000
heap
page read and write
1150000
trusted library allocation
page read and write
43AE000
stack
page read and write
2848FE93000
trusted library allocation
page read and write
17AD273E000
trusted library allocation
page read and write
4C5A000
heap
page read and write
4B5C000
heap
page read and write
5C0000
trusted library allocation
page read and write
21F177E0000
trusted library allocation
page read and write
2848FE96000
trusted library allocation
page read and write
17AD33D1000
heap
page read and write
2848DD48000
heap
page read and write
1500000
trusted library allocation
page read and write
17AD1798000
heap
page read and write
43EE000
stack
page read and write
874000
heap
page read and write
7FF7D945A000
unkown
page read and write
4B6D000
heap
page read and write
1150000
trusted library allocation
page read and write
34D3000
heap
page read and write
31D0000
heap
page read and write
4B6D000
heap
page read and write
8C8000
heap
page read and write
21F197BE000
heap
page read and write
37F0000
heap
page read and write
2848FE8C000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
2C54EEE0000
trusted library section
page readonly
1500000
trusted library allocation
page read and write
28F6000
heap
page read and write
1500000
trusted library allocation
page read and write
835000
heap
page read and write
17AD33B1000
heap
page read and write
2848FE92000
trusted library allocation
page read and write
2848FE8E000
trusted library allocation
page read and write
2848DF24000
trusted library allocation
page read and write
1EDC4EA0000
heap
page read and write
2848FE8F000
trusted library allocation
page read and write
2848DD93000
heap
page read and write
17AD26EE000
trusted library allocation
page read and write
2848FE95000
trusted library allocation
page read and write
89C000
heap
page read and write
17AD3382000
heap
page read and write
88D000
heap
page read and write
3FDF000
stack
page read and write
1EDC4F5F000
heap
page read and write
1B1000
unkown
page execute read
2848DDD1000
heap
page read and write
17AD32DE000
heap
page read and write
E01E0FF000
stack
page read and write
1500000
trusted library allocation
page read and write
2848FE8A000
trusted library allocation
page read and write
7F8000
heap
page read and write
2C553300000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848DD93000
heap
page read and write
121D000
trusted library allocation
page execute and read and write
2848DD85000
heap
page read and write
2848FE8D000
trusted library allocation
page read and write
17AD3380000
heap
page read and write
5C0000
trusted library allocation
page read and write
1640000
heap
page read and write
1AB1C002000
heap
page read and write
1150000
trusted library allocation
page read and write
17AD334B000
heap
page read and write
84C000
heap
page read and write
22FDCAF4000
heap
page read and write
1BF08245000
heap
page read and write
279A000
heap
page read and write
2848FE90000
trusted library allocation
page read and write
2848FE92000
trusted library allocation
page read and write
2848DD91000
heap
page read and write
2848DD77000
heap
page read and write
2A2B000
heap
page read and write
1500000
trusted library allocation
page read and write
17AD3247000
heap
page read and write
4E20000
trusted library allocation
page read and write
4AE000
unkown
page readonly
4A81000
heap
page read and write
1BF0825B000
heap
page read and write
1500000
trusted library allocation
page read and write
2848FE8A000
trusted library allocation
page read and write
4B53000
heap
page read and write
83B000
heap
page read and write
1150000
trusted library allocation
page read and write
2A04000
heap
page read and write
2848DD93000
heap
page read and write
8A3000
heap
page read and write
17AD2711000
trusted library allocation
page read and write
851000
heap
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
BEA000
heap
page read and write
2848DD93000
heap
page read and write
2848FE8A000
trusted library allocation
page read and write
17AD2EC3000
heap
page read and write
17AD3376000
heap
page read and write
83C000
heap
page read and write
1150000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848DF20000
trusted library allocation
page read and write
1813000
heap
page read and write
2848DCA0000
heap
page read and write
1500000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
2950000
heap
page read and write
1150000
trusted library allocation
page read and write
2848FE8C000
trusted library allocation
page read and write
860000
heap
page read and write
4AF8000
heap
page read and write
5C0000
trusted library allocation
page read and write
1D202F24000
heap
page read and write
1EDC4F66000
heap
page read and write
17AD3303000
heap
page read and write
17AD2F84000
heap
page read and write
17AD3CAD000
trusted library allocation
page read and write
2851000
heap
page read and write
830000
heap
page read and write
2C553390000
trusted library allocation
page read and write
21F197A2000
heap
page read and write
277D000
heap
page read and write
1500000
trusted library allocation
page read and write
2848FE99000
trusted library allocation
page read and write
838000
heap
page read and write
4C26000
heap
page read and write
5C0000
trusted library allocation
page read and write
2961000
heap
page read and write
DC2000
unkown
page readonly
17AD31AB000
heap
page read and write
21F17843000
heap
page read and write
4A20000
heap
page read and write
2775000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD272D000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
21F17802000
unkown
page read and write
65CB000
heap
page read and write
4AC7000
heap
page read and write
2848FE8B000
trusted library allocation
page read and write
89D000
heap
page read and write
1500000
trusted library allocation
page read and write
342F000
stack
page read and write
2848FE8F000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
17AD273A000
trusted library allocation
page read and write
17AD26FE000
trusted library allocation
page read and write
2848DDBD000
heap
page read and write
10BD000
unkown
page write copy
83E000
heap
page read and write
2848FE8A000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
17AD32E0000
heap
page read and write
1500000
trusted library allocation
page read and write
3212000
heap
page read and write
34C2000
heap
page read and write
1150000
trusted library allocation
page read and write
775EFFF000
stack
page read and write
2848FE95000
trusted library allocation
page read and write
2848FE93000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
830000
heap
page read and write
17AD3287000
heap
page read and write
869000
heap
page read and write
330E000
stack
page read and write
17AD34B5000
heap
page read and write
17AD3CAA000
trusted library allocation
page read and write
2770000
heap
page read and write
87D000
heap
page read and write
2848DDD1000
heap
page read and write
F04010A000
stack
page read and write
775F3FE000
stack
page read and write
17AD2736000
trusted library allocation
page read and write
17AD1E29000
heap
page read and write
17AD2F38000
heap
page read and write
21F19000000
heap
page read and write
2848DD85000
heap
page read and write
1150000
trusted library allocation
page read and write
2960000
heap
page read and write
1150000
trusted library allocation
page read and write
17AD2F40000
heap
page read and write
21F17C13000
heap
page read and write
2848DD93000
heap
page read and write
37D0000
heap
page read and write
BD1000
unkown
page execute read
3510000
heap
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2DFD000
stack
page read and write
5C0000
trusted library allocation
page read and write
276C000
heap
page read and write
2848FE96000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
6510000
heap
page read and write
53C000
stack
page read and write
830000
heap
page read and write
5C0000
trusted library allocation
page read and write
2780000
heap
page read and write
34D3000
heap
page read and write
4BEE000
heap
page read and write
E674B7E000
stack
page read and write
17AD2AAB000
trusted library allocation
page read and write
3130000
heap
page read and write
5C0000
trusted library allocation
page read and write
4A85000
heap
page read and write
1245000
trusted library allocation
page execute and read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2C553304000
trusted library allocation
page read and write
2848DDBB000
heap
page read and write
27D2000
heap
page read and write
4C29000
heap
page read and write
17AD3352000
heap
page read and write
4395000
heap
page read and write
1150000
trusted library allocation
page read and write
2848FE95000
trusted library allocation
page read and write
2848FE8A000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
1BF08230000
heap
page read and write
1500000
trusted library allocation
page read and write
11F5000
heap
page read and write
37A2000
heap
page read and write
1EDC4F6B000
heap
page read and write
835000
heap
page read and write
1D202EF9000
heap
page read and write
2848FE92000
trusted library allocation
page read and write
17AD2AA6000
trusted library allocation
page read and write
840000
heap
page read and write
C0479FE000
stack
page read and write
1150000
trusted library allocation
page read and write
1BF08235000
heap
page read and write
1150000
trusted library allocation
page read and write
17AD3191000
heap
page read and write
E01DD09000
stack
page read and write
1500000
trusted library allocation
page read and write
71E000
stack
page read and write
59B6000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848DF20000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
830000
heap
page read and write
4A8F000
heap
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
17AD26DB000
trusted library allocation
page read and write
E01E4FE000
stack
page read and write
2848DD85000
heap
page read and write
1150000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
2961000
heap
page read and write
37A0000
heap
page read and write
1500000
trusted library allocation
page read and write
17AD16C0000
heap
page read and write
86E000
heap
page read and write
1150000
trusted library allocation
page read and write
2C54EEC0000
trusted library section
page readonly
2848DCD0000
heap
page read and write
5C0000
trusted library allocation
page read and write
2848DD91000
heap
page read and write
2848FE92000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
1D202F24000
heap
page read and write
2C54ECA1000
trusted library allocation
page read and write
17AD3495000
heap
page read and write
401000
unkown
page execute read
855000
heap
page read and write
2968000
heap
page read and write
5C0000
trusted library allocation
page read and write
2848DD93000
heap
page read and write
17AD32B9000
heap
page read and write
4D7000
unkown
page write copy
82D000
heap
page read and write
17AD2F38000
heap
page read and write
1D202E80000
heap
page read and write
852000
heap
page read and write
17AD26C4000
trusted library allocation
page read and write
3160000
heap
page read and write
7FF7D9430000
unkown
page readonly
2C54E713000
heap
page read and write
17AD32E1000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD270E000
trusted library allocation
page read and write
825000
heap
page read and write
1D6D000
stack
page read and write
4ADE000
heap
page read and write
17AD3460000
heap
page read and write
1150000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
282B000
heap
page read and write
2848FE90000
trusted library allocation
page read and write
5CE23FE000
stack
page read and write
17AD26E0000
trusted library allocation
page read and write
2848FE90000
trusted library allocation
page read and write
17AD2312000
trusted library allocation
page read and write
2848DF20000
trusted library allocation
page read and write
2848FE8D000
trusted library allocation
page read and write
2848FE94000
trusted library allocation
page read and write
17AD3203000
heap
page read and write
4DC000
unkown
page readonly
17AD1824000
heap
page read and write
1500000
trusted library allocation
page read and write
2848FCC4000
heap
page read and write
8A0000
heap
page read and write
84F000
heap
page read and write
17AD26DF000
trusted library allocation
page read and write
2848DD75000
heap
page read and write
67A8000
heap
page read and write
84A000
heap
page read and write
28AF000
heap
page read and write
2848DDD1000
heap
page read and write
17AD271C000
trusted library allocation
page read and write
17AD330A000
heap
page read and write
87F000
heap
page read and write
17AD26E8000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
17AD3390000
heap
page read and write
282B000
heap
page read and write
2848DD93000
heap
page read and write
2848FE93000
trusted library allocation
page read and write
F04018E000
stack
page read and write
17AD2F07000
heap
page read and write
5C0000
trusted library allocation
page read and write
2848FE8E000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
17AD1E07000
heap
page read and write
17AD3CAC000
trusted library allocation
page read and write
17AD17B3000
heap
page read and write
1150000
trusted library allocation
page read and write
17AD32E0000
heap
page read and write
2848FE95000
trusted library allocation
page read and write
17AD3657000
heap
page read and write
2848FE93000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
2775000
heap
page read and write
17AD26FA000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
2C54E801000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
17AD271F000
trusted library allocation
page read and write
2848DD79000
heap
page read and write
2848FE8B000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2FFE000
stack
page read and write
47D0000
heap
page read and write
2848FE95000
trusted library allocation
page read and write
2848DDBB000
heap
page read and write
4260000
trusted library section
page read and write
17AD3197000
heap
page read and write
C0474FF000
stack
page read and write
17AD3703000
heap
page read and write
17AD319F000
heap
page read and write
17AD2EBE000
heap
page read and write
1500000
trusted library allocation
page read and write
17AD3504000
heap
page read and write
17AD26DC000
trusted library allocation
page read and write
2848DD85000
heap
page read and write
17AD1826000
heap
page read and write
17AD2AB3000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
310E000
stack
page read and write
17AD31EB000
heap
page read and write
1500000
trusted library allocation
page read and write
4AF8000
heap
page read and write
2848FE8B000
trusted library allocation
page read and write
17AD338E000
heap
page read and write
1500000
trusted library allocation
page read and write
820000
heap
page read and write
295E000
heap
page read and write
7FF7D9431000
unkown
page execute read
17AD2AA5000
trusted library allocation
page read and write
17AD381E000
heap
page read and write
5C0000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
14E4000
heap
page read and write
28C8000
heap
page read and write
2848FE8B000
trusted library allocation
page read and write
2848FE96000
trusted library allocation
page read and write
145B000
heap
page read and write
2848DF24000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
831000
heap
page read and write
17AD2F51000
heap
page read and write
3393000
heap
page read and write
29C5000
heap
page read and write
2848FE8A000
trusted library allocation
page read and write
2848FE8A000
trusted library allocation
page read and write
2848FE8B000
trusted library allocation
page read and write
29A4000
heap
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
17AD343F000
heap
page read and write
2848DF24000
trusted library allocation
page read and write
835000
heap
page read and write
2C553455000
heap
page read and write
2A20000
heap
page read and write
4A4B000
heap
page read and write
1150000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848FE8B000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848FB00000
heap
page read and write
2848DDBB000
heap
page read and write
17AD3342000
heap
page read and write
17AD327B000
heap
page read and write
281F000
heap
page read and write
2848DD85000
heap
page read and write
2848FE91000
trusted library allocation
page read and write
4270000
heap
page execute and read and write
1500000
trusted library allocation
page read and write
47CF000
stack
page read and write
878000
heap
page read and write
2C5536C2000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
2848FE70000
heap
page read and write
2848DD93000
heap
page read and write
2848DD93000
heap
page read and write
656000
heap
page read and write
17AD2715000
trusted library allocation
page read and write
2848DF20000
trusted library allocation
page read and write
3210000
heap
page read and write
17AD355C000
heap
page read and write
2746000
heap
page read and write
1150000
trusted library allocation
page read and write
4BE5000
heap
page read and write
2848FE8A000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
17AD33DA000
heap
page read and write
4A60000
heap
page read and write
2848FE8C000
trusted library allocation
page read and write
17AD1826000
heap
page read and write
36F0000
heap
page read and write
17AD33EA000
heap
page read and write
846000
heap
page read and write
27A4000
heap
page read and write
830000
heap
page read and write
852000
heap
page read and write
2848FE93000
trusted library allocation
page read and write
2613000
heap
page read and write
2848DDD1000
heap
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2C54DE2B000
heap
page read and write
17AD31B3000
heap
page read and write
17AD2F86000
heap
page read and write
2798000
heap
page read and write
834000
heap
page read and write
17AD269D000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848000
heap
page read and write
4C5D000
heap
page read and write
28E2000
heap
page read and write
36E0000
heap
page read and write
2848FE8B000
trusted library allocation
page read and write
2848DDD0000
heap
page read and write
1500000
trusted library allocation
page read and write
17AD26F5000
trusted library allocation
page read and write
2848FE8D000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
17AD26E5000
trusted library allocation
page read and write
836000
heap
page read and write
5C0000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
825000
heap
page read and write
4DC000
unkown
page readonly
2848DDD1000
heap
page read and write
297A000
heap
page read and write
2848FE8D000
trusted library allocation
page read and write
338F000
stack
page read and write
1150000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
17AD26C3000
trusted library allocation
page read and write
7F8C000
stack
page read and write
1AB1C002000
heap
page read and write
2848FE92000
trusted library allocation
page read and write
2848FE91000
trusted library allocation
page read and write
2848FE93000
trusted library allocation
page read and write
7FF7D9456000
unkown
page write copy
1500000
trusted library allocation
page read and write
2A04000
heap
page read and write
2848FE96000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
17AD2733000
trusted library allocation
page read and write
820000
heap
page read and write
2848FE8F000
trusted library allocation
page read and write
2848FE8A000
trusted library allocation
page read and write
4C4F000
heap
page read and write
2C5532D0000
trusted library allocation
page read and write
2848DDBD000
heap
page read and write
30CC000
stack
page read and write
22FDCAF4000
heap
page read and write
5C0000
trusted library allocation
page read and write
2848DDBF000
heap
page read and write
5C0000
trusted library allocation
page read and write
2848FE8D000
trusted library allocation
page read and write
2848FE8F000
trusted library allocation
page read and write
5A5E000
stack
page read and write
1500000
trusted library allocation
page read and write
31D0000
heap
page read and write
864000
heap
page read and write
1150000
trusted library allocation
page read and write
830000
heap
page read and write
3310000
heap
page read and write
2C55350D000
heap
page read and write
28FB000
heap
page read and write
810000
heap
page read and write
59BE000
trusted library allocation
page read and write
B80000
heap
page read and write
2848FE92000
trusted library allocation
page read and write
17AD2732000
trusted library allocation
page read and write
1AB1BFEF000
heap
page read and write
2848FE8B000
trusted library allocation
page read and write
17AD26F7000
trusted library allocation
page read and write
17AD26F9000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
E67587E000
unkown
page readonly
1500000
trusted library allocation
page read and write
2848FE8C000
trusted library allocation
page read and write
4BD2000
heap
page read and write
835000
heap
page read and write
1150000
trusted library allocation
page read and write
17AD270B000
trusted library allocation
page read and write
4D7000
unkown
page read and write
7D0000
heap
page read and write
1430000
trusted library allocation
page read and write
7FF7D9430000
unkown
page readonly
2C5536E5000
trusted library allocation
page read and write
78F0000
trusted library allocation
page execute and read and write
1AB1BFE5000
heap
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
850000
heap
page read and write
7FF7D9447000
unkown
page readonly
46E0000
direct allocation
page execute and read and write
31D5000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
4C75000
heap
page read and write
2848FE8E000
trusted library allocation
page read and write
87D000
heap
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
4BEE000
heap
page read and write
1BF08210000
heap
page read and write
84D000
heap
page read and write
36B0000
heap
page read and write
2848FE91000
trusted library allocation
page read and write
4A5C000
heap
page read and write
1150000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848FE95000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
17AD26C5000
trusted library allocation
page read and write
29AD000
heap
page read and write
17AD32AE000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD3352000
heap
page read and write
1D202D70000
heap
page read and write
4A8E000
heap
page read and write
84C000
heap
page read and write
1500000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
17AD2A94000
trusted library allocation
page read and write
2848FE8B000
trusted library allocation
page read and write
442E000
stack
page read and write
1500000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2E76000
stack
page read and write
E1F000
stack
page read and write
2970000
heap
page read and write
1150000
trusted library allocation
page read and write
17AD2260000
heap
page read and write
1404000
trusted library allocation
page read and write
2C54DE8E000
heap
page read and write
5B03E7A000
stack
page read and write
1150000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2C54EEA0000
trusted library section
page readonly
7DB000
heap
page read and write
2848FE8F000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848FE8D000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
17AD16A0000
heap
page read and write
17AD26FC000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
2848FE93000
trusted library allocation
page read and write
17AD2232000
trusted library allocation
page read and write
835000
heap
page read and write
15E0000
heap
page read and write
17AD3CC5000
trusted library allocation
page read and write
17AD271B000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848FE94000
trusted library allocation
page read and write
17AD3CBA000
trusted library allocation
page read and write
28AF000
heap
page read and write
17AD2690000
trusted library allocation
page read and write
1BF08204000
heap
page read and write
1150000
trusted library allocation
page read and write
750000
heap
page read and write
2848FE8C000
trusted library allocation
page read and write
17AD3191000
heap
page read and write
17AD32DE000
heap
page read and write
5C0000
trusted library allocation
page read and write
17AD3CBB000
trusted library allocation
page read and write
17AD2AAD000
trusted library allocation
page read and write
2848DDBD000
heap
page read and write
5C0000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
313F000
stack
page read and write
17AD26D3000
trusted library allocation
page read and write
870000
heap
page read and write
1500000
trusted library allocation
page read and write
2C55364D000
trusted library allocation
page read and write
1411000
heap
page read and write
17AD3732000
heap
page read and write
C04716B000
stack
page read and write
1450000
heap
page read and write
2848DF20000
trusted library allocation
page read and write
2848FE86000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
4A5B000
heap
page read and write
2C5536A0000
trusted library allocation
page read and write
C15B0FF000
stack
page read and write
1150000
trusted library allocation
page read and write
17AD26D6000
trusted library allocation
page read and write
17AD31DA000
heap
page read and write
2848FE8D000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
3518000
heap
page read and write
17AD31C7000
heap
page read and write
2848FE8F000
trusted library allocation
page read and write
37E0000
heap
page read and write
4BEE000
heap
page read and write
2848FE90000
trusted library allocation
page read and write
2848DD85000
heap
page read and write
29D4000
heap
page read and write
1500000
trusted library allocation
page read and write
1EDC4F74000
heap
page read and write
7FF7D9456000
unkown
page write copy
4260000
trusted library allocation
page read and write
2848FE8D000
trusted library allocation
page read and write
2848FE8D000
trusted library allocation
page read and write
1AB1BFE0000
heap
page read and write
17AD3CB5000
trusted library allocation
page read and write
2848FE8E000
trusted library allocation
page read and write
78D0000
heap
page read and write
2848FE95000
trusted library allocation
page read and write
17AD32AE000
heap
page read and write
17AD16F0000
heap
page read and write
17AD2EA3000
heap
page read and write
17AD2AA6000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
4B8D000
heap
page read and write
1500000
trusted library allocation
page read and write
2848DD85000
heap
page read and write
5F10000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
4BA6000
heap
page read and write
2D91000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
21F1782B000
heap
page read and write
17AD34B6000
heap
page read and write
17AD2A9F000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2FB0000
heap
page read and write
7DE000
stack
page read and write
1500000
trusted library allocation
page read and write
17AD26E6000
trusted library allocation
page read and write
1BB0000
trusted library allocation
page read and write
2848FE8F000
trusted library allocation
page read and write
17AD2F38000
heap
page read and write
17AD271E000
trusted library allocation
page read and write
2848DDBC000
heap
page read and write
2848DDBF000
heap
page read and write
2966000
heap
page read and write
2735000
heap
page read and write
1500000
trusted library allocation
page read and write
2848DD85000
heap
page read and write
2848FCB0000
heap
page read and write
17AD3495000
heap
page read and write
7FF7D9456000
unkown
page write copy
5C0000
trusted library allocation
page read and write
2848FE90000
trusted library allocation
page read and write
22FDCAC0000
heap
page read and write
2775000
heap
page read and write
17AD2E91000
heap
page read and write
2848FE95000
trusted library allocation
page read and write
2C55348E000
heap
page read and write
4C20000
heap
page read and write
2C55342E000
heap
page read and write
5C0000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848FA50000
heap
page read and write
2C5536E8000
trusted library allocation
page read and write
2792000
heap
page read and write
5C0000
trusted library allocation
page read and write
764207F000
stack
page read and write
C15ACFB000
stack
page read and write
E67577E000
unkown
page readonly
2848DD91000
heap
page read and write
1500000
trusted library allocation
page read and write
411F000
stack
page read and write
17AD182B000
heap
page read and write
1500000
trusted library allocation
page read and write
17AD330A000
heap
page read and write
2E40000
heap
page execute and read and write
4AFF000
heap
page read and write
2848DDD1000
heap
page read and write
2848DDBF000
heap
page read and write
5C0000
trusted library allocation
page read and write
2848DDBE000
heap
page read and write
17AD1834000
heap
page read and write
2848FE8B000
trusted library allocation
page read and write
17AD26EF000
trusted library allocation
page read and write
7FF7D945B000
unkown
page readonly
17AD2AAB000
trusted library allocation
page read and write
6E0000
heap
page read and write
140D000
trusted library allocation
page execute and read and write
31D8000
heap
page read and write
1500000
trusted library allocation
page read and write
17AD3615000
heap
page read and write
1150000
trusted library allocation
page read and write
A90000
heap
page read and write
1500000
trusted library allocation
page read and write
870000
heap
page read and write
1150000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2961000
heap
page read and write
1150000
trusted library allocation
page read and write
17AD343D000
heap
page read and write
1229000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
509000
unkown
page readonly
2848DF20000
trusted library allocation
page read and write
2C5534FA000
heap
page read and write
17AD34D6000
heap
page read and write
854000
heap
page read and write
2E9A000
heap
page read and write
1500000
trusted library allocation
page read and write
17AD3658000
heap
page read and write
509000
unkown
page readonly
88D000
heap
page read and write
1500000
trusted library allocation
page read and write
2848FE8C000
trusted library allocation
page read and write
17AD36AD000
heap
page read and write
17AD3090000
heap
page read and write
2848FE92000
trusted library allocation
page read and write
1500000
heap
page read and write
2730000
trusted library allocation
page read and write
2848FE90000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
835000
heap
page read and write
17AD32F7000
heap
page read and write
17AD3CBF000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848DD93000
heap
page read and write
17AD273B000
trusted library allocation
page read and write
17AD269C000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
289E000
heap
page read and write
4DC000
unkown
page readonly
760000
heap
page read and write
2848FE8F000
trusted library allocation
page read and write
2848DD93000
heap
page read and write
1500000
trusted library allocation
page read and write
2730000
trusted library allocation
page read and write
2848DD93000
heap
page read and write
2F4C000
stack
page read and write
4A9C000
heap
page read and write
27A8000
heap
page read and write
84F000
heap
page read and write
1150000
trusted library allocation
page read and write
17AD3245000
heap
page read and write
1500000
trusted library allocation
page read and write
1437000
trusted library allocation
page execute and read and write
2848DD85000
heap
page read and write
863000
heap
page read and write
17AD26D5000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2950000
heap
page read and write
4BA6000
heap
page read and write
31D000
unkown
page write copy
884000
heap
page read and write
5DE0000
heap
page read and write
1500000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2C553442000
heap
page read and write
1150000
trusted library allocation
page read and write
2848DDBD000
heap
page read and write
276E000
heap
page read and write
2848FE83000
trusted library allocation
page read and write
4C7A000
heap
page read and write
2848FE92000
trusted library allocation
page read and write
830000
heap
page read and write
17AD26A4000
trusted library allocation
page read and write
21F17863000
heap
page read and write
2C54DE44000
heap
page read and write
4C22000
heap
page read and write
1500000
trusted library allocation
page read and write
1EDC4F7B000
heap
page read and write
7FF7D9430000
unkown
page readonly
610000
heap
page read and write
17AD3CB9000
trusted library allocation
page read and write
22FDE404000
heap
page read and write
17AD31F4000
heap
page read and write
17AD2AAD000
trusted library allocation
page read and write
12E9000
heap
page read and write
1500000
trusted library allocation
page read and write
2848DDBF000
heap
page read and write
2730000
trusted library allocation
page read and write
2730000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
17AD32BF000
heap
page read and write
843000
heap
page read and write
2848FE94000
trusted library allocation
page read and write
17AD34E0000
heap
page read and write
17AD33EE000
heap
page read and write
30FE000
stack
page read and write
7FF7D945B000
unkown
page readonly
1AB1BFE5000
heap
page read and write
8A6000
heap
page read and write
31CF000
stack
page read and write
21F1975E000
heap
page read and write
2848DD91000
heap
page read and write
3991000
heap
page read and write
2848DDBD000
heap
page read and write
2848FE93000
trusted library allocation
page read and write
5C0000
trusted library allocation
page read and write
2848DF24000
trusted library allocation
page read and write
2848FE8B000
trusted library allocation
page read and write
821000
heap
page read and write
2848FE8E000
trusted library allocation
page read and write
840000
heap
page read and write
17AD2714000
trusted library allocation
page read and write
2848FE91000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
2848DD93000
heap
page read and write
297C000
heap
page read and write
1150000
trusted library allocation
page read and write
851000
heap
page read and write
2848FE92000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
2914000
heap
page read and write
2848FE8B000
trusted library allocation
page read and write
2848FE95000
trusted library allocation
page read and write
2848FE90000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
There are 3633 hidden memdumps, click here to show them.