IOC Report
SecuriteInfo.com.Trojan.MSIL.Krypt.13987.3473.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.MSIL.Krypt.13987.3473.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
C:\Program Files (x86)\Packing Partner V4\CEF\DOMView.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Packing Partner V4\CEF\resources.pak
data
dropped
malicious
C:\Program Files (x86)\Packing Partner V4\DOMView.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Packing Partner V4\Font\arialn.z
zlib compressed data
dropped
malicious
C:\Program Files (x86)\Packing Partner V4\Font\arialnb.z
zlib compressed data
dropped
malicious
C:\Program Files (x86)\Packing Partner V4\Library\CEF1120.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Program Files (x86)\Packing Partner V4\Library\Lib4000.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Program Files (x86)\Packing Partner V4\Packing Partner V3.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Packing Partner V4\Packing Station.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Package Cache\.unverified\cab54A5CABBE7274D8A22EB58060AAB7623 (copy)
Microsoft Cabinet archive data, many, 758680 bytes, 10 files, at 0x44 +A "concrt140.dll" +A "msvcp140.dll", flags 0x4, number 1, extra bytes 20 in head, 56 datablocks, 0x1 compression
dropped
malicious
C:\ProgramData\Package Cache\.unverified\cabB3E1576D1FEFBB979E13B1A5379E0B16 (copy)
Microsoft Cabinet archive data, many, 5112845 bytes, 14 files, at 0x44 +A "mfc140.dll" +A "mfc140chs.dll", flags 0x4, number 1, extra bytes 20 in head, 319 datablocks, 0x1 compression
dropped
malicious
C:\ProgramData\Package Cache\{46E11E7F-01E1-44D0-BB86-C67342D253DD}v14.32.31326\packages\vcRuntimeMinimum_x86\cab1.cab (copy)
Microsoft Cabinet archive data, many, 758680 bytes, 10 files, at 0x44 +A "concrt140.dll" +A "msvcp140.dll", flags 0x4, number 1, extra bytes 20 in head, 56 datablocks, 0x1 compression
dropped
malicious
C:\ProgramData\Package Cache\{A250E750-DB3F-40C1-8460-8EF77C7582DA}v14.32.31326\packages\vcRuntimeAdditional_x86\cab1.cab (copy)
Microsoft Cabinet archive data, many, 5112845 bytes, 14 files, at 0x44 +A "mfc140.dll" +A "mfc140chs.dll", flags 0x4, number 1, extra bytes 20 in head, 319 datablocks, 0x1 compression
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\vcredist_2019_x86[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\Lib4000[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\CEF1120[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\vcredist_2019_x86.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\{564A0345-3E27-4D7C-BAD6-487E44262AFC}\.cr\vcredist_2019_x86.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.be\VC_redist.x86.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\cab54A5CABBE7274D8A22EB58060AAB7623
Microsoft Cabinet archive data, many, 758680 bytes, 10 files, at 0x44 +A "concrt140.dll" +A "msvcp140.dll", flags 0x4, number 1, extra bytes 20 in head, 56 datablocks, 0x1 compression
dropped
malicious
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\cabB3E1576D1FEFBB979E13B1A5379E0B16
Microsoft Cabinet archive data, many, 5112845 bytes, 14 files, at 0x44 +A "mfc140.dll" +A "mfc140chs.dll", flags 0x4, number 1, extra bytes 20 in head, 319 datablocks, 0x1 compression
dropped
malicious
6c80e6.rbf (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
6c80eb.rbf (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
6c80ec.rbf (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
6c80ed.rbf (copy)
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
6c80ee.rbf (copy)
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\14cf0ab3e4a0f130fd99e986a4\$shtdwn$.req
data
dropped
C:\14cf0ab3e4a0f130fd99e986a4\1028\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (388), with CRLF line terminators
dropped
C:\14cf0ab3e4a0f130fd99e986a4\1028\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\14cf0ab3e4a0f130fd99e986a4\1028\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\14cf0ab3e4a0f130fd99e986a4\1031\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (615), with CRLF line terminators
dropped
C:\14cf0ab3e4a0f130fd99e986a4\1031\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\14cf0ab3e4a0f130fd99e986a4\1031\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\14cf0ab3e4a0f130fd99e986a4\1033\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (565), with CRLF line terminators
dropped
C:\14cf0ab3e4a0f130fd99e986a4\1033\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\14cf0ab3e4a0f130fd99e986a4\1033\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\14cf0ab3e4a0f130fd99e986a4\1036\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (619), with CRLF line terminators
dropped
C:\14cf0ab3e4a0f130fd99e986a4\1036\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\14cf0ab3e4a0f130fd99e986a4\1036\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\14cf0ab3e4a0f130fd99e986a4\1040\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (601), with CRLF line terminators
dropped
C:\14cf0ab3e4a0f130fd99e986a4\1040\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\14cf0ab3e4a0f130fd99e986a4\1040\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\14cf0ab3e4a0f130fd99e986a4\1041\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (440), with CRLF line terminators
dropped
C:\14cf0ab3e4a0f130fd99e986a4\1041\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\14cf0ab3e4a0f130fd99e986a4\1041\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\14cf0ab3e4a0f130fd99e986a4\1042\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (439), with CRLF line terminators
dropped
C:\14cf0ab3e4a0f130fd99e986a4\1042\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\14cf0ab3e4a0f130fd99e986a4\1042\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\14cf0ab3e4a0f130fd99e986a4\1049\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (634), with CRLF line terminators
dropped
C:\14cf0ab3e4a0f130fd99e986a4\1049\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\14cf0ab3e4a0f130fd99e986a4\1049\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\14cf0ab3e4a0f130fd99e986a4\2052\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (390), with CRLF line terminators
dropped
C:\14cf0ab3e4a0f130fd99e986a4\2052\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\14cf0ab3e4a0f130fd99e986a4\2052\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\14cf0ab3e4a0f130fd99e986a4\3082\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (616), with CRLF line terminators
dropped
C:\14cf0ab3e4a0f130fd99e986a4\3082\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\14cf0ab3e4a0f130fd99e986a4\3082\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\14cf0ab3e4a0f130fd99e986a4\DHtmlHeader.html
HTML document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\14cf0ab3e4a0f130fd99e986a4\DisplayIcon.ico
MS Windows icon resource - 13 icons, 16x16, 16 colors, 4 bits/pixel, 16x16, 8 bits/pixel
dropped
C:\14cf0ab3e4a0f130fd99e986a4\Graphics\Print.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\14cf0ab3e4a0f130fd99e986a4\Graphics\Rotate1.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\14cf0ab3e4a0f130fd99e986a4\Graphics\Rotate2.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\14cf0ab3e4a0f130fd99e986a4\Graphics\Rotate3.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\14cf0ab3e4a0f130fd99e986a4\Graphics\Rotate4.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\14cf0ab3e4a0f130fd99e986a4\Graphics\Rotate5.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\14cf0ab3e4a0f130fd99e986a4\Graphics\Rotate6.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\14cf0ab3e4a0f130fd99e986a4\Graphics\Rotate7.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\14cf0ab3e4a0f130fd99e986a4\Graphics\Rotate8.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\14cf0ab3e4a0f130fd99e986a4\Graphics\Save.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\14cf0ab3e4a0f130fd99e986a4\Graphics\Setup.ico
MS Windows icon resource - 12 icons, 16x16, 16 colors, 4 bits/pixel, 16x16, 8 bits/pixel
dropped
C:\14cf0ab3e4a0f130fd99e986a4\Graphics\SysReqMet.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\14cf0ab3e4a0f130fd99e986a4\Graphics\SysReqNotMet.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\14cf0ab3e4a0f130fd99e986a4\Graphics\stop.ico
MS Windows icon resource - 6 icons, 32x32, 16 colors, 4 bits/pixel, 16x16, 16 colors, 4 bits/pixel
dropped
C:\14cf0ab3e4a0f130fd99e986a4\Graphics\warn.ico
MS Windows icon resource - 6 icons, 32x32, 16 colors, 4 bits/pixel, 16x16, 16 colors, 4 bits/pixel
dropped
C:\14cf0ab3e4a0f130fd99e986a4\ParameterInfo.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (314), with CRLF line terminators
dropped
C:\14cf0ab3e4a0f130fd99e986a4\Setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\14cf0ab3e4a0f130fd99e986a4\SetupEngine.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\14cf0ab3e4a0f130fd99e986a4\SetupUi.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\14cf0ab3e4a0f130fd99e986a4\SetupUi.xsd
XML 1.0 document, ASCII text, with very long lines (335), with CRLF line terminators
dropped
C:\14cf0ab3e4a0f130fd99e986a4\SplashScreen.bmp
PC bitmap, Windows 3.x format, 200 x 200 x 8, image size 40000, resolution 3779 x 3779 px/m, cbSize 41078, bits offset 1078
dropped
C:\14cf0ab3e4a0f130fd99e986a4\Strings.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\14cf0ab3e4a0f130fd99e986a4\UiInfo.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\14cf0ab3e4a0f130fd99e986a4\header.bmp
PC bitmap, Windows 3.x format, 49 x 49 x 24, image size 7254, resolution 2834 x 2834 px/m, cbSize 7308, bits offset 54
dropped
C:\14cf0ab3e4a0f130fd99e986a4\sqmapi.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\14cf0ab3e4a0f130fd99e986a4\vc_red.cab
Microsoft Cabinet archive data, 4186145 bytes, 19 files, at 0x44 +A "F_CENTRAL_atl100_x86" +A "F_CENTRAL_mfc100_x86", flags 0x4, number 1, extra bytes 20 in head, 354 datablocks, 0x1503 compression
dropped
C:\14cf0ab3e4a0f130fd99e986a4\vc_red.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x86 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x86 Redistributable - 10.0.30319., Template: Intel;0, Revision Number: {F035AD1C-45C3-4166-865F-C2F7CD4958B1}, Create Time/Date: Fri Mar 19 16:11:58 2010, Last Saved Time/Date: Fri Mar 19 16:11:58 2010, Number of Pages: 200, Name of Creating Application: Windows Installer XML (3.5.0626.0), Security: 2, Number of Words: 2
dropped
C:\14cf0ab3e4a0f130fd99e986a4\watermark.bmp
PC bitmap, Windows 3.x format, 164 x 628 x 24, image size 308978, resolution 2834 x 2834 px/m, cbSize 309032, bits offset 54
dropped
C:\Config.Msi\6c3ca0.rbs
data
modified
C:\Config.Msi\6c80dd.rbs
data
dropped
C:\Config.Msi\6c80e1.rbs
data
dropped
C:\Config.Msi\6c80e5.rbs
data
dropped
C:\Config.Msi\6c80ea.rbs
data
dropped
C:\Program Files (x86)\Common Files\Microsoft Shared\VC\msdia100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\CefSharp.BrowserSubprocess.Core.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\CefSharp.Core.Runtime.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\CefSharp.Core.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\CefSharp.WinForms.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\CefSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\DOMView.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\LICENSE.txt
ASCII text
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\README.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\chrome_100_percent.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\chrome_200_percent.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\chrome_elf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\d3dcompiler_47.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\icudtl.dat
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\libEGL.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\libGLESv2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\libcef.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\af.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\am.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\ar.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\bg.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\bn.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\ca.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\cs.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\da.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\de.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\el.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\en-GB.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\en-US.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\es-419.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\es.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\et.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\fa.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\fi.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\fil.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\fr.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\gu.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\he.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\hi.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\hr.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\hu.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\id.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\it.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\ja.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\kn.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\ko.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\lt.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\lv.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\ml.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\mr.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\ms.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\nb.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\nl.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\pl.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\pt-BR.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\pt-PT.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\ro.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\ru.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\sk.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\sl.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\sr.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\sv.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\sw.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\ta.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\te.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\th.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\tr.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\uk.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\ur.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\vi.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\zh-CN.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\locales\zh-TW.pak
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\build\pdf.js
Unicode text, UTF-8 text, with very long lines (1141), with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\build\pdf.worker.js
Unicode text, UTF-8 text, with very long lines (1141), with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\78-EUC-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\78-EUC-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\78-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\78-RKSJ-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\78-RKSJ-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\78-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\78ms-RKSJ-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\78ms-RKSJ-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\83pv-RKSJ-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\90ms-RKSJ-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\90ms-RKSJ-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\90msp-RKSJ-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\90msp-RKSJ-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\90pv-RKSJ-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\90pv-RKSJ-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Add-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Add-RKSJ-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Add-RKSJ-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Add-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-CNS1-0.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-CNS1-1.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-CNS1-2.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-CNS1-3.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-CNS1-4.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-CNS1-5.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-CNS1-6.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-CNS1-UCS2.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-GB1-0.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-GB1-1.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-GB1-2.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-GB1-3.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-GB1-4.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-GB1-5.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-GB1-UCS2.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-Japan1-0.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-Japan1-1.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-Japan1-2.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-Japan1-3.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-Japan1-4.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-Japan1-5.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-Japan1-6.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-Japan1-UCS2.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-Korea1-0.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-Korea1-1.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-Korea1-2.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Adobe-Korea1-UCS2.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\B5-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\B5-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\B5pc-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\B5pc-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\CNS-EUC-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\CNS-EUC-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\CNS1-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\CNS1-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\CNS2-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\CNS2-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\ETHK-B5-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\ETHK-B5-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\ETen-B5-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\ETen-B5-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\ETenms-B5-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\ETenms-B5-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\EUC-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\EUC-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Ext-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Ext-RKSJ-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Ext-RKSJ-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Ext-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\GB-EUC-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\GB-EUC-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\GB-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\GB-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\GBK-EUC-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\GBK-EUC-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\GBK2K-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\GBK2K-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\GBKp-EUC-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\GBKp-EUC-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\GBT-EUC-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\GBT-EUC-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\GBT-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\GBT-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\GBTpc-EUC-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\GBTpc-EUC-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\GBpc-EUC-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\GBpc-EUC-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\HKdla-B5-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\HKdla-B5-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\HKdlb-B5-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\HKdlb-B5-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\HKgccs-B5-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\HKgccs-B5-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\HKm314-B5-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\HKm314-B5-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\HKm471-B5-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\HKm471-B5-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\HKscs-B5-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\HKscs-B5-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Hankaku.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Hiragana.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\KSC-EUC-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\KSC-EUC-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\KSC-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\KSC-Johab-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\KSC-Johab-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\KSC-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\KSCms-UHC-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\KSCms-UHC-HW-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\KSCms-UHC-HW-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\KSCms-UHC-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\KSCpc-EUC-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\KSCpc-EUC-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Katakana.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\NWP-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\NWP-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\RKSJ-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\RKSJ-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\Roman.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniCNS-UCS2-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniCNS-UCS2-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniCNS-UTF16-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniCNS-UTF16-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniCNS-UTF32-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniCNS-UTF32-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniCNS-UTF8-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniCNS-UTF8-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniGB-UCS2-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniGB-UCS2-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniGB-UTF16-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniGB-UTF16-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniGB-UTF32-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniGB-UTF32-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniGB-UTF8-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniGB-UTF8-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniJIS-UCS2-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniJIS-UCS2-HW-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniJIS-UCS2-HW-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniJIS-UCS2-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniJIS-UTF16-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniJIS-UTF16-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniJIS-UTF32-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniJIS-UTF32-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniJIS-UTF8-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniJIS-UTF8-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniJIS2004-UTF16-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniJIS2004-UTF16-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniJIS2004-UTF32-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniJIS2004-UTF32-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniJIS2004-UTF8-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniJIS2004-UTF8-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniJISPro-UCS2-HW-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniJISPro-UCS2-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniJISPro-UTF8-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniJISX0213-UTF32-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniJISX0213-UTF32-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniJISX02132004-UTF32-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniJISX02132004-UTF32-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniKS-UCS2-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniKS-UCS2-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniKS-UTF16-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniKS-UTF16-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniKS-UTF32-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniKS-UTF32-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniKS-UTF8-H.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\UniKS-UTF8-V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\V.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\cmaps\WP-Symbol.bcmap
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\annotation-check.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\annotation-comment.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\annotation-help.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\annotation-insert.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\annotation-key.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\annotation-newparagraph.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\annotation-noicon.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\annotation-note.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\annotation-paperclip.svg
exported SGML document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\annotation-paragraph.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\annotation-pushpin.svg
exported SGML document, ASCII text, with very long lines (818), with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\cursor-editorFreeText.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\cursor-editorInk.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\findbarButton-next.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\findbarButton-previous.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\gv-toolbarButton-download.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\gv-toolbarButton-openinapp.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\loading-dark.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\loading-icon.gif
GIF image data, version 89a, 24 x 24
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\loading.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\secondaryToolbarButton-documentProperties.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\secondaryToolbarButton-firstPage.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\secondaryToolbarButton-handTool.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\secondaryToolbarButton-lastPage.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\secondaryToolbarButton-rotateCcw.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\secondaryToolbarButton-rotateCw.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\secondaryToolbarButton-scrollHorizontal.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\secondaryToolbarButton-scrollPage.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\secondaryToolbarButton-scrollVertical.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\secondaryToolbarButton-scrollWrapped.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\secondaryToolbarButton-selectTool.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\secondaryToolbarButton-spreadEven.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\secondaryToolbarButton-spreadNone.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\secondaryToolbarButton-spreadOdd.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\toolbarButton-bookmark.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\toolbarButton-currentOutlineItem.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\toolbarButton-download.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\toolbarButton-editorFreeText.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\toolbarButton-editorInk.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\toolbarButton-menuArrow.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\toolbarButton-openFile.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\toolbarButton-pageDown.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\toolbarButton-pageUp.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\toolbarButton-presentationMode.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\toolbarButton-print.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\toolbarButton-search.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\toolbarButton-secondaryToolbarToggle.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\toolbarButton-sidebarToggle.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\toolbarButton-viewAttachments.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\toolbarButton-viewLayers.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\toolbarButton-viewOutline.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\toolbarButton-viewThumbnail.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\toolbarButton-zoomIn.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\toolbarButton-zoomOut.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\treeitem-collapsed.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\images\treeitem-expanded.svg
SVG Scalable Vector Graphics image
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\index.html
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\ach\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\af\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\an\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\ar\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\ast\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\az\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\be\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\bg\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\bn\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\bo\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\br\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\brx\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\bs\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\ca\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\cak\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\ckb\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\cs\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\cy\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\da\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\de\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\dsb\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\el\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\en-CA\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\en-GB\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\en-US\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\eo\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\es-AR\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\es-CL\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\es-ES\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\es-MX\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\et\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\eu\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\fa\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\ff\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\fi\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\fr\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\fur\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\fy-NL\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\ga-IE\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\gd\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\gl\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\gn\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\gu-IN\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\he\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\hi-IN\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\hr\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\hsb\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\hu\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\hy-AM\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\hye\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\ia\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\id\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\is\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\it\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\ja\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\ka\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\kab\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\kk\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\km\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\kn\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\ko\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\lij\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\lo\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\locale.properties
Generic INItialization configuration [af]
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\lt\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\ltg\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\lv\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\meh\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\mk\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\mr\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\ms\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\my\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\nb-NO\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\ne-NP\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\nl\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\nn-NO\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\oc\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\pa-IN\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\pl\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\pt-BR\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\pt-PT\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\rm\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\ro\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\ru\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\sat\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\sc\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\scn\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\sco\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\si\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\sk\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\skr\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\sl\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\son\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\sq\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\sr\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\sv-SE\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\szl\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\ta\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\te\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\tg\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\th\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\tl\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\tr\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\trs\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\uk\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\ur\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\uz\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\vi\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\wo\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\xh\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\zh-CN\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\locale\zh-TW\viewer.properties
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\standard_fonts\FoxitDingbats.pfb
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\standard_fonts\FoxitFixed.pfb
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\standard_fonts\FoxitFixedBold.pfb
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\standard_fonts\FoxitFixedBoldItalic.pfb
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\standard_fonts\FoxitFixedItalic.pfb
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\standard_fonts\FoxitSans.pfb
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\standard_fonts\FoxitSansBold.pfb
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\standard_fonts\FoxitSansBoldItalic.pfb
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\standard_fonts\FoxitSansItalic.pfb
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\standard_fonts\FoxitSerif.pfb
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\standard_fonts\FoxitSerifBold.pfb
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\standard_fonts\FoxitSerifBoldItalic.pfb
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\standard_fonts\FoxitSerifItalic.pfb
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\standard_fonts\FoxitSymbol.pfb
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\standard_fonts\LICENSE_FOXIT
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\standard_fonts\LICENSE_LIBERATION
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\standard_fonts\LiberationSans-Bold.ttf
TrueType Font data, 19 tables, 1st "FFTM", 28 names, Macintosh
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\standard_fonts\LiberationSans-BoldItalic.ttf
TrueType Font data, 19 tables, 1st "FFTM", 28 names, Macintosh
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\standard_fonts\LiberationSans-Italic.ttf
TrueType Font data, 19 tables, 1st "FFTM", 28 names, Macintosh
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\standard_fonts\LiberationSans-Regular.ttf
TrueType Font data, 19 tables, 1st "FFTM", 28 names, Macintosh
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\viewer.css
Algol 68 source, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\viewer.html
HTML document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\pdf.js\web\viewer.js
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\snapshot_blob.bin
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\v8_context_snapshot.bin
data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\vk_swiftshader.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\vk_swiftshader_icd.json
JSON data
dropped
C:\Program Files (x86)\Packing Partner V4\CEF\vulkan-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\ChilkatDotNet45.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\DiffPlex.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\ExcelDataReader.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\Extensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\Extras.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\FlatTabControl.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\Font\3of9.vbf
ASCII text, with very long lines (2631), with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\Font\3of9.z
zlib compressed data
dropped
C:\Program Files (x86)\Packing Partner V4\Font\helvetica.vbf
ASCII text, with very long lines (3162), with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\Font\helveticab.vbf
ASCII text, with very long lines (3161), with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\Font\helveticabi.vbf
ASCII text, with very long lines (2832), with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\Font\helveticai.vbf
ASCII text, with very long lines (2642), with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\Font\techncln.vbf
ASCII text, with very long lines (2631), with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\Font\techncln.z
zlib compressed data
dropped
C:\Program Files (x86)\Packing Partner V4\Font\times.vbf
ASCII text, with very long lines (2632), with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\HelpViewer.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\HidSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\MdiTabControl.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\MessagingToolkit.Barcode.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\Microsoft.WindowsAPICodePack.Shell.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\Microsoft.WindowsAPICodePack.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\Microsoft.mshtml.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\PDFImage.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\PDFLibNet.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\Packing Partner Backup.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\Packing Partner Print.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\Packing Partner V3.exe.config
XML 1.0 document, ASCII text, with very long lines (411), with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\Packing Station.exe.config
XML 1.0 document, ASCII text, with very long lines (411), with CRLF line terminators
dropped
C:\Program Files (x86)\Packing Partner V4\Restart.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\SQLite.Interop.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\ScintillaNET.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\Sharp3DBinPacking.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\System.Data.SQLite.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\Tesseract.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\tessdata\eng.traineddata
data
dropped
C:\Program Files (x86)\Packing Partner V4\x86\liblept172.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Packing Partner V4\x86\libtesseract304.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Package Cache\.unverified\vcRuntimeAdditional_x86 (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2022 X86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2022 X86 Additional Runtime - 14.32.31326., Template: Intel;1033, Revision Number: {3127C6A7-931A-4E2F-A162-225998F79120}, Create Time/Date: Sat Mar 26 20:26:48 2022, Last Saved Time/Date: Sat Mar 26 20:26:48 2022, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.10.4.4718), Security: 2
dropped
C:\ProgramData\Package Cache\.unverified\vcRuntimeMinimum_x86 (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2022 X86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2022 X86 Minimum Runtime - 14.32.31326., Template: Intel;1033, Revision Number: {EFBFDAFA-D89B-4C11-9508-2DFF00454246}, Create Time/Date: Sat Mar 26 20:23:34 2022, Last Saved Time/Date: Sat Mar 26 20:23:34 2022, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.10.4.4718), Security: 2
dropped
C:\ProgramData\Package Cache\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\state.rsm
data
dropped
C:\ProgramData\Package Cache\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\vcredist_x86.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Package Cache\{46E11E7F-01E1-44D0-BB86-C67342D253DD}v14.32.31326\packages\vcRuntimeMinimum_x86\vc_runtimeMinimum_x86.msi (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2022 X86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2022 X86 Minimum Runtime - 14.32.31326., Template: Intel;1033, Revision Number: {EFBFDAFA-D89B-4C11-9508-2DFF00454246}, Create Time/Date: Sat Mar 26 20:23:34 2022, Last Saved Time/Date: Sat Mar 26 20:23:34 2022, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.10.4.4718), Security: 2
dropped
C:\ProgramData\Package Cache\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}\VC_redist.x86.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Package Cache\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}\state.rsm
data
dropped
C:\ProgramData\Package Cache\{A250E750-DB3F-40C1-8460-8EF77C7582DA}v14.32.31326\packages\vcRuntimeAdditional_x86\vc_runtimeAdditional_x86.msi (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2022 X86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2022 X86 Additional Runtime - 14.32.31326., Template: Intel;1033, Revision Number: {3127C6A7-931A-4E2F-A162-225998F79120}, Create Time/Date: Sat Mar 26 20:26:48 2022, Last Saved Time/Date: Sat Mar 26 20:26:48 2022, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.10.4.4718), Security: 2
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\vcredist_2012_x86[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\vcredist_2010_x86[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Layouts\01 per sheet A4 Portrait.pl3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Layouts\02 per sheet A4 Portrait.pl3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Layouts\04 per sheet Landscape.pl3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Layouts\08 per sheet A4 Portrait.pl3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Layouts\14 per sheet A4 Portrait.pl3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Layouts\21 per sheet A4 Portrait.pl3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Layouts\Sample CN22 Invoice.pl3
dBase IV DBT, blocks size 0, block length 3072, next free block index 44993, next free block 1868767300, next used block 1634751340
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Layouts\Single A Bottom.pl3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Layouts\Single A Top.pl3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Layouts\Single B Bottom.pl3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Layouts\Single B Top.pl3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Layouts\Single C Bottom.pl3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Layouts\Single C Top.pl3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\D1 Bottom.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\D1 Top.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\D8 Bottom.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 6330, next free block 1936941420, next used block 543454269
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\S1 Bottom.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 6081, next free block 1953453117, next used block 222194785
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\S1 Top.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 6108, next free block 1148927604, next used block 1868788585
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\S11 Bottom.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\S11 Top.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\S12 Bottom.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\S12 Top.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\S14 Top.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\S15 Bottom.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\S15 Top.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\S2 Bottom.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 6104, next free block 1668507972, next used block 1953396079
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\S2 Top.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 6112, next free block 1734962273, next used block 1769094510
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\S3 Bottom.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 6149, next free block 1818304562, next used block 1030645609
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\S3 Top.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\S4 Bottom.pt3
DOS executable (COM)
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\S4 Top.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 6118, next free block 1634493216, next used block 1950184307
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\S6 Bottom.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\S6 Top.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\S7 Bottom.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\S7 Top.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\S8 Bottom for Carrier Label.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\S8 Bottom.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Cheap Integrated\T3 Bottom.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Delivery and Invoice\2 per A4 portrait.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Delivery and Invoice\Delivery Note A4.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Delivery and Invoice\Invoice A4.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\FormsPlus\FPD-1 Bottom.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\FormsPlus\FPD-1 Top.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\FormsPlus\FPS-1 Bottom.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\FormsPlus\FPS-1 Top.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\FormsPlus\FPS-2 Bottom.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 6104, next free block 1668507972, next used block 1953396079
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\FormsPlus\FPS-2 Top.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 6112, next free block 1734962273, next used block 1769094510
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\FormsPlus\FPS-3 Bottom.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 6149, next free block 1818304562, next used block 1030645609
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\FormsPlus\FPS-3 Top.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\FormsPlus\FPS-4 Bottom.pt3
DOS executable (COM)
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\FormsPlus\FPS-4 Top.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 6118, next free block 1634493216, next used block 1950184307
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\FormsPlus\FPS-5 Bottom.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\FormsPlus\FPS-5 Top.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\PickitPackit\Stock Label 1 Bottom.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 6451, next free block 1918976829, next used block 1734437234
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\PickitPackit\Stock Label 1 Top.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\PickitPackit\Stock Label 2 Bottom.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\PickitPackit\Stock Label 2 Top.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\PickitPackit\Stock Label 5 Bottom.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\PickitPackit\Stock Label 5 Top.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\PickitPackit\Stock Label 6 Bottom.pl3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\PickitPackit\Stock Label 6 Bottom.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\PickitPackit\Stock Label 6 Top.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Priory Direct\Double A Bottom.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Priory Direct\Double A Top.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Priory Direct\Double C Bottom.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Priory Direct\Double C Top.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Priory Direct\Double E Bottom.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 6330, next free block 1936941420, next used block 543454269
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Priory Direct\Single A Bottom.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 6081, next free block 1953453117, next used block 222194785
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Priory Direct\Single A Top.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 6108, next free block 1148927604, next used block 1868788585
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Priory Direct\Single B Bottom.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 6104, next free block 1668507972, next used block 1953396079
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Priory Direct\Single B Top.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 6112, next free block 1734962273, next used block 1769094510
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Priory Direct\Single C Bottom.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 6149, next free block 1818304562, next used block 1030645609
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Priory Direct\Single C Top.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Priory Direct\Single D Bottom.pt3
DOS executable (COM)
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Priory Direct\Single D Top.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 6118, next free block 1634493216, next used block 1950184307
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Priory Direct\Single F Bottom.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Priory Direct\Single F Top.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Priory Direct\Single G Bottom.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Priory Direct\Single G Top.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Priory Direct\Single H Bottom.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Sheet Labels\01 per sheet A4 portrait.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Sheet Labels\02 per sheet A4 portrait.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Sheet Labels\04 per sheet A4 landscape.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 2977
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Sheet Labels\04 per sheet A4 portrait.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 2893
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Sheet Labels\04 per sheet portrait.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Sheet Labels\08 per sheet A4 portrait.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 3431, next free block 1635017573, next used block 1030057058
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Sheet Labels\10 per sheet A4 portrait.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 3676, next free block 1144785421, next used block 1763726921
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Sheet Labels\12 per sheet A4 portrait.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 3929, next free block 908081748, next used block 540765549
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Sheet Labels\14 per sheet A4 portrait.pt3
SysEx File - Oberheim
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Sheet Labels\16 per sheet A4 portrait.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 4627, next free block 1935827232, next used block 1953852527
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Sheet Labels\18 per sheet A4 portrait.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 4919, next free block 542525764, next used block 1819898995
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Sheet Labels\21 per sheet A4 portrait.pt3
dBase IV DBT, blocks size 0, block length 3072, next free block index 5370, next free block 775435057, next used block 1835872819
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Sheet Labels\24 per sheet A4 portrait.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Thermal\Address 101x54.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Thermal\Large 89x36.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\Templates\Thermal\Standard 89x28.pt3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_mail\Order despatched.eml
MIME entity, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_mail\Order processing.eml
news or mail, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_mail\Retail Invoice.eml
MIME entity, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_mail\Tax Invoice.eml
MIME entity, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_mail\Your order has been despatched.eml
news or mail, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_mail\Your order is being processed.eml
news or mail, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_resource\Commercial_64.pl3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_resource\Commercial_A4.pl3
data
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_resource\Royal Mail\ppi_24.html
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_resource\Royal Mail\ppi_48.html
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_resource\Royal Mail\ppi_eng_24_22x117.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, little-endian, direntries=1, orientation=upper-left], baseline, precision 8, 1378x260, components 3
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_resource\Royal Mail\ppi_eng_48_22x117.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, little-endian, direntries=1, orientation=upper-left], baseline, precision 8, 1378x260, components 3
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_resource\Sample_Packing_Item.txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_resource\Sample_Packing_Record.txt
HTML document, ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_resource\Sample_Packing_Titles.txt
HTML document, ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_resource\Sample_Picking_Item.txt
HTML document, ASCII text, with very long lines (313), with no line terminators
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_resource\Sample_Picking_List.txt
HTML document, ASCII text, with very long lines (309), with no line terminators
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_resource\UK Mail\parcel.html
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_resource\UK Mail\parcel.png
PNG image data, 86 x 591, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_resource\UK Mail\parcels.json
Unicode text, UTF-16, little-endian text, with very long lines (32767), with no line terminators
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_resource\UK Mail\services.json
Unicode text, UTF-16, little-endian text, with very long lines (6874), with no line terminators
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_resource\Yodel\Index.idx
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_resource\Yodel\common.html
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_resource\Yodel\exception.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_resource\Yodel\prdservices.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_resource\Yodel\reamusid.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_resource\Yodel\service.txt
ASCII text, with very long lines (379), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_resource\Yodel\station.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packing Partner V3\_resource\Yodel\yodel.png
PNG image data, 291 x 105, 8-bit grayscale, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\HFI2E95.tmp.html
HTML document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\HFI3639.tmp.html
data
dropped
C:\Users\user\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_20240523_234123140-MSI_vc_red.msi.txt
Unicode text, UTF-16, little-endian text, with very long lines (319), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_20240523_234123140.html
HTML document, Unicode text, UTF-16, little-endian text, with very long lines (357), with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\Setup_20240523_234121249.html
HTML document, Unicode text, UTF-16, little-endian text, with very long lines (323), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20240523234124.log
ASCII text, with very long lines (487), with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20240523234124_0_vcRuntimeMinimum_x86.log
Unicode text, UTF-16, little-endian text, with very long lines (319), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20240523234124_1_vcRuntimeAdditional_x86.log
Unicode text, UTF-16, little-endian text, with very long lines (319), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20240523234139.log
ASCII text, with very long lines (321), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20240523234139_000_vcRuntimeMinimum_x86.log
Unicode text, UTF-16, little-endian text, with very long lines (319), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20240523234139_001_vcRuntimeAdditional_x86.log
Unicode text, UTF-16, little-endian text, with very long lines (411), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20240523234215.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nshEE02.tmp\FindProcDLL.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nshEE02.tmp\INetC.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nshEE02.tmp\InstallOptions.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nshEE02.tmp\Options.ini
Generic INItialization configuration [Field 1]
dropped
C:\Users\user\AppData\Local\Temp\nshEE02.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nshEE02.tmp\ioSpecial.ini
Generic INItialization configuration [Field 1]
dropped
C:\Users\user\AppData\Local\Temp\nshEE02.tmp\modern-wizard.bmp
PC bitmap, Windows 3.x format, 164 x 313 x 24, image size 153996, resolution 2007 x 2007 px/m, cbSize 154050, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\nsnBB64.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\vcredist_2010_x86.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\vcredist_2012_x86.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\.ba1\BootstrapperApplicationData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (485), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\.ba1\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
dropped
C:\Users\user\AppData\Local\Temp\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\.ba1\logo.png
PNG image data, 64 x 64, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\.ba1\thm.wxl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\.ba1\thm.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\.ba1\wixstdba.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\.be\vcredist_x86.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\cab54A5CABBE7274D8A22EB58060AAB7623
Microsoft Cabinet archive data, 805553 bytes, 4 files, at 0x44 +A "F_CENTRAL_atl110_x86" +A "F_CENTRAL_msvcp110_x86", flags 0x4, number 1, extra bytes 20 in head, 56 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\Local\Temp\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\cabB3E1576D1FEFBB979E13B1A5379E0B16
Microsoft Cabinet archive data, 5137688 bytes, 16 files, at 0x44 +A "F_CENTRAL_mfc110_x86" +A "F_CENTRAL_mfc110chs_x86", flags 0x4, number 1, extra bytes 20 in head, 309 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\Local\Temp\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\vcRuntimeAdditional_x86
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2012 x86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2012 x86 Additional Runtime - 11.0.61030., Template: Intel;1033, Revision Number: {4A44C12C-61E5-4883-A3D5-CB1B89DC2074}, Create Time/Date: Wed Oct 30 12:00:50 2013, Last Saved Time/Date: Wed Oct 30 12:00:50 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML - SOC (3.6.3520.0), Security: 2
dropped
C:\Users\user\AppData\Local\Temp\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\vcRuntimeMinimum_x86
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2012 x86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2012 x86 Minimum Runtime - 11.0.61030., Template: Intel;1033, Revision Number: {13B38BE3-59B9-463F-B577-B3FE71A3AD3A}, Create Time/Date: Wed Oct 30 12:00:44 2013, Last Saved Time/Date: Wed Oct 30 12:00:44 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML - SOC (3.6.3520.0), Security: 2
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\1028\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\1028\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\1029\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\1029\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\1031\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\1031\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\1036\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\1036\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\1040\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\1040\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\1041\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\1041\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\1042\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\1042\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\1045\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\1045\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\1046\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\1046\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\1049\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\1049\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\1055\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\1055\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\2052\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\2052\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\3082\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\3082\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\BootstrapperApplicationData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (558), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\logo.png
PNG image data, 64 x 64, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\thm.wxl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\thm.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{A9914FEB-2B11-4285-BCDA-3E3AB9073948}\.ba\wixstdba.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Fonts\3 of 9 Narrow ASCII.ttf
TrueType Font data, 16 tables, 1st "LTSH", 36 names, Macintosh, Copyright (c) 2017 by Aimco Software. All rights reserved.3 of 9 Narrow ASCIINormal3 of 9 Narrow
dropped
C:\Windows\Fonts\3 of 9 Narrow.ttf
TrueType Font data, 16 tables, 1st "LTSH", 30 names, Macintosh, Copyright (c) 2017 by AiMCo Software. All rights reserved.3 of 9 NarrowNormal3of9narrow3 of 9 Na
dropped
C:\Windows\Fonts\3 of 9 Wide ASCII.ttf
TrueType Font data, 16 tables, 1st "LTSH", 35 names, Macintosh, Copyright (c) 2017 by AiMCo Software. All rights reserved.3 of 9 Wide ASCIINormal3of9wideascii3
dropped
C:\Windows\Fonts\3 of 9 Wide.ttf
TrueType Font data, 16 tables, 1st "LTSH", 35 names, Macintosh, Copyright (c) 2017 by AiMCo Software. All rights reserved.3 of 9 WideNormal3of9wide3 of 9 Wide1.
dropped
C:\Windows\Fonts\Consolas.ttf
TrueType Font data, digitally signed, 18 tables, 1st "DSIG", 45 names, Unicode, \251 2005 Microsoft Corporation. All Rights Reserved.Consolas is aimed for use in programming en
dropped
C:\Windows\Fonts\Segoe UI Bold Italic.ttf
TrueType Font data, 18 tables, 1st "FFTM", 72 names, Macintosh
dropped
C:\Windows\Fonts\Segoe UI Bold.ttf
TrueType Font data, 18 tables, 1st "FFTM", 72 names, Macintosh
dropped
C:\Windows\Fonts\Segoe UI Italic.ttf
TrueType Font data, 18 tables, 1st "FFTM", 72 names, Macintosh
dropped
C:\Windows\Fonts\Segoe UI.ttf
TrueType Font data, 18 tables, 1st "FFTM", 48 names, Macintosh
dropped
C:\Windows\Fonts\SourceCodePro.ttf
TrueType Font data, digitally signed, 20 tables, 1st "BASE", 127 names, Macintosh, Copyright 2010, 2012 Adobe Systems Incorporated (http://www.adobe.com/), with Reserved Font Name
dropped
C:\Windows\Installer\$PatchCache$\Managed\D04BB691875110D32B98EBCF771AA1E1\10.0.30319\F_CENTRAL_msvcp100_x86
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\D04BB691875110D32B98EBCF771AA1E1\10.0.30319\F_CENTRAL_msvcr100_x86
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\F7E11E641E100D44BB686C37242D35DD\14.32.31326\concrt140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\F7E11E641E100D44BB686C37242D35DD\14.32.31326\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\F7E11E641E100D44BB686C37242D35DD\14.32.31326\msvcp140_1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\F7E11E641E100D44BB686C37242D35DD\14.32.31326\msvcp140_2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\F7E11E641E100D44BB686C37242D35DD\14.32.31326\msvcp140_atomic_wait.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\F7E11E641E100D44BB686C37242D35DD\14.32.31326\msvcp140_codecvt_ids.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\F7E11E641E100D44BB686C37242D35DD\14.32.31326\vccorlib140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\F7E11E641E100D44BB686C37242D35DD\14.32.31326\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\6c3c9e.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x86 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x86 Redistributable - 10.0.30319., Template: Intel;0, Revision Number: {F035AD1C-45C3-4166-865F-C2F7CD4958B1}, Create Time/Date: Fri Mar 19 16:11:58 2010, Last Saved Time/Date: Fri Mar 19 16:11:58 2010, Number of Pages: 200, Name of Creating Application: Windows Installer XML (3.5.0626.0), Security: 2, Number of Words: 2
dropped
C:\Windows\Installer\6c3ca1.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x86 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x86 Redistributable - 10.0.30319., Template: Intel;0, Revision Number: {F035AD1C-45C3-4166-865F-C2F7CD4958B1}, Create Time/Date: Fri Mar 19 16:11:58 2010, Last Saved Time/Date: Fri Mar 19 16:11:58 2010, Number of Pages: 200, Name of Creating Application: Windows Installer XML (3.5.0626.0), Security: 2, Number of Words: 2
dropped
C:\Windows\Installer\6c80db.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2012 x86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2012 x86 Minimum Runtime - 11.0.61030., Template: Intel;1033, Revision Number: {13B38BE3-59B9-463F-B577-B3FE71A3AD3A}, Create Time/Date: Wed Oct 30 12:00:44 2013, Last Saved Time/Date: Wed Oct 30 12:00:44 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML - SOC (3.6.3520.0), Security: 2
dropped
C:\Windows\Installer\6c80de.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2012 x86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2012 x86 Minimum Runtime - 11.0.61030., Template: Intel;1033, Revision Number: {13B38BE3-59B9-463F-B577-B3FE71A3AD3A}, Create Time/Date: Wed Oct 30 12:00:44 2013, Last Saved Time/Date: Wed Oct 30 12:00:44 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML - SOC (3.6.3520.0), Security: 2
dropped
C:\Windows\Installer\6c80df.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2012 x86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2012 x86 Additional Runtime - 11.0.61030., Template: Intel;1033, Revision Number: {4A44C12C-61E5-4883-A3D5-CB1B89DC2074}, Create Time/Date: Wed Oct 30 12:00:50 2013, Last Saved Time/Date: Wed Oct 30 12:00:50 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML - SOC (3.6.3520.0), Security: 2
dropped
C:\Windows\Installer\6c80e2.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2012 x86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2012 x86 Additional Runtime - 11.0.61030., Template: Intel;1033, Revision Number: {4A44C12C-61E5-4883-A3D5-CB1B89DC2074}, Create Time/Date: Wed Oct 30 12:00:50 2013, Last Saved Time/Date: Wed Oct 30 12:00:50 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML - SOC (3.6.3520.0), Security: 2
dropped
C:\Windows\Installer\6c80e3.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2022 X86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2022 X86 Minimum Runtime - 14.32.31326., Template: Intel;1033, Revision Number: {EFBFDAFA-D89B-4C11-9508-2DFF00454246}, Create Time/Date: Sat Mar 26 20:23:34 2022, Last Saved Time/Date: Sat Mar 26 20:23:34 2022, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.10.4.4718), Security: 2
dropped
C:\Windows\Installer\6c80e7.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2022 X86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2022 X86 Minimum Runtime - 14.32.31326., Template: Intel;1033, Revision Number: {EFBFDAFA-D89B-4C11-9508-2DFF00454246}, Create Time/Date: Sat Mar 26 20:23:34 2022, Last Saved Time/Date: Sat Mar 26 20:23:34 2022, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.10.4.4718), Security: 2
dropped
C:\Windows\Installer\6c80e8.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2022 X86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2022 X86 Additional Runtime - 14.32.31326., Template: Intel;1033, Revision Number: {3127C6A7-931A-4E2F-A162-225998F79120}, Create Time/Date: Sat Mar 26 20:26:48 2022, Last Saved Time/Date: Sat Mar 26 20:26:48 2022, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.10.4.4718), Security: 2
dropped
C:\Windows\Installer\6c80ef.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2022 X86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2022 X86 Additional Runtime - 14.32.31326., Template: Intel;1033, Revision Number: {3127C6A7-931A-4E2F-A162-225998F79120}, Create Time/Date: Sat Mar 26 20:26:48 2022, Last Saved Time/Date: Sat Mar 26 20:26:48 2022, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.10.4.4718), Security: 2
dropped
C:\Windows\Installer\MSI4103.tmp
data
dropped
C:\Windows\Installer\MSI831D.tmp
data
dropped
C:\Windows\Installer\MSI886D.tmp
data
dropped
C:\Windows\Installer\MSID43C.tmp
data
dropped
C:\Windows\Installer\MSIDE7E.tmp
data
dropped
C:\Windows\Installer\SourceHash{196BB40D-1578-3D01-B289-BEFC77A11A1E}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\SourceHash{46E11E7F-01E1-44D0-BB86-C67342D253DD}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\SourceHash{A250E750-DB3F-40C1-8460-8EF77C7582DA}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\SourceHash{B175520C-86A2-35A7-8619-86DC379688B9}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\SourceHash{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\SysWOW64\atl100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100chs.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100cht.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100deu.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100enu.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100esn.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100fra.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100ita.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100jpn.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100kor.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100rus.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100u.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc140chs.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc140cht.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc140deu.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc140enu.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc140esn.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc140fra.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc140ita.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc140jpn.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc140kor.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc140rus.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc140u.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfcm100.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\SysWOW64\mfcm100u.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\SysWOW64\mfcm140.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\SysWOW64\mfcm140u.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\SysWOW64\msvcr110.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\vcamp110.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\vcamp140.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\vccorlib110.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\vcomp100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\vcomp110.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\vcomp140.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\1028\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\1028\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\1029\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\1029\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\1031\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\1031\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\1036\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\1036\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\1040\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\1040\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\1041\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\1041\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\1042\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\1042\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\1045\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\1045\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\1046\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\1046\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\1049\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\1049\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\1055\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\1055\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\2052\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\2052\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\3082\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\3082\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\BootstrapperApplicationData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (558), with CRLF line terminators
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\logo.png
PNG image data, 64 x 64, 8-bit colormap, non-interlaced
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\thm.wxl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\thm.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.ba\wixstdba.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\vcRuntimeAdditional_x86
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2022 X86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2022 X86 Additional Runtime - 14.32.31326., Template: Intel;1033, Revision Number: {3127C6A7-931A-4E2F-A162-225998F79120}, Create Time/Date: Sat Mar 26 20:26:48 2022, Last Saved Time/Date: Sat Mar 26 20:26:48 2022, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.10.4.4718), Security: 2
dropped
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\vcRuntimeMinimum_x86
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2022 X86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2022 X86 Minimum Runtime - 14.32.31326., Template: Intel;1033, Revision Number: {EFBFDAFA-D89B-4C11-9508-2DFF00454246}, Create Time/Date: Sat Mar 26 20:23:34 2022, Last Saved Time/Date: Sat Mar 26 20:23:34 2022, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.10.4.4718), Security: 2
dropped
C:\Windows\Temp\~DF04BDA72F7CA4387A.TMP
data
dropped
C:\Windows\Temp\~DF07557106391A104B.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF09F94F45912960E8.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF0F69EB9A8A786F1B.TMP
data
modified
C:\Windows\Temp\~DF195CFECFDDABC4B5.TMP
data
dropped
C:\Windows\Temp\~DF1FC4ADCD6DB24D83.TMP
data
dropped
C:\Windows\Temp\~DF22C18C6EAFAB763C.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF2474D85AF51A9B61.TMP
data
dropped
C:\Windows\Temp\~DF25620FDEA7A50910.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF2F18C5FFD91CEAC2.TMP
data
dropped
C:\Windows\Temp\~DF2F42B2038D2952BD.TMP
data
dropped
C:\Windows\Temp\~DF30666A12A88DFCAB.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF38D33630A2E13C52.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF39CDC1187FDA4009.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF3AE358A90C2E3B2B.TMP
data
dropped
C:\Windows\Temp\~DF3B8463D77ADD8289.TMP
data
dropped
C:\Windows\Temp\~DF3BA8FB151748DC5A.TMP
data
dropped
C:\Windows\Temp\~DF3D2B816E965EA704.TMP
data
dropped
C:\Windows\Temp\~DF3DC585B3F55710C4.TMP
data
dropped
C:\Windows\Temp\~DF3E268966ADD77F05.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF42FBA4A09C49947A.TMP
data
dropped
C:\Windows\Temp\~DF43CC3EC1B97FDB1A.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF45ABCBEA0EEA4300.TMP
data
dropped
C:\Windows\Temp\~DF46A3700BCC8D4A6C.TMP
data
dropped
C:\Windows\Temp\~DF4813E62E05221DB0.TMP
data
dropped
C:\Windows\Temp\~DF49D6AA824E0C52FA.TMP
data
dropped
C:\Windows\Temp\~DF4DF30103561D8BED.TMP
data
dropped
C:\Windows\Temp\~DF4E04910151343822.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF52AB31231D1FFEB8.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF540791D73FEC337E.TMP
data
dropped
C:\Windows\Temp\~DF58F5D8AD958C4A8B.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF5991AE06636346AA.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF5B08BED9B73CE487.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF6147C737AAAB6E27.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF693A038E102BE594.TMP
data
dropped
C:\Windows\Temp\~DF6AC403EF94824AE6.TMP
data
dropped
C:\Windows\Temp\~DF768EE619D9CF4C31.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF7CAFDFCC48B0F1B5.TMP
data
dropped
C:\Windows\Temp\~DF7DA71F7F94911D52.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF7DF158AC6F9AAF0A.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF99122D1D842D4B31.TMP
data
dropped
C:\Windows\Temp\~DFAD462F552E7DCF00.TMP
data
dropped
C:\Windows\Temp\~DFBF0A02DB4BA4C0AB.TMP
data
dropped
C:\Windows\Temp\~DFC2EA003C1326864C.TMP
data
dropped
C:\Windows\Temp\~DFC3A3E0817520D949.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFC74F21506377F3D5.TMP
data
dropped
C:\Windows\Temp\~DFC8266D5467B0B107.TMP
data
dropped
C:\Windows\Temp\~DFC983EACBD50C9453.TMP
data
dropped
C:\Windows\Temp\~DFCAA114B747D2BC96.TMP
data
dropped
C:\Windows\Temp\~DFCFE1C7B1C6D997FA.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFD2E518D3756EA4FA.TMP
data
dropped
C:\Windows\Temp\~DFD73B7E63F9CF34DB.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFDC004FCC93234C9B.TMP
data
dropped
C:\Windows\Temp\~DFE72091E0A7B53ED1.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFE87FDE20E2C0C7E1.TMP
data
dropped
C:\Windows\Temp\~DFEA53F39EEF79852B.TMP
data
dropped
C:\Windows\Temp\~DFEBC783EB65721247.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFF6A2C185AE1EE069.TMP
data
dropped
C:\Windows\Temp\~DFF8EDD4986CD7964B.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFFBB0B7798A568A42.TMP
Composite Document File V2 Document, Cannot read section info
dropped
There are 932 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.Krypt.13987.3473.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.Krypt.13987.3473.exe"
malicious
C:\Users\user\AppData\Local\Temp\vcredist_2010_x86.exe
C:\Users\user\AppData\Local\Temp\vcredist_2010_x86.exe /q /norestart
malicious
C:\14cf0ab3e4a0f130fd99e986a4\Setup.exe
c:\14cf0ab3e4a0f130fd99e986a4\Setup.exe /q /norestart
malicious
C:\Users\user\AppData\Local\Temp\vcredist_2012_x86.exe
C:\Users\user\AppData\Local\Temp\vcredist_2012_x86.exe /q /norestart
malicious
C:\Users\user\AppData\Local\Temp\vcredist_2012_x86.exe
"C:\Users\user\AppData\Local\Temp\vcredist_2012_x86.exe" /q /norestart -burn.unelevated BurnPipe.{CA42E693-A6A8-4B3E-8B47-BDA43C78E551} {5B7172FD-6E81-465C-B515-21DA173C4F62} 2820
malicious
C:\Users\user\AppData\Local\Temp\vcredist_2019_x86.exe
C:\Users\user\AppData\Local\Temp\vcredist_2019_x86.exe /q /norestart
malicious
C:\Windows\Temp\{564A0345-3E27-4D7C-BAD6-487E44262AFC}\.cr\vcredist_2019_x86.exe
"C:\Windows\Temp\{564A0345-3E27-4D7C-BAD6-487E44262AFC}\.cr\vcredist_2019_x86.exe" -burn.clean.room="C:\Users\user\AppData\Local\Temp\vcredist_2019_x86.exe" -burn.filehandle.attached=700 -burn.filehandle.self=748 /q /norestart
malicious
C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.be\VC_redist.x86.exe
"C:\Windows\Temp\{CFB84EDF-86E6-41E3-8D30-2468A68A0171}\.be\VC_redist.x86.exe" -q -burn.elevated BurnPipe.{F320CDF8-E401-4EF5-9F1B-EDA3611F5688} {5D0F0C66-332F-41E0-A1E1-6C2057523AF5} 7668
malicious
C:\Program Files (x86)\Packing Partner V4\Library\Lib4000.exe
"C:\Program Files (x86)\Packing Partner V4\Library\Lib4000.exe" /S /D=C:\Program Files (x86)\Packing Partner V4
malicious
C:\Program Files (x86)\Packing Partner V4\Library\CEF1120.exe
"C:\Program Files (x86)\Packing Partner V4\Library\CEF1120.exe" /S /D=C:\Program Files (x86)\Packing Partner V4
malicious
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\System32\SrTasks.exe
C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\ProgramData\Package Cache\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\vcredist_x86.exe
"C:\ProgramData\Package Cache\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\vcredist_x86.exe" /burn.log.append "C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20240523234124.log" /quiet /norestart ignored /burn.runonce
C:\ProgramData\Package Cache\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\vcredist_x86.exe
"C:\ProgramData\Package Cache\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\vcredist_x86.exe" /burn.log.append C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20240523234124.log /quiet /norestart ignored
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
C:\ProgramData\Package Cache\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\vcredist_x86.exe
"C:\ProgramData\Package Cache\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\vcredist_x86.exe" -q -burn.elevated BurnPipe.{A2C4E75F-C172-4AD8-B169-B7BE702B5646} {D3660430-5913-4C20-9C4C-44BF2099DAC6} 5612
C:\Windows\System32\SrTasks.exe
C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\ProgramData\Package Cache\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}\VC_redist.x86.exe
"C:\ProgramData\Package Cache\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}\VC_redist.x86.exe" /burn.runonce
C:\ProgramData\Package Cache\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}\VC_redist.x86.exe
"C:\ProgramData\Package Cache\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}\VC_redist.x86.exe"
C:\ProgramData\Package Cache\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}\VC_redist.x86.exe
"C:\ProgramData\Package Cache\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}\VC_redist.x86.exe" -burn.clean.room="C:\ProgramData\Package Cache\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}\VC_redist.x86.exe" -burn.filehandle.attached=532 -burn.filehandle.self=540
There are 13 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.channeladvisor.com/ChannelAdvisorAPI/v7/AdminService.asmx
unknown
https://cknotes.com/ssh-sftp-public-key-authentication-fails-w-dsa-key-and-openssh-server/
unknown
http://www.myhermes.co.uk/tracking-results.html?trackingNumber=
unknown
https://staging-aimco.onrender.com/CreateShipment
unknown
https://download.aimcosoftware.co.uk/CEF1120.exeInstalling
unknown
http://politicas.icpbrasil.gov.br/PA_AD_RA_v2_1.der
unknown
http://www.UKMail.com/Services/IUKMAuthenticationService/LoginT
unknown
http://api.channeladvisor.com/webservices/OrderMergeT
unknown
https://download.aimcosoftware.co.uk/Lib4000.exeInstalling
unknown
http://api.channeladvisor.com/webservices/SubmitOrderShipmentListT
unknown
https://aimcosoftware.co.uk/V4/info/pricing.html
unknown
https://api.channeladvisor.com/ChannelAdvisorAPI/v5/AdminService.asmx
unknown
http://tempuri.org/IShipmentService/DoShipmentResponse
unknown
https://wwwcie.ups.com/ship/v1/shipments
unknown
https://packingpartner.uk/remote?https://packingpartner.uk/forum
unknown
http://api.channeladvisor.com/webservices/AssignLabelListToInventoryItemListT
unknown
http://api.channeladvisor.com/webservices/GetInventoryItemListWithFullDetailT
unknown
http://api.microsofttranslator.com/V2/LanguageService/SpeakResponse
unknown
https://production-aimco.onrender.com/CreateShipment
unknown
https://despatch-api.dxdelivery.com/
unknown
http://tempuri.org/IShipmentService/DoShipmentValidationFaultFaultT
unknown
http://schemas.datacontract.org/2004/07/WOModel.ShippingLabelf
unknown
http://politicas.icpbrasil.gov.br/PA_PAdES_AD_RT_v1_0.der
unknown
http://www.UKMail.com/Services/Contracts/ServiceContractsT
unknown
https://mtapi.net/;https://mtapi.net/?testMode=1
unknown
https://ws.fedex.com:443/web-services/ship
unknown
http://www.UKMail.com/Services/Contracts/ServiceContracts/IUKMConsignmentService/CancelReturnRespons
unknown
http://politicas.icpbrasil.gov.br/PA_AD_RB_v2_2.der
unknown
https://support.google.com/accounts/answer/6010255
unknown
https://wsbeta.fedex.com:443/web-services
unknown
https://api.parcel.royalmail.com/api/v1/orders
unknown
https://admin.myshopwired.uk/business/manage-profile-about
unknown
https://sandbox-enterprise.justshoutgfs.com/ClientServer_4861/ClientShipService.asmx?op=
unknown
http://politicas.icpbrasil.gov.br/PA_AD_RT_v2_1.der
unknown
http://us.ard.yahoo.com/
unknown
https://icontrol.gls-ireland.com/adeplus/pm1/ade_webapi2.php?wsdl#adeLogin
unknown
https://api.dpd.co.uk/shipping/shipmentghttps://api.dpd.co.uk/shipping/shipment/
unknown
http://api.channeladvisor.com/webservices/SetSellerOrderIDT
unknown
http://schemas.datacontract.org/2004/07/WOWebServicesp
unknown
http://nsis.sf.net/NSIS_Error
unknown
http://api.channeladvisor.com/webservices/GetInventoryItemQuantityInfoT
unknown
http://api.channeladvisor.com/webservices/UpdateOrderListT
unknown
http://api.microsofttranslator.com/V2/LanguageService/GetLanguagesForTranslateResponse
unknown
https://icontrol.gls-ireland.com/adeplus/pm1/ade_webapi2.php?wsdl#adePreparingBox_InsertExt
unknown
http://centiro.com/facade/shared/1/0/servicecontract/ISharedOperations/Authenticate)AuthenticationTi
unknown
http://schemas.datacontract.org/2004/07/WOWebServices.Model
unknown
http://www.cknotes.com/?p=370
unknown
http://www.xfa.org/schema/xdc/
unknown
https://www.chilkatsoft.com/refdoc/csPdfRef.html
unknown
http://www.UKMail.com/Services/Contracts/ServiceContracts/IUKMAuthenticationService/LoginResponse
unknown
http://politicas.icpbrasil.gov.br/PA_AD_RA.der
unknown
http://www.UKMail.com/Services/Contracts/DataContracts_
unknown
http://politicas.icpbrasil.gov.br/PA_AD_RC_v2_3.der
unknown
http://www.UKMail.com/Services/Contracts/DataContractsc
unknown
http://www.UKMail.com/Services/Contracts/DataContractsb
unknown
http://cknotes.com/ssh-sftp-error-must-first-connect-to-the-ssh-server/
unknown
http://www.UKMail.com/Services/Contracts/DataContractse
unknown
http://politicas.icpbrasil.gov.br/PA_AD_RA_v2_0.der
unknown
http://www.UKMail.com/Services/Contracts/DataContractsf
unknown
http://www.UKMail.com/Services/IUKMConsignmentService/AddDomesticConsignmentT
unknown
http://www.UKMail.com/Services/Contracts/DataContractsi
unknown
http://www.UKMail.com/Services/Contracts/DataContractsk
unknown
http://www.UKMail.com/Services/Contracts/DataContractsj
unknown
http://politicas.icpbrasil.gov.br/PA_PAdES_AD_RA_v1_1.der
unknown
http://schemas.datacontract.org/2004/07/WOWebServices_
unknown
http://www.UKMail.com/Services/Contracts/DataContractsl
unknown
http://politicas.icpbrasil.gov.br/PA_PAdES_AD_RC_v1_2.der
unknown
http://www.UKMail.com/Services/Contracts/DataContractso
unknown
https://cloud.centiro.com/Universe.Services/TMSBasic/Wcf/c1/i1/TMSBasic/Authenticate.svc/xml
unknown
http://www.UKMail.com/Services/Contracts/DataContractsn
unknown
http://dispatch.lowcostparcels.co.uk/tracking/ByTrackID.aspx?trackID=
unknown
http://www.UKMail.com/Services/Contracts/DataContractsq
unknown
http://schemas.datacontract.org/2004/07/WOWebServicesc
unknown
http://www.UKMail.com/Services/Contracts/DataContractsp
unknown
http://www.UKMail.com/Services/Contracts/DataContractss
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://www.UKMail.com/Services/Contracts/DataContractsu
unknown
http://www.UKMail.com/Services/Contracts/DataContractst
unknown
https://www.parcelforce.com/portal/pw/track?trackNumber=khttp://www.royalmail.com/portal/rm/track?tr
unknown
http://www.UKMail.com/Services/Contracts/DataContractsw
unknown
http://www.UKMail.com/Services/Contracts/DataContractsv
unknown
http://www.UKMail.com/Services/Contracts/DataContractsy
unknown
http://www.xfa.org/schema/xfa-template/
unknown
http://politicas.icpbrasil.gov.br/PA_AD_RV_v2_3.der
unknown
https://api.parcel.royalmail.com/api/v1/orders/ref;
unknown
https://api.ebay.com/wsapi?callname=
unknown
https://api.create.net/products/
unknown
https://api.channeladvisor.com/ChannelAdvisorAPI/v7/OrderService.asmx
unknown
https://api.dpdlocal.co.uk/shipping/shipmentqhttps://api.dpdlocal.co.uk/shipping/shipment/
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
https://support.google.com/mail/?p=BadCredentials
unknown
http://download.aimcosoftware.co.uk/V4.txt
unknown
http://www.xfa.org/schema/xfa-data/1.0/
unknown
http://centiro.com/facade/shared/1/0/datacontract
unknown
http://cknotes.com/v9-5-0-55-micro-update-new-features-fixes-changes-etc-2/
unknown
http://politicas.icpbrasil.gov.br/PA_AD_RT_v2_2.der
unknown
https://api.channeladvisor.com/ChannelAdvisorAPI/v7/InventoryService.asmx
unknown
https://www.parcel2go.com/auth/connect/tokenIhttps://www.parcel2go.com/api/ordersIhttps://www.parcel
unknown
http://api.microsofttranslator.com/V2/LanguageService/GetAppIdTokenT
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.194.90.17
unknown
United Kingdom

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A43489159A520F0D93D032CCAF37E7FE20A8B419
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A43489159A520F0D93D032CCAF37E7FE20A8B419
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
Packing Partner V3.exe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING
Packing Partner V3.exe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
Packing Station.exe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING
Packing Station.exe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
Packing Partner Print.exe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING
Packing Partner Print.exe
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Accepted Documents
html
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Accepted Documents
xhtml
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Accepted Documents
xml
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Fonts
3 of 9 Narrow (TrueType)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Fonts
3 of 9 Narrow ASCII (TrueType)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Fonts
3 of 9 Wide (TrueType)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Fonts
3 of 9 Wide ASCII (TrueType)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Fonts
Segoe UI Bold Italic(TrueType)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Fonts
Source Code Pro (TrueType)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Fonts
Consolas (TrueType)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Fonts
Segoe UI (TrueType)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Fonts
Segoe UI Bold (TrueType)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Fonts
Segoe UI Italic (TrueType)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\VSSetup
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\VSSetup
TypesSupported
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
AoACAPIError
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
AoACAPIResult
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
FirstRun
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
LastIndex
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
NestingLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
StartNesting
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore
SRInitDone
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
SrCreateRp (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
SrCreateRp (Leave)
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
BundleCachePath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
BundleUpgradeCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
BundleAddonCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
BundleDetectCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
BundlePatchCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
BundleVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
BundleProviderKey
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
BundleTag
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
EngineVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
NoElevateOnModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
Resume
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
Installed
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
RPSessionInterval
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
LastIndex
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
Resume
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
c:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
c:\Config.Msi\6c3ca0.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
c:\Config.Msi\6c3ca0.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E4C35488E6280433B4A9504AC59CB06
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\48DB41415A9D5EE3AA3711D8C7703207
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
c:\Program Files (x86)\Common Files\Microsoft Shared\VC\msdia100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\33964F2EF4FF0E649B796FD4C2D6F41A
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\atl100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\06A0D925C8932A8379FE28AFAF97A860
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\339F228ED07C4FC39AD227368BCAFC03
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8EBEE9DB288E3EA36B66B61AD16E6844
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100u.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6432CE2221869C437BF73206B4A1E41B
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfcm100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\724137509B874A03688844BF844518FB
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfcm100u.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\22ADB29655D63AE309B41371AFB2D2E9
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100cht.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\179FE72998B7B4C319AD15ECF0D789A2
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100chs.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3121A08DAA1666E37A639F747E57545C
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100enu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\653ED3563DFD92235AEDBE6C434DA014
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100deu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D1896C2474BDF2C319AE7F4B6C2E628A
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100esn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8CFAF524C51FA013D98AF03737CB8863
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100fra.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\465777D8C2D35073D89B3E56588E2F01
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100ita.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\33BEF75DAFB5F5C329FE5CA253A07615
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100jpn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9796DE27DAA0C7132AC5BAA921E1D603
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100kor.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\EDEBFFDD9304B413CAD812F52A578C3A
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100rus.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\047DE1C57A5C26139B5BF06B6D9DFF6F
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\vcomp100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0A6B7DEC5302BF73F923C8C583CA5653
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\56111199315302F42AC73C5FF3218BB7
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\903AA223F4959C147984F03FDC1CEFDF
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\60FDC9AE86DE9EA4B9A8DDE8E78778F6
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\27777D3C1D5245B438588A9DCD84485D
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\51CDBAC9106C61A499B3BFD01FAB4E25
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\67D910D9E436BC4468B47775A9D6A5D7
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\115EA997438B7F93F8EBF155CE5AC35E
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\89D167C9B8F306038ADB87ABC137D43C
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\875C7AC1A0E5BC73CB72373226AAD9BD
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
c:\Program Files (x86)\Common Files\Microsoft Shared\VC\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\D04BB691875110D32B98EBCF771AA1E1
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\D04BB691875110D32B98EBCF771AA1E1
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\D04BB691875110D32B98EBCF771AA1E1
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\D04BB691875110D32B98EBCF771AA1E1
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\D04BB691875110D32B98EBCF771AA1E1
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\D04BB691875110D32B98EBCF771AA1E1
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\D04BB691875110D32B98EBCF771AA1E1
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\D04BB691875110D32B98EBCF771AA1E1
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\D04BB691875110D32B98EBCF771AA1E1
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\D04BB691875110D32B98EBCF771AA1E1
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\339F228ED07C4FC39AD227368BCAFC03\D04BB691875110D32B98EBCF771AA1E1
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\339F228ED07C4FC39AD227368BCAFC03\D04BB691875110D32B98EBCF771AA1E1
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\339F228ED07C4FC39AD227368BCAFC03\D04BB691875110D32B98EBCF771AA1E1
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\339F228ED07C4FC39AD227368BCAFC03\D04BB691875110D32B98EBCF771AA1E1
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\339F228ED07C4FC39AD227368BCAFC03\D04BB691875110D32B98EBCF771AA1E1
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\339F228ED07C4FC39AD227368BCAFC03\D04BB691875110D32B98EBCF771AA1E1
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\339F228ED07C4FC39AD227368BCAFC03\D04BB691875110D32B98EBCF771AA1E1
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\339F228ED07C4FC39AD227368BCAFC03\D04BB691875110D32B98EBCF771AA1E1
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\339F228ED07C4FC39AD227368BCAFC03\D04BB691875110D32B98EBCF771AA1E1
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\339F228ED07C4FC39AD227368BCAFC03\D04BB691875110D32B98EBCF771AA1E1
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86
Installed
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86
MajorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86
MinorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86
Bld
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86
Rbld
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
Install
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
InstallerType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
SP
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
SPIndex
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
SPName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
Bld
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
Rbld
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0
SP
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0
SPIndex
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red
Install
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red
InstallerType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red
SPName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\1033
Install
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\1033
InstallerType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\1033
SP
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\1033
SPIndex
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\1033
SPName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\1033
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\A2D1F4F1AD9DFC2399908484D50AD65D
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{196BB40D-1578-3D01-B289-BEFC77A11A1E}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\D04BB691875110D32B98EBCF771AA1E1
VCRedist_x86_enu
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\Features
VCRedist_x86_enu
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\D04BB691875110D32B98EBCF771AA1E1
VC_RED_enu_x86_net_SETUP
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\Features
VC_RED_enu_x86_net_SETUP
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\D04BB691875110D32B98EBCF771AA1E1
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\Features
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\D04BB691875110D32B98EBCF771AA1E1\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\D04BB691875110D32B98EBCF771AA1E1
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\D04BB691875110D32B98EBCF771AA1E1
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\D04BB691875110D32B98EBCF771AA1E1
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\D04BB691875110D32B98EBCF771AA1E1
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\D04BB691875110D32B98EBCF771AA1E1
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\D04BB691875110D32B98EBCF771AA1E1
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\D04BB691875110D32B98EBCF771AA1E1
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\D04BB691875110D32B98EBCF771AA1E1
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\D04BB691875110D32B98EBCF771AA1E1
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\A2D1F4F1AD9DFC2399908484D50AD65D
D04BB691875110D32B98EBCF771AA1E1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\D04BB691875110D32B98EBCF771AA1E1\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\D04BB691875110D32B98EBCF771AA1E1\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\D04BB691875110D32B98EBCF771AA1E1\SourceList\Media
DiskPrompt
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\D04BB691875110D32B98EBCF771AA1E1\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\D04BB691875110D32B98EBCF771AA1E1
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\D04BB691875110D32B98EBCF771AA1E1\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcr100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcp100.dll
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}
BundleCachePath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}
BundleUpgradeCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}
BundleAddonCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}
BundleDetectCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}
BundlePatchCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}
BundleVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}
BundleProviderKey
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}
BundleTag
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}
EngineVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}
NoElevateOnModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x86,x86,14.32,bundle
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x86,x86,14.32,bundle
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x86,x86,14.32,bundle
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}
Resume
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}
BundleResumeCommandLine
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}
Installed
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
SrCreateRp (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
SrCreateRp (Leave)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
LastIndex
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{817e21c1-6b3a-4bc1-8c49-67e4e1887b3a}
Resume
HKEY_LOCAL_MACHINE\BCD00000000\Description
FirmwareModified
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001
Element
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\12000002
Element
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{584f4cfd-61ca-11ee-8a62-e43725c6cdb7}\Elements\12000004
Element
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{584f4cfe-61ca-11ee-8a62-e43725c6cdb7}\Elements\12000004
Element
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{a5a30fa2-3d06-4e9f-b5f4-a01df9d1fcba}\Description
Type
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{a5a30fa2-3d06-4e9f-b5f4-a01df9d1fcba}\Elements\24000001
Element
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{a5a30fa2-3d06-4e9f-b5f4-a01df9d1fcba}\Elements\25000004
Element
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6c80dd.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6c80dd.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\82A9039DE7C100A35863BA380E08841D
DC8A59DBF9D1DA5389A1E3975220E6BB
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\atl110.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6C162EDDD35A5E54E8BFF303C05BE886
DC8A59DBF9D1DA5389A1E3975220E6BB
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcr110.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD6DBC5FC9C5E034387A71B94A9988DC
DC8A59DBF9D1DA5389A1E3975220E6BB
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcp110.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7F47F7E03490EFA4AAD5D5EAB3941AF9
DC8A59DBF9D1DA5389A1E3975220E6BB
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\vccorlib110.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7A1D1891699C40E459B785BF7198266C
DC8A59DBF9D1DA5389A1E3975220E6BB
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A27015B17C9A34734A6C99BC08D12061
DC8A59DBF9D1DA5389A1E3975220E6BB
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FB4C2D78F539E2037BCD69CDAF193583
DC8A59DBF9D1DA5389A1E3975220E6BB
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9F476DAFCC18813E9268FC5915C8AEE
DC8A59DBF9D1DA5389A1E3975220E6BB
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\926B3E818B6D62B3FB422C22959F46E8
DC8A59DBF9D1DA5389A1E3975220E6BB
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6C162EDDD35A5E54E8BFF303C05BE886\DC8A59DBF9D1DA5389A1E3975220E6BB
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6C162EDDD35A5E54E8BFF303C05BE886\DC8A59DBF9D1DA5389A1E3975220E6BB
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6C162EDDD35A5E54E8BFF303C05BE886\DC8A59DBF9D1DA5389A1E3975220E6BB
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6C162EDDD35A5E54E8BFF303C05BE886\DC8A59DBF9D1DA5389A1E3975220E6BB
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6C162EDDD35A5E54E8BFF303C05BE886\DC8A59DBF9D1DA5389A1E3975220E6BB
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6C162EDDD35A5E54E8BFF303C05BE886\DC8A59DBF9D1DA5389A1E3975220E6BB
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6C162EDDD35A5E54E8BFF303C05BE886\DC8A59DBF9D1DA5389A1E3975220E6BB
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6C162EDDD35A5E54E8BFF303C05BE886\DC8A59DBF9D1DA5389A1E3975220E6BB
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6C162EDDD35A5E54E8BFF303C05BE886\DC8A59DBF9D1DA5389A1E3975220E6BB
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6C162EDDD35A5E54E8BFF303C05BE886\DC8A59DBF9D1DA5389A1E3975220E6BB
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7F47F7E03490EFA4AAD5D5EAB3941AF9\DC8A59DBF9D1DA5389A1E3975220E6BB
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7F47F7E03490EFA4AAD5D5EAB3941AF9\DC8A59DBF9D1DA5389A1E3975220E6BB
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7F47F7E03490EFA4AAD5D5EAB3941AF9\DC8A59DBF9D1DA5389A1E3975220E6BB
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7F47F7E03490EFA4AAD5D5EAB3941AF9\DC8A59DBF9D1DA5389A1E3975220E6BB
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7F47F7E03490EFA4AAD5D5EAB3941AF9\DC8A59DBF9D1DA5389A1E3975220E6BB
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7F47F7E03490EFA4AAD5D5EAB3941AF9\DC8A59DBF9D1DA5389A1E3975220E6BB
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7F47F7E03490EFA4AAD5D5EAB3941AF9\DC8A59DBF9D1DA5389A1E3975220E6BB
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7F47F7E03490EFA4AAD5D5EAB3941AF9\DC8A59DBF9D1DA5389A1E3975220E6BB
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7F47F7E03490EFA4AAD5D5EAB3941AF9\DC8A59DBF9D1DA5389A1E3975220E6BB
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7F47F7E03490EFA4AAD5D5EAB3941AF9\DC8A59DBF9D1DA5389A1E3975220E6BB
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimum_x86,v11
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimum_x86,v11
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimum_x86,v11
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v11
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v11
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v11
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\11.0\VC\Runtimes\x86
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\11.0\VC\Runtimes\x86
Installed
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\11.0\VC\Runtimes\x86
Major
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\11.0\VC\Runtimes\x86
Minor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\11.0\VC\Runtimes\x86
Bld
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\11.0\VC\Runtimes\x86
Rbld
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\11.0
SP
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\11.0
SPIndex
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\11.0\RuntimeMinimum
Install
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\11.0\RuntimeMinimum
InstallerType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\11.0\RuntimeMinimum
SPName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\11.0\RuntimeMinimum
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\11.0\RuntimeMinimum
UpdateVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\85DE12149DB4B7E38A5BF9B8AA0E547B
DC8A59DBF9D1DA5389A1E3975220E6BB
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\DC8A59DBF9D1DA5389A1E3975220E6BB
VC_Runtime_Minimum
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\Features
VC_Runtime_Minimum
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\DC8A59DBF9D1DA5389A1E3975220E6BB
Provider
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\Features
Provider
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\DC8A59DBF9D1DA5389A1E3975220E6BB
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\Features
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\DC8A59DBF9D1DA5389A1E3975220E6BB
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\DC8A59DBF9D1DA5389A1E3975220E6BB
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\DC8A59DBF9D1DA5389A1E3975220E6BB
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\DC8A59DBF9D1DA5389A1E3975220E6BB
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\DC8A59DBF9D1DA5389A1E3975220E6BB
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\DC8A59DBF9D1DA5389A1E3975220E6BB
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\DC8A59DBF9D1DA5389A1E3975220E6BB
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\DC8A59DBF9D1DA5389A1E3975220E6BB
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\DC8A59DBF9D1DA5389A1E3975220E6BB
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\85DE12149DB4B7E38A5BF9B8AA0E547B
DC8A59DBF9D1DA5389A1E3975220E6BB
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\SourceList\Media
DiskPrompt
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\DC8A59DBF9D1DA5389A1E3975220E6BB
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\DC8A59DBF9D1DA5389A1E3975220E6BB\SourceList
LastUsedSource
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6c80e1.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6c80e1.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\486DFD6FBE1659D328CBFC9E3672DB4A
C025571B2A687A53689168CD7369889B
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc110.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9D509CE45EAB2F64C8902F99D0C8958C
C025571B2A687A53689168CD7369889B
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc110u.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7C17811C6D4C32647AF849BB8567B05E
C025571B2A687A53689168CD7369889B
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfcm110.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A7697D8BD5B245B4E8BA2F26A93C001A
C025571B2A687A53689168CD7369889B
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfcm110u.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\851EDA34DFC0D3248AC0F034B0F26932
C025571B2A687A53689168CD7369889B
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc110cht.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5D5ED22144BC9504FB14E6D8E530E9B7
C025571B2A687A53689168CD7369889B
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc110chs.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\353D769CC9DB3A141BDEA213F1CAEA8B
C025571B2A687A53689168CD7369889B
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc110enu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E2B6F5AF0CD164C4591B799A8E5DEC3E
C025571B2A687A53689168CD7369889B
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc110deu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\50973AB6721091A42A53E0DBE0F56813
C025571B2A687A53689168CD7369889B
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc110esn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B014C8DBA9220B647BAE3B35796DD4C1
C025571B2A687A53689168CD7369889B
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc110fra.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FD9BA5BA4418A2445893D0398CB4A3A3
C025571B2A687A53689168CD7369889B
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc110ita.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BC68435879E48AA46B4BA253732BA193
C025571B2A687A53689168CD7369889B
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc110jpn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0379690C5F67F844DADD4B46D21F52D3
C025571B2A687A53689168CD7369889B
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc110kor.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\438E903E40976CE4EB942AA4D1058C17
C025571B2A687A53689168CD7369889B
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc110rus.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CCC39D2965433E541A9D6C9E2919E36D
C025571B2A687A53689168CD7369889B
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\vcamp110.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\255F2DA1E6A616745A9229A9FBA945CC
C025571B2A687A53689168CD7369889B
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\vcomp110.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\EFD1177BDD1D8994AADC0AE492E3746E
C025571B2A687A53689168CD7369889B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A27015B17C9A34734A6C99BC08D12061
C025571B2A687A53689168CD7369889B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AD1440C6A46707C3F9AC959C1A7BA51E
C025571B2A687A53689168CD7369889B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C1D033B6CB08F193B870AD82FF62B7E0
C025571B2A687A53689168CD7369889B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB5D749EDA8FC3F3D8C70E987A808E33
C025571B2A687A53689168CD7369889B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9D509CE45EAB2F64C8902F99D0C8958C\C025571B2A687A53689168CD7369889B
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9D509CE45EAB2F64C8902F99D0C8958C\C025571B2A687A53689168CD7369889B
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9D509CE45EAB2F64C8902F99D0C8958C\C025571B2A687A53689168CD7369889B
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9D509CE45EAB2F64C8902F99D0C8958C\C025571B2A687A53689168CD7369889B
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9D509CE45EAB2F64C8902F99D0C8958C\C025571B2A687A53689168CD7369889B
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9D509CE45EAB2F64C8902F99D0C8958C\C025571B2A687A53689168CD7369889B
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9D509CE45EAB2F64C8902F99D0C8958C\C025571B2A687A53689168CD7369889B
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9D509CE45EAB2F64C8902F99D0C8958C\C025571B2A687A53689168CD7369889B
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9D509CE45EAB2F64C8902F99D0C8958C\C025571B2A687A53689168CD7369889B
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9D509CE45EAB2F64C8902F99D0C8958C\C025571B2A687A53689168CD7369889B
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\353D769CC9DB3A141BDEA213F1CAEA8B\C025571B2A687A53689168CD7369889B
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5D5ED22144BC9504FB14E6D8E530E9B7\C025571B2A687A53689168CD7369889B
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\50973AB6721091A42A53E0DBE0F56813\C025571B2A687A53689168CD7369889B
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E2B6F5AF0CD164C4591B799A8E5DEC3E\C025571B2A687A53689168CD7369889B
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B014C8DBA9220B647BAE3B35796DD4C1\C025571B2A687A53689168CD7369889B
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FD9BA5BA4418A2445893D0398CB4A3A3\C025571B2A687A53689168CD7369889B
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BC68435879E48AA46B4BA253732BA193\C025571B2A687A53689168CD7369889B
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0379690C5F67F844DADD4B46D21F52D3\C025571B2A687A53689168CD7369889B
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\438E903E40976CE4EB942AA4D1058C17\C025571B2A687A53689168CD7369889B
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CCC39D2965433E541A9D6C9E2919E36D\C025571B2A687A53689168CD7369889B
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7C17811C6D4C32647AF849BB8567B05E\C025571B2A687A53689168CD7369889B
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A7697D8BD5B245B4E8BA2F26A93C001A\C025571B2A687A53689168CD7369889B
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\851EDA34DFC0D3248AC0F034B0F26932\C025571B2A687A53689168CD7369889B
File
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditional_x86,v11
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditional_x86,v11
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditional_x86,v11
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v11
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v11
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v11
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\11.0\RuntimeAdditional
Install
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\11.0\RuntimeAdditional
InstallerType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\11.0\RuntimeAdditional
SP
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\11.0\RuntimeAdditional
SPIndex
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\11.0\RuntimeAdditional
SPName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\11.0\RuntimeAdditional
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\11.0\RuntimeAdditional
UpdateVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\945EA3163AD7EA43ABC5D6718F743A55
C025571B2A687A53689168CD7369889B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B175520C-86A2-35A7-8619-86DC379688B9}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\C025571B2A687A53689168CD7369889B
VC_Runtime_Additional
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\Features
VC_Runtime_Additional
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\C025571B2A687A53689168CD7369889B
Provider
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\Features
Provider
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\C025571B2A687A53689168CD7369889B
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\Features
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C025571B2A687A53689168CD7369889B\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C025571B2A687A53689168CD7369889B
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C025571B2A687A53689168CD7369889B
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C025571B2A687A53689168CD7369889B
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C025571B2A687A53689168CD7369889B
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C025571B2A687A53689168CD7369889B
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C025571B2A687A53689168CD7369889B
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C025571B2A687A53689168CD7369889B
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C025571B2A687A53689168CD7369889B
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C025571B2A687A53689168CD7369889B
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\945EA3163AD7EA43ABC5D6718F743A55
C025571B2A687A53689168CD7369889B
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C025571B2A687A53689168CD7369889B\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C025571B2A687A53689168CD7369889B\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C025571B2A687A53689168CD7369889B\SourceList\Media
DiskPrompt
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C025571B2A687A53689168CD7369889B\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C025571B2A687A53689168CD7369889B
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C025571B2A687A53689168CD7369889B\SourceList
LastUsedSource
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6c80e5.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6c80e5.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\46B9183E65C37DD329D1000B11DA13ED
F7E11E641E100D44BB686C37242D35DD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14
F7E11E641E100D44BB686C37242D35DD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C069AA2AC3DFD6A3DBF641390311FA3B
F7E11E641E100D44BB686C37242D35DD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F3027E2A2C06E7D3A864BDD383A1C26E
F7E11E641E100D44BB686C37242D35DD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA
F7E11E641E100D44BB686C37242D35DD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D2CEC367661A6084E955D760679C2B2C
F7E11E641E100D44BB686C37242D35DD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9512E90A57FAE634AAD4526B0B1AD106
F7E11E641E100D44BB686C37242D35DD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8F139CF91DE936230A1FA8ED33D0E0EC
F7E11E641E100D44BB686C37242D35DD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\97FC00201A9B4EB359A592AFD9B4A1C5
F7E11E641E100D44BB686C37242D35DD
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\vcamp140.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2085E0429CDB18632976C73AF592EEFB
F7E11E641E100D44BB686C37242D35DD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC
F7E11E641E100D44BB686C37242D35DD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1F6CD69CA4980E338A1CE3E93749AF82
F7E11E641E100D44BB686C37242D35DD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB48ECA76FF4B153EA191E89DD8B25EE
F7E11E641E100D44BB686C37242D35DD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F2D616F7941B2083EBC4F079B192B3C6
F7E11E641E100D44BB686C37242D35DD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\F7E11E641E100D44BB686C37242D35DD
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\F7E11E641E100D44BB686C37242D35DD
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\F7E11E641E100D44BB686C37242D35DD
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\F7E11E641E100D44BB686C37242D35DD
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\F7E11E641E100D44BB686C37242D35DD
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\F7E11E641E100D44BB686C37242D35DD
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\F7E11E641E100D44BB686C37242D35DD
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\F7E11E641E100D44BB686C37242D35DD
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\F7E11E641E100D44BB686C37242D35DD
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFB6ED46C7D3FD634972D26E58F854EC\F7E11E641E100D44BB686C37242D35DD
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B3D93E8E53F48D638B29B48233F60E14\F7E11E641E100D44BB686C37242D35DD
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C069AA2AC3DFD6A3DBF641390311FA3B\F7E11E641E100D44BB686C37242D35DD
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F3027E2A2C06E7D3A864BDD383A1C26E\F7E11E641E100D44BB686C37242D35DD
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FE9930CBD9E5C7C3FB5FE5A9599CD6FA\F7E11E641E100D44BB686C37242D35DD
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D2CEC367661A6084E955D760679C2B2C\F7E11E641E100D44BB686C37242D35DD
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9512E90A57FAE634AAD4526B0B1AD106\F7E11E641E100D44BB686C37242D35DD
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8F139CF91DE936230A1FA8ED33D0E0EC\F7E11E641E100D44BB686C37242D35DD
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\97FC00201A9B4EB359A592AFD9B4A1C5\F7E11E641E100D44BB686C37242D35DD
File
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v14
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v14
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v14
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\14.0\VC\Runtimes\X86
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\14.0\VC\Runtimes\X86
Installed
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\14.0\VC\Runtimes\X86
Major
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\14.0\VC\Runtimes\X86
Minor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\14.0\VC\Runtimes\X86
Bld
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\14.0\VC\Runtimes\X86
Rbld
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{46E11E7F-01E1-44D0-BB86-C67342D253DD}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{46E11E7F-01E1-44D0-BB86-C67342D253DD}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{46E11E7F-01E1-44D0-BB86-C67342D253DD}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{46E11E7F-01E1-44D0-BB86-C67342D253DD}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{46E11E7F-01E1-44D0-BB86-C67342D253DD}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{46E11E7F-01E1-44D0-BB86-C67342D253DD}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{46E11E7F-01E1-44D0-BB86-C67342D253DD}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{46E11E7F-01E1-44D0-BB86-C67342D253DD}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{46E11E7F-01E1-44D0-BB86-C67342D253DD}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{46E11E7F-01E1-44D0-BB86-C67342D253DD}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{46E11E7F-01E1-44D0-BB86-C67342D253DD}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{46E11E7F-01E1-44D0-BB86-C67342D253DD}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{46E11E7F-01E1-44D0-BB86-C67342D253DD}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{46E11E7F-01E1-44D0-BB86-C67342D253DD}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{46E11E7F-01E1-44D0-BB86-C67342D253DD}
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{46E11E7F-01E1-44D0-BB86-C67342D253DD}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{46E11E7F-01E1-44D0-BB86-C67342D253DD}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{46E11E7F-01E1-44D0-BB86-C67342D253DD}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{46E11E7F-01E1-44D0-BB86-C67342D253DD}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{46E11E7F-01E1-44D0-BB86-C67342D253DD}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{46E11E7F-01E1-44D0-BB86-C67342D253DD}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{46E11E7F-01E1-44D0-BB86-C67342D253DD}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{46E11E7F-01E1-44D0-BB86-C67342D253DD}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\60DB5E5629367203C8625813703DFCA1
F7E11E641E100D44BB686C37242D35DD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{46E11E7F-01E1-44D0-BB86-C67342D253DD}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\F7E11E641E100D44BB686C37242D35DD
VC_Runtime_Minimum
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\Features
VC_Runtime_Minimum
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\F7E11E641E100D44BB686C37242D35DD
Provider
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\Features
Provider
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\F7E11E641E100D44BB686C37242D35DD
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\Features
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\F7E11E641E100D44BB686C37242D35DD\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\F7E11E641E100D44BB686C37242D35DD
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\F7E11E641E100D44BB686C37242D35DD
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\F7E11E641E100D44BB686C37242D35DD
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\F7E11E641E100D44BB686C37242D35DD
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\F7E11E641E100D44BB686C37242D35DD
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\F7E11E641E100D44BB686C37242D35DD
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\F7E11E641E100D44BB686C37242D35DD
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\F7E11E641E100D44BB686C37242D35DD
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\F7E11E641E100D44BB686C37242D35DD
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\60DB5E5629367203C8625813703DFCA1
F7E11E641E100D44BB686C37242D35DD
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\F7E11E641E100D44BB686C37242D35DD\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\F7E11E641E100D44BB686C37242D35DD\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\F7E11E641E100D44BB686C37242D35DD\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\F7E11E641E100D44BB686C37242D35DD
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\F7E11E641E100D44BB686C37242D35DD\SourceList
LastUsedSource
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6c80ea.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6c80ea.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\46B9183E65C37DD329D1000B11DA13ED
057E052AF3BD1C044806E87FC75728AD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D
057E052AF3BD1C044806E87FC75728AD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6
057E052AF3BD1C044806E87FC75728AD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9
057E052AF3BD1C044806E87FC75728AD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AF6D649BB945143DAD2D436C434C20F
057E052AF3BD1C044806E87FC75728AD
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc140chs.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\841B335EA38A88737A36C0C664FCC63C
057E052AF3BD1C044806E87FC75728AD
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc140cht.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3A1C53B88CB3F7C33B57D6B5E272B8FF
057E052AF3BD1C044806E87FC75728AD
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc140deu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0B76360A9B1D0AC35A81B25B36672275
057E052AF3BD1C044806E87FC75728AD
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc140enu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BF427A2B66EB00A3182637A36261AA34
057E052AF3BD1C044806E87FC75728AD
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc140esn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BCE00C92AF70C413399B4A50F82E20B5
057E052AF3BD1C044806E87FC75728AD
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc140fra.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7FD8D5E49CB105931B840901B2EC77A7
057E052AF3BD1C044806E87FC75728AD
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc140ita.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\18E39E9B8AC8A5A3EA358562C997478C
057E052AF3BD1C044806E87FC75728AD
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc140jpn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E52BAFB9807F7F32B60B598A4DBB7A7
057E052AF3BD1C044806E87FC75728AD
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc140kor.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\52FCE2A887EC8E939BD4BAB1A128F53C
057E052AF3BD1C044806E87FC75728AD
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc140rus.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CF1288ED10B63B4328E2F1739AE9A4E2
057E052AF3BD1C044806E87FC75728AD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1F6CD69CA4980E338A1CE3E93749AF82
057E052AF3BD1C044806E87FC75728AD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FD022AE163B598239B970D86144E8188
057E052AF3BD1C044806E87FC75728AD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D119A3F71F2F0B13890895B0C76A267C
057E052AF3BD1C044806E87FC75728AD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\057E052AF3BD1C044806E87FC75728AD
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\057E052AF3BD1C044806E87FC75728AD
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\057E052AF3BD1C044806E87FC75728AD
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\057E052AF3BD1C044806E87FC75728AD
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\057E052AF3BD1C044806E87FC75728AD
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\057E052AF3BD1C044806E87FC75728AD
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\057E052AF3BD1C044806E87FC75728AD
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\057E052AF3BD1C044806E87FC75728AD
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\057E052AF3BD1C044806E87FC75728AD
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C8BA4DF4F75C28732903C9AC2251A33D\057E052AF3BD1C044806E87FC75728AD
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\057E052AF3BD1C044806E87FC75728AD
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\057E052AF3BD1C044806E87FC75728AD
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\057E052AF3BD1C044806E87FC75728AD
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\057E052AF3BD1C044806E87FC75728AD
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\057E052AF3BD1C044806E87FC75728AD
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\057E052AF3BD1C044806E87FC75728AD
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\057E052AF3BD1C044806E87FC75728AD
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\057E052AF3BD1C044806E87FC75728AD
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\057E052AF3BD1C044806E87FC75728AD
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B6AE1A6418D39933981921F7F7A77EA6\057E052AF3BD1C044806E87FC75728AD
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\057E052AF3BD1C044806E87FC75728AD
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\057E052AF3BD1C044806E87FC75728AD
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\057E052AF3BD1C044806E87FC75728AD
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\057E052AF3BD1C044806E87FC75728AD
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\057E052AF3BD1C044806E87FC75728AD
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\057E052AF3BD1C044806E87FC75728AD
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\057E052AF3BD1C044806E87FC75728AD
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\057E052AF3BD1C044806E87FC75728AD
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\057E052AF3BD1C044806E87FC75728AD
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\91EDD49C07CCA9B36AFAC57A43B0B9A9\057E052AF3BD1C044806E87FC75728AD
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AF6D649BB945143DAD2D436C434C20F\057E052AF3BD1C044806E87FC75728AD
File
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v14
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v14
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v14
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\057E052AF3BD1C044806E87FC75728AD\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\057E052AF3BD1C044806E87FC75728AD\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\057E052AF3BD1C044806E87FC75728AD\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\057E052AF3BD1C044806E87FC75728AD\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\057E052AF3BD1C044806E87FC75728AD\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\057E052AF3BD1C044806E87FC75728AD\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\057E052AF3BD1C044806E87FC75728AD\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\057E052AF3BD1C044806E87FC75728AD\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\057E052AF3BD1C044806E87FC75728AD\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\057E052AF3BD1C044806E87FC75728AD\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\057E052AF3BD1C044806E87FC75728AD\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\057E052AF3BD1C044806E87FC75728AD\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\057E052AF3BD1C044806E87FC75728AD\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\057E052AF3BD1C044806E87FC75728AD\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\057E052AF3BD1C044806E87FC75728AD\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\057E052AF3BD1C044806E87FC75728AD\InstallProperties
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\057E052AF3BD1C044806E87FC75728AD\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\057E052AF3BD1C044806E87FC75728AD\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\057E052AF3BD1C044806E87FC75728AD\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\057E052AF3BD1C044806E87FC75728AD\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\atl110.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcp110.dll
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc110.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc110u.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfcm110.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfcm110u.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc110cht.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc110chs.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc110enu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc110deu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc110esn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc110fra.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc110ita.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc110jpn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc110kor.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc110rus.dll
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\vcruntime140.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcp140.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcp140_1.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcp140_2.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcp140_atomic_wait.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcp140_codecvt_ids.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\concrt140.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\vccorlib140.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\vcomp140.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\14.0\RuntimeMinimum
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\14.0\RuntimeMinimum
UpdateVersion
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc140.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc140u.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfcm140.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfcm140u.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\14.0\RuntimeAdditional
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\14.0\RuntimeAdditional
UpdateVersion
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
SrCreateRp (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
SrCreateRp (Leave)
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
Resume
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}
Resume
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
There are 872 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
26DA000
heap
page read and write
1BC6DC56000
heap
page read and write
655000
heap
page read and write
3920000
heap
page read and write
F70000
unkown
page write copy
379F000
trusted library allocation
page read and write
D4E000
unkown
page readonly
31FF000
trusted library allocation
page read and write
33D3000
trusted library allocation
page read and write
1BC722F5000
heap
page read and write
1BC6F4E4000
heap
page read and write
3B10000
trusted library allocation
page read and write
A8C000
stack
page read and write
26D5000
heap
page read and write
1BC72871000
heap
page read and write
649000
heap
page read and write
26E7000
heap
page read and write
26E5000
heap
page read and write
CAC000
heap
page read and write
943000
heap
page read and write
3795000
trusted library allocation
page read and write
3413000
trusted library allocation
page read and write
394B000
trusted library allocation
page read and write
3781000
trusted library allocation
page read and write
596F000
stack
page read and write
35C7000
trusted library allocation
page read and write
3799000
trusted library allocation
page read and write
26D5000
heap
page read and write
26D0000
heap
page read and write
8E5000
heap
page read and write
F20000
unkown
page readonly
26D6000
heap
page read and write
60B000
heap
page read and write
7FF5279C2000
unkown
page readonly
1BC6FB33000
trusted library allocation
page read and write
26D5000
heap
page read and write
38F2000
trusted library allocation
page read and write
1BC71A91000
heap
page read and write
7FF5279CD000
unkown
page readonly
1BC719B3000
heap
page read and write
649000
heap
page read and write
3946000
trusted library allocation
page read and write
21B000
unkown
page readonly
26D7000
heap
page read and write
26D0000
heap
page read and write
1BC6DC84000
heap
page read and write
655000
heap
page read and write
37B0000
heap
page read and write
14A0000
heap
page read and write
307F000
stack
page read and write
393E000
trusted library allocation
page read and write
655000
heap
page read and write
1BC73794000
heap
page read and write
2E088280000
heap
page read and write
26D2000
heap
page read and write
26DC000
heap
page read and write
649000
heap
page read and write
58E000
stack
page read and write
B00000
heap
page read and write
1BC724C1000
heap
page read and write
655000
heap
page read and write
13E5E233000
unkown
page read and write
26DE000
heap
page read and write
1BC73214000
heap
page read and write
3267000
heap
page read and write
16A0000
trusted library allocation
page read and write
810000
heap
page read and write
649000
heap
page read and write
1BC6DB00000
heap
page read and write
1BC73973000
heap
page read and write
26D3000
heap
page read and write
89A000
heap
page read and write
1BC72D28000
heap
page read and write
163B000
heap
page read and write
3760000
heap
page read and write
B0E000
stack
page read and write
26D2000
heap
page read and write
5A8F000
heap
page read and write
1BC72D5C000
heap
page read and write
26D3000
heap
page read and write
F58A87F000
stack
page read and write
2E088241000
heap
page read and write
649000
heap
page read and write
3160000
heap
page read and write
1BC72D28000
heap
page read and write
649000
heap
page read and write
1D1000
unkown
page execute read
3340000
heap
page read and write
3770000
trusted library allocation
page read and write
3940000
heap
page read and write
2E08826F000
heap
page read and write
1BC722CC000
heap
page read and write
2C1A000
heap
page read and write
1BC72E46000
heap
page read and write
26E8000
heap
page read and write
35C0000
heap
page read and write
3740000
heap
page read and write
3772000
trusted library allocation
page read and write
649000
heap
page read and write
800000
heap
page read and write
26DD000
heap
page read and write
1BC6DBB8000
heap
page read and write
504000
heap
page read and write
D24000
heap
page read and write
26D6000
heap
page read and write
26DD000
stack
page read and write
26DD000
heap
page read and write
26D2000
heap
page read and write
1BC71431000
heap
page read and write
CAF000
heap
page read and write
504000
heap
page read and write
313E000
stack
page read and write
504000
heap
page read and write
1BC734D6000
heap
page read and write
3114000
trusted library allocation
page read and write
26D7000
heap
page read and write
CF5000
heap
page read and write
3798000
trusted library allocation
page read and write
65F000
heap
page read and write
B9C000
stack
page read and write
403F000
stack
page read and write
1BC739FF000
heap
page read and write
2E08A140000
trusted library allocation
page read and write
32C0000
heap
page read and write
1631000
heap
page read and write
3870000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
1BC7145F000
heap
page read and write
CC7000
heap
page read and write
26D1000
heap
page read and write
3D40000
trusted library allocation
page read and write
26EC000
heap
page read and write
1BC6FB27000
trusted library allocation
page read and write
1BC71746000
heap
page read and write
1BC71968000
heap
page read and write
26D6000
heap
page read and write
26D7000
heap
page read and write
7FF527A41000
unkown
page readonly
1F0000
heap
page read and write
3796000
trusted library allocation
page read and write
13E5E240000
unkown
page read and write
1BC73118000
heap
page read and write
26DB000
heap
page read and write
1469000
heap
page read and write
7FF527999000
unkown
page readonly
3870000
trusted library allocation
page read and write
42C000
unkown
page readonly
1BC718EC000
heap
page read and write
26D6000
heap
page read and write
2E08A13B000
trusted library allocation
page read and write
1BC6DC2F000
heap
page read and write
1BC72531000
heap
page read and write
2E30000
heap
page read and write
1645000
heap
page read and write
3986000
trusted library allocation
page read and write
1BC6DBF2000
heap
page read and write
26D3000
heap
page read and write
37C1000
trusted library allocation
page read and write
26D5000
heap
page read and write
1BC71549000
heap
page read and write
1BC71AF2000
heap
page read and write
504000
heap
page read and write
649000
heap
page read and write
B10000
heap
page read and write
649000
heap
page read and write
649000
heap
page read and write
30A0000
trusted library allocation
page read and write
37BB000
trusted library allocation
page read and write
26D4000
heap
page read and write
1BC7142E000
heap
page read and write
26D3000
heap
page read and write
649000
heap
page read and write
649000
heap
page read and write
93C000
stack
page read and write
1BC73793000
heap
page read and write
1BC6FB35000
trusted library allocation
page read and write
26E3000
heap
page read and write
D14000
heap
page read and write
DD1000
unkown
page execute read
26E1000
heap
page read and write
649000
heap
page read and write
3792000
trusted library allocation
page read and write
3982000
trusted library allocation
page read and write
6E4000
heap
page read and write
31E0000
heap
page read and write
B51000
unkown
page execute read
13E5E1C0000
heap
page read and write
3420000
heap
page read and write
7FF5279C2000
unkown
page readonly
504000
heap
page read and write
486C000
stack
page read and write
504000
heap
page read and write
3457000
trusted library allocation
page read and write
1BC6F6C0000
heap
page read and write
649000
heap
page read and write
649000
heap
page read and write
3210000
heap
page read and write
504000
heap
page read and write
649000
heap
page read and write
2E08A13E000
trusted library allocation
page read and write
37CD000
trusted library allocation
page read and write
2E08A141000
trusted library allocation
page read and write
3340000
heap
page read and write
26D4000
heap
page read and write
504000
heap
page read and write
F21000
unkown
page execute read
44A0000
heap
page read and write
FEB000
stack
page read and write
BA0000
unkown
page write copy
8E6000
heap
page read and write
3667000
trusted library allocation
page read and write
504000
heap
page read and write
16A0000
trusted library allocation
page read and write
6C1C6000
unkown
page read and write
1488000
heap
page read and write
552F000
stack
page read and write
45BF000
stack
page read and write
26D2000
heap
page read and write
1BC71B44000
heap
page read and write
CAB000
stack
page read and write
2E088241000
heap
page read and write
26E7000
heap
page read and write
504000
heap
page read and write
33D0000
heap
page read and write
F21000
unkown
page execute read
400000
unkown
page readonly
1BC7165A000
heap
page read and write
1331000
heap
page read and write
1BC6FB3B000
trusted library allocation
page read and write
1BC72F22000
heap
page read and write
26E7000
heap
page read and write
1331000
heap
page read and write
655000
heap
page read and write
27DC000
heap
page read and write
163E000
stack
page read and write
26D8000
heap
page read and write
345E000
trusted library allocation
page read and write
23E000
unkown
page readonly
2E088251000
heap
page read and write
655000
heap
page read and write
26D7000
heap
page read and write
504000
heap
page read and write
935000
heap
page read and write
F75000
unkown
page readonly
1BC6F4C3000
heap
page read and write
15FF000
heap
page read and write
26D6000
heap
page read and write
30A0000
trusted library allocation
page read and write
649000
heap
page read and write
655000
heap
page read and write
F73000
heap
page read and write
649000
heap
page read and write
3330000
heap
page read and write
26D6000
heap
page read and write
655000
heap
page read and write
649000
heap
page read and write
2C80000
heap
page read and write
649000
heap
page read and write
146C000
heap
page read and write
1BC72B78000
heap
page read and write
4040000
trusted library allocation
page read and write
649000
heap
page read and write
1BC6F577000
heap
page read and write
37A2000
trusted library allocation
page read and write
1471000
heap
page read and write
162E000
heap
page read and write
504000
heap
page read and write
649000
heap
page read and write
2E84000
trusted library allocation
page read and write
2E00000
heap
page read and write
1BC71D54000
heap
page read and write
2E08A13F000
trusted library allocation
page read and write
1BC72D4A000
heap
page read and write
14A4000
heap
page read and write
37C8000
trusted library allocation
page read and write
30C0000
heap
page read and write
394D000
trusted library allocation
page read and write
26D9000
heap
page read and write
C9F000
heap
page read and write
1BC744C6000
heap
page read and write
26D8000
heap
page read and write
2E088236000
heap
page read and write
1BC71A2F000
heap
page read and write
26DE000
heap
page read and write
1BC6DC9D000
heap
page read and write
1493000
heap
page read and write
3900000
heap
page read and write
1473000
heap
page read and write
1BC72774000
heap
page read and write
7FF52799E000
unkown
page readonly
E3A000
unkown
page write copy
3380000
heap
page read and write
2E08A13F000
trusted library allocation
page read and write
1BC73118000
heap
page read and write
1BC6DC38000
heap
page read and write
649000
heap
page read and write
B51000
unkown
page execute read
655000
heap
page read and write
26D4000
heap
page read and write
649000
heap
page read and write
26DC000
heap
page read and write
1080000
heap
page read and write
655000
heap
page read and write
1482000
heap
page read and write
1BC6DC2B000
heap
page read and write
2E089BB4000
trusted library allocation
page read and write
E3E000
unkown
page readonly
377F000
trusted library allocation
page read and write
26D9000
heap
page read and write
1BC71898000
heap
page read and write
2E089BB4000
trusted library allocation
page read and write
307E000
stack
page read and write
33C0000
trusted library allocation
page read and write
35C4000
trusted library allocation
page read and write
1BC71C8F000
heap
page read and write
2E088280000
heap
page read and write
3120000
remote allocation
page read and write
504000
heap
page read and write
655000
heap
page read and write
976000
heap
page read and write
1BC73070000
heap
page read and write
2F0F000
heap
page read and write
26D2000
heap
page read and write
649000
heap
page read and write
C4A000
unkown
page read and write
2E08822B000
heap
page read and write
649000
heap
page read and write
1480000
heap
page read and write
1610000
heap
page read and write
31B0000
trusted library allocation
page read and write
26D4000
heap
page read and write
2E088180000
heap
page read and write
1471000
heap
page read and write
2E089DF0000
heap
page read and write
B50000
unkown
page readonly
14A0000
heap
page read and write
36F0000
heap
page read and write
1BC7169C000
heap
page read and write
1BC71328000
heap
page read and write
15FF000
heap
page read and write
133E000
heap
page read and write
3419000
trusted library allocation
page read and write
AE6000
heap
page read and write
3740000
trusted library allocation
page read and write
B02000
heap
page read and write
8D0000
heap
page read and write
3A96000
heap
page read and write
649000
heap
page read and write
655000
heap
page read and write
649000
heap
page read and write
2E08A145000
trusted library allocation
page read and write
2E08A13F000
trusted library allocation
page read and write
649000
heap
page read and write
2F80000
heap
page read and write
37C5000
trusted library allocation
page read and write
649000
heap
page read and write
26D0000
heap
page read and write
1BC6DBF5000
heap
page read and write
C5F000
heap
page read and write
1BC6FB37000
trusted library allocation
page read and write
649000
heap
page read and write
3120000
heap
page read and write
2E088241000
heap
page read and write
14A4000
heap
page read and write
1BC6DBF5000
heap
page read and write
1BC72E04000
heap
page read and write
1486000
heap
page read and write
42E000
unkown
page readonly
655000
heap
page read and write
1BC71968000
heap
page read and write
2000000
heap
page read and write
3740000
trusted library allocation
page read and write
26D4000
heap
page read and write
31B0000
trusted library allocation
page read and write
3788000
trusted library allocation
page read and write
3783000
trusted library allocation
page read and write
26D8000
heap
page read and write
655000
heap
page read and write
13E5E240000
unkown
page read and write
2C1F000
stack
page read and write
CA7000
heap
page read and write
122D000
heap
page read and write
429000
unkown
page read and write
649000
heap
page read and write
3917000
trusted library allocation
page read and write
1BC72532000
heap
page read and write
472B000
stack
page read and write
1BC6F4C3000
heap
page read and write
1BC7232B000
heap
page read and write
26E4000
heap
page read and write
1BC727CE000
heap
page read and write
2FC0000
heap
page read and write
655000
heap
page read and write
14A0000
heap
page read and write
1000000
unkown
page readonly
2E0883F0000
heap
page read and write
EFF000
heap
page read and write
13E5E1F0000
unkown
page read and write
26E1000
heap
page read and write
1BC716FC000
heap
page read and write
1BC6DE40000
trusted library allocation
page read and write
2E088243000
heap
page read and write
F40000
heap
page read and write
30FC000
stack
page read and write
1BC712E8000
heap
page read and write
BE1000
unkown
page execute read
26D6000
heap
page read and write
600000
heap
page read and write
3983000
trusted library allocation
page read and write
26D9000
heap
page read and write
3870000
trusted library allocation
page read and write
BA0000
unkown
page read and write
1BC713B6000
heap
page read and write
1BC7262B000
heap
page read and write
26D2000
heap
page read and write
26DC000
heap
page read and write
26DA000
heap
page read and write
FE0000
heap
page read and write
D80000
heap
page read and write
3740000
trusted library allocation
page read and write
37B0000
heap
page read and write
26D7000
heap
page read and write
649000
heap
page read and write
3110000
heap
page read and write
2E089C20000
heap
page read and write
3941000
trusted library allocation
page read and write
884000
heap
page read and write
1BC6F960000
heap
page read and write
655000
heap
page read and write
1BC6F4EF000
heap
page read and write
35E2000
trusted library allocation
page read and write
1BC73070000
heap
page read and write
2ECC000
stack
page read and write
504000
heap
page read and write
646000
heap
page read and write
3200000
trusted library allocation
page read and write
655000
heap
page read and write
1BC71A91000
heap
page read and write
377B000
trusted library allocation
page read and write
2E08A143000
trusted library allocation
page read and write
1BC733DA000
heap
page read and write
1BC7185D000
heap
page read and write
37B8000
trusted library allocation
page read and write
26DA000
heap
page read and write
34DE000
stack
page read and write
3310000
heap
page read and write
870000
heap
page read and write
1BC71968000
heap
page read and write
35DD000
trusted library allocation
page read and write
2E90000
trusted library allocation
page read and write
655000
heap
page read and write
649000
heap
page read and write
1471000
heap
page read and write
1BC71F8C000
heap
page read and write
2E088243000
heap
page read and write
649000
heap
page read and write
2E08826F000
heap
page read and write
14A4000
heap
page read and write
1BC732C0000
heap
page read and write
26D3000
heap
page read and write
649000
heap
page read and write
2E08A13C000
trusted library allocation
page read and write
1BC6F4D3000
heap
page read and write
D06000
heap
page read and write
CDE000
heap
page read and write
655000
heap
page read and write
1676000
heap
page read and write
1329000
heap
page read and write
655000
heap
page read and write
68B000
heap
page read and write
4AAF000
stack
page read and write
26EB000
heap
page read and write
21B000
unkown
page readonly
26DD000
heap
page read and write
1BC71618000
heap
page read and write
3790000
trusted library allocation
page read and write
3933000
trusted library allocation
page read and write
649000
heap
page read and write
35CA000
heap
page read and write
649000
heap
page read and write
13E5E213000
unkown
page read and write
504000
heap
page read and write
6E1000
heap
page read and write
83F000
stack
page read and write
16A0000
trusted library allocation
page read and write
1BC7368C000
heap
page read and write
649000
heap
page read and write
3420000
heap
page read and write
514000
heap
page read and write
2E08A142000
trusted library allocation
page read and write
30D0000
heap
page read and write
26D3000
heap
page read and write
211F000
stack
page read and write
3730000
heap
page read and write
26D1000
heap
page read and write
B00000
heap
page read and write
1BC72B24000
heap
page read and write
2E08A13D000
trusted library allocation
page read and write
3798000
trusted library allocation
page read and write
1BC74336000
heap
page read and write
1BC73236000
heap
page read and write
CA9000
heap
page read and write
1BC6DC38000
heap
page read and write
2210000
heap
page read and write
2E08A142000
trusted library allocation
page read and write
26D2000
heap
page read and write
154D000
stack
page read and write
1BC718F3000
heap
page read and write
1BC6FB2E000
trusted library allocation
page read and write
3AF6000
trusted library allocation
page read and write
1469000
heap
page read and write
3390000
heap
page read and write
649000
heap
page read and write
1BC6F730000
heap
page read and write
1BC6F5AE000
heap
page read and write
1BC730D5000
heap
page read and write
2E08A144000
trusted library allocation
page read and write
3171000
heap
page read and write
26D2000
heap
page read and write
3410000
heap
page read and write
3201000
trusted library allocation
page read and write
26EB000
heap
page read and write
649000
heap
page read and write
3740000
heap
page read and write
649000
heap
page read and write
1251000
heap
page read and write
649000
heap
page read and write
1002000
unkown
page execute read
2E08A146000
trusted library allocation
page read and write
1610000
heap
page read and write
26D9000
heap
page read and write
14D8000
heap
page read and write
13E5E200000
unkown
page read and write
31B0000
trusted library allocation
page read and write
655000
heap
page read and write
3340000
heap
page read and write
26E3000
heap
page read and write
649000
heap
page read and write
1BC6F55C000
heap
page read and write
30C0000
heap
page read and write
6A0000
heap
page read and write
1BC6F4F3000
heap
page read and write
26D1000
heap
page read and write
1680000
trusted library allocation
page read and write
649000
heap
page read and write
26D8000
heap
page read and write
35C3000
trusted library allocation
page read and write
26D2000
heap
page read and write
2E088280000
heap
page read and write
C7F000
heap
page read and write
655000
heap
page read and write
504000
heap
page read and write
2CD0000
heap
page read and write
C9B000
stack
page read and write
3775000
trusted library allocation
page read and write
F4E000
heap
page read and write
26D7000
heap
page read and write
649000
heap
page read and write
1BC7318F000
heap
page read and write
6C730000
unkown
page readonly
1BC743DC000
heap
page read and write
2E08A13C000
trusted library allocation
page read and write
3912000
trusted library allocation
page read and write
1BC71905000
heap
page read and write
33C5000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
1BC6F583000
heap
page read and write
1657000
heap
page read and write
D06000
heap
page read and write
649000
heap
page read and write
1BC715D8000
heap
page read and write
16D0000
heap
page read and write
1BC71B40000
heap
page read and write
655000
heap
page read and write
34125FE000
unkown
page readonly
1BC727CE000
heap
page read and write
30A0000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
133E000
heap
page read and write
1BC71EF6000
heap
page read and write
655000
heap
page read and write
26E3000
heap
page read and write
3EB000
heap
page read and write
649000
heap
page read and write
2840000
trusted library allocation
page read and write
1BC71327000
heap
page read and write
98000
stack
page read and write
35DC000
trusted library allocation
page read and write
3773000
trusted library allocation
page read and write
BE0000
unkown
page readonly
1BC6DC03000
heap
page read and write
13C0000
heap
page read and write
1BC74508000
heap
page read and write
1BC7135C000
heap
page read and write
649000
heap
page read and write
1BC7198D000
heap
page read and write
6C1CA000
unkown
page readonly
2E088243000
heap
page read and write
1BC71458000
heap
page read and write
1BC71CB0000
heap
page read and write
26D9000
heap
page read and write
14A7000
heap
page read and write
1BC7452A000
heap
page read and write
15E9000
heap
page read and write
338B000
stack
page read and write
9C000
stack
page read and write
26D8000
heap
page read and write
26D6000
heap
page read and write
37B6000
trusted library allocation
page read and write
CE1000
unkown
page execute read
3AF4000
trusted library allocation
page read and write
649000
heap
page read and write
1BC6F565000
heap
page read and write
5A8F000
heap
page read and write
1BC6FB2B000
trusted library allocation
page read and write
649000
heap
page read and write
16A0000
heap
page read and write
C70000
heap
page read and write
1BC6F57C000
heap
page read and write
3797000
trusted library allocation
page read and write
2F0F000
heap
page read and write
14A0000
heap
page read and write
649000
heap
page read and write
2E089F80000
heap
page read and write
810000
heap
page read and write
13E5E1B0000
heap
page read and write
7FF527A3B000
unkown
page readonly
100C000
unkown
page read and write
504000
heap
page read and write
BA5000
unkown
page readonly
655000
heap
page read and write
2E08826D000
heap
page read and write
655000
heap
page read and write
5D0000
heap
page read and write
1BC74440000
heap
page read and write
F9E000
heap
page read and write
26DA000
heap
page read and write
391E000
trusted library allocation
page read and write
649000
heap
page read and write
504000
heap
page read and write
379A000
trusted library allocation
page read and write
649000
heap
page read and write
649000
heap
page read and write
504000
heap
page read and write
2E088241000
heap
page read and write
1BC71C86000
heap
page read and write
1390000
heap
page read and write
649000
heap
page read and write
1BC728F8000
heap
page read and write
26E5000
heap
page read and write
E40000
heap
page read and write
655000
heap
page read and write
1BC6DC2D000
heap
page read and write
1482000
heap
page read and write
13E5E202000
unkown
page read and write
CDE000
heap
page read and write
2E81000
trusted library allocation
page read and write
655000
heap
page read and write
1BC71A49000
heap
page read and write
649000
heap
page read and write
26EA000
heap
page read and write
26ED000
heap
page read and write
2E089BB0000
trusted library allocation
page read and write
649000
heap
page read and write
26ED000
heap
page read and write
1497000
heap
page read and write
1BC7312B000
heap
page read and write
2E088225000
heap
page read and write
26E3000
heap
page read and write
5211000
heap
page read and write
3B0000
heap
page read and write
2150000
heap
page read and write
2E089BB4000
trusted library allocation
page read and write
377E000
trusted library allocation
page read and write
1000000
unkown
page readonly
8AE000
heap
page read and write
655000
heap
page read and write
649000
heap
page read and write
44FE000
heap
page read and write
26E6000
heap
page read and write
1BC70022000
heap
page read and write
26D6000
heap
page read and write
649000
heap
page read and write
655000
heap
page read and write
26DD000
heap
page read and write
13F0000
heap
page read and write
D06000
heap
page read and write
2E088251000
heap
page read and write
649000
heap
page read and write
2E089BB0000
trusted library allocation
page read and write
649000
heap
page read and write
EE7000
heap
page read and write
11D0000
heap
page read and write
35CC000
trusted library allocation
page read and write
1BC72B24000
heap
page read and write
14F6000
heap
page read and write
2E08A140000
trusted library allocation
page read and write
168E000
heap
page read and write
31FE000
trusted library allocation
page read and write
649000
heap
page read and write
92D000
heap
page read and write
26DE000
heap
page read and write
341E000
trusted library allocation
page read and write
6E4000
heap
page read and write
655000
heap
page read and write
5A8F000
heap
page read and write
377D000
trusted library allocation
page read and write
26E7000
heap
page read and write
14A9000
heap
page read and write
655000
heap
page read and write
26DB000
heap
page read and write
30C0000
heap
page read and write
1BC7167F000
heap
page read and write
1BC71A95000
heap
page read and write
3740000
trusted library allocation
page read and write
26E0000
heap
page read and write
26D4000
heap
page read and write
3779000
trusted library allocation
page read and write
649000
heap
page read and write
1BC7148D000
heap
page read and write
26D1000
heap
page read and write
26E7000
heap
page read and write
1BC719FC000
heap
page read and write
1BC72084000
heap
page read and write
3919000
trusted library allocation
page read and write
3A80000
heap
page read and write
818000
heap
page read and write
649000
heap
page read and write
31CF000
stack
page read and write
504000
heap
page read and write
2E8F000
trusted library allocation
page read and write
379C000
trusted library allocation
page read and write
1224000
heap
page read and write
655000
heap
page read and write
334B000
stack
page read and write
6FA000
stack
page read and write
1492000
heap
page read and write
1BC7154C000
heap
page read and write
2E08A13D000
trusted library allocation
page read and write
1632000
heap
page read and write
35C1000
trusted library allocation
page read and write
26DC000
heap
page read and write
7FF5279DA000
unkown
page readonly
649000
heap
page read and write
26D6000
heap
page read and write
655000
heap
page read and write
377A000
trusted library allocation
page read and write
1BC7370F000
heap
page read and write
1BC7452A000
heap
page read and write
C99000
heap
page read and write
26D5000
heap
page read and write
649000
heap
page read and write
41EF000
stack
page read and write
504000
heap
page read and write
1BC731F2000
heap
page read and write
39B000
stack
page read and write
1BC730D4000
heap
page read and write
1BC73279000
heap
page read and write
391C000
trusted library allocation
page read and write
DF0000
heap
page read and write
3420000
heap
page read and write
1BC6DC2C000
heap
page read and write
26DA000
heap
page read and write
2B1F000
stack
page read and write
CB7000
heap
page read and write
26EC000
heap
page read and write
37CB000
trusted library allocation
page read and write
3663000
trusted library allocation
page read and write
370000
heap
page read and write
685000
heap
page read and write
F70000
unkown
page read and write
3740000
trusted library allocation
page read and write
1BC74634000
heap
page read and write
133B000
stack
page read and write
26D5000
heap
page read and write
1BC71A8A000
heap
page read and write
51FC000
stack
page read and write
26E2000
heap
page read and write
26E9000
heap
page read and write
837000
heap
page read and write
1BC71408000
heap
page read and write
649000
heap
page read and write
3360000
heap
page read and write
46A0000
trusted library allocation
page read and write
1BC71752000
heap
page read and write
33CA000
trusted library allocation
page read and write
504000
heap
page read and write
1BC715E2000
heap
page read and write
DD0000
unkown
page readonly
7FF5279DA000
unkown
page readonly
649000
heap
page read and write
26E4000
heap
page read and write
655000
heap
page read and write
EFF000
heap
page read and write
26D7000
heap
page read and write
1BC72C40000
heap
page read and write
26D1000
heap
page read and write
13E5EA02000
unkown
page read and write
30A0000
trusted library allocation
page read and write
26D6000
heap
page read and write
2E8D000
trusted library allocation
page read and write
649000
heap
page read and write
1BC71849000
heap
page read and write
2E088236000
heap
page read and write
8F1000
heap
page read and write
1BC71BD0000
heap
page read and write
3204000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
35B0000
heap
page read and write
1BC73A4F000
heap
page read and write
649000
heap
page read and write
1680000
trusted library allocation
page read and write
1BC6DC03000
heap
page read and write
1BC72BBB000
heap
page read and write
26D5000
heap
page read and write
31F1000
trusted library allocation
page read and write
655000
heap
page read and write
1BC6F4C7000
heap
page read and write
1BC72080000
heap
page read and write
97A000
heap
page read and write
1BC7282C000
heap
page read and write
413F000
stack
page read and write
3740000
trusted library allocation
page read and write
345F000
trusted library allocation
page read and write
2800000
heap
page read and write
26DB000
heap
page read and write
26ED000
heap
page read and write
33E0000
heap
page read and write
26E2000
heap
page read and write
3150000
heap
page read and write
6C32C000
unkown
page readonly
3ED0000
trusted library allocation
page read and write
26E3000
heap
page read and write
1BC72BBA000
heap
page read and write
23A000
unkown
page write copy
B10000
heap
page read and write
2E089BB0000
trusted library allocation
page read and write
400000
unkown
page readonly
2C30000
heap
page read and write
26D7000
heap
page read and write
1BC72A35000
heap
page read and write
409000
unkown
page read and write
1BC73931000
heap
page read and write
83E000
heap
page read and write
850000
heap
page read and write
E50000
heap
page read and write
2E08A143000
trusted library allocation
page read and write
123F000
stack
page read and write
655000
heap
page read and write
1BC7145A000
heap
page read and write
40B000
unkown
page read and write
B10000
heap
page read and write
3770000
heap
page read and write
CC6000
heap
page read and write
1471000
heap
page read and write
2E82000
trusted library allocation
page read and write
2E08A14E000
trusted library allocation
page read and write
26D6000
heap
page read and write
13E5E238000
unkown
page read and write
1BC6FB30000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
649000
heap
page read and write
1BC71572000
heap
page read and write
3786000
trusted library allocation
page read and write
649000
heap
page read and write
8F1000
heap
page read and write
38F8000
trusted library allocation
page read and write
F58A34A000
stack
page read and write
26D5000
heap
page read and write
1BC72F64000
heap
page read and write
7FF5279BA000
unkown
page readonly
649000
heap
page read and write
26DD000
heap
page read and write
1BC72E8A000
heap
page read and write
26E1000
heap
page read and write
148D000
heap
page read and write
1491000
heap
page read and write
1BC7312A000
heap
page read and write
85E000
heap
page read and write
1BC71694000
heap
page read and write
2E08A145000
trusted library allocation
page read and write
3423000
heap
page read and write
2C23000
heap
page read and write
2F0F000
heap
page read and write
649000
heap
page read and write
26D5000
heap
page read and write
11CF000
heap
page read and write
B02000
heap
page read and write
26DA000
heap
page read and write
6C1BE000
unkown
page read and write
43F5000
heap
page read and write
1BC71DFB000
heap
page read and write
26D0000
heap
page read and write
1BC71753000
heap
page read and write
CAF000
heap
page read and write
3984000
trusted library allocation
page read and write
40EF000
stack
page read and write
D0F000
heap
page read and write
26DD000
heap
page read and write
3460000
trusted library allocation
page read and write
10BE000
stack
page read and write
2E08A140000
trusted library allocation
page read and write
26DC000
heap
page read and write
649000
heap
page read and write
1BC6DE9E000
heap
page read and write
2E08A147000
trusted library allocation
page read and write
2E088241000
heap
page read and write
655000
heap
page read and write
1BC6F4C1000
heap
page read and write
3120000
remote allocation
page read and write
26D7000
heap
page read and write
379A000
trusted library allocation
page read and write
1BC73302000
heap
page read and write
1482000
heap
page read and write
3F30000
heap
page read and write
B22000
trusted library allocation
page read and write
14A0000
heap
page read and write
1BC72ECC000
heap
page read and write
1488000
heap
page read and write
26D6000
heap
page read and write
1BC7128E000
heap
page read and write
14A1000
heap
page read and write
655000
heap
page read and write
2E08A141000
trusted library allocation
page read and write
1BC714F1000
heap
page read and write
F0F000
heap
page read and write
2E089BB0000
trusted library allocation
page read and write
EE0000
heap
page read and write
37C3000
trusted library allocation
page read and write
2E089BB0000
trusted library allocation
page read and write
1BC742D3000
heap
page read and write
26E1000
heap
page read and write
F61000
heap
page read and write
168F000
heap
page read and write
1493000
heap
page read and write
3700000
heap
page read and write
2840000
trusted library allocation
page read and write
42BE000
stack
page read and write
1BC71EA2000
heap
page read and write
6E4000
heap
page read and write
3A60000
heap
page read and write
1BC74508000
heap
page read and write
85E000
heap
page read and write
26D8000
heap
page read and write
696000
heap
page read and write
740000
heap
page read and write
1BC7259B000
heap
page read and write
2F0F000
heap
page read and write
CAC000
stack
page read and write
2E08826E000
heap
page read and write
CC0000
unkown
page read and write
1693000
heap
page read and write
88E000
heap
page read and write
30A0000
trusted library allocation
page read and write
2E088280000
heap
page read and write
2E088243000
heap
page read and write
14A7000
heap
page read and write
2E08A13D000
trusted library allocation
page read and write
1BC733C8000
heap
page read and write
1BC713B5000
heap
page read and write
3870000
trusted library allocation
page read and write
26DB000
heap
page read and write
1BC735C1000
heap
page read and write
2BEF000
heap
page read and write
1BC716FD000
heap
page read and write
649000
heap
page read and write
400000
unkown
page readonly
3938000
trusted library allocation
page read and write
1BC74634000
heap
page read and write
649000
heap
page read and write
1BC6F4C8000
heap
page read and write
35D2000
trusted library allocation
page read and write
1BC73070000
heap
page read and write
1BC73278000
heap
page read and write
B51000
unkown
page execute read
3040000
trusted library allocation
page read and write
649000
heap
page read and write
13E5E1D1000
unkown
page readonly
1675000
heap
page read and write
2E08A13C000
trusted library allocation
page read and write
3790000
heap
page read and write
3985000
trusted library allocation
page read and write
97B000
heap
page read and write
3AFC000
trusted library allocation
page read and write
1BC717B6000
heap
page read and write
386C000
stack
page read and write
1601000
heap
page read and write
56AE000
stack
page read and write
1BC72DC0000
heap
page read and write
1BC74698000
heap
page read and write
1BC7169C000
heap
page read and write
26D2000
heap
page read and write
3771000
trusted library allocation
page read and write
26D6000
heap
page read and write
26E2000
heap
page read and write
655000
heap
page read and write
1BC71C86000
heap
page read and write
2E08822E000
heap
page read and write
655000
heap
page read and write
655000
heap
page read and write
1BC6F530000
heap
page read and write
3130000
trusted library allocation
page read and write
26D2000
heap
page read and write
393D000
trusted library allocation
page read and write
26D3000
heap
page read and write
26DA000
heap
page read and write
A80000
trusted library allocation
page read and write
7FF000
stack
page read and write
1BC74440000
heap
page read and write
14A7000
heap
page read and write
514000
heap
page read and write
26DD000
heap
page read and write
30A0000
trusted library allocation
page read and write
649000
heap
page read and write
649000
heap
page read and write
26DA000
heap
page read and write
26E5000
heap
page read and write
1BC6DC41000
heap
page read and write
649000
heap
page read and write
649000
heap
page read and write
514000
heap
page read and write
37C0000
trusted library allocation
page read and write
649000
heap
page read and write
1469000
heap
page read and write
F0F000
heap
page read and write
31F2000
trusted library allocation
page read and write
649000
heap
page read and write
1BC74698000
heap
page read and write
1BC6F4F0000
heap
page read and write
16A0000
trusted library allocation
page read and write
3265000
heap
page read and write
B20000
trusted library allocation
page read and write
3370000
heap
page read and write
2F0F000
heap
page read and write
655000
heap
page read and write
691000
heap
page read and write
2E70000
heap
page read and write
64E000
heap
page read and write
940000
heap
page read and write
649000
heap
page read and write
B10000
heap
page read and write
3180000
trusted library allocation
page read and write
30D0000
heap
page read and write
2E088243000
heap
page read and write
1BC72304000
heap
page read and write
1BC6F4B0000
heap
page read and write
1BC6DB20000
heap
page read and write
1BC71847000
heap
page read and write
649000
heap
page read and write
1BC71A8D000
heap
page read and write
1BC6F521000
heap
page read and write
1BC730F6000
heap
page read and write
30A0000
trusted library allocation
page read and write
2F0F000
heap
page read and write
9EF000
stack
page read and write
13E5EA02000
unkown
page read and write
CCD000
heap
page read and write
649000
heap
page read and write
1BC6F4F5000
heap
page read and write
2E08A13B000
trusted library allocation
page read and write
3AF7000
trusted library allocation
page read and write
3740000
heap
page read and write
F36000
heap
page read and write
1BC6DCA8000
heap
page read and write
3870000
trusted library allocation
page read and write
1318000
heap
page read and write
1BC6F4EF000
heap
page read and write
655000
heap
page read and write
B00000
heap
page read and write
7FF5279D3000
unkown
page readonly
2F70000
heap
page read and write
2E08826E000
heap
page read and write
89E000
heap
page read and write
13E5E200000
unkown
page read and write
1BC716FC000
heap
page read and write
EF7000
heap
page read and write
2E08A142000
trusted library allocation
page read and write
1BC72A56000
heap
page read and write
6C111000
unkown
page execute read
422000
unkown
page read and write
3779000
trusted library allocation
page read and write
504000
heap
page read and write
1BC6FB2D000
trusted library allocation
page read and write
1BC72909000
heap
page read and write
26E4000
heap
page read and write
1BC6FB10000
heap
page read and write
14A4000
heap
page read and write
1BC6F556000
heap
page read and write
37C0000
trusted library allocation
page read and write
315E000
stack
page read and write
649000
heap
page read and write
14A0000
heap
page read and write
1BC716B8000
heap
page read and write
700000
heap
page read and write
16A0000
trusted library allocation
page read and write
649000
heap
page read and write
655000
heap
page read and write
D4A000
unkown
page write copy
D30000
heap
page read and write
345C000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
649000
heap
page read and write
504000
heap
page read and write
26E1000
heap
page read and write
26D7000
heap
page read and write
2E088243000
heap
page read and write
1BC71AD6000
heap
page read and write
2E08826F000
heap
page read and write
2E089DA0000
heap
page read and write
3949000
trusted library allocation
page read and write
1BC731B0000
heap
page read and write
26D3000
heap
page read and write
26ED000
heap
page read and write
328A000
heap
page read and write
1BC71AEE000
heap
page read and write
649000
heap
page read and write
3870000
trusted library allocation
page read and write
504000
heap
page read and write
30DD000
heap
page read and write
26DB000
heap
page read and write
740000
heap
page read and write
26D2000
heap
page read and write
26D0000
heap
page read and write
3130000
trusted library allocation
page read and write
1BC72AC0000
heap
page read and write
655000
heap
page read and write
2E89000
trusted library allocation
page read and write
649000
heap
page read and write
1BC6DC03000
heap
page read and write
1BC74336000
heap
page read and write
26E6000
heap
page read and write
649000
heap
page read and write
13E5E120000
unkown
page readonly
3669000
trusted library allocation
page read and write
26DA000
heap
page read and write
1BC73A91000
heap
page read and write
1BC6F4DD000
heap
page read and write
1BC73118000
heap
page read and write
9EA000
heap
page read and write
30A0000
trusted library allocation
page read and write
1BC72C82000
heap
page read and write
26E4000
heap
page read and write
1BC715E6000
heap
page read and write
1BC714D2000
heap
page read and write
38FA000
trusted library allocation
page read and write
26E5000
heap
page read and write
26EB000
heap
page read and write
2870000
heap
page read and write
3F40000
heap
page read and write
37B4000
trusted library allocation
page read and write
26CF000
stack
page read and write
1BC6DC2B000
heap
page read and write
2E08A13F000
trusted library allocation
page read and write
364E000
stack
page read and write
1491000
heap
page read and write
2E08826F000
heap
page read and write
1BC72348000
heap
page read and write
1BC73859000
heap
page read and write
1BC715E2000
heap
page read and write
26D1000
heap
page read and write
1BC74358000
heap
page read and write
1BC72F01000
heap
page read and write
1BC72310000
heap
page read and write
C20000
heap
page read and write
3171000
heap
page read and write
26D1000
heap
page read and write
655000
heap
page read and write
35A0000
trusted library allocation
page read and write
2E08A140000
trusted library allocation
page read and write
398A000
trusted library allocation
page read and write
70A000
heap
page read and write
1482000
heap
page read and write
26D3000
heap
page read and write
3130000
trusted library allocation
page read and write
62E000
heap
page read and write
5A8F000
heap
page read and write
830000
heap
page read and write
2754000
heap
page read and write
649000
heap
page read and write
2E08A14C000
trusted library allocation
page read and write
422000
unkown
page read and write
655000
heap
page read and write
1BC739DB000
heap
page read and write
649000
heap
page read and write
26D6000
heap
page read and write
26D5000
heap
page read and write
2E089BB0000
trusted library allocation
page read and write
13E5E22B000
unkown
page read and write
13E5E1A0000
unkown
page readonly
14A0000
heap
page read and write
AF0000
heap
page read and write
379B000
trusted library allocation
page read and write
AC0000
heap
page read and write
2E08A13E000
trusted library allocation
page read and write
1BC743FE000
heap
page read and write
649000
heap
page read and write
6C751000
unkown
page readonly
26D5000
heap
page read and write
3948000
trusted library allocation
page read and write
649000
heap
page read and write
2E08A142000
trusted library allocation
page read and write
649000
heap
page read and write
2E08A144000
trusted library allocation
page read and write
1BC72634000
heap
page read and write
A00000
unkown
page readonly
26DE000
heap
page read and write
1BC712C8000
heap
page read and write
1473000
heap
page read and write
3944000
trusted library allocation
page read and write
649000
heap
page read and write
1BC712B7000
heap
page read and write
3610000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
132F000
heap
page read and write
30A0000
trusted library allocation
page read and write
1BC742F4000
heap
page read and write
407000
unkown
page readonly
345B000
trusted library allocation
page read and write
B10000
heap
page read and write
26D1000
heap
page read and write
2E088241000
heap
page read and write
16A0000
trusted library allocation
page read and write
649000
heap
page read and write
649000
heap
page read and write
3914000
trusted library allocation
page read and write
37B2000
trusted library allocation
page read and write
649000
heap
page read and write
13E5E213000
unkown
page read and write
97A000
heap
page read and write
13E5E120000
unkown
page readonly
429000
unkown
page read and write
215E000
stack
page read and write
26DE000
heap
page read and write
132F000
heap
page read and write
33CB000
trusted library allocation
page read and write
2E08A13B000
trusted library allocation
page read and write
CBF000
heap
page read and write
1BC72997000
heap
page read and write
1BC72DE3000
heap
page read and write
1BC72DC0000
heap
page read and write
ABD000
stack
page read and write
655000
heap
page read and write
655000
heap
page read and write
26E0000
heap
page read and write
504000
heap
page read and write
1BC6FB25000
trusted library allocation
page read and write
1BC71990000
heap
page read and write
3206000
trusted library allocation
page read and write
655000
heap
page read and write
26D7000
heap
page read and write
504000
heap
page read and write
1BC7140D000
heap
page read and write
1640000
heap
page read and write
649000
heap
page read and write
1BC72C1E000
heap
page read and write
1BC71553000
heap
page read and write
11E0000
heap
page read and write
2BF8000
heap
page read and write
3202000
trusted library allocation
page read and write
1BC6F55E000
heap
page read and write
655000
heap
page read and write
8AE000
heap
page read and write
2E08A13C000
trusted library allocation
page read and write
655000
heap
page read and write
1BC6F4E9000
heap
page read and write
2E089BB0000
trusted library allocation
page read and write
2E70000
heap
page read and write
30A0000
trusted library allocation
page read and write
1BC712BA000
heap
page read and write
26EE000
heap
page read and write
1BC6DC41000
heap
page read and write
13E5E22B000
unkown
page read and write
1BC72C40000
heap
page read and write
2E08A140000
trusted library allocation
page read and write
26D4000
heap
page read and write
26D4000
heap
page read and write
BA5000
unkown
page readonly
504000
heap
page read and write
660000
heap
page read and write
CC6000
heap
page read and write
504000
heap
page read and write
649000
heap
page read and write
1BC7458E000
heap
page read and write
B00000
heap
page read and write
B51000
unkown
page execute read
1BC724D0000
heap
page read and write
1BC72870000
heap
page read and write
31F5000
trusted library allocation
page read and write
3450000
heap
page read and write
975000
heap
page read and write
DBE000
stack
page read and write
3450000
heap
page read and write
1BC717DD000
heap
page read and write
1BC71AE0000
heap
page read and write
16B0000
trusted library allocation
page read and write
1BC71886000
heap
page read and write
26EC000
heap
page read and write
1BC72081000
heap
page read and write
1664000
heap
page read and write
37C6000
trusted library allocation
page read and write
EFF000
heap
page read and write
2E08826E000
heap
page read and write
2E08A14D000
trusted library allocation
page read and write
26DC000
heap
page read and write
2E08A144000
trusted library allocation
page read and write
1BC72FA8000
heap
page read and write
CCD000
heap
page read and write
368B000
stack
page read and write
655000
heap
page read and write
1BC6F4DC000
heap
page read and write
3C90000
trusted library allocation
page read and write
1330000
heap
page read and write
5D0000
heap
page read and write
C26000
heap
page read and write
34121BE000
unkown
page readonly
649000
heap
page read and write
26D9000
heap
page read and write
6AC000
heap
page read and write
649000
heap
page read and write
8FF000
heap
page read and write
84E000
heap
page read and write
1D0000
unkown
page readonly
26E5000
heap
page read and write
2E088280000
heap
page read and write
3230000
heap
page read and write
3777000
trusted library allocation
page read and write
2E08A143000
trusted library allocation
page read and write
1BC6DC2D000
heap
page read and write
1BC6FB21000
trusted library allocation
page read and write
26DB000
heap
page read and write
1BC7148B000
heap
page read and write
391D000
trusted library allocation
page read and write
26DA000
heap
page read and write
649000
heap
page read and write
C6F000
heap
page read and write
1BC6DC01000
heap
page read and write
26D3000
heap
page read and write
1BC72531000
heap
page read and write
2E70000
heap
page read and write
1BC713B3000
heap
page read and write
1313000
heap
page read and write
655000
heap
page read and write
1BC7257C000
heap
page read and write
1488000
heap
page read and write
1BC72563000
heap
page read and write
7FF527984000
unkown
page readonly
DC000
stack
page read and write
2E08A146000
trusted library allocation
page read and write
14A7000
heap
page read and write
2E08A140000
trusted library allocation
page read and write
2E08A13B000
trusted library allocation
page read and write
1BC742F4000
heap
page read and write
649000
heap
page read and write
2E08A13B000
trusted library allocation
page read and write
38FE000
stack
page read and write
3664000
trusted library allocation
page read and write
1BC723C0000
trusted library allocation
page read and write
26EC000
heap
page read and write
1BC72328000
heap
page read and write
649000
heap
page read and write
7FF5279A4000
unkown
page readonly
E3A000
unkown
page read and write
2E08A142000
trusted library allocation
page read and write
1491000
heap
page read and write
A0E000
stack
page read and write
F0F000
heap
page read and write
7FF5279BA000
unkown
page readonly
1BC74440000
heap
page read and write
655000
heap
page read and write
EFF000
heap
page read and write
649000
heap
page read and write
31B0000
unkown
page read and write
1BC6F576000
heap
page read and write
2F0F000
heap
page read and write
2F0F000
heap
page read and write
26E8000
heap
page read and write
36BB000
stack
page read and write
1BC72818000
heap
page read and write
1BC722B6000
heap
page read and write
655000
heap
page read and write
D10000
heap
page read and write
324E000
stack
page read and write
B80000
heap
page read and write
147A000
heap
page read and write
496E000
stack
page read and write
3795000
trusted library allocation
page read and write
649000
heap
page read and write
26D2000
heap
page read and write
1BC6DC32000
heap
page read and write
13E5E202000
unkown
page read and write
26DD000
heap
page read and write
CAF000
heap
page read and write
1BC729B8000
heap
page read and write
3B00000
trusted library allocation
page read and write
1420000
heap
page read and write
DB0000
heap
page read and write
26D3000
heap
page read and write
26D4000
heap
page read and write
3AF0000
trusted library allocation
page read and write
655000
heap
page read and write
3760000
heap
page read and write
CC6000
heap
page read and write
30A0000
trusted library allocation
page read and write
35C6000
trusted library allocation
page read and write
1BC6DBF5000
heap
page read and write
655000
heap
page read and write
31B0000
heap
page read and write
144D000
heap
page read and write
F9D000
heap
page read and write
655000
heap
page read and write
45A0000
heap
page read and write
1BC71EA2000
heap
page read and write
1BC6F57B000
heap
page read and write
26DE000
heap
page read and write
B10000
heap
page read and write
1BC7168B000
heap
page read and write
649000
heap
page read and write
1F6DAFE000
stack
page read and write
30FF000
stack
page read and write
3208000
trusted library allocation
page read and write
33C4000
trusted library allocation
page read and write
1BC72360000
heap
page read and write
1DE000
stack
page read and write
26E2000
heap
page read and write
2E80000
trusted library allocation
page read and write
1BC71CF2000
heap
page read and write
3870000
trusted library allocation
page read and write
649000
heap
page read and write
2B60000
heap
page read and write
37BF000
trusted library allocation
page read and write
3900000
heap
page read and write
2E088241000
heap
page read and write
1BC716BB000
heap
page read and write
1BC6DE40000
trusted library allocation
page read and write
14A0000
heap
page read and write
21B000
unkown
page readonly
1BC712E7000
heap
page read and write
649000
heap
page read and write
913000
heap
page read and write
1BC7302F000
heap
page read and write
655000
heap
page read and write
26D8000
heap
page read and write
16B0000
trusted library allocation
page read and write
16A0000
heap
page read and write
2E088241000
heap
page read and write
2FC0000
trusted library allocation
page read and write
1BC6DC43000
heap
page read and write
1BC724C0000
heap
page read and write
26DE000
heap
page read and write
2E08A13E000
trusted library allocation
page read and write
CBF000
heap
page read and write
B4E000
stack
page read and write
649000
heap
page read and write
1BC718AB000
heap
page read and write
2E08A13A000
trusted library allocation
page read and write
3203000
trusted library allocation
page read and write
655000
heap
page read and write
3120000
heap
page read and write
3665000
trusted library allocation
page read and write
1BC6F4F9000
heap
page read and write
1BC6FB3C000
trusted library allocation
page read and write
655000
heap
page read and write
37C0000
trusted library allocation
page read and write
27D4000
heap
page read and write
1BC6DE44000
trusted library allocation
page read and write
379B000
trusted library allocation
page read and write
655000
heap
page read and write
40BF000
stack
page read and write
28A0000
heap
page read and write
219E000
stack
page read and write
1BC712A7000
heap
page read and write
33E0000
heap
page read and write
1BC6FB39000
trusted library allocation
page read and write
35CB000
trusted library allocation
page read and write
26ED000
heap
page read and write
600000
heap
page read and write
1BC71FF2000
heap
page read and write
649000
heap
page read and write
CAF000
heap
page read and write
CFA000
heap
page read and write
1BC71280000
heap
page read and write
542E000
stack
page read and write
265F000
stack
page read and write
1684000
heap
page read and write
1BC71B45000
heap
page read and write
1BC71377000
heap
page read and write
AE0000
heap
page read and write
26D2000
heap
page read and write
649000
heap
page read and write
33C1000
trusted library allocation
page read and write
649000
heap
page read and write
1BC6DC03000
heap
page read and write
1BC6DBD2000
heap
page read and write
1BC71CBF000
heap
page read and write
F75000
unkown
page readonly
2E089BB4000
trusted library allocation
page read and write
ADB000
heap
page read and write
5CE000
stack
page read and write
1BC7207E000
heap
page read and write
1331000
heap
page read and write
35C0000
heap
page read and write
600000
heap
page read and write
41BE000
stack
page read and write
31F4000
trusted library allocation
page read and write
1BC7329A000
heap
page read and write
2E08A145000
trusted library allocation
page read and write
1488000
heap
page read and write
3080000
trusted library allocation
page read and write
1BC729B8000
heap
page read and write
1F6D87E000
stack
page read and write
45FC000
stack
page read and write
3172000
heap
page read and write
1BC743FE000
heap
page read and write
655000
heap
page read and write
407000
unkown
page readonly
1BC71D34000
heap
page read and write
655000
heap
page read and write
655000
heap
page read and write
CB7000
heap
page read and write
2E088236000
heap
page read and write
44F8000
heap
page read and write
1BC71FF2000
heap
page read and write
1D1000
unkown
page execute read
30A0000
trusted library allocation
page read and write
1BC71864000
heap
page read and write
F85000
heap
page read and write
1BC6DC49000
heap
page read and write
C4F000
heap
page read and write
1471000
heap
page read and write
1BC70C0F000
heap
page read and write
1BC7136F000
heap
page read and write
2E08826D000
heap
page read and write
1BC6F7E0000
heap
page read and write
1BC72C1E000
heap
page read and write
26E1000
heap
page read and write
1BC725FD000
heap
page read and write
1482000
heap
page read and write
649000
heap
page read and write
16A0000
trusted library allocation
page read and write
3934000
trusted library allocation
page read and write
1BC73668000
heap
page read and write
2E08A13E000
trusted library allocation
page read and write
1BC71760000
heap
page read and write
3740000
trusted library allocation
page read and write
1BC6F670000
heap
page read and write
1482000
heap
page read and write
655000
heap
page read and write
1BC6DC3A000
heap
page read and write
CA0000
heap
page read and write
2E088243000
heap
page read and write
2E08A145000
trusted library allocation
page read and write
1670000
heap
page read and write
33C8000
trusted library allocation
page read and write
649000
heap
page read and write
2E08A13D000
trusted library allocation
page read and write
2E089BB0000
trusted library allocation
page read and write
2E088280000
heap
page read and write
736000
heap
page read and write
1486000
heap
page read and write
1BC74462000
heap
page read and write
37DE000
stack
page read and write
3417000
trusted library allocation
page read and write
1BC71844000
heap
page read and write
11C8000
heap
page read and write
1BC71752000
heap
page read and write
2E089BB4000
trusted library allocation
page read and write
B50000
unkown
page readonly
655000
heap
page read and write
CB6000
heap
page read and write
655000
heap
page read and write
1BC7232D000
heap
page read and write
C94000
heap
page read and write
8CE000
stack
page read and write
2E088236000
heap
page read and write
3AF9000
trusted library allocation
page read and write
1BC719FC000
heap
page read and write
A5C000
stack
page read and write
649000
heap
page read and write
26D1000
heap
page read and write
1BC6F4C7000
heap
page read and write
3DF0000
heap
page read and write
655000
heap
page read and write
26DE000
heap
page read and write
1BC7207C000
heap
page read and write
26D6000
heap
page read and write
1BC7207E000
heap
page read and write
26D6000
heap
page read and write
1BC7292A000
heap
page read and write
649000
heap
page read and write
19A000
stack
page read and write
1BC734C4000
heap
page read and write
6B3000
heap
page read and write
30A0000
trusted library allocation
page read and write
132F000
heap
page read and write
610000
heap
page read and write
2E08A146000
trusted library allocation
page read and write
23A000
unkown
page write copy
1BC72084000
heap
page read and write
649000
heap
page read and write
39FF000
stack
page read and write
35D9000
trusted library allocation
page read and write
16D5000
heap
page read and write
1BC6FB34000
trusted library allocation
page read and write
31D0000
heap
page read and write
3870000
trusted library allocation
page read and write
33D4000
trusted library allocation
page read and write
504000
heap
page read and write
1BC6DC3F000
heap
page read and write
3400000
heap
page read and write
1BC71B8F000
heap
page read and write
692000
heap
page read and write
655000
heap
page read and write
2E08A143000
trusted library allocation
page read and write
26D6000
heap
page read and write
26ED000
heap
page read and write
87A000
stack
page read and write
2E08826D000
heap
page read and write
AE4000
heap
page read and write
16A0000
trusted library allocation
page read and write
1BC7458E000
heap
page read and write
26DB000
heap
page read and write
1BC71549000
heap
page read and write
26D8000
heap
page read and write
2E08A146000
trusted library allocation
page read and write
1BC75260000
trusted library allocation
page read and write
26D1000
heap
page read and write
2E08A14B000
trusted library allocation
page read and write
1BC6DC38000
heap
page read and write
1473000
heap
page read and write
649000
heap
page read and write
EC0000
heap
page read and write
2E088243000
heap
page read and write
26D9000
heap
page read and write
1471000
heap
page read and write
1BC71AE4000
heap
page read and write
14CD000
heap
page read and write
2E088243000
heap
page read and write
160F000
heap
page read and write
31F7000
trusted library allocation
page read and write
13C6000
heap
page read and write
37C2000
trusted library allocation
page read and write
655000
heap
page read and write
655000
heap
page read and write
5A7E000
stack
page read and write
45A4000
heap
page read and write
26D9000
heap
page read and write
3459000
trusted library allocation
page read and write
1BC7175F000
heap
page read and write
5A8F000
heap
page read and write
16A0000
trusted library allocation
page read and write
33C3000
trusted library allocation
page read and write
1BC6DC38000
heap
page read and write
2E08A145000
trusted library allocation
page read and write
1482000
heap
page read and write
3452000
trusted library allocation
page read and write
26E8000
heap
page read and write
1BC7386C000
heap
page read and write
26D5000
heap
page read and write
31FC000
trusted library allocation
page read and write
26D3000
heap
page read and write
6D7000
heap
page read and write
3789000
trusted library allocation
page read and write
43EF000
stack
page read and write
26D0000
heap
page read and write
2F0F000
heap
page read and write
101E000
unkown
page readonly
31FD000
trusted library allocation
page read and write
1BC74290000
heap
page read and write
1BC6DC03000
heap
page read and write
26D7000
heap
page read and write
26D1000
heap
page read and write
26D8000
heap
page read and write
3370000
heap
page read and write
1482000
heap
page read and write
2E08A144000
trusted library allocation
page read and write
C96000
heap
page read and write
3455000
trusted library allocation
page read and write
EB0000
heap
page read and write
649000
heap
page read and write
1BC72B46000
heap
page read and write
1BC712C0000
heap
page read and write
649000
heap
page read and write
8D2000
heap
page read and write
2E08A141000
trusted library allocation
page read and write
88F000
heap
page read and write
1BC717BB000
heap
page read and write
767000
heap
page read and write
3160000
heap
page read and write
1675000
heap
page read and write
1BC6DC2B000
heap
page read and write
1F6D8FE000
stack
page read and write
26EE000
heap
page read and write
1BC6DC03000
heap
page read and write
2E08822D000
heap
page read and write
2E088280000
heap
page read and write
2E08826D000
heap
page read and write
1BC6DC2B000
heap
page read and write
394E000
trusted library allocation
page read and write
26D2000
heap
page read and write
9B000
stack
page read and write
1BC6F576000
heap
page read and write
649000
heap
page read and write
1BC7234C000
heap
page read and write
36A0000
heap
page read and write
1BC72D28000
heap
page read and write
1BC713FB000
heap
page read and write
C50000
trusted library allocation
page read and write
CE1000
unkown
page execute read
26D3000
heap
page read and write
1F6DA7E000
stack
page read and write
1BC6DC01000
heap
page read and write
34125FE000
unkown
page readonly
26DC000
heap
page read and write
1BC73817000
heap
page read and write
649000
heap
page read and write
26D1000
heap
page read and write
3171000
heap
page read and write
1BC732C1000
heap
page read and write
1BC717A2000
heap
page read and write
26D6000
heap
page read and write
1331000
heap
page read and write
B02000
heap
page read and write
1BC6FB24000
trusted library allocation
page read and write
7FF5279A8000
unkown
page readonly
38F0000
trusted library allocation
page read and write
514000
heap
page read and write
26DB000
heap
page read and write
655000
heap
page read and write
980000
heap
page read and write
2B50000
heap
page read and write
556E000
stack
page read and write
2E08A141000
trusted library allocation
page read and write
AFB000
stack
page read and write
3915000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
1BC72954000
heap
page read and write
140000
heap
page read and write
26D4000
heap
page read and write
16C0000
heap
page read and write
1BC71491000
heap
page read and write
F21000
unkown
page execute read
1BC71926000
heap
page read and write
14A0000
heap
page read and write
655000
heap
page read and write
30A0000
trusted library allocation
page read and write
2F0F000
heap
page read and write
8E0000
heap
page read and write
26E6000
heap
page read and write
649000
heap
page read and write
16B0000
trusted library allocation
page read and write
650000
heap
page read and write
3350000
heap
page read and write
514000
heap
page read and write
26D2000
heap
page read and write
3130000
heap
page read and write
26D6000
heap
page read and write
DA0000
heap
page read and write
398C000
trusted library allocation
page read and write
35E0000
trusted library allocation
page read and write
649000
heap
page read and write
649000
heap
page read and write
26DC000
heap
page read and write
945000
heap
page read and write
26DC000
heap
page read and write
3A02000
heap
page read and write
1BC71286000
heap
page read and write
1488000
heap
page read and write
649000
heap
page read and write
2E08A13C000
trusted library allocation
page read and write
649000
heap
page read and write
26D2000
heap
page read and write
649000
heap
page read and write
61E000
heap
page read and write
1492000
heap
page read and write
1BC6DCA8000
heap
page read and write
1BC7316C000
heap
page read and write
1BC6DC42000
heap
page read and write
655000
heap
page read and write
1BC6DC3C000
heap
page read and write
26D1000
heap
page read and write
1681000
heap
page read and write
65A000
heap
page read and write
7F0000
heap
page read and write
3D7B000
stack
page read and write
655000
heap
page read and write
2E08A141000
trusted library allocation
page read and write
26D2000
heap
page read and write
26DE000
heap
page read and write
26D4000
heap
page read and write
649000
heap
page read and write
504000
heap
page read and write
B50000
unkown
page readonly
26D7000
heap
page read and write
2E08A13C000
trusted library allocation
page read and write
132F000
heap
page read and write
649000
heap
page read and write
2960000
heap
page read and write
2E08A13A000
trusted library allocation
page read and write
26D4000
heap
page read and write
3988000
trusted library allocation
page read and write
736000
heap
page read and write
D06000
heap
page read and write
D4E000
unkown
page readonly
2E088241000
heap
page read and write
328A000
heap
page read and write
31FA000
trusted library allocation
page read and write
2A40000
heap
page read and write
1BC6F59B000
heap
page read and write
1BC72350000
heap
page read and write
3F3E000
stack
page read and write
1BC71551000
heap
page read and write
32C0000
heap
page read and write
1BC716A8000
heap
page read and write
649000
heap
page read and write
8CE000
stack
page read and write
C90000
heap
page read and write
E60000
trusted library allocation
page read and write
767000
heap
page read and write
37CC000
trusted library allocation
page read and write
2E08A13F000
trusted library allocation
page read and write
37C4000
trusted library allocation
page read and write
3DF6000
heap
page read and write
407000
unkown
page readonly
8EF000
heap
page read and write
655000
heap
page read and write
11E0000
heap
page read and write
15F2000
heap
page read and write
655000
heap
page read and write
2E08A143000
trusted library allocation
page read and write
740000
heap
page read and write
7FF527999000
unkown
page readonly
1473000
heap
page read and write
2E08826E000
heap
page read and write
83C000
stack
page read and write
3030000
heap
page read and write
655000
heap
page read and write
26D9000
heap
page read and write
649000
heap
page read and write
655000
heap
page read and write
34126FE000
stack
page read and write
2E08A13B000
trusted library allocation
page read and write
1482000
heap
page read and write
3460000
trusted library section
page read and write
23A000
unkown
page read and write
26D2000
heap
page read and write
14F0000
heap
page read and write
2E8C000
trusted library allocation
page read and write
38F5000
trusted library allocation
page read and write
26D0000
heap
page read and write
1478000
heap
page read and write
1BC6DC5C000
heap
page read and write
14A4000
heap
page read and write
341213B000
stack
page read and write
16A0000
trusted library allocation
page read and write
3350000
heap
page read and write
50F000
stack
page read and write
504000
heap
page read and write
15B0000
heap
page read and write
26D0000
heap
page read and write
3778000
trusted library allocation
page read and write
26D4000
heap
page read and write
6E4000
heap
page read and write
655000
heap
page read and write
1BC72AB0000
heap
page read and write
3451000
trusted library allocation
page read and write
8FF000
heap
page read and write
A01000
unkown
page execute read
504000
heap
page read and write
1BC71886000
heap
page read and write
26DE000
heap
page read and write
643000
heap
page read and write
3D3C000
stack
page read and write
87E000
heap
page read and write
26D8000
heap
page read and write
1BC6DBDB000
heap
page read and write
CAF000
heap
page read and write
48E000
stack
page read and write
655000
heap
page read and write
3490000
heap
page read and write
26F7000
heap
page read and write
26D5000
heap
page read and write
26DE000
heap
page read and write
26E9000
heap
page read and write
2E088243000
heap
page read and write
1BC71AFF000
heap
page read and write
1BC6F4E9000
heap
page read and write
504000
heap
page read and write
391A000
trusted library allocation
page read and write
1BC72AE2000
heap
page read and write
655000
heap
page read and write
1BC6FB3E000
trusted library allocation
page read and write
2E08A13E000
trusted library allocation
page read and write
37B9000
trusted library allocation
page read and write
2E088236000
heap
page read and write
26DC000
heap
page read and write
649000
heap
page read and write
26DB000
heap
page read and write
26D5000
heap
page read and write
655000
heap
page read and write
26E3000
heap
page read and write
1BC729EA000
heap
page read and write
1BC7284F000
heap
page read and write
325F000
stack
page read and write
B50000
unkown
page readonly
2708000
heap
page read and write
26DA000
heap
page read and write
1BC71760000
heap
page read and write
E80000
heap
page read and write
1BC722C8000
heap
page read and write
3FE000
stack
page read and write
1BC6DE44000
trusted library allocation
page read and write
26D7000
heap
page read and write
89B000
heap
page read and write
655000
heap
page read and write
26D0000
heap
page read and write
3AFD000
trusted library allocation
page read and write
42C000
unkown
page readonly
1BC71534000
heap
page read and write
482F000
stack
page read and write
448E000
stack
page read and write
1BC71AD7000
heap
page read and write
26E4000
heap
page read and write
65F000
heap
page read and write
DD0000
unkown
page readonly
132F000
heap
page read and write
C40000
heap
page read and write
26CE000
stack
page read and write
26EA000
heap
page read and write
16A0000
trusted library allocation
page read and write
133F000
heap
page read and write
26DA000
heap
page read and write
F30000
heap
page read and write
133F000
heap
page read and write
2F0F000
heap
page read and write
26D2000
heap
page read and write
14A0000
heap
page read and write
1BC72D5C000
heap
page read and write
649000
heap
page read and write
877000
heap
page read and write
3870000
trusted library allocation
page read and write
341213B000
stack
page read and write
2194000
heap
page read and write
1488000
heap
page read and write
11A0000
heap
page read and write
3300000
heap
page read and write
F01000
heap
page read and write
26D6000
heap
page read and write
504000
heap
page read and write
1BC72A2C000
heap
page read and write
35F0000
trusted library allocation
page read and write
8D8000
heap
page read and write
148F000
heap
page read and write
2E08A141000
trusted library allocation
page read and write
341A000
trusted library allocation
page read and write
649000
heap
page read and write
504000
heap
page read and write
1BC72C82000
heap
page read and write
6C731000
unkown
page execute read
1BC72A2C000
heap
page read and write
2C4C000
heap
page read and write
26D8000
heap
page read and write
8D8000
heap
page read and write
3772000
trusted library allocation
page read and write
1493000
heap
page read and write
26DE000
heap
page read and write
2E088241000
heap
page read and write
504000
heap
page read and write
3360000
heap
page read and write
2844000
trusted library allocation
page read and write
649000
heap
page read and write
813000
heap
page read and write
655000
heap
page read and write
1BC7456D000
heap
page read and write
11DE000
heap
page read and write
3940000
trusted library allocation
page read and write
1BC6F4E8000
heap
page read and write
37A0000
trusted library allocation
page read and write
8D4000
heap
page read and write
649000
heap
page read and write
649000
heap
page read and write
1BC7357E000
heap
page read and write
38F3000
trusted library allocation
page read and write
649000
heap
page read and write
F69000
heap
page read and write
26E1000
heap
page read and write
CBF000
heap
page read and write
26DE000
heap
page read and write
649000
heap
page read and write
7BE000
stack
page read and write
3A0B000
heap
page read and write
1BC72E68000
heap
page read and write
483F000
stack
page read and write
26D4000
heap
page read and write
655000
heap
page read and write
26D3000
heap
page read and write
CAF000
heap
page read and write
15F2000
heap
page read and write
30D0000
heap
page read and write
50F9000
stack
page read and write
23E000
unkown
page readonly
10000000
unkown
page readonly
649000
heap
page read and write
3790000
trusted library allocation
page read and write
26D5000
heap
page read and write
1F0000
heap
page read and write
655000
heap
page read and write
13E5E861000
unkown
page readonly
393B000
trusted library allocation
page read and write
D00000
heap
page read and write
655000
heap
page read and write
6C1BF000
unkown
page write copy
2E089BB0000
trusted library allocation
page read and write
1BC728B2000
heap
page read and write
14A0000
heap
page read and write
377C000
trusted library allocation
page read and write
378C000
trusted library allocation
page read and write
35DB000
trusted library allocation
page read and write
26D5000
heap
page read and write
1BC7316C000
heap
page read and write
33C0000
heap
page read and write
2E088251000
heap
page read and write
1BC6F586000
heap
page read and write
38F7000
trusted library allocation
page read and write
84E000
heap
page read and write
3160000
heap
page read and write
65A000
heap
page read and write
2E08A148000
trusted library allocation
page read and write
649000
heap
page read and write
649000
heap
page read and write
649000
heap
page read and write
504000
heap
page read and write
CBF000
heap
page read and write
504000
heap
page read and write
2E088243000
heap
page read and write
649000
heap
page read and write
2E08A120000
heap
page read and write
1BC735C0000
heap
page read and write
1BC74336000
heap
page read and write
1BC72774000
heap
page read and write
1BC72F23000
heap
page read and write
3740000
trusted library allocation
page read and write
1336000
heap
page read and write
2E08A13A000
trusted library allocation
page read and write
504000
heap
page read and write
2E08A13A000
trusted library allocation
page read and write
35D1000
trusted library allocation
page read and write
1BC72318000
heap
page read and write
3740000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
3E3F000
stack
page read and write
1329000
heap
page read and write
3740000
trusted library allocation
page read and write
5A0C000
stack
page read and write
26D4000
heap
page read and write
3AF3000
trusted library allocation
page read and write
34127FE000
unkown
page readonly
2E08A142000
trusted library allocation
page read and write
65F000
heap
page read and write
3450000
heap
page read and write
6CC000
heap
page read and write
273E000
stack
page read and write
CE0000
unkown
page readonly
16C0000
heap
page read and write
1BC7142F000
heap
page read and write
D23000
heap
page read and write
3AFA000
trusted library allocation
page read and write
649000
heap
page read and write
3420000
heap
page read and write
D80000
heap
page read and write
655000
heap
page read and write
2FCD000
stack
page read and write
1BC716A1000
heap
page read and write
CAF000
heap
page read and write
1BC71290000
heap
page read and write
1BC72A56000
heap
page read and write
1BC6DC45000
heap
page read and write
7FF5279C4000
unkown
page readonly
2E088280000
heap
page read and write
2E089BB0000
trusted library allocation
page read and write
1BC7452A000
heap
page read and write
26E7000
heap
page read and write
649000
heap
page read and write
3939000
trusted library allocation
page read and write
2E088236000
heap
page read and write
2E088241000
heap
page read and write
655000
heap
page read and write
1BC7132B000
heap
page read and write
30A0000
trusted library allocation
page read and write
1BC6DC2D000
heap
page read and write
649000
heap
page read and write
649000
heap
page read and write
5A8F000
heap
page read and write
3720000
heap
page read and write
35E1000
trusted library allocation
page read and write
1BC72AB8000
heap
page read and write
33C2000
trusted library allocation
page read and write
1688000
heap
page read and write
3970000
heap
page read and write
3945000
trusted library allocation
page read and write
655000
heap
page read and write
649000
heap
page read and write
1BC722F8000
heap
page read and write
2020000
heap
page read and write
504000
heap
page read and write
26D2000
heap
page read and write
31F9000
trusted library allocation
page read and write
366A000
trusted library allocation
page read and write
1BC6FB3F000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
14A7000
heap
page read and write
1BC6F4C7000
heap
page read and write
30A0000
trusted library allocation
page read and write
649000
heap
page read and write
3209000
trusted library allocation
page read and write
8D8000
heap
page read and write
655000
heap
page read and write
2E08A13D000
trusted library allocation
page read and write
649000
heap
page read and write
649000
heap
page read and write
655000
heap
page read and write
1BC6DC87000
heap
page read and write
1BC71408000
heap
page read and write
F94000
heap
page read and write
33CD000
trusted library allocation
page read and write
1BC7278C000
heap
page read and write
2DC0000
heap
page read and write
3760000
heap
page read and write
649000
heap
page read and write
1D0000
unkown
page readonly
B0E000
stack
page read and write
26DE000
heap
page read and write
3458000
trusted library allocation
page read and write
379D000
trusted library allocation
page read and write
6D7000
heap
page read and write
2E08A13A000
trusted library allocation
page read and write
3330000
heap
page read and write
134A000
heap
page read and write
E90000
heap
page read and write
26D7000
heap
page read and write
2860000
heap
page read and write
409000
unkown
page read and write
649000
heap
page read and write
35CE000
trusted library allocation
page read and write
8E1000
heap
page read and write
1488000
heap
page read and write
26DE000
heap
page read and write
1D0000
unkown
page readonly
1BC716FC000
heap
page read and write
649000
heap
page read and write
61A000
heap
page read and write
1BC71695000
heap
page read and write
13E5E130000
unkown
page readonly
1BC6DC01000
heap
page read and write
2F0F000
heap
page read and write
366B000
trusted library allocation
page read and write
8EF000
heap
page read and write
2F4E000
stack
page read and write
A0A000
unkown
page readonly
504000
heap
page read and write
3320000
heap
page read and write
BA0000
unkown
page read and write
1BC71380000
heap
page read and write
1BC72D4A000
heap
page read and write
35D7000
trusted library allocation
page read and write
26D7000
heap
page read and write
26D4000
heap
page read and write
1488000
heap
page read and write
1632000
heap
page read and write
1BC717B3000
heap
page read and write
649000
heap
page read and write
1BC7165C000
heap
page read and write
30A0000
trusted library allocation
page read and write
1BC6DBF5000
heap
page read and write
26DA000
heap
page read and write
194000
heap
page read and write
649000
heap
page read and write
AF0000
heap
page read and write
26D4000
heap
page read and write
2F30000
heap
page read and write
CB1000
heap
page read and write
649000
heap
page read and write
655000
heap
page read and write
1BC72080000
heap
page read and write
1482000
heap
page read and write
2E08A149000
trusted library allocation
page read and write
3FEF000
stack
page read and write
26DE000
heap
page read and write
1BC71A91000
heap
page read and write
655000
heap
page read and write
1BC6DBF4000
heap
page read and write
3782000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
3799000
trusted library allocation
page read and write
3480000
trusted library section
page read and write
655000
heap
page read and write
7FF52799E000
unkown
page readonly
30A0000
trusted library allocation
page read and write
7FF5279F7000
unkown
page readonly
3270000
heap
page read and write
453B000
stack
page read and write
655000
heap
page read and write
BE1000
unkown
page execute read
2ED0000
heap
page read and write
3911000
trusted library allocation
page read and write
2C70000
heap
page read and write
2E088236000
heap
page read and write
2E089BB4000
trusted library allocation
page read and write
1BC7259D000
heap
page read and write
1BC6F4CE000
heap
page read and write
35C9000
trusted library allocation
page read and write
26D0000
heap
page read and write
1BC71752000
heap
page read and write
409000
unkown
page write copy
391B000
trusted library allocation
page read and write
1BC712DB000
heap
page read and write
46FE000
stack
page read and write
B10000
heap
page read and write
649000
heap
page read and write
3130000
heap
page read and write
1BC71E0C000
heap
page read and write
2F0F000
heap
page read and write
16A0000
trusted library allocation
page read and write
D0A000
heap
page read and write
3AF1000
trusted library allocation
page read and write
26D4000
heap
page read and write
AFD000
stack
page read and write
3120000
remote allocation
page read and write
44FA000
heap
page read and write
1BC71604000
heap
page read and write
35E4000
trusted library allocation
page read and write
1BC71CE1000
heap
page read and write
3AF2000
trusted library allocation
page read and write
649000
heap
page read and write
7FF5279A8000
unkown
page readonly
3774000
trusted library allocation
page read and write
1BC73A0D000
heap
page read and write
1BC6F4B1000
heap
page read and write
1BC7165B000
heap
page read and write
2E088280000
heap
page read and write
3315000
stack
page read and write
655000
heap
page read and write
2E1E000
stack
page read and write
1BC73386000
heap
page read and write
2F0F000
heap
page read and write
2E08826F000
heap
page read and write
1BC6DC34000
heap
page read and write
1BC6DBC8000
heap
page read and write
1BC7168C000
heap
page read and write
2E088251000
heap
page read and write
1BC71713000
heap
page read and write
44BE000
stack
page read and write
275F000
stack
page read and write
373E000
stack
page read and write
2E088160000
heap
page read and write
2A43000
heap
page read and write
3440000
trusted library allocation
page read and write
3666000
trusted library allocation
page read and write
1BC7127F000
heap
page read and write
1BC72058000
heap
page read and write
1BC6DC40000
heap
page read and write
655000
heap
page read and write
21B000
unkown
page readonly
30A0000
heap
page read and write
2E91000
trusted library allocation
page read and write
649000
heap
page read and write
94D000
heap
page read and write
393A000
trusted library allocation
page read and write
1BC6DC42000
heap
page read and write
BA0000
trusted library allocation
page read and write
649000
heap
page read and write
36EC000
stack
page read and write
649000
heap
page read and write
1482000
heap
page read and write
1BC7136F000
heap
page read and write
1BC731F2000
heap
page read and write
1BC6DE95000
heap
page read and write
463F000
stack
page read and write
1BC7181E000
heap
page read and write
649000
heap
page read and write
378E000
trusted library allocation
page read and write
1BC712E2000
heap
page read and write
BA0000
unkown
page read and write
26EC000
heap
page read and write
440000
heap
page read and write
1493000
heap
page read and write
1BC73668000
heap
page read and write
692000
heap
page read and write
2E088229000
heap
page read and write
CD0000
heap
page read and write
2E08A13E000
trusted library allocation
page read and write
CBE000
heap
page read and write
10001000
unkown
page execute read
4490000
heap
page read and write
1BC6DC3E000
heap
page read and write
26D0000
heap
page read and write
EDC000
heap
page read and write
3453000
trusted library allocation
page read and write
649000
heap
page read and write
8BD000
stack
page read and write
26DC000
heap
page read and write
3AF8000
trusted library allocation
page read and write
26D1000
heap
page read and write
1BC7342E000
heap
page read and write
3989000
trusted library allocation
page read and write
3130000
heap
page read and write
6C300000
unkown
page readonly
1BC73973000
heap
page read and write
2E08A13B000
trusted library allocation
page read and write
26D0000
heap
page read and write
2E08826D000
heap
page read and write
26D5000
heap
page read and write
26D9000
heap
page read and write
3414000
trusted library allocation
page read and write
3774000
trusted library allocation
page read and write
31B0000
trusted library allocation
page read and write
655000
heap
page read and write
649000
heap
page read and write
1482000
heap
page read and write
1BC6DBE5000
heap
page read and write
26E3000
heap
page read and write
1BC6F4D3000
heap
page read and write
75D000
heap
page read and write
F20000
unkown
page readonly
400000
unkown
page readonly
30A0000
trusted library allocation
page read and write
649000
heap
page read and write
2A70000
heap
page read and write
26DE000
heap
page read and write
13E5E1A0000
unkown
page readonly
2E088236000
heap
page read and write
7FF527903000
unkown
page readonly
1BC726AD000
heap
page read and write
1344000
heap
page read and write
1BC7352A000
heap
page read and write
26DD000
heap
page read and write
E3E000
unkown
page readonly
26DA000
heap
page read and write
649000
heap
page read and write
AC0000
heap
page read and write
1BC6F4F3000
heap
page read and write
2F0F000
heap
page read and write
26DA000
heap
page read and write
73D000
heap
page read and write
A50000
heap
page read and write
AB0000
heap
page read and write
33CC000
trusted library allocation
page read and write
504000
heap
page read and write
1BC71467000
heap
page read and write
2E08A13F000
trusted library allocation
page read and write
31B0000
trusted library allocation
page read and write
3773000
trusted library allocation
page read and write
26D8000
heap
page read and write
2E98000
heap
page read and write
30A0000
trusted library allocation
page read and write
504000
heap
page read and write
2ED0000
heap
page read and write
3454000
trusted library allocation
page read and write
14A4000
heap
page read and write
1D1000
unkown
page execute read
655000
heap
page read and write
655000
heap
page read and write
1BC7294C000
heap
page read and write
1BC72996000
heap
page read and write
13E5E302000
unkown
page read and write
1BC717A2000
heap
page read and write
38E0000
heap
page read and write
13E5E238000
unkown
page read and write
649000
heap
page read and write
1BC71291000
heap
page read and write
504000
heap
page read and write
504000
heap
page read and write
379D000
trusted library allocation
page read and write
1BC6DE40000
trusted library allocation
page read and write
649000
heap
page read and write
2E088080000
heap
page read and write
3340000
heap
page read and write
5A8F000
heap
page read and write
649000
heap
page read and write
3C40000
heap
page read and write
649000
heap
page read and write
14A0000
heap
page read and write
1BC716A8000
heap
page read and write
6E3000
heap
page read and write
1BC7329A000
heap
page read and write
2E88000
trusted library allocation
page read and write
1BC6FB28000
trusted library allocation
page read and write
1BC737D5000
heap
page read and write
26EA000
heap
page read and write
2E08A13C000
trusted library allocation
page read and write
897000
heap
page read and write
F83000
heap
page read and write
1344000
heap
page read and write
26D3000
heap
page read and write
8A3000
heap
page read and write
2E08A13C000
trusted library allocation
page read and write
2F1E000
stack
page read and write
CE0000
unkown
page readonly
26D5000
heap
page read and write
649000
heap
page read and write
649000
heap
page read and write
1BC7261E000
heap
page read and write
2E08A13D000
trusted library allocation
page read and write
655000
heap
page read and write
147E000
heap
page read and write
16B0000
trusted library allocation
page read and write
655000
heap
page read and write
1BC6DC51000
heap
page read and write
649000
heap
page read and write
590B000
stack
page read and write
328A000
heap
page read and write
1BC73751000
heap
page read and write
30A0000
trusted library allocation
page read and write
1486000
heap
page read and write
35C0000
heap
page read and write
13E5E190000
heap
page read and write
26D9000
heap
page read and write
F7D000
heap
page read and write
2E089BB4000
trusted library allocation
page read and write
1BC725EF000
heap
page read and write
649000
heap
page read and write
3785000
trusted library allocation
page read and write
3AFE000
trusted library allocation
page read and write
BA5000
unkown
page readonly
D03000
heap
page read and write
2E87000
trusted library allocation
page read and write
3A06000
heap
page read and write
655000
heap
page read and write
3416000
trusted library allocation
page read and write
649000
heap
page read and write
1482000
heap
page read and write
7FF527984000
unkown
page readonly
345A000
trusted library allocation
page read and write
3793000
trusted library allocation
page read and write
1BC72FEA000
heap
page read and write
1BC7235A000
heap
page read and write
3130000
trusted library allocation
page read and write
147C000
heap
page read and write
2C8B000
heap
page read and write
1BC7268F000
heap
page read and write
514000
heap
page read and write
1BC6DBE9000
heap
page read and write
514000
heap
page read and write
26D9000
heap
page read and write
1BC72CC4000
heap
page read and write
3947000
trusted library allocation
page read and write
3780000
heap
page read and write
31F3000
trusted library allocation
page read and write
46EF000
stack
page read and write
26D7000
heap
page read and write
1BC71551000
heap
page read and write
14A7000
heap
page read and write
649000
heap
page read and write
649000
heap
page read and write
2190000
heap
page read and write
2E08A147000
trusted library allocation
page read and write
1BC714D2000
heap
page read and write
1BC71AEF000
heap
page read and write
26D5000
heap
page read and write
1BC72356000
heap
page read and write
2D20000
heap
page read and write
1BC6F576000
heap
page read and write
D06000
heap
page read and write
E1B000
unkown
page readonly
1BC7367A000
heap
page read and write
1BC6F532000
heap
page read and write
1680000
trusted library allocation
page read and write
649000
heap
page read and write
504000
heap
page read and write
649000
heap
page read and write
649000
heap
page read and write
2E08A13E000
trusted library allocation
page read and write
37A1000
trusted library allocation
page read and write
3740000
trusted library allocation
page read and write
655000
heap
page read and write
2E088291000
heap
page read and write
3780000
heap
page read and write
2E08826E000
heap
page read and write
1BC74291000
heap
page read and write
3791000
trusted library allocation
page read and write
649000
heap
page read and write
320B000
trusted library allocation
page read and write
2E08A13B000
trusted library allocation
page read and write
649000
heap
page read and write
2E089BB4000
trusted library allocation
page read and write
2E00000
heap
page read and write
649000
heap
page read and write
911000
heap
page read and write
1498000
heap
page read and write
6C31F000
unkown
page readonly
649000
heap
page read and write
2F0F000
heap
page read and write
C60000
heap
page read and write
1344000
heap
page read and write
1BC74463000
heap
page read and write
30C000
stack
page read and write
35D8000
trusted library allocation
page read and write
2E08A13A000
trusted library allocation
page read and write
3A90000
heap
page read and write
9B000
stack
page read and write
1BC71E60000
heap
page read and write
256F000
stack
page read and write
2E08A146000
trusted library allocation
page read and write
3AFF000
trusted library allocation
page read and write
2E08A13D000
trusted library allocation
page read and write
504000
heap
page read and write
1BC7181E000
heap
page read and write
26EA000
heap
page read and write
1BC72ECC000
heap
page read and write
649000
heap
page read and write
2E08827A000
heap
page read and write
850000
heap
page read and write
162B000
heap
page read and write
1BC71CF2000
heap
page read and write
37B5000
trusted library allocation
page read and write
1D0000
unkown
page readonly
26D1000
heap
page read and write
26D5000
heap
page read and write
440A000
stack
page read and write
2F0F000
heap
page read and write
649000
heap
page read and write
2E089F94000
heap
page read and write
26D6000
heap
page read and write
149D000
heap
page read and write
2EBA000
heap
page read and write
26ED000
heap
page read and write
B50000
unkown
page readonly
38F6000
trusted library allocation
page read and write
26EB000
heap
page read and write
2E08A13B000
trusted library allocation
page read and write
EF3000
heap
page read and write
1BC72BDC000
heap
page read and write
655000
heap
page read and write
649000
heap
page read and write
1482000
heap
page read and write
13E5E130000
unkown
page readonly
26D8000
heap
page read and write
2E08A13A000
trusted library allocation
page read and write
1BC72335000
heap
page read and write
43F0000
heap
page read and write
655000
heap
page read and write
11EE000
heap
page read and write
14A0000
heap
page read and write
10003000
unkown
page readonly
37B1000
trusted library allocation
page read and write
1482000
heap
page read and write
2E94000
trusted library allocation
page read and write
26D0000
heap
page read and write
35C8000
heap
page read and write
655000
heap
page read and write
1BC6F530000
heap
page read and write
1647000
heap
page read and write
401000
unkown
page execute read
393C000
trusted library allocation
page read and write
2E08A14A000
trusted library allocation
page read and write
93B000
stack
page read and write
3370000
heap
page read and write
1BC6DC03000
heap
page read and write
1349000
heap
page read and write
649000
heap
page read and write
649000
heap
page read and write
15CC000
heap
page read and write
64E000
heap
page read and write
1BC6FB20000
trusted library allocation
page read and write
1BC72BDC000
heap
page read and write
2E86000
trusted library allocation
page read and write
1BC71AE7000
heap
page read and write
649000
heap
page read and write
1BC71DDA000
heap
page read and write
35D6000
trusted library allocation
page read and write
649000
heap
page read and write
F20000
unkown
page readonly
1BC71AF4000
heap
page read and write
26DB000
heap
page read and write
649000
heap
page read and write
30A0000
trusted library allocation
page read and write
38F9000
trusted library allocation
page read and write
26D8000
heap
page read and write
1BC6F55F000
heap
page read and write
1BC739B5000
heap
page read and write
649000
heap
page read and write
3740000
trusted library allocation
page read and write
1BC73302000
heap
page read and write
1BC7142E000
heap
page read and write
1BC7357E000
heap
page read and write
D4A000
unkown
page read and write
2E08A141000
trusted library allocation
page read and write
BA0000
unkown
page write copy
504000
heap
page read and write
37B3000
trusted library allocation
page read and write
407000
unkown
page readonly
13E5E861000
unkown
page readonly
2E08822D000
heap
page read and write
1BC712BD000
heap
page read and write
26DE000
heap
page read and write
26E8000
heap
page read and write
30A0000
trusted library allocation
page read and write
31C0000
heap
page read and write
2950000
heap
page read and write
AE7000
heap
page read and write
2F0F000
heap
page read and write
BA0000
trusted library allocation
page read and write
8EF000
heap
page read and write
13E5E302000
unkown
page read and write
F93000
heap
page read and write
341F000
trusted library allocation
page read and write
1BC71C86000
heap
page read and write
1BC71685000
heap
page read and write
38FC000
trusted library allocation
page read and write
1482000
heap
page read and write
1BC6DC2F000
heap
page read and write
1BC72639000
heap
page read and write
1BC735D2000
heap
page read and write
649000
heap
page read and write
AFA000
heap
page read and write
7F6000
heap
page read and write
3777000
trusted library allocation
page read and write
2F0F000
heap
page read and write
BF0000
heap
page read and write
2E088236000
heap
page read and write
4B5000
heap
page read and write
510000
heap
page read and write
1642000
heap
page read and write
2E088209000
heap
page read and write
26D4000
heap
page read and write
2E08A141000
trusted library allocation
page read and write
649000
heap
page read and write
430000
heap
page read and write
1BC7439A000
heap
page read and write
EB0000
heap
page read and write
1BC7170E000
heap
page read and write
14A0000
heap
page read and write
6A0000
heap
page read and write
1BC73614000
heap
page read and write
9B0000
heap
page read and write
6C750000
unkown
page read and write
D2B000
unkown
page readonly
26E2000
heap
page read and write
26D4000
heap
page read and write
1BC7329A000
heap
page read and write
407000
unkown
page readonly
2E85000
trusted library allocation
page read and write
3360000
heap
page read and write
1BC745D0000
heap
page read and write
30C0000
heap
page read and write
2F0F000
heap
page read and write
2E089CC0000
heap
page read and write
1BC6DC9C000
heap
page read and write
C2B000
unkown
page readonly
1BC6DC38000
heap
page read and write
649000
heap
page read and write
37CE000
trusted library allocation
page read and write
26D3000
heap
page read and write
2867000
heap
page read and write
7FF52791A000
unkown
page readonly
1BC724D2000
heap
page read and write
2E08A141000
trusted library allocation
page read and write
1BC7318E000
heap
page read and write
37CA000
trusted library allocation
page read and write
6EE000
stack
page read and write
2E08A142000
trusted library allocation
page read and write
3570000
heap
page read and write
7FF527A41000
unkown
page readonly
401000
unkown
page execute read
377E000
trusted library allocation
page read and write
1BC7167E000
heap
page read and write
3456000
trusted library allocation
page read and write
7FF5279DD000
unkown
page readonly
6A6000
heap
page read and write
504000
heap
page read and write
26D0000
heap
page read and write
1BC72AE3000
heap
page read and write
3740000
trusted library allocation
page read and write
409000
unkown
page write copy
1BC6F5A3000
heap
page read and write
1BC71752000
heap
page read and write
1BC718ED000
heap
page read and write
2F7F000
stack
page read and write
26D6000
heap
page read and write
F7D000
heap
page read and write
26DC000
heap
page read and write
83A000
heap
page read and write
26DC000
heap
page read and write
1BC7267B000
heap
page read and write
26D5000
heap
page read and write
2F7E000
stack
page read and write
26DD000
heap
page read and write
1BC6DE90000
heap
page read and write
30A0000
trusted library allocation
page read and write
1BC6DC41000
heap
page read and write
1493000
heap
page read and write
1BC6DCAE000
heap
page read and write
26D6000
heap
page read and write
2E8B000
trusted library allocation
page read and write
101E000
unkown
page readonly
649000
heap
page read and write
13C0000
heap
page read and write
26D5000
heap
page read and write
26DE000
heap
page read and write
2E088280000
heap
page read and write
B10000
heap
page read and write
26D5000
heap
page read and write
2E089BB4000
trusted library allocation
page read and write
42EF000
stack
page read and write
1BC6DC01000
heap
page read and write
3792000
trusted library allocation
page read and write
1340000
heap
page read and write
1BC71B40000
heap
page read and write
423C000
stack
page read and write
1BC73482000
heap
page read and write
26D4000
heap
page read and write
1BC7145F000
heap
page read and write
686000
heap
page read and write
1BC7367A000
heap
page read and write
398B000
trusted library allocation
page read and write
3320000
heap
page read and write
13E5E1B0000
heap
page read and write
2E089BB0000
trusted library allocation
page read and write
1BC726BD000
heap
page read and write
2E93000
trusted library allocation
page read and write
1BC6FF20000
heap
page read and write
1BC6F5A8000
heap
page read and write
AFA000
heap
page read and write
649000
heap
page read and write
1BC72084000
heap
page read and write
1BC71E4F000
heap
page read and write
1BC6F524000
heap
page read and write
649000
heap
page read and write
15F0000
heap
page read and write
AFA000
heap
page read and write
1BC75360000
heap
page read and write
345D000
trusted library allocation
page read and write
133F000
heap
page read and write
1BC72534000
heap
page read and write
586E000
stack
page read and write
2E08A142000
trusted library allocation
page read and write
C9F000
heap
page read and write
655000
heap
page read and write
655000
heap
page read and write
2E08A144000
trusted library allocation
page read and write
263E000
stack
page read and write
1BC71927000
heap
page read and write
1BC726C0000
heap
page read and write
F83000
heap
page read and write
F21000
unkown
page execute read
61D000
heap
page read and write
13E5E190000
heap
page read and write
3778000
trusted library allocation
page read and write
2F0F000
heap
page read and write
65A000
heap
page read and write
2E8E000
trusted library allocation
page read and write
26D0000
heap
page read and write
44F0000
heap
page read and write
1BC6F530000
heap
page read and write
3918000
trusted library allocation
page read and write
1BC6F4C4000
heap
page read and write
1BC6DC01000
heap
page read and write
36F0000
heap
page read and write
3420000
trusted library allocation
page read and write
504000
heap
page read and write
1471000
heap
page read and write
600000
heap
page read and write
2761000
heap
page read and write
655000
heap
page read and write
655000
heap
page read and write
3360000
heap
page read and write
3740000
trusted library allocation
page read and write
44F8000
heap
page read and write
1473000
heap
page read and write
3130000
heap
page read and write
504000
heap
page read and write
14A4000
heap
page read and write
1BC719B9000
heap
page read and write
21B000
unkown
page readonly
3913000
trusted library allocation
page read and write
7FF5279FD000
unkown
page readonly
26D3000
heap
page read and write
649000
heap
page read and write
26E8000
heap
page read and write
1BC71DFA000
heap
page read and write
655000
heap
page read and write
655000
heap
page read and write
2E08A142000
trusted library allocation
page read and write
30E0000
heap
page read and write
26D6000
heap
page read and write
2E08A13A000
trusted library allocation
page read and write
1BC744A4000
heap
page read and write
276A000
heap
page read and write
1329000
heap
page read and write
1BC6F4E9000
heap
page read and write
655000
heap
page read and write
1BC6F5AE000
heap
page read and write
2E088243000
heap
page read and write
2E80000
heap
page read and write
655000
heap
page read and write
1BC71FB0000
heap
page read and write
2E08A146000
trusted library allocation
page read and write
13E5E1D1000
unkown
page readonly
2C80000
heap
page read and write
1482000
heap
page read and write
401000
unkown
page execute read
655000
heap
page read and write
148B000
heap
page read and write
68F000
heap
page read and write
27DE000
stack
page read and write
CCD000
heap
page read and write
1627000
heap
page read and write
CA7000
heap
page read and write
1BC745D0000
heap
page read and write
C6F000
heap
page read and write
7FF5279E0000
unkown
page readonly
3662000
trusted library allocation
page read and write
26DE000
heap
page read and write
649000
heap
page read and write
26D9000
heap
page read and write
12E0000
heap
page read and write
31D0000
heap
page read and write
10005000
unkown
page readonly
B50000
unkown
page readonly
2E088243000
heap
page read and write
655000
heap
page read and write
1BC6F4F3000
heap
page read and write
7FF5279D3000
unkown
page readonly
BA5000
unkown
page readonly
E80000
unkown
page read and write
3600000
heap
page read and write
26EC000
heap
page read and write
CAF000
heap
page read and write
663000
heap
page read and write
2E08A13B000
trusted library allocation
page read and write
26E6000
heap
page read and write
3935000
trusted library allocation
page read and write
655000
heap
page read and write
CB7000
heap
page read and write
DAB000
stack
page read and write
835000
heap
page read and write
1BC71747000
heap
page read and write
655000
heap
page read and write
878000
heap
page read and write
D16000
heap
page read and write
1BC728F8000
heap
page read and write
8E0000
heap
page read and write
26DC000
heap
page read and write
35C5000
trusted library allocation
page read and write
1BC6DC38000
heap
page read and write
363E000
stack
page read and write
655000
heap
page read and write
335A000
heap
page read and write
655000
heap
page read and write
1BC742D2000
heap
page read and write
F4A000
heap
page read and write
26E1000
heap
page read and write
7FF5279EB000
unkown
page readonly
1BC73092000
heap
page read and write
2E08A140000
trusted library allocation
page read and write
7FF5279FD000
unkown
page readonly
1BC71699000
heap
page read and write
26DA000
heap
page read and write
649000
heap
page read and write
3870000
trusted library allocation
page read and write
AC8000
heap
page read and write
26D6000
heap
page read and write
30A0000
trusted library allocation
page read and write
2E08826D000
heap
page read and write
11DE000
heap
page read and write
148A000
heap
page read and write
649000
heap
page read and write
2E08A13E000
trusted library allocation
page read and write
26D7000
heap
page read and write
37BD000
trusted library allocation
page read and write
D7E000
stack
page read and write
25CE000
stack
page read and write
1BC74634000
heap
page read and write
1BC71328000
heap
page read and write
1086000
heap
page read and write
500000
heap
page read and write
79B000
stack
page read and write
B51000
unkown
page execute read
35C0000
heap
page read and write
3415000
trusted library allocation
page read and write
1BC731F2000
heap
page read and write
33A0000
heap
page read and write
33D1000
trusted library allocation
page read and write
2B50000
heap
page read and write
26D3000
heap
page read and write
1BC7256C000
heap
page read and write
1BC6DC2D000
heap
page read and write
377B000
trusted library allocation
page read and write
1BC72E68000
heap
page read and write
1BC6DBDE000
heap
page read and write
1BC7206A000
heap
page read and write
1BC6FF24000
heap
page read and write
1BC745F2000
heap
page read and write
2E088243000
heap
page read and write
26DB000
heap
page read and write
23A000
unkown
page read and write
1BC71551000
heap
page read and write
87D000
heap
page read and write
2E088236000
heap
page read and write
2F0F000
heap
page read and write
2E08A13F000
trusted library allocation
page read and write
2FE0000
heap
page read and write
F75000
unkown
page readonly
1BC72E8A000
heap
page read and write
1BC72702000
heap
page read and write
649000
heap
page read and write
14A0000
heap
page read and write
26E8000
heap
page read and write
3270000
direct allocation
page read and write
6E4000
heap
page read and write
26D2000
heap
page read and write
33C0000
heap
page read and write
1471000
heap
page read and write
30A0000
trusted library allocation
page read and write
26EC000
heap
page read and write
26ED000
heap
page read and write
26D2000
heap
page read and write
504000
heap
page read and write
1BC7456C000
heap
page read and write
26DA000
heap
page read and write
26DD000
heap
page read and write
1060000
heap
page read and write
F3B000
heap
page read and write
3470000
trusted library section
page read and write
43FB000
stack
page read and write
D90000
heap
page read and write
514000
heap
page read and write
D90000
heap
page read and write
1627000
heap
page read and write
3020000
trusted library allocation
page read and write
2E088241000
heap
page read and write
1BC72F86000
heap
page read and write
2F0F000
heap
page read and write
AE9000
heap
page read and write
1BC734D6000
heap
page read and write
26D6000
heap
page read and write
649000
heap
page read and write
42E000
unkown
page readonly
1BC73118000
heap
page read and write
1482000
heap
page read and write
90E000
heap
page read and write
655000
heap
page read and write
26DC000
heap
page read and write
35C0000
heap
page read and write
649000
heap
page read and write
1BC71316000
heap
page read and write
26DE000
heap
page read and write
1BC6FB2A000
trusted library allocation
page read and write
163A000
heap
page read and write
2CE3000
heap
page read and write
3771000
trusted library allocation
page read and write
3650000
heap
page read and write
1476000
heap
page read and write
504000
heap
page read and write
884000
heap
page read and write
30A0000
trusted library allocation
page read and write
1BC72D9E000
heap
page read and write
1BC6DE9E000
heap
page read and write
1493000
heap
page read and write
1BC72702000
heap
page read and write
3130000
trusted library allocation
page read and write
26DD000
heap
page read and write
378B000
trusted library allocation
page read and write
649000
heap
page read and write
504000
heap
page read and write
CBF000
heap
page read and write
F0F000
heap
page read and write
3A03000
heap
page read and write
655000
heap
page read and write
3770000
heap
page read and write
C4E000
unkown
page readonly
1BC728F8000
heap
page read and write
1BC728B5000
heap
page read and write
1BC71E4E000
heap
page read and write
2E08A14F000
trusted library allocation
page read and write
1BC6DC38000
heap
page read and write
649000
heap
page read and write
1BC73859000
heap
page read and write
34126FE000
stack
page read and write
649000
heap
page read and write
3890000
heap
page read and write
1BC7282D000
heap
page read and write
26D1000
heap
page read and write
3932000
trusted library allocation
page read and write
EF7000
heap
page read and write
3930000
heap
page read and write
35DE000
trusted library allocation
page read and write
26D3000
heap
page read and write
60A000
heap
page read and write
649000
heap
page read and write
3260000
heap
page read and write
1BC72F00000
heap
page read and write
26DD000
heap
page read and write
26DB000
heap
page read and write
367C000
stack
page read and write
1BC73931000
heap
page read and write
7FF5279CD000
unkown
page readonly
649000
heap
page read and write
8FF000
heap
page read and write
649000
heap
page read and write
26DE000
heap
page read and write
1675000
heap
page read and write
14A4000
heap
page read and write
649000
heap
page read and write
655000
heap
page read and write
26E8000
heap
page read and write
1245000
heap
page read and write
2E08A146000
trusted library allocation
page read and write
649000
heap
page read and write
514000
heap
page read and write
167F000
heap
page read and write
1BC7145E000
heap
page read and write
97A000
heap
page read and write
F83000
heap
page read and write
33C000
stack
page read and write
1FFF000
stack
page read and write
649000
heap
page read and write
2E20000
heap
page read and write
1BC7342E000
heap
page read and write
89C000
heap
page read and write
1482000
heap
page read and write
C78000
heap
page read and write
CB1000
heap
page read and write
8D0000
heap
page read and write
400000
unkown
page readonly
2E089BB4000
trusted library allocation
page read and write
1BC6FB26000
trusted library allocation
page read and write
1BC6DE44000
trusted library allocation
page read and write
2E08826F000
heap
page read and write
30A0000
trusted library allocation
page read and write
504000
heap
page read and write
39C0000
heap
page read and write
2E0881F0000
heap
page read and write
11BF000
stack
page read and write
33C6000
trusted library allocation
page read and write
2E40000
heap
page read and write
2E4E000
stack
page read and write
1BC6F52F000
heap
page read and write
1BC6F4F3000
heap
page read and write
3794000
trusted library allocation
page read and write
14A4000
heap
page read and write
64E000
heap
page read and write
1F0000
heap
page read and write
655000
heap
page read and write
D06000
heap
page read and write
14A7000
heap
page read and write
3720000
heap
page read and write
26D5000
heap
page read and write
90D000
heap
page read and write
C71000
heap
page read and write
163F000
heap
page read and write
2E83000
trusted library allocation
page read and write
26D0000
heap
page read and write
1BC715E6000
heap
page read and write
1BC733EC000
heap
page read and write
31FB000
trusted library allocation
page read and write
42BE000
stack
page read and write
DCE000
stack
page read and write
49AC000
stack
page read and write
163A000
heap
page read and write
655000
heap
page read and write
EEE000
heap
page read and write
2E08826D000
heap
page read and write
655000
heap
page read and write
504000
heap
page read and write
3820000
heap
page read and write
26D1000
heap
page read and write
655000
heap
page read and write
29C0000
heap
page read and write
26E6000
heap
page read and write
1BC73657000
heap
page read and write
1BC6FB36000
trusted library allocation
page read and write
504000
heap
page read and write
6DE000
heap
page read and write
2BC0000
trusted library allocation
page read and write
26D0000
heap
page read and write
94D000
heap
page read and write
26EE000
heap
page read and write
929000
heap
page read and write
1BC71376000
heap
page read and write
377C000
trusted library allocation
page read and write
131F000
heap
page read and write
1BC722C4000
heap
page read and write
394F000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
1BC72703000
heap
page read and write
26D7000
heap
page read and write
A08000
unkown
page write copy
1BC7386B000
heap
page read and write
F93000
heap
page read and write
26EE000
heap
page read and write
1BC745F3000
heap
page read and write
379E000
trusted library allocation
page read and write
2E08826D000
heap
page read and write
649000
heap
page read and write
765000
heap
page read and write
1BC6DBEA000
heap
page read and write
C96000
heap
page read and write
34124FB000
stack
page read and write
655000
heap
page read and write
6A2000
heap
page read and write
7FF5279E0000
unkown
page readonly
3010000
heap
page read and write
504000
heap
page read and write
514000
heap
page read and write
130C000
heap
page read and write
1BC7259B000
heap
page read and write
13E5E4D0000
unkown
page readonly
337D000
heap
page read and write
32C0000
heap
page read and write
12C0000
heap
page read and write
3360000
heap
page read and write
CF7000
heap
page read and write
32D0000
heap
page read and write
649000
heap
page read and write
26D9000
heap
page read and write
BA0000
unkown
page write copy
514000
heap
page read and write
2E08A13F000
trusted library allocation
page read and write
1BC7174F000
heap
page read and write
26D7000
heap
page read and write
3172000
heap
page read and write
1BC736CD000
heap
page read and write
65A000
heap
page read and write
320A000
trusted library allocation
page read and write
2CEC000
heap
page read and write
26DA000
heap
page read and write
38FF000
trusted library allocation
page read and write
2E08A13F000
trusted library allocation
page read and write
1BC7284E000
heap
page read and write
26D1000
heap
page read and write
3BD000
stack
page read and write
2E90000
heap
page read and write
649000
heap
page read and write
26D2000
heap
page read and write
CB1000
heap
page read and write
C4C000
heap
page read and write
2E088236000
heap
page read and write
5A8F000
heap
page read and write
649000
heap
page read and write
655000
heap
page read and write
1BC6F4D0000
heap
page read and write
655000
heap
page read and write
26DB000
heap
page read and write
2E08A145000
trusted library allocation
page read and write
C90000
heap
page read and write
1BC74656000
heap
page read and write
30D0000
heap
page read and write
1BC71968000
heap
page read and write
1BC71890000
heap
page read and write
1BC71F9E000
heap
page read and write
1BC733C8000
heap
page read and write
26D0000
heap
page read and write
35C8000
trusted library allocation
page read and write
38FD000
trusted library allocation
page read and write
1641000
heap
page read and write
CBF000
heap
page read and write
F01000
heap
page read and write
1BC6FB3A000
trusted library allocation
page read and write
26DB000
heap
page read and write
2830000
heap
page read and write
28C0000
heap
page read and write
655000
heap
page read and write
1BC72302000
heap
page read and write
143B000
heap
page read and write
26DB000
heap
page read and write
16A0000
trusted library allocation
page read and write
1BC71E0C000
heap
page read and write
26D6000
heap
page read and write
401000
unkown
page execute read
37B7000
trusted library allocation
page read and write
1471000
heap
page read and write
26D0000
heap
page read and write
655000
heap
page read and write
2E08A13A000
trusted library allocation
page read and write
1BC6F50C000
heap
page read and write
1002000
unkown
page execute read
2E08822D000
heap
page read and write
26E0000
heap
page read and write
85D000
stack
page read and write
655000
heap
page read and write
1BC71B44000
heap
page read and write
F58A7FE000
stack
page read and write
1BC6DC38000
heap
page read and write
2E08A140000
trusted library allocation
page read and write
26E5000
heap
page read and write
649000
heap
page read and write
2DE0000
heap
page read and write
94D000
heap
page read and write
401000
unkown
page execute read
655000
heap
page read and write
26DA000
heap
page read and write
16A0000
trusted library allocation
page read and write
7FF52763F000
unkown
page readonly
8F1000
heap
page read and write
2E089BB4000
trusted library allocation
page read and write
2E08A143000
trusted library allocation
page read and write
649000
heap
page read and write
1BC72365000
heap
page read and write
1BC7300C000
heap
page read and write
3930000
trusted library allocation
page read and write
1BC7452B000
heap
page read and write
16A0000
trusted library allocation
page read and write
3980000
trusted library allocation
page read and write
3776000
trusted library allocation
page read and write
15FF000
heap
page read and write
1BC7135C000
heap
page read and write
14A7000
heap
page read and write
1BC72A98000
heap
page read and write
2E08A13B000
trusted library allocation
page read and write
7FF5279A4000
unkown
page readonly
37C9000
trusted library allocation
page read and write
65F000
heap
page read and write
1BC73237000
heap
page read and write
1690000
heap
page read and write
148F000
heap
page read and write
26DA000
heap
page read and write
1BC7452A000
heap
page read and write
F6C000
heap
page read and write
3870000
trusted library allocation
page read and write
26DA000
heap
page read and write
504000
heap
page read and write
1473000
heap
page read and write
35C0000
heap
page read and write
1BC72058000
heap
page read and write
1430000
heap
page read and write
3870000
trusted library allocation
page read and write
1BC6FB29000
trusted library allocation
page read and write
649000
heap
page read and write
88E000
heap
page read and write
14C0000
heap
page read and write
26EE000
heap
page read and write
71D000
heap
page read and write
64E000
stack
page read and write
1BC71A91000
heap
page read and write
1D1000
unkown
page execute read
30A0000
trusted library allocation
page read and write
1BC73470000
heap
page read and write
1BC6F564000
heap
page read and write
2E08826E000
heap
page read and write
504000
heap
page read and write
1BC71AF4000
heap
page read and write
649000
heap
page read and write
26D7000
heap
page read and write
26D0000
heap
page read and write
26EA000
heap
page read and write
655000
heap
page read and write
30A0000
trusted library allocation
page read and write
1BC718A9000
heap
page read and write
140E000
stack
page read and write
514000
heap
page read and write
26D6000
heap
page read and write
649000
heap
page read and write
26D3000
heap
page read and write
A00000
unkown
page readonly
1BC71694000
heap
page read and write
378A000
trusted library allocation
page read and write
1BC73471000
heap
page read and write
2E08A130000
trusted library allocation
page read and write
566F000
stack
page read and write
26D2000
heap
page read and write
1BC72C82000
heap
page read and write
84E000
stack
page read and write
C8E000
heap
page read and write
649000
heap
page read and write
39A0000
heap
page read and write
8D8000
heap
page read and write
2E08A144000
trusted library allocation
page read and write
1690000
heap
page read and write
3793000
trusted library allocation
page read and write
1BC72F64000
heap
page read and write
1BC744A5000
heap
page read and write
1BC71377000
heap
page read and write
F85000
heap
page read and write
379E000
trusted library allocation
page read and write
26D9000
heap
page read and write
1BC71490000
heap
page read and write
38BF000
stack
page read and write
1482000
heap
page read and write
2F0F000
heap
page read and write
80E000
stack
page read and write
1BC71891000
heap
page read and write
1BC71B44000
heap
page read and write
2E08A146000
trusted library allocation
page read and write
33D2000
trusted library allocation
page read and write
38FE000
trusted library allocation
page read and write
EC0000
heap
page read and write
1BC71441000
heap
page read and write
6D7000
heap
page read and write
3668000
trusted library allocation
page read and write
2E088243000
heap
page read and write
7FF5279EB000
unkown
page readonly
1BC6FB38000
trusted library allocation
page read and write
504000
heap
page read and write
649000
heap
page read and write
37BC000
trusted library allocation
page read and write
2E088280000
heap
page read and write
3BFF000
stack
page read and write
15BA000
heap
page read and write
CCF000
heap
page read and write
2E089BB4000
trusted library allocation
page read and write
1360000
heap
page read and write
3A0E000
heap
page read and write
649000
heap
page read and write
26D8000
heap
page read and write
1BC6F4E0000
heap
page read and write
2B30000
heap
page read and write
1BC6DC01000
heap
page read and write
1BC71A90000
heap
page read and write
413C000
stack
page read and write
3418000
trusted library allocation
page read and write
649000
heap
page read and write
8AE000
heap
page read and write
CBF000
heap
page read and write
2715000
heap
page read and write
1BC6F8A0000
heap
page read and write
394C000
trusted library allocation
page read and write
8D0000
heap
page read and write
1BC6DCAA000
heap
page read and write
2ADD000
heap
page read and write
3981000
trusted library allocation
page read and write
1BC6DBE5000
heap
page read and write
CDE000
heap
page read and write
1BC72330000
heap
page read and write
1BC71724000
heap
page read and write
6C32A000
unkown
page read and write
64E000
heap
page read and write
1471000
heap
page read and write
1BC72332000
heap
page read and write
1BC712A4000
heap
page read and write
649000
heap
page read and write
1D0000
unkown
page readonly
1BC6DC4C000
heap
page read and write
F70000
unkown
page read and write
880000
heap
page read and write
1BC71D66000
heap
page read and write
655000
heap
page read and write
504000
heap
page read and write
649000
heap
page read and write
C7F000
heap
page read and write
2E08A141000
trusted library allocation
page read and write
1010000
heap
page read and write
3120000
heap
page read and write
33F0000
heap
page read and write
655000
heap
page read and write
2E08A140000
trusted library allocation
page read and write
1BC71968000
heap
page read and write
26D4000
heap
page read and write
2E08A13A000
trusted library allocation
page read and write
B20000
heap
page read and write
1BC6FB23000
trusted library allocation
page read and write
BE0000
unkown
page readonly
113F000
stack
page read and write
504000
heap
page read and write
37CF000
trusted library allocation
page read and write
EF5000
heap
page read and write
1BC6F58C000
heap
page read and write
B51000
unkown
page execute read
8DF000
heap
page read and write
1BC74359000
heap
page read and write
1BC7184C000
heap
page read and write
2E08A144000
trusted library allocation
page read and write
F70000
unkown
page write copy
1BC73214000
heap
page read and write
1BC738EF000
heap
page read and write
150000
heap
page read and write
15E2000
heap
page read and write
26DA000
heap
page read and write
341D000
trusted library allocation
page read and write
3937000
trusted library allocation
page read and write
CCF000
heap
page read and write
B00000
heap
page read and write
26E8000
heap
page read and write
C96000
heap
page read and write
35DF000
trusted library allocation
page read and write
8A0000
heap
page read and write
3776000
trusted library allocation
page read and write
BF0000
unkown
page read and write
26D0000
heap
page read and write
30F0000
heap
page read and write
1BC72732000
heap
page read and write
33C7000
trusted library allocation
page read and write
1BC6DBD7000
heap
page read and write
1BC731B0000
heap
page read and write
649000
heap
page read and write
26E4000
heap
page read and write
30FD000
heap
page read and write
2E089D00000
heap
page read and write
489F000
stack
page read and write
655000
heap
page read and write
BA5000
unkown
page readonly
1BC6FB22000
trusted library allocation
page read and write
3870000
trusted library allocation
page read and write
26D4000
heap
page read and write
649000
heap
page read and write
EC0000
trusted library allocation
page read and write
1BC71593000
heap
page read and write
C58000
heap
page read and write
14A7000
heap
page read and write
26D6000
heap
page read and write
328C000
heap
page read and write
3660000
trusted library allocation
page read and write
EDF000
heap
page read and write
470000
heap
page read and write
655000
heap
page read and write
5F0000
heap
page read and write
2E088241000
heap
page read and write
2E8A000
trusted library allocation
page read and write
29B0000
heap
page read and write
13E5E1F0000
unkown
page read and write
26D2000
heap
page read and write
190000
heap
page read and write
3130000
trusted library allocation
page read and write
14E7000
heap
page read and write
5211000
heap
page read and write
2E08A144000
trusted library allocation
page read and write
663000
heap
page read and write
2E08A145000
trusted library allocation
page read and write
649000
heap
page read and write
504000
heap
page read and write
11EE000
heap
page read and write
1BC73817000
heap
page read and write
3784000
trusted library allocation
page read and write
41BE000
stack
page read and write
35D0000
trusted library allocation
page read and write
1BC72A56000
heap
page read and write
1BC715E3000
heap
page read and write
1BC7139F000
heap
page read and write
3B90000
heap
page read and write
2E088241000
heap
page read and write
3931000
trusted library allocation
page read and write
26DD000
heap
page read and write
649000
heap
page read and write
1BC6DC01000
heap
page read and write
379C000
trusted library allocation
page read and write
2E08A143000
trusted library allocation
page read and write
3320000
heap
page read and write
655000
heap
page read and write
8D0000
heap
page read and write
26DA000
heap
page read and write
649000
heap
page read and write
1BC71B86000
heap
page read and write
1BC7133A000
heap
page read and write
1BC6FB2F000
trusted library allocation
page read and write
3775000
trusted library allocation
page read and write
26DC000
heap
page read and write
1234000
heap
page read and write
741000
heap
page read and write
655000
heap
page read and write
3943000
trusted library allocation
page read and write
1BC6DBB0000
heap
page read and write
655000
heap
page read and write
2E08A13C000
trusted library allocation
page read and write
35CA000
trusted library allocation
page read and write
341C000
trusted library allocation
page read and write
12FB000
stack
page read and write
2E088241000
heap
page read and write
1BC71889000
heap
page read and write
2E08822D000
heap
page read and write
401000
unkown
page execute read
2E08A13D000
trusted library allocation
page read and write
37A0000
heap
page read and write
26D4000
heap
page read and write
92D000
heap
page read and write
3950000
trusted library allocation
page read and write
1BC743DC000
heap
page read and write
30A0000
trusted library allocation
page read and write
1482000
heap
page read and write
26D4000
heap
page read and write
16A0000
trusted library allocation
page read and write
1BC71284000
heap
page read and write
2E0883F5000
heap
page read and write
1BC6FB31000
trusted library allocation
page read and write
1BC71A8B000
heap
page read and write
2E08826D000
heap
page read and write
30A0000
trusted library allocation
page read and write
1BC6DC01000
heap
page read and write
649000
heap
page read and write
26D1000
heap
page read and write
2F0F000
heap
page read and write
26DD000
heap
page read and write
CAB000
stack
page read and write
1BC726BD000
heap
page read and write
1BC7148E000
heap
page read and write
2E08A13D000
trusted library allocation
page read and write
649000
heap
page read and write
2E08A13C000
trusted library allocation
page read and write
26E7000
heap
page read and write
12EA000
heap
page read and write
26D4000
heap
page read and write
1BC72EEE000
heap
page read and write
1BC728B2000
heap
page read and write
26D1000
heap
page read and write
1D0000
unkown
page readonly
2E088228000
heap
page read and write
15E0000
heap
page read and write
29D0000
heap
page read and write
3700000
heap
page read and write
1BC7259D000
heap
page read and write
655000
heap
page read and write
898000
heap
page read and write
504000
heap
page read and write
655000
heap
page read and write
2E08A13E000
trusted library allocation
page read and write
1BC727CE000
heap
page read and write
150E000
stack
page read and write
2890000
unkown
page read and write
479F000
stack
page read and write
1BC6F50A000
heap
page read and write
8A3000
heap
page read and write
3740000
trusted library allocation
page read and write
1648000
heap
page read and write
37BA000
trusted library allocation
page read and write
33C9000
trusted library allocation
page read and write
2C43000
heap
page read and write
649000
heap
page read and write
2A80000
heap
page read and write
1BC6DE9C000
heap
page read and write
23E000
unkown
page readonly
14A0000
heap
page read and write
3F2E000
stack
page read and write
3AFB000
trusted library allocation
page read and write
1BC72C61000
heap
page read and write
DD1000
unkown
page execute read
1BC73518000
heap
page read and write
C20000
heap
page read and write
649000
heap
page read and write
26D3000
heap
page read and write
F64000
heap
page read and write
A01000
unkown
page execute read
6E1000
heap
page read and write
26D6000
heap
page read and write
42C000
unkown
page readonly
BA5000
unkown
page readonly
30A0000
trusted library allocation
page read and write
C71000
heap
page read and write
1BC6DA20000
heap
page read and write
26D1000
heap
page read and write
4AE000
stack
page read and write
26D1000
heap
page read and write
1BC6FB2C000
trusted library allocation
page read and write
649000
heap
page read and write
444E000
stack
page read and write
7FF527903000
unkown
page readonly
1476000
heap
page read and write
377A000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
9E0000
heap
page read and write
1BC71752000
heap
page read and write
CF4000
heap
page read and write
655000
heap
page read and write
16A0000
trusted library allocation
page read and write
38FB000
trusted library allocation
page read and write
23A000
unkown
page read and write
44FF000
stack
page read and write
26D8000
heap
page read and write
1BC7133A000
heap
page read and write
7FF52763F000
unkown
page readonly
1BC7259D000
heap
page read and write
3380000
heap
page read and write
1BC6DC42000
heap
page read and write
1471000
heap
page read and write
14C9000
heap
page read and write
1488000
heap
page read and write
B20000
trusted library allocation
page read and write
504000
heap
page read and write
1BC71536000
heap
page read and write
1BC7207C000
heap
page read and write
1BC7135C000
heap
page read and write
1BC7329A000
heap
page read and write
3370000
heap
page read and write
C2B000
unkown
page readonly
1BC738AE000
heap
page read and write
649000
heap
page read and write
29A0000
heap
page read and write
649000
heap
page read and write
3380000
heap
page read and write
1BC71284000
heap
page read and write
1BC735D2000
heap
page read and write
26E4000
heap
page read and write
1BC72AC1000
heap
page read and write
3780000
trusted library allocation
page read and write
26DB000
heap
page read and write
1BC71A8F000
heap
page read and write
1BC719B2000
heap
page read and write
3220000
heap
page read and write
655000
heap
page read and write
35C2000
trusted library allocation
page read and write
1482000
heap
page read and write
504000
heap
page read and write
3E0000
heap
page read and write
CE0000
heap
page read and write
B10000
heap
page read and write
1BC71F08000
heap
page read and write
26D9000
heap
page read and write
1BC726C1000
heap
page read and write
26DD000
heap
page read and write
31F6000
trusted library allocation
page read and write
649000
heap
page read and write
26D8000
heap
page read and write
649000
heap
page read and write
649000
heap
page read and write
31F0000
heap
page read and write
8D8000
heap
page read and write
2E08A13E000
trusted library allocation
page read and write
3412000
trusted library allocation
page read and write
1488000
heap
page read and write
3870000
trusted library allocation
page read and write
2E088236000
heap
page read and write
37B0000
trusted library allocation
page read and write
450000
heap
page read and write
26D7000
heap
page read and write
649000
heap
page read and write
2E08826F000
heap
page read and write
7FF5279DD000
unkown
page readonly
649000
heap
page read and write
514000
heap
page read and write
655000
heap
page read and write
1BC71D98000
heap
page read and write
13B0000
heap
page read and write
5211000
heap
page read and write
26E5000
heap
page read and write
6C301000
unkown
page execute read
16A0000
trusted library allocation
page read and write
9E5000
heap
page read and write
2E088280000
heap
page read and write
2F0F000
heap
page read and write
23E000
unkown
page readonly
19B000
stack
page read and write
65A000
heap
page read and write
13E5E1C0000
heap
page read and write
6C110000
unkown
page readonly
1BC7148B000
heap
page read and write
1BC73344000
heap
page read and write
377F000
trusted library allocation
page read and write
2E089BB0000
trusted library allocation
page read and write
655000
heap
page read and write
3410000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
475000
heap
page read and write
1BC6FB32000
trusted library allocation
page read and write
26D5000
heap
page read and write
3796000
trusted library allocation
page read and write
1BC6DC38000
heap
page read and write
3440000
heap
page read and write
655000
heap
page read and write
30A0000
trusted library allocation
page read and write
1BC71F8D000
heap
page read and write
1495000
heap
page read and write
2E08A144000
trusted library allocation
page read and write
1642000
heap
page read and write
1BC6F576000
heap
page read and write
33CF000
trusted library allocation
page read and write
649000
heap
page read and write
BA2000
trusted library allocation
page read and write
B02000
heap
page read and write
1BC6F4F7000
heap
page read and write
3910000
trusted library allocation
page read and write
1BC72785000
heap
page read and write
2E088236000
heap
page read and write
26E5000
heap
page read and write
2E08826F000
heap
page read and write
3172000
heap
page read and write
1BC71615000
heap
page read and write
26D1000
heap
page read and write
28D0000
heap
page read and write
1BC725AD000
heap
page read and write
1BC7439B000
heap
page read and write
1BC72CE6000
heap
page read and write
26D7000
heap
page read and write
2F50000
heap
page read and write
F93000
heap
page read and write
1BC71533000
heap
page read and write
3110000
trusted library allocation
page read and write
2F0F000
heap
page read and write
2E08A13C000
trusted library allocation
page read and write
1BC7458E000
heap
page read and write
649000
heap
page read and write
26D6000
heap
page read and write
341B000
trusted library allocation
page read and write
1BC6F545000
heap
page read and write
2E08A145000
trusted library allocation
page read and write
1370000
heap
page read and write
23E000
unkown
page readonly
6FB000
stack
page read and write
26D5000
heap
page read and write
34127FE000
unkown
page readonly
26D5000
heap
page read and write
649000
heap
page read and write
1BC6F5AE000
heap
page read and write
35D4000
trusted library allocation
page read and write
1BC71B86000
heap
page read and write
8E2000
heap
page read and write
37BE000
trusted library allocation
page read and write
649000
heap
page read and write
3320000
heap
page read and write
80F000
stack
page read and write
3207000
trusted library allocation
page read and write
655000
heap
page read and write
655000
heap
page read and write
2E08826D000
heap
page read and write
26D6000
heap
page read and write
26E9000
heap
page read and write
123B000
stack
page read and write
16A0000
trusted library allocation
page read and write
1BC74440000
heap
page read and write
3916000
trusted library allocation
page read and write
1BC713B6000
heap
page read and write
30A0000
trusted library allocation
page read and write
504000
heap
page read and write
655000
heap
page read and write
33F0000
heap
page read and write
1BC6DC03000
heap
page read and write
1BC6DBDE000
heap
page read and write
26DE000
heap
page read and write
33D0000
trusted library allocation
page read and write
649000
heap
page read and write
A08000
unkown
page read and write
1BC715D8000
heap
page read and write
35D3000
trusted library allocation
page read and write
748000
heap
page read and write
1BC71EB4000
heap
page read and write
649000
heap
page read and write
26DD000
heap
page read and write
26D4000
heap
page read and write
14A7000
heap
page read and write
26D9000
heap
page read and write
5A8F000
heap
page read and write
35C0000
heap
page read and write
649000
heap
page read and write
1474000
heap
page read and write
649000
heap
page read and write
35CD000
trusted library allocation
page read and write
130F000
heap
page read and write
1BC6F600000
heap
page read and write
3C0000
heap
page read and write
F20000
unkown
page readonly
26D1000
heap
page read and write
2E088251000
heap
page read and write
26D3000
heap
page read and write
3411000
trusted library allocation
page read and write
649000
heap
page read and write
649000
heap
page read and write
400000
unkown
page readonly
26ED000
heap
page read and write
C6F000
heap
page read and write
1486000
heap
page read and write
1BC72358000
heap
page read and write
F10000
unkown
page read and write
26D7000
heap
page read and write
1BC6DCAE000
heap
page read and write
1BC72692000
heap
page read and write
1BC7169C000
heap
page read and write
1BC7356C000
heap
page read and write
1BC6DCAE000
heap
page read and write
35DA000
trusted library allocation
page read and write
1BC72DE2000
heap
page read and write
655000
heap
page read and write
1BC73387000
heap
page read and write
655000
heap
page read and write
43BF000
stack
page read and write
13E5E4D0000
unkown
page readonly
BE0000
heap
page read and write
1BC7233F000
heap
page read and write
2E0881F8000
heap
page read and write
3794000
trusted library allocation
page read and write
3760000
heap
page read and write
1601000
heap
page read and write
688000
heap
page read and write
655000
heap
page read and write
1BC713B7000
heap
page read and write
1BC6DC9C000
heap
page read and write
E60000
trusted library allocation
page read and write
514000
heap
page read and write
2FF8000
stack
page read and write
649000
heap
page read and write
1BC7259E000
heap
page read and write
1BC72FA8000
heap
page read and write
1BC72E04000
heap
page read and write
26D8000
heap
page read and write
394A000
trusted library allocation
page read and write
3470000
heap
page read and write
655000
heap
page read and write
1BC7139F000
heap
page read and write
26D1000
heap
page read and write
30E0000
heap
page read and write
57AE000
stack
page read and write
1BC6DBF5000
heap
page read and write
35C0000
trusted library allocation
page read and write
21B000
unkown
page readonly
2E08A13D000
trusted library allocation
page read and write
2A00000
heap
page read and write
1BC713EA000
heap
page read and write
1BC6FF2F000
heap
page read and write
2FF0000
heap
page read and write
1BC6F584000
heap
page read and write
26D6000
heap
page read and write
26DA000
heap
page read and write
1BC71AE0000
heap
page read and write
1BC71B40000
heap
page read and write
26DA000
heap
page read and write
26D8000
heap
page read and write
97A000
heap
page read and write
8A3000
heap
page read and write
504000
heap
page read and write
2E0882F0000
heap
page read and write
11A8000
heap
page read and write
1471000
heap
page read and write
504000
heap
page read and write
D07000
heap
page read and write
2E80000
trusted library allocation
page read and write
1482000
heap
page read and write
3450000
trusted library allocation
page read and write
29C0000
heap
page read and write
30E0000
heap
page read and write
3100000
heap
page read and write
38F1000
trusted library allocation
page read and write
2E089BB0000
trusted library allocation
page read and write
1220000
heap
page read and write
26DE000
heap
page read and write
2E08A142000
trusted library allocation
page read and write
F58A77E000
stack
page read and write
1BC736CD000
heap
page read and write
1680000
trusted library allocation
page read and write
378D000
trusted library allocation
page read and write
1BC744C7000
heap
page read and write
2E08A13D000
trusted library allocation
page read and write
31C0000
heap
page read and write
F93000
heap
page read and write
30F0000
heap
page read and write
35D5000
trusted library allocation
page read and write
3787000
trusted library allocation
page read and write
C98000
heap
page read and write
2E08A143000
trusted library allocation
page read and write
3E6000
heap
page read and write
34121BE000
unkown
page readonly
16A0000
trusted library allocation
page read and write
1BC6F4EB000
heap
page read and write
38F4000
trusted library allocation
page read and write
EF7000
heap
page read and write
23A000
unkown
page write copy
655000
heap
page read and write
1BC6DC2D000
heap
page read and write
3150000
heap
page read and write
649000
heap
page read and write
1BC714D3000
heap
page read and write
649000
heap
page read and write
1497000
heap
page read and write
26D9000
heap
page read and write
ADE000
heap
page read and write
26EE000
heap
page read and write
26D0000
heap
page read and write
1BC718F3000
heap
page read and write
23E000
unkown
page readonly
3661000
trusted library allocation
page read and write
390000
heap
page read and write
1BC7135C000
heap
page read and write
1491000
heap
page read and write
35E3000
trusted library allocation
page read and write
133E000
heap
page read and write
504000
heap
page read and write
33B0000
heap
page read and write
450000
heap
page read and write
1BC74508000
heap
page read and write
3797000
trusted library allocation
page read and write
1488000
heap
page read and write
A0A000
unkown
page readonly
4B0000
heap
page read and write
3A4F000
stack
page read and write
1BC6F4C2000
heap
page read and write
C7F000
heap
page read and write
26E1000
heap
page read and write
CDE000
heap
page read and write
1BC71450000
heap
page read and write
649000
heap
page read and write
26D7000
heap
page read and write
CB7000
heap
page read and write
655000
heap
page read and write
1488000
heap
page read and write
1BC6F4CC000
heap
page read and write
1BC71F4A000
heap
page read and write
1BC6F52F000
heap
page read and write
26DE000
heap
page read and write
3205000
trusted library allocation
page read and write
1229000
heap
page read and write
3987000
trusted library allocation
page read and write
1482000
heap
page read and write
1497000
heap
page read and write
2E08A13A000
trusted library allocation
page read and write
1BC6F4D8000
heap
page read and write
3320000
heap
page read and write
2E089F90000
heap
page read and write
649000
heap
page read and write
2E08A140000
trusted library allocation
page read and write
1BC71C8E000
heap
page read and write
1488000
heap
page read and write
649000
heap
page read and write
1BC7135E000
heap
page read and write
1F6D5DA000
stack
page read and write
649000
heap
page read and write
473B000
stack
page read and write
2E08A13F000
trusted library allocation
page read and write
1BC72B78000
heap
page read and write
33CE000
trusted library allocation
page read and write
26DA000
heap
page read and write
B00000
heap
page read and write
430000
heap
page read and write
1BC7302E000
heap
page read and write
1BC73751000
heap
page read and write
3200000
heap
page read and write
1BC71CF2000
heap
page read and write
429000
unkown
page read and write
1BC72CE7000
heap
page read and write
1BC717BC000
heap
page read and write
42C000
unkown
page readonly
407000
unkown
page readonly
2E5E000
stack
page read and write
1BC6FB3D000
trusted library allocation
page read and write
1BC6DC45000
heap
page read and write
422000
unkown
page read and write
3870000
trusted library allocation
page read and write
3780000
trusted library allocation
page read and write
1BC72034000
heap
page read and write
19B000
stack
page read and write
26E6000
heap
page read and write
1BC71CF2000
heap
page read and write
26DA000
heap
page read and write
7FF5279F7000
unkown
page readonly
1BC73656000
heap
page read and write
C4A000
unkown
page write copy
34124FB000
stack
page read and write
14C6000
heap
page read and write
30A0000
trusted library allocation
page read and write
1BC71F4A000
heap
page read and write
1BC6DC2B000
heap
page read and write
649000
heap
page read and write
26D5000
heap
page read and write
1BC6DBDB000
heap
page read and write
1BC728F9000
heap
page read and write
1BC7278C000
heap
page read and write
409000
unkown
page read and write
655000
heap
page read and write
F75000
unkown
page readonly
655000
heap
page read and write
E1B000
unkown
page readonly
30A0000
trusted library allocation
page read and write
268E000
stack
page read and write
2E08A143000
trusted library allocation
page read and write
2E08A143000
trusted library allocation
page read and write
31F8000
trusted library allocation
page read and write
3320000
heap
page read and write
3870000
trusted library allocation
page read and write
5A8F000
heap
page read and write
168E000
heap
page read and write
1BC73093000
heap
page read and write
15A0000
heap
page read and write
133F000
heap
page read and write
649000
heap
page read and write
162E000
heap
page read and write
2E92000
trusted library allocation
page read and write
409000
unkown
page write copy
26DC000
heap
page read and write
1BC6DC01000
heap
page read and write
C4E000
unkown
page readonly
3870000
trusted library allocation
page read and write
655000
heap
page read and write
1BC7181E000
heap
page read and write
28B0000
heap
page read and write
26D1000
heap
page read and write
C80000
heap
page read and write
1BC725F0000
heap
page read and write
3740000
trusted library allocation
page read and write
CB7000
heap
page read and write
1BC731F2000
heap
page read and write
3110000
trusted library allocation
page read and write
26E2000
heap
page read and write
1380000
heap
page read and write
26D5000
heap
page read and write
14A7000
heap
page read and write
1D1000
unkown
page execute read
649000
heap
page read and write
1BC71A30000
heap
page read and write
26EE000
heap
page read and write
30A0000
trusted library allocation
page read and write
28B0000
heap
page read and write
16A0000
trusted library allocation
page read and write
26D7000
heap
page read and write
30A0000
trusted library allocation
page read and write
1BC71D35000
heap
page read and write
649000
heap
page read and write
2E089E30000
heap
page read and write
1BC71436000
heap
page read and write
3150000
unkown
page read and write
649000
heap
page read and write
1BC7133D000
heap
page read and write
26D0000
heap
page read and write
649000
heap
page read and write
DF5000
heap
page read and write
2970000
heap
page read and write
7FF5279C4000
unkown
page readonly
5A8F000
heap
page read and write
1BC73668000
heap
page read and write
655000
heap
page read and write
3942000
trusted library allocation
page read and write
3936000
trusted library allocation
page read and write
377D000
trusted library allocation
page read and write
C90000
heap
page read and write
16A0000
trusted library allocation
page read and write
3CFE000
stack
page read and write
34C0000
heap
page read and write
7FF527A3B000
unkown
page readonly
3791000
trusted library allocation
page read and write
1690000
heap
page read and write
33CD000
heap
page read and write
1BC6F559000
heap
page read and write
D2B000
unkown
page readonly
1BC715E2000
heap
page read and write
2E089BB4000
trusted library allocation
page read and write
26D5000
heap
page read and write
3770000
trusted library allocation
page read and write
C2B000
heap
page read and write
65F000
heap
page read and write
1BC72F00000
heap
page read and write
CA9000
heap
page read and write
390F000
stack
page read and write
655000
heap
page read and write
1F6D9FE000
stack
page read and write
655000
heap
page read and write
1D1000
unkown
page execute read
3AF5000
trusted library allocation
page read and write
1BC6DC38000
heap
page read and write
2E089F9F000
heap
page read and write
3080000
trusted library allocation
page read and write
2E8B000
stack
page read and write
1BC71A1E000
heap
page read and write
1BC72046000
heap
page read and write
16A0000
trusted library allocation
page read and write
37C7000
trusted library allocation
page read and write
1BC71CB0000
heap
page read and write
26D3000
heap
page read and write
2E088236000
heap
page read and write
655000
heap
page read and write
939000
heap
page read and write
26D7000
heap
page read and write
B4D000
stack
page read and write
26EE000
heap
page read and write
1BC72EEE000
heap
page read and write
649000
heap
page read and write
3780000
heap
page read and write
1BC738AD000
heap
page read and write
3020000
trusted library allocation
page read and write
514000
heap
page read and write
29C000
stack
page read and write
7FF52791A000
unkown
page readonly
26D4000
heap
page read and write
1BC74656000
heap
page read and write
26D7000
heap
page read and write
1BC7169C000
heap
page read and write
970000
heap
page read and write
12D0000
heap
page read and write
1486000
heap
page read and write
83C000
stack
page read and write
162B000
heap
page read and write
2E08A145000
trusted library allocation
page read and write
26E6000
heap
page read and write
CB7000
heap
page read and write
1BC6DC9C000
heap
page read and write
1BC6F4F2000
heap
page read and write
D1B000
heap
page read and write
1BC6F576000
heap
page read and write
6E3000
heap
page read and write
1BC72D5D000
heap
page read and write
163D000
heap
page read and write
2E08A144000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
649000
heap
page read and write
35C0000
heap
page read and write
3710000
heap
page read and write
1BC71844000
heap
page read and write
There are 4068 hidden memdumps, click here to show them.