IOC Report
SecuriteInfo.com.Win32.Malware-gen.10020.18427.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.Malware-gen.10020.18427.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
C:\Program Files (x86)\IPCTools\IPCTools\PlayDiag.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\IPCTools\IPCTools\RemoteConfig.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\IPCTools\IPCTools\RenderEngine.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\IPCTools\IPCTools\WEBConfig.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\IPCTools\IPCTools\WinRender.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\IPCTools\IPCTools\dhplay.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\IPCTools\IPCTools\msvcp100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\IPCTools\IPCTools\msvcr100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\IPCTools\IPCTools\play.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Package Cache\{f65db027-aff3-4070-886a-0d87064aabb1}\vcredist_x86.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\vcredist_x86_vs2005_en.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\.be\vcredist_x86.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Config.Msi\6d20d6.rbs
data
dropped
C:\Config.Msi\6d20da.rbs
data
dropped
C:\Config.Msi\6d20de.rbs
data
dropped
C:\Program Files (x86)\Common Files\Microsoft Shared\VC\msdia80.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\IPCTools\IPCTools\7z.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\IPCTools\IPCTools\7z.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\IPCTools\IPCTools\AjNetSdkDll.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\IPCTools\IPCTools\AjPlayer.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\IPCTools\IPCTools\AjRtspClientLib.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\IPCTools\IPCTools\ArmingUpload\china\Arming_area_please_leave.mp3
MPEG ADTS, layer III, v2, 32 kbps, 16 kHz, Monaural
dropped
C:\Program Files (x86)\IPCTools\IPCTools\ArmingUpload\china\Arming_area_please_leave.txt
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Program Files (x86)\IPCTools\IPCTools\ArmingUpload\china\Garbage_sorting_reminder.mp3
MPEG ADTS, layer III, v2, 32 kbps, 16 kHz, Monaural
dropped
C:\Program Files (x86)\IPCTools\IPCTools\ArmingUpload\china\Garbage_sorting_reminder.txt
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Program Files (x86)\IPCTools\IPCTools\ArmingUpload\china\Hazardous_area_do_not_approach.mp3
MPEG ADTS, layer III, v2, 32 kbps, 16 kHz, Monaural
dropped
C:\Program Files (x86)\IPCTools\IPCTools\ArmingUpload\china\Hazardous_area_do_not_approach.txt
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Program Files (x86)\IPCTools\IPCTools\ArmingUpload\china\Private_area_no_entry.mp3
MPEG ADTS, layer III, v2, 32 kbps, 16 kHz, Monaural
dropped
C:\Program Files (x86)\IPCTools\IPCTools\ArmingUpload\china\Private_area_no_entry.txt
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Program Files (x86)\IPCTools\IPCTools\ArmingUpload\china\Welcome.mp3
MPEG ADTS, layer III, v2, 32 kbps, 16 kHz, Monaural
dropped
C:\Program Files (x86)\IPCTools\IPCTools\ArmingUpload\china\Welcome.txt
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Program Files (x86)\IPCTools\IPCTools\ArmingUpload\china\alarm_do_not_climb_high_dangers.mp3
MPEG ADTS, layer III, v2, 32 kbps, 16 kHz, Monaural
dropped
C:\Program Files (x86)\IPCTools\IPCTools\ArmingUpload\china\alarm_do_not_climb_high_dangers.txt
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Program Files (x86)\IPCTools\IPCTools\ArmingUpload\china\alarm_safety_water_depth_hazards.mp3
MPEG ADTS, layer III, v2, 32 kbps, 16 kHz, Monaural
dropped
C:\Program Files (x86)\IPCTools\IPCTools\ArmingUpload\china\alarm_safety_water_depth_hazards.txt
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Program Files (x86)\IPCTools\IPCTools\ArmingUpload\china\tone_Police_siren.mp3
MPEG ADTS, layer III, v2, 32 kbps, 22.05 kHz, Monaural
dropped
C:\Program Files (x86)\IPCTools\IPCTools\ArmingUpload\china\tone_Police_siren.txt
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Program Files (x86)\IPCTools\IPCTools\ArmingUpload\english\Danger_PleaseKeepAway.mp3
Audio file with ID3 version 2.4.0, contains: MPEG ADTS, layer III, v1, 128 kbps, 44.1 kHz, Stereo
dropped
C:\Program Files (x86)\IPCTools\IPCTools\ArmingUpload\english\Danger_PleaseKeepAway.txt
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Program Files (x86)\IPCTools\IPCTools\ArmingUpload\english\Warning_this_is_restrice_area.mp3
MPEG ADTS, layer III, v2, 32 kbps, 16 kHz, Monaural
dropped
C:\Program Files (x86)\IPCTools\IPCTools\ArmingUpload\english\Warning_this_is_restrice_area.txt
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Program Files (x86)\IPCTools\IPCTools\ArmingUpload\english\tone_Police_siren.mp3
MPEG ADTS, layer III, v2, 32 kbps, 22.05 kHz, Monaural
dropped
C:\Program Files (x86)\IPCTools\IPCTools\ArmingUpload\english\tone_Police_siren.txt
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Program Files (x86)\IPCTools\IPCTools\HWDec.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\IPCTools\IPCTools\IPCTools.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\IPCTools\IPCTools\MP4V3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\IPCTools\IPCTools\ajfileserver.7z
7-zip archive data, version 0.4
dropped
C:\Program Files (x86)\IPCTools\IPCTools\display.xml
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\IPCTools\IPCTools\firmware_clean_all_cust.bin
data
dropped
C:\Program Files (x86)\IPCTools\IPCTools\ipc_search.ico
MS Windows icon resource - 7 icons, -128x-128, 32 bits/pixel, 96x96, 32 bits/pixel
dropped
C:\Program Files (x86)\IPCTools\IPCTools\language.xml
XML 1.0 document, Unicode text, UTF-8 text
dropped
C:\Program Files (x86)\IPCTools\IPCTools\language_en-us.xml
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (315)
dropped
C:\Program Files (x86)\IPCTools\IPCTools\language_ko-ko.xml
XML 1.0 document, Unicode text, UTF-8 (with BOM) text
dropped
C:\Program Files (x86)\IPCTools\IPCTools\language_mongolian.xml
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (351), with CRLF line terminators
dropped
C:\Program Files (x86)\IPCTools\IPCTools\language_pl-pl.xml
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (319)
dropped
C:\Program Files (x86)\IPCTools\IPCTools\language_pt-br.xml
XML 1.0 document, Unicode text, UTF-8 text
dropped
C:\Program Files (x86)\IPCTools\IPCTools\language_russian.xml
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (362), with CRLF line terminators
dropped
C:\Program Files (x86)\IPCTools\IPCTools\language_zh-cn.xml
XML 1.0 document, Unicode text, UTF-8 text
dropped
C:\Program Files (x86)\IPCTools\IPCTools\language_zh-tw.xml
XML 1.0 document, Unicode text, UTF-8 text
dropped
C:\Program Files (x86)\IPCTools\IPCTools\registry.xml
XML 1.0 document, ASCII text, with no line terminators
dropped
C:\Program Files (x86)\IPCTools\IPCTools\restore.mp3
MPEG ADTS, layer III, v2, 32 kbps, 16 kHz, Monaural
dropped
C:\Program Files (x86)\IPCTools\IPCTools\startprint.mp3
MPEG ADTS, layer III, v2, 32 kbps, 16 kHz, Monaural
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\IPCTools\IPCTools\IPCTools.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Tue May 21 13:02:24 2024, mtime=Thu Jul 4 19:29:18 2024, atime=Tue May 21 13:02:24 2024, length=1761792, window=hide
dropped
C:\ProgramData\Package Cache\{f65db027-aff3-4070-886a-0d87064aabb1}\state.rsm
data
dropped
C:\Users\Public\Desktop\IPCTools.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Tue May 21 13:02:24 2024, mtime=Thu Jul 4 19:29:10 2024, atime=Tue May 21 13:02:24 2024, length=1761792, window=hide
dropped
C:\Users\user\AppData\Local\Temp\IXP000.TMP\vcredis1.cab
Microsoft Cabinet archive data, Windows 2000/XP setup, 253512 bytes, 1 file, at 0x2c +A "FL_msdia71_dll_2_____X86.3643236F_FC70_11D3_A536_0090278A1BB8", ID 4303, number 1, 20 datablocks, 0x1503 compression
dropped
C:\Users\user\AppData\Local\Temp\IXP000.TMP\vcredist.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, MSI Installer, Create Time/Date: Mon Jun 21 09:00:00 1999, Number of Pages: 200, Code page: 1252, Title: Installation Database, Subject: Microsoft Visual C++ 2005 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: Microsoft Visual C++ 2005 Redistributable RTL x86 enu; Copyright (C) Microsoft Corporation, All rights reserved., Template: Intel;0, Revision Number: {31076048-5B7B-4476-ABF0-15989228CB90}, Name of Creating Application: Visual Studio Setup Build Engine (BuildMod.DLL), Security: 2, Last Saved Time/Date: Fri May 13 19:14:52 2011, Number of Words: 2
dropped
C:\Users\user\AppData\Local\Temp\MSId3100.LOG
Unicode text, UTF-16, little-endian text, with very long lines (370), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20240704162930.log
ASCII text, with very long lines (320), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20240704162930_0_vcRuntimeMinimum_x86.log
Unicode text, UTF-16, little-endian text, with very long lines (588), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20240704162930_1_vcRuntimeAdditional_x86.log
Unicode text, UTF-16, little-endian text, with very long lines (588), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsoBE71.tmp\InstallOptions.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsoBE71.tmp\LangDLL.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsoBE71.tmp\ioSpecial.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsoBE71.tmp\modern-wizard.bmp
PC bitmap, Windows 3.x format, 164 x 314 x 4, image size 26376, resolution 2834 x 2834 px/m, cbSize 26494, bits offset 118
dropped
C:\Users\user\AppData\Local\Temp\vcredist_x86_vs2013_en.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\.ba1\BootstrapperApplicationData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (560), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\.ba1\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\.ba1\logo.png
PNG image data, 64 x 64, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\.ba1\thm.wxl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\.ba1\thm.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\.ba1\wixstdba.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\cab54A5CABBE7274D8A22EB58060AAB7623
Microsoft Cabinet archive data, many, 980926 bytes, 5 files, at 0x44 +A "F_CENTRAL_msvcp120_x86" +A "F_CENTRAL_msvcr120_x86", flags 0x4, number 1, extra bytes 20 in head, 66 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\cabB3E1576D1FEFBB979E13B1A5379E0B16
Microsoft Cabinet archive data, 4916768 bytes, 14 files, at 0x44 +A "F_CENTRAL_mfc120_x86" +A "F_CENTRAL_mfc120chs_x86", flags 0x4, number 1, extra bytes 20 in head, 296 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\vcRuntimeAdditional_x86
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2013 x86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005., Template: Intel;1033, Revision Number: {5703FD24-BF2D-4D14-AB2F-E415A0361E63}, Create Time/Date: Sat Oct 5 11:36:30 2013, Last Saved Time/Date: Sat Oct 5 11:36:30 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.7.1623.0), Security: 2
dropped
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\vcRuntimeMinimum_x86
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2013 x86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005., Template: Intel;1033, Revision Number: {E9934153-EAB1-4DA6-AA72-86C8BB1EDF2C}, Create Time/Date: Sat Oct 5 11:36:36 2013, Last Saved Time/Date: Sat Oct 5 11:36:36 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.7.1623.0), Security: 2
dropped
C:\Windows\Installer\6d20d4.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, MSI Installer, Create Time/Date: Mon Jun 21 09:00:00 1999, Number of Pages: 200, Code page: 1252, Title: Installation Database, Subject: Microsoft Visual C++ 2005 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: Microsoft Visual C++ 2005 Redistributable RTL x86 enu; Copyright (C) Microsoft Corporation, All rights reserved., Template: Intel;0, Revision Number: {31076048-5B7B-4476-ABF0-15989228CB90}, Name of Creating Application: Visual Studio Setup Build Engine (BuildMod.DLL), Security: 2, Last Saved Time/Date: Fri May 13 19:14:52 2011, Number of Words: 2
dropped
C:\Windows\Installer\6d20d7.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, MSI Installer, Create Time/Date: Mon Jun 21 09:00:00 1999, Number of Pages: 200, Code page: 1252, Title: Installation Database, Subject: Microsoft Visual C++ 2005 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: Microsoft Visual C++ 2005 Redistributable RTL x86 enu; Copyright (C) Microsoft Corporation, All rights reserved., Template: Intel;0, Revision Number: {31076048-5B7B-4476-ABF0-15989228CB90}, Name of Creating Application: Visual Studio Setup Build Engine (BuildMod.DLL), Security: 2, Last Saved Time/Date: Fri May 13 19:14:52 2011, Number of Words: 2
dropped
C:\Windows\Installer\6d20d8.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2013 x86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005., Template: Intel;1033, Revision Number: {E9934153-EAB1-4DA6-AA72-86C8BB1EDF2C}, Create Time/Date: Sat Oct 5 11:36:36 2013, Last Saved Time/Date: Sat Oct 5 11:36:36 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.7.1623.0), Security: 2
dropped
C:\Windows\Installer\6d20db.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2013 x86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005., Template: Intel;1033, Revision Number: {E9934153-EAB1-4DA6-AA72-86C8BB1EDF2C}, Create Time/Date: Sat Oct 5 11:36:36 2013, Last Saved Time/Date: Sat Oct 5 11:36:36 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.7.1623.0), Security: 2
dropped
C:\Windows\Installer\6d20dc.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2013 x86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005., Template: Intel;1033, Revision Number: {5703FD24-BF2D-4D14-AB2F-E415A0361E63}, Create Time/Date: Sat Oct 5 11:36:30 2013, Last Saved Time/Date: Sat Oct 5 11:36:30 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.7.1623.0), Security: 2
dropped
C:\Windows\Installer\6d20df.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2013 x86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005., Template: Intel;1033, Revision Number: {5703FD24-BF2D-4D14-AB2F-E415A0361E63}, Create Time/Date: Sat Oct 5 11:36:30 2013, Last Saved Time/Date: Sat Oct 5 11:36:30 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.7.1623.0), Security: 2
dropped
C:\Windows\Installer\MSI2354.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI2CEA.tmp
data
dropped
C:\Windows\Installer\MSI9838.tmp
data
dropped
C:\Windows\Installer\MSI9EB1.tmp
data
dropped
C:\Windows\Installer\SourceHash{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\SourceHash{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\SourceHash{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\SysWOW64\mfc120chs.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc120cht.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc120deu.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc120enu.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc120esn.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc120fra.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc120ita.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc120jpn.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc120kor.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc120rus.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\vcamp120.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\vcomp120.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\~DF0D0B5FB702FA3DCB.TMP
data
dropped
C:\Windows\Temp\~DF0EC8608B9E5C127E.TMP
data
dropped
C:\Windows\Temp\~DF128E55B9BE3CB8F4.TMP
data
dropped
C:\Windows\Temp\~DF1DC5004F568B4844.TMP
data
modified
C:\Windows\Temp\~DF295472261A3FD9BD.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF31FC46B418A22292.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF3B93F582E315F895.TMP
data
dropped
C:\Windows\Temp\~DF414678F2701A1AC3.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF43E18F71882F45C3.TMP
data
dropped
C:\Windows\Temp\~DF57E255BAA2F21910.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF670E07D4926FAB6D.TMP
data
dropped
C:\Windows\Temp\~DF675C29C7E70E2FC2.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF6B02453BB7FFCA53.TMP
data
dropped
C:\Windows\Temp\~DF74326E5B42649FBC.TMP
data
dropped
C:\Windows\Temp\~DF7BDF82FE44019C8C.TMP
data
dropped
C:\Windows\Temp\~DF85AD642656776D4A.TMP
data
dropped
C:\Windows\Temp\~DF89319D1C3029050D.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF943D361E6FD8BA36.TMP
data
dropped
C:\Windows\Temp\~DF9981C9EAE3B4C966.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF9CAC639F5B4DD1C5.TMP
data
dropped
C:\Windows\Temp\~DFAA888D2F3211F178.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFC57CACC7B4BADA46.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFC9459F4C5961BEB2.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFCB681BCD25FB9DD2.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFD6DF29FE878886D8.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFD6E1C177B4F6F167.TMP
data
dropped
C:\Windows\Temp\~DFE46A57D61B65357A.TMP
data
dropped
C:\Windows\Temp\~DFE912E947C19AF2F3.TMP
data
dropped
C:\Windows\Temp\~DFEAF171339255A7AF.TMP
data
dropped
C:\Windows\Temp\~DFEC8F688D3BA16A1C.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFF36962FDF9CE9496.TMP
data
dropped
C:\Windows\Temp\~DFF3B7CC65AFBC7454.TMP
data
dropped
C:\Windows\WinSxS\InstallTemp\20240704162926823.0\ATL80.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240704162926823.0\x86_Microsoft.VC80.ATL_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_a4c618fa.cat
data
dropped
C:\Windows\WinSxS\InstallTemp\20240704162926823.0\x86_Microsoft.VC80.ATL_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_a4c618fa.manifest
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\WinSxS\InstallTemp\20240704162926855.0\msvcm80.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240704162926855.0\msvcp80.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240704162926855.0\msvcr80.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240704162926855.0\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_44262b86.cat
data
dropped
C:\Windows\WinSxS\InstallTemp\20240704162926855.0\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_44262b86.manifest
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (504), with CRLF line terminators
dropped
C:\Windows\WinSxS\InstallTemp\20240704162926964.0\mfc80.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240704162926964.0\mfc80u.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240704162926964.0\mfcm80.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240704162926964.0\mfcm80u.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240704162926964.0\x86_Microsoft.VC80.MFC_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_150c9e8b.cat
data
dropped
C:\Windows\WinSxS\InstallTemp\20240704162926964.0\x86_Microsoft.VC80.MFC_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_150c9e8b.manifest
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (504), with CRLF line terminators
dropped
C:\Windows\WinSxS\InstallTemp\20240704162927136.0\mfc80CHS.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240704162927136.0\mfc80CHT.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240704162927136.0\mfc80DEU.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240704162927136.0\mfc80ENU.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240704162927136.0\mfc80ESP.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240704162927136.0\mfc80FRA.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240704162927136.0\mfc80ITA.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240704162927136.0\mfc80JPN.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240704162927136.0\mfc80KOR.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240704162927136.0\x86_Microsoft.VC80.MFCLOC_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_6a5bb789.cat
data
dropped
C:\Windows\WinSxS\InstallTemp\20240704162927136.0\x86_Microsoft.VC80.MFCLOC_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_6a5bb789.manifest
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\WinSxS\InstallTemp\20240704162927261.0\vcomp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\WinSxS\InstallTemp\20240704162927261.0\x86_Microsoft.VC80.OpenMP_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_452bf920.cat
data
dropped
C:\Windows\WinSxS\InstallTemp\20240704162927261.0\x86_Microsoft.VC80.OpenMP_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_452bf920.manifest
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\WinSxS\InstallTemp\20240704162927276.0\8.0.50727.6195.cat
data
dropped
C:\Windows\WinSxS\InstallTemp\20240704162927276.0\8.0.50727.6195.policy
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\WinSxS\InstallTemp\20240704162927292.0\8.0.50727.6195.cat
data
dropped
C:\Windows\WinSxS\InstallTemp\20240704162927292.0\8.0.50727.6195.policy
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\WinSxS\InstallTemp\20240704162927308.0\8.0.50727.6195.cat
data
dropped
C:\Windows\WinSxS\InstallTemp\20240704162927308.0\8.0.50727.6195.policy
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\WinSxS\InstallTemp\20240704162927308.1\8.0.50727.6195.cat
data
dropped
C:\Windows\WinSxS\InstallTemp\20240704162927308.1\8.0.50727.6195.policy
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\WinSxS\InstallTemp\20240704162927323.0\8.0.50727.6195.cat
data
dropped
C:\Windows\WinSxS\InstallTemp\20240704162927323.0\8.0.50727.6195.policy
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
There are 174 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.10020.18427.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.10020.18427.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
"C:\Windows\system32\taskkill.exe" /F /IM IPCTools.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Users\user\AppData\Local\Temp\vcredist_x86_vs2005_en.exe
C:\Users\user\AppData\Local\Temp\vcredist_x86_vs2005_en.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\msiexec.exe
msiexec /i vcredist.msi
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 8341741E8479EC6D551F124E2FB1671E
C:\Users\user\AppData\Local\Temp\vcredist_x86_vs2013_en.exe
C:\Users\user\AppData\Local\Temp\vcredist_x86_vs2013_en.exe
C:\Users\user\AppData\Local\Temp\vcredist_x86_vs2013_en.exe
"C:\Users\user\AppData\Local\Temp\vcredist_x86_vs2013_en.exe" -burn.unelevated BurnPipe.{A826652D-AFD8-40B6-84B0-7105BE434658} {ED4ADFC9-BDFE-4680-B562-A7A4CCF98333} 6952
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Windows\System32\SrTasks.exe
C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://10.6.5.2/svnpl/CODEC/PC/ADPCM/Trunk
unknown
http://10.6.5.2/svnpl/CODEC/PC/Audio_Codec/Audio_Mpeg2l2_Dec/Trunk
unknown
http://lame.sf.net
unknown
http://www.icamra.com/
unknown
http://10.6.5.2/svnpl/CODEC/PC/Audio_Codec/Audio_Mpeg2l2_Dec/Trunkmalloc
unknown
http://wixtoolset.org/schemas/thmutil/2010
unknown
http://%s/http://%s:%d//:HTTP:http:login.html?idChangeStream%d:%d-%d:%dselectedIndexevaltry
unknown
http://10.6.5.2/svnpl/CODEC/PC/DEC_H26L/Trunk/H26L_Decoder_PC
unknown
http://www.symauth.com/rpa00
unknown
http://www.audiocoding.com/)
unknown
http://lame.sf.net1.0LAME3.99rLAME3.99r53.99.5
unknown
http://www.microsoft.
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://10.6.5.2/svnpl/CODEC/PC/DEC_H26L/Trunk/H26L_Decoder_PCInput
unknown
http://www.symauth.com/cps0(
unknown
There are 5 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
wextract_cleanup0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A43489159A520F0D93D032CCAF37E7FE20A8B419
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A43489159A520F0D93D032CCAF37E7FE20A8B419
Blob
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6d20d6.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6d20d6.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F942F94A19C0F79468FD2B85E5E8677B
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\77EB05CE46035D115AA4000972A8B18B
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\4006F64980E4BACB0EF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1FA18F7974E099CD0AF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\ED124534C201BC1D0CF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\4006F64980E4BACB0DF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1FA18F7974E099CD0BF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\65D08F79D77199CD0BF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\50D08F791A7199CD0BF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BEE08F799C6199CD0BF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A9E08F79DE6199CD0BF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\50D08F791A7199CD0CF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A9E08F79DE6199CD0CF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\794475340AEA7C1D0BF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3C7DB2B9966ADE110CF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6076953468135C1D0BF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1AE87534CE837C1D0BF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1AE87534CE837C1D0CF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A6555534A8BC9C1D0CF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DA42BC89BF25F5BD0AF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5081BC895CB5F5BD0BF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\4F76A244A49AD80D0CF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2A31EAB9FA7E3C6D0AF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6CD93EE9D3F761C00BF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D43D1EE9D8E781C00CF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\470D1EE91DF781C00BF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\27BB0174E8F9EEBC0CF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6EC3DF47D8A2C9E00AF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\780705E191800E540AF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A57605E15BE00E540BF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D33605E1B2110E540BF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CE2605E1F4110E540CF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2562336682C91B850AF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6F949E36CB3004C50AF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9D6C7B862FD11C450AF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F3D0372D14C348850AF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6B3F9B40546985670AF18C3B9B1A1EE8
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Program Files (x86)\Common Files\Microsoft Shared\VC\msdia80.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1E9E9A540C8BFC34A9AE14B739ECD0DB
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Common Files\Microsoft Shared\VC\
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\8.0\RED\1033
Install
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\8.0\RED\1033
InstallerType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\8.0\RED\1033
SP
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\8.0\RED\1033
SPIndex
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\8.0\RED\1033
SPName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SideBySide\PatchedComponents
{97F81AF1-0E47-DC99-A01F-C8B3B9A1E18E}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SideBySide\PatchedComponents
{98CB24AD-52FB-DB5F-A01F-C8B3B9A1E18E}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SideBySide\PatchedComponents
{9BAE13A2-E7AF-D6C3-A01F-C8B3B9A1E18E}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SideBySide\PatchedComponents
{74FD3CE6-2A8D-0E9C-A01F-C8B3B9A1E18E}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SideBySide\PatchedComponents
{1E507087-0819-45E0-A01F-C8B3B9A1E18E}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SideBySide\PatchedComponents
{66332652-9C28-58B1-A01F-C8B3B9A1E18E}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SideBySide\PatchedComponents
{63E949F6-03BC-5C40-A01F-C8B3B9A1E18E}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SideBySide\PatchedComponents
{68B7C6D9-1DF2-54C1-A01F-C8B3B9A1E18E}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SideBySide\PatchedComponents
{D2730D3F-3C41-5884-A01F-C8B3B9A1E18E}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SideBySide\PatchedComponents
{04B9F3B6-9645-7658-A01F-C8B3B9A1E18E}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\AA5D9C68C00F12943B2F6CA09FE28244
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global
Microsoft.VC80.ATL,type="win32",version="8.0.50727.6195",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global
Microsoft.VC80.CRT,type="win32",version="8.0.50727.6195",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global
Microsoft.VC80.MFC,type="win32",version="8.0.50727.6195",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global
Microsoft.VC80.MFCLOC,type="win32",version="8.0.50727.6195",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global
Microsoft.VC80.OpenMP,type="win32",version="8.0.50727.6195",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global
policy.8.0.Microsoft.VC80.ATL,type="win32-policy",version="8.0.50727.6195",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global
policy.8.0.Microsoft.VC80.CRT,type="win32-policy",version="8.0.50727.6195",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global
policy.8.0.Microsoft.VC80.MFC,type="win32-policy",version="8.0.50727.6195",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global
policy.8.0.Microsoft.VC80.MFCLOC,type="win32-policy",version="8.0.50727.6195",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global
policy.8.0.Microsoft.VC80.OpenMP,type="win32-policy",version="8.0.50727.6195",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\c1c4f01781cc94c4c8fb1542c0981a2a
VC_Redist
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\Features
VC_Redist
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\c1c4f01781cc94c4c8fb1542c0981a2a
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\Features
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\c1c4f01781cc94c4c8fb1542c0981a2a\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\AA5D9C68C00F12943B2F6CA09FE28244
c1c4f01781cc94c4c8fb1542c0981a2a
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList\Media
DiskPrompt
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList\Media
2
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList\Media
3
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList\Media
4
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList\Media
5
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList\Media
6
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList\Media
7
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList\Media
8
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList\Media
9
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList\Media
10
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList\Media
11
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList
LastUsedSource
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6d20da.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6d20da.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7CAA08EF3739B543C898104D5339838F
21EE4A31AE32173319EEFE3BD6FDFFE3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\749C53802D6D25E4FA4120130DE488AE
21EE4A31AE32173319EEFE3BD6FDFFE3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB
21EE4A31AE32173319EEFE3BD6FDFFE3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6
21EE4A31AE32173319EEFE3BD6FDFFE3
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\vcamp120.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\345CD80E7ADAB6646B92EC09D89DDB3E
21EE4A31AE32173319EEFE3BD6FDFFE3
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\vcomp120.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3D4577A1B447A9342B48DBA7C142CFAF
21EE4A31AE32173319EEFE3BD6FDFFE3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\64D33A20AABB1EA31BF893B0436FD952
21EE4A31AE32173319EEFE3BD6FDFFE3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C3CC85108644EEB3AA9E1CC5CB146DD7
21EE4A31AE32173319EEFE3BD6FDFFE3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7C7CA8F6AFF2E883CBEF81E616CA4B73
21EE4A31AE32173319EEFE3BD6FDFFE3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\749C53802D6D25E4FA4120130DE488AE\21EE4A31AE32173319EEFE3BD6FDFFE3
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v12
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v12
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v12
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x86
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x86
Installed
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x86
Major
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x86
Minor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x86
Bld
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x86
Rbld
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0
SP
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0
SPIndex
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
Install
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
InstallerType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
SPName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
UpdateVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\1FB5F95B8C762083E895C25E153AF95C
21EE4A31AE32173319EEFE3BD6FDFFE3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\21EE4A31AE32173319EEFE3BD6FDFFE3
VC_Runtime_Minimum
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\Features
VC_Runtime_Minimum
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\21EE4A31AE32173319EEFE3BD6FDFFE3
Provider
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\Features
Provider
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\21EE4A31AE32173319EEFE3BD6FDFFE3
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\Features
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\1FB5F95B8C762083E895C25E153AF95C
21EE4A31AE32173319EEFE3BD6FDFFE3
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\SourceList\Media
DiskPrompt
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\SourceList
LastUsedSource
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6d20de.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6d20de.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\12A184D1F34C9B830B1D0E09DFD26234
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2C3624DA4AD00048A0EB48E4EA6A9C3
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29C5E17263532824A9FB44A9198B2C7D
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc120cht.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1B4424E8F8F60AE4CAA643D67EFC970A
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc120chs.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\04227BBBA6F818A44ABA7B7FEFE2496C
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc120enu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7309AD69569C54C42AC77E268345112F
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc120deu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6FAD7EE0916644F428B74920FE352AD4
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc120esn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4C3045C250CA36498FBCA0172083495
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc120fra.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D0AFBC2DFFBF964C966EB1DAC5BB10A
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc120ita.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C3601DD9224EF594A96BA741F92B285B
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc120jpn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F2132BA00EBB72C42A7026C487984B6D
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc120kor.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\109A3AD6210E2E248B91AD3F87EBB4FE
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc120rus.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E03DDD0940D9F144893096F40883A78E
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\64D33A20AABB1EA31BF893B0436FD952
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6764CC2991A26973DAE5976895576F3F
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\13FB0C7B0049A443FAE4A93AA7FAB407
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2C3624DA4AD00048A0EB48E4EA6A9C3\22BEFC8F7E2A1793E9ADB411DEFE1C58
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29C5E17263532824A9FB44A9198B2C7D\22BEFC8F7E2A1793E9ADB411DEFE1C58
File
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v12
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v12
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v12
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
Install
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
InstallerType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
SP
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
SPIndex
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
SPName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
UpdateVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\B696E639D8C084A389FD43F4AEE41193
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\22BEFC8F7E2A1793E9ADB411DEFE1C58
VC_Runtime_Additional
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\Features
VC_Runtime_Additional
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\22BEFC8F7E2A1793E9ADB411DEFE1C58
Provider
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\Features
Provider
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\22BEFC8F7E2A1793E9ADB411DEFE1C58
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\Features
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\B696E639D8C084A389FD43F4AEE41193
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\SourceList\Media
DiskPrompt
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcr120.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcp120.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\vccorlib120.dll
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc120.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc120u.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfcm120.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfcm120u.dll
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
AoACAPIError
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
AoACAPIResult
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
FirstRun
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
LastIndex
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
NestingLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
StartNesting
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore
SRInitDone
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
SrCreateRp (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
SrCreateRp (Leave)
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
BundleCachePath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
BundleUpgradeCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
BundleAddonCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
BundleDetectCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
BundlePatchCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
BundleVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
BundleProviderKey
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
BundleTag
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
EngineVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
NoElevateOnModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{f65db027-aff3-4070-886a-0d87064aabb1}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{f65db027-aff3-4070-886a-0d87064aabb1}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{f65db027-aff3-4070-886a-0d87064aabb1}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
Resume
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
{f65db027-aff3-4070-886a-0d87064aabb1}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
BundleResumeCommandLine
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\25\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\25\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
Installed
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
RPSessionInterval
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
LastIndex
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
Resume
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
There are 589 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
241475F4000
trusted library allocation
page read and write
729000
heap
page read and write
638000
heap
page read and write
71A000
heap
page read and write
24145405000
heap
page read and write
27CA000
heap
page read and write
729000
heap
page read and write
24145466000
heap
page read and write
D63000
heap
page read and write
710000
heap
page read and write
241475EC000
trusted library allocation
page read and write
2414544D000
heap
page read and write
2AC3000
heap
page read and write
241475ED000
trusted library allocation
page read and write
A50000
unkown
page readonly
2D7C000
stack
page read and write
2A4C000
stack
page read and write
3990000
trusted library allocation
page read and write
241475F2000
trusted library allocation
page read and write
241475F6000
trusted library allocation
page read and write
24146F14000
trusted library allocation
page read and write
73C000
heap
page read and write
24145463000
heap
page read and write
A8A000
unkown
page readonly
241475EA000
trusted library allocation
page read and write
730000
heap
page read and write
241475EE000
trusted library allocation
page read and write
D03000
heap
page read and write
729000
heap
page read and write
F71C67F000
stack
page read and write
4F5000
heap
page read and write
680000
heap
page read and write
D05000
heap
page read and write
241475F0000
trusted library allocation
page read and write
241475EE000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
24145405000
heap
page read and write
24145421000
heap
page read and write
729000
heap
page read and write
1001000
unkown
page execute read
241475EF000
trusted library allocation
page read and write
24147290000
heap
page read and write
8C0000
heap
page read and write
71A000
heap
page read and write
AA4000
unkown
page write copy
21CE000
stack
page read and write
23A0000
heap
page read and write
241475F0000
trusted library allocation
page read and write
241475ED000
trusted library allocation
page read and write
24145421000
heap
page read and write
241475EF000
trusted library allocation
page read and write
538000
heap
page read and write
241475F4000
trusted library allocation
page read and write
CC1000
heap
page read and write
2414544B000
heap
page read and write
71A000
heap
page read and write
714000
heap
page read and write
241475F5000
trusted library allocation
page read and write
6F3000
heap
page read and write
24146F14000
trusted library allocation
page read and write
24145405000
heap
page read and write
241475F2000
trusted library allocation
page read and write
AAA000
unkown
page readonly
70B000
heap
page read and write
714000
heap
page read and write
241470E0000
heap
page read and write
71A000
heap
page read and write
241475ED000
trusted library allocation
page read and write
2414544E000
heap
page read and write
24146F14000
trusted library allocation
page read and write
24145421000
heap
page read and write
70B000
heap
page read and write
3300000
trusted library allocation
page read and write
24145473000
heap
page read and write
24145423000
heap
page read and write
70B000
heap
page read and write
4142000
heap
page read and write
710000
heap
page read and write
3990000
trusted library allocation
page read and write
27C2000
heap
page read and write
241475EE000
trusted library allocation
page read and write
241475EC000
trusted library allocation
page read and write
2414544D000
heap
page read and write
24145469000
heap
page read and write
241475EF000
trusted library allocation
page read and write
2414544D000
heap
page read and write
D39000
heap
page read and write
4C1000
unkown
page read and write
3990000
trusted library allocation
page read and write
D15000
heap
page read and write
24146F10000
trusted library allocation
page read and write
67D000
heap
page read and write
27CB000
heap
page read and write
24145471000
heap
page read and write
24145451000
heap
page read and write
6F8BF000
unkown
page readonly
24146F14000
trusted library allocation
page read and write
241475F3000
trusted library allocation
page read and write
D1D000
heap
page read and write
24145460000
heap
page read and write
27C4000
heap
page read and write
2F2F000
stack
page read and write
241475F3000
trusted library allocation
page read and write
27D8000
heap
page read and write
730000
heap
page read and write
24145463000
heap
page read and write
729000
heap
page read and write
2FAF000
heap
page read and write
2880000
heap
page read and write
4149000
heap
page read and write
71A000
heap
page read and write
241475F5000
trusted library allocation
page read and write
24146F14000
trusted library allocation
page read and write
30F0000
heap
page read and write
28C6000
heap
page read and write
241475EA000
trusted library allocation
page read and write
24145453000
heap
page read and write
4FE000
unkown
page readonly
24145421000
heap
page read and write
241475EF000
trusted library allocation
page read and write
730000
heap
page read and write
3990000
trusted library allocation
page read and write
730000
heap
page read and write
241475F6000
trusted library allocation
page read and write
24145462000
heap
page read and write
517000
heap
page read and write
1000000
unkown
page readonly
24145421000
heap
page read and write
71A000
heap
page read and write
522000
heap
page read and write
241475F2000
trusted library allocation
page read and write
24146F10000
trusted library allocation
page read and write
24145462000
heap
page read and write
10000000
unkown
page readonly
6FF000
heap
page read and write
730000
heap
page read and write
241475EF000
trusted library allocation
page read and write
24145466000
heap
page read and write
24145471000
heap
page read and write
E66000
heap
page read and write
710000
heap
page read and write
241475F2000
trusted library allocation
page read and write
24146F14000
trusted library allocation
page read and write
2414544B000
heap
page read and write
730000
heap
page read and write
241475F2000
trusted library allocation
page read and write
241475F2000
trusted library allocation
page read and write
27C2000
heap
page read and write
27C2000
heap
page read and write
710000
heap
page read and write
241475F2000
trusted library allocation
page read and write
D50000
heap
page read and write
714000
heap
page read and write
27C2000
heap
page read and write
24145423000
heap
page read and write
2870000
heap
page read and write
241475EB000
trusted library allocation
page read and write
241475F1000
trusted library allocation
page read and write
714000
heap
page read and write
2414544D000
heap
page read and write
3AAC000
stack
page read and write
241475ED000
trusted library allocation
page read and write
241475E7000
trusted library allocation
page read and write
714000
heap
page read and write
241475EC000
trusted library allocation
page read and write
241475F3000
trusted library allocation
page read and write
241475F4000
trusted library allocation
page read and write
19C000
stack
page read and write
3990000
trusted library allocation
page read and write
241475F3000
trusted library allocation
page read and write
24145460000
heap
page read and write
241475ED000
trusted library allocation
page read and write
2414544D000
heap
page read and write
241475F6000
trusted library allocation
page read and write
24145405000
heap
page read and write
241475EB000
trusted library allocation
page read and write
729000
heap
page read and write
70B000
heap
page read and write
19A000
stack
page read and write
6FF000
heap
page read and write
6FF000
heap
page read and write
2B6E000
stack
page read and write
27C1000
heap
page read and write
3990000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
241475ED000
trusted library allocation
page read and write
241475F5000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
43BE000
stack
page read and write
241475F4000
trusted library allocation
page read and write
6BE000
heap
page read and write
241475F0000
trusted library allocation
page read and write
70B000
heap
page read and write
44FE000
stack
page read and write
241475EB000
trusted library allocation
page read and write
70B000
heap
page read and write
71A000
heap
page read and write
24146F10000
trusted library allocation
page read and write
71A000
heap
page read and write
D1A000
heap
page read and write
241475F5000
trusted library allocation
page read and write
6FF000
heap
page read and write
757000
heap
page read and write
3990000
trusted library allocation
page read and write
2F7D000
heap
page read and write
3990000
trusted library allocation
page read and write
730000
heap
page read and write
24145405000
heap
page read and write
24145466000
heap
page read and write
241475EB000
trusted library allocation
page read and write
66B000
stack
page read and write
6FF000
heap
page read and write
408000
unkown
page readonly
202FDC80000
heap
page read and write
27C5000
heap
page read and write
6FF000
heap
page read and write
5E6000
heap
page read and write
241475EE000
trusted library allocation
page read and write
729000
heap
page read and write
24145423000
heap
page read and write
6FF000
heap
page read and write
241475EA000
trusted library allocation
page read and write
24146F14000
trusted library allocation
page read and write
24145466000
heap
page read and write
66C000
heap
page read and write
241475ED000
trusted library allocation
page read and write
24145474000
heap
page read and write
241475F6000
trusted library allocation
page read and write
24146F10000
trusted library allocation
page read and write
2414546E000
heap
page read and write
24145423000
heap
page read and write
70B000
heap
page read and write
241475EB000
trusted library allocation
page read and write
6FF000
heap
page read and write
241475EF000
trusted library allocation
page read and write
241475F6000
trusted library allocation
page read and write
241475F6000
trusted library allocation
page read and write
69F000
heap
page read and write
714000
heap
page read and write
A8A000
unkown
page readonly
3990000
trusted library allocation
page read and write
714000
heap
page read and write
241475FF000
trusted library allocation
page read and write
83C547F000
stack
page read and write
241475F0000
trusted library allocation
page read and write
70B000
heap
page read and write
70B000
heap
page read and write
6FF000
heap
page read and write
24145423000
heap
page read and write
3990000
trusted library allocation
page read and write
729000
heap
page read and write
27C2000
heap
page read and write
241475F1000
trusted library allocation
page read and write
2414544E000
heap
page read and write
24145463000
heap
page read and write
730000
heap
page read and write
730000
heap
page read and write
24145423000
heap
page read and write
71A000
heap
page read and write
24145472000
heap
page read and write
2414544D000
heap
page read and write
24145460000
heap
page read and write
24146F14000
trusted library allocation
page read and write
241475EB000
trusted library allocation
page read and write
730000
heap
page read and write
730000
heap
page read and write
24146F14000
trusted library allocation
page read and write
729000
heap
page read and write
241475ED000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
100B000
unkown
page write copy
241475EB000
trusted library allocation
page read and write
540000
heap
page read and write
714000
heap
page read and write
4DD000
unkown
page read and write
2414544D000
heap
page read and write
24146F14000
trusted library allocation
page read and write
241475F1000
trusted library allocation
page read and write
27CB000
heap
page read and write
241475F2000
trusted library allocation
page read and write
6FF000
heap
page read and write
71A000
heap
page read and write
241475ED000
trusted library allocation
page read and write
241475F4000
trusted library allocation
page read and write
24145405000
heap
page read and write
2414544D000
heap
page read and write
2362000
trusted library allocation
page read and write
729000
heap
page read and write
7D0000
heap
page read and write
714000
heap
page read and write
27C0000
heap
page read and write
6C0000
heap
page read and write
27C0000
heap
page read and write
71A000
heap
page read and write
2FA5000
heap
page read and write
241475ED000
trusted library allocation
page read and write
24146F10000
trusted library allocation
page read and write
A50000
unkown
page readonly
DC000
stack
page read and write
24145421000
heap
page read and write
70B000
heap
page read and write
24146F10000
trusted library allocation
page read and write
24146F14000
trusted library allocation
page read and write
4140000
heap
page read and write
24145405000
heap
page read and write
241475EA000
trusted library allocation
page read and write
729000
heap
page read and write
241475EC000
trusted library allocation
page read and write
710000
heap
page read and write
241475F0000
trusted library allocation
page read and write
714000
heap
page read and write
40A000
unkown
page read and write
3990000
trusted library allocation
page read and write
66C000
heap
page read and write
241475ED000
trusted library allocation
page read and write
241475EC000
trusted library allocation
page read and write
241475EA000
trusted library allocation
page read and write
241475F6000
trusted library allocation
page read and write
241475F6000
trusted library allocation
page read and write
27C7000
heap
page read and write
71A000
heap
page read and write
70B000
heap
page read and write
24145421000
heap
page read and write
6FF000
heap
page read and write
24145415000
heap
page read and write
241475EE000
trusted library allocation
page read and write
D52000
heap
page read and write
71A000
heap
page read and write
729000
heap
page read and write
24145471000
heap
page read and write
70B000
heap
page read and write
710000
heap
page read and write
714000
heap
page read and write
241475F1000
trusted library allocation
page read and write
241475EC000
trusted library allocation
page read and write
24145423000
heap
page read and write
408000
unkown
page readonly
24145423000
heap
page read and write
241475F0000
trusted library allocation
page read and write
202FDCE0000
heap
page read and write
A51000
unkown
page execute read
241475F6000
trusted library allocation
page read and write
CBA000
heap
page read and write
3990000
trusted library allocation
page read and write
A8A000
unkown
page readonly
241475EE000
trusted library allocation
page read and write
241475F1000
trusted library allocation
page read and write
241475F5000
trusted library allocation
page read and write
24146F14000
trusted library allocation
page read and write
27CA000
heap
page read and write
241475E9000
trusted library allocation
page read and write
241475E4000
trusted library allocation
page read and write
628000
stack
page read and write
24147440000
heap
page read and write
6F8B5000
unkown
page readonly
24145421000
heap
page read and write
241475F1000
trusted library allocation
page read and write
2414544D000
heap
page read and write
27CB000
heap
page read and write
710000
heap
page read and write
241475F3000
trusted library allocation
page read and write
2414546E000
heap
page read and write
52F000
heap
page read and write
241453F7000
heap
page read and write
24145466000
heap
page read and write
241475F5000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
24145471000
heap
page read and write
710000
heap
page read and write
6FF000
heap
page read and write
241475F4000
trusted library allocation
page read and write
656000
heap
page read and write
24146F10000
trusted library allocation
page read and write
241475F1000
trusted library allocation
page read and write
241475F4000
trusted library allocation
page read and write
241475F0000
trusted library allocation
page read and write
729000
heap
page read and write
24145460000
heap
page read and write
4E3000
heap
page read and write
241475F5000
trusted library allocation
page read and write
24145473000
heap
page read and write
3990000
trusted library allocation
page read and write
3190000
trusted library allocation
page read and write
27CC000
heap
page read and write
241475ED000
trusted library allocation
page read and write
2414544D000
heap
page read and write
241475F4000
trusted library allocation
page read and write
507000
heap
page read and write
71A000
heap
page read and write
241475EB000
trusted library allocation
page read and write
241475EB000
trusted library allocation
page read and write
2414546E000
heap
page read and write
6B0000
heap
page read and write
24145462000
heap
page read and write
A51000
unkown
page execute read
241475EA000
trusted library allocation
page read and write
6FF000
heap
page read and write
539000
heap
page read and write
3990000
trusted library allocation
page read and write
241475F6000
trusted library allocation
page read and write
241475F1000
trusted library allocation
page read and write
71A000
heap
page read and write
730000
heap
page read and write
710000
heap
page read and write
241475ED000
trusted library allocation
page read and write
241475ED000
trusted library allocation
page read and write
70B000
heap
page read and write
280B000
heap
page read and write
241475EA000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
6FF000
heap
page read and write
241475EB000
trusted library allocation
page read and write
24146F14000
trusted library allocation
page read and write
710000
heap
page read and write
730000
heap
page read and write
241475F0000
trusted library allocation
page read and write
241475EF000
trusted library allocation
page read and write
3E00000
heap
page read and write
24145462000
heap
page read and write
24145460000
heap
page read and write
24146F14000
trusted library allocation
page read and write
241475F0000
trusted library allocation
page read and write
241475F0000
trusted library allocation
page read and write
2F66000
heap
page read and write
2279000
heap
page read and write
23D0000
heap
page read and write
24145421000
heap
page read and write
241475F5000
trusted library allocation
page read and write
2414546E000
heap
page read and write
2414544D000
heap
page read and write
241475EC000
trusted library allocation
page read and write
24145405000
heap
page read and write
24145460000
heap
page read and write
C10000
trusted library allocation
page read and write
2DE0000
heap
page read and write
67D000
heap
page read and write
241475EB000
trusted library allocation
page read and write
24145460000
heap
page read and write
241475F3000
trusted library allocation
page read and write
D04000
heap
page read and write
2414544D000
heap
page read and write
71A000
heap
page read and write
2414546E000
heap
page read and write
729000
heap
page read and write
71A000
heap
page read and write
710000
heap
page read and write
241475EF000
trusted library allocation
page read and write
71A000
heap
page read and write
24145423000
heap
page read and write
241453D0000
heap
page read and write
241475F2000
trusted library allocation
page read and write
710000
heap
page read and write
27CC000
heap
page read and write
241455C0000
heap
page read and write
3990000
trusted library allocation
page read and write
241475F0000
trusted library allocation
page read and write
71A000
heap
page read and write
71A000
heap
page read and write
6FF000
heap
page read and write
27C0000
heap
page read and write
5E0000
heap
page read and write
2FB3000
heap
page read and write
730000
heap
page read and write
714000
heap
page read and write
241475EF000
trusted library allocation
page read and write
2414544F000
heap
page read and write
730000
heap
page read and write
70B000
heap
page read and write
241475ED000
trusted library allocation
page read and write
241475F0000
trusted library allocation
page read and write
24145423000
heap
page read and write
3990000
trusted library allocation
page read and write
28CA000
heap
page read and write
E60000
heap
page read and write
3990000
trusted library allocation
page read and write
730000
heap
page read and write
24145421000
heap
page read and write
24145463000
heap
page read and write
241453F7000
heap
page read and write
241475F3000
trusted library allocation
page read and write
D0D000
heap
page read and write
730000
heap
page read and write
10001000
unkown
page execute read
2390000
unkown
page read and write
241475EF000
trusted library allocation
page read and write
241475D0000
heap
page read and write
71A000
heap
page read and write
241455E0000
heap
page read and write
27C2000
heap
page read and write
24146F10000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
24145423000
heap
page read and write
714000
heap
page read and write
43FB000
stack
page read and write
3CFF000
stack
page read and write
730000
heap
page read and write
241475F5000
trusted library allocation
page read and write
6CE000
heap
page read and write
6FF000
heap
page read and write
C90000
heap
page read and write
24146F10000
trusted library allocation
page read and write
24145405000
heap
page read and write
729000
heap
page read and write
2AD0000
trusted library allocation
page read and write
241475EE000
trusted library allocation
page read and write
241475F0000
trusted library allocation
page read and write
729000
heap
page read and write
241475F5000
trusted library allocation
page read and write
6FF000
heap
page read and write
71A000
heap
page read and write
241475E2000
trusted library allocation
page read and write
76B000
stack
page read and write
241475F2000
trusted library allocation
page read and write
40E000
unkown
page read and write
CE2000
heap
page read and write
24145421000
heap
page read and write
241475EC000
trusted library allocation
page read and write
530000
heap
page read and write
241475ED000
trusted library allocation
page read and write
6FF000
heap
page read and write
241475ED000
trusted library allocation
page read and write
241475EB000
trusted library allocation
page read and write
241475EF000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
24145405000
heap
page read and write
710000
heap
page read and write
C30000
heap
page read and write
AA4000
unkown
page write copy
241475F2000
trusted library allocation
page read and write
AA4000
unkown
page read and write
D05000
heap
page read and write
26BE000
stack
page read and write
3990000
trusted library allocation
page read and write
6FF000
heap
page read and write
729000
heap
page read and write
24145471000
heap
page read and write
714000
heap
page read and write
6C9000
heap
page read and write
70B000
heap
page read and write
241475EE000
trusted library allocation
page read and write
241475F2000
trusted library allocation
page read and write
24145405000
heap
page read and write
6FF000
heap
page read and write
241475F0000
trusted library allocation
page read and write
27F5000
heap
page read and write
24146F14000
trusted library allocation
page read and write
27C7000
heap
page read and write
241475F4000
trusted library allocation
page read and write
241475ED000
trusted library allocation
page read and write
24145423000
heap
page read and write
241475EB000
trusted library allocation
page read and write
27C9000
heap
page read and write
CE2000
heap
page read and write
6FF000
heap
page read and write
24146F14000
trusted library allocation
page read and write
241475F4000
trusted library allocation
page read and write
27CA000
heap
page read and write
2F00000
trusted library allocation
page read and write
729000
heap
page read and write
24146F10000
trusted library allocation
page read and write
24145421000
heap
page read and write
241475EC000
trusted library allocation
page read and write
83C514A000
stack
page read and write
3990000
trusted library allocation
page read and write
241475F4000
trusted library allocation
page read and write
27C6000
heap
page read and write
24145421000
heap
page read and write
3990000
trusted library allocation
page read and write
241475ED000
trusted library allocation
page read and write
6FF000
heap
page read and write
730000
heap
page read and write
241475E5000
trusted library allocation
page read and write
241475F4000
trusted library allocation
page read and write
83C51CF000
stack
page read and write
714000
heap
page read and write
241475EF000
trusted library allocation
page read and write
24147090000
heap
page read and write
70B000
heap
page read and write
24145405000
heap
page read and write
241475EB000
trusted library allocation
page read and write
241475F2000
trusted library allocation
page read and write
70B000
heap
page read and write
24145423000
heap
page read and write
2414544B000
heap
page read and write
3FFF000
stack
page read and write
E69000
heap
page read and write
729000
heap
page read and write
24145405000
heap
page read and write
241475F0000
trusted library allocation
page read and write
D4A000
heap
page read and write
241475F4000
trusted library allocation
page read and write
241472AF000
heap
page read and write
27C8000
heap
page read and write
401000
unkown
page execute read
730000
heap
page read and write
730000
heap
page read and write
27CA000
heap
page read and write
241475F5000
trusted library allocation
page read and write
24146F10000
trusted library allocation
page read and write
24146F14000
trusted library allocation
page read and write
38BA000
stack
page read and write
2AD0000
trusted library allocation
page read and write
2EC0000
trusted library section
page read and write
241475EB000
trusted library allocation
page read and write
730000
heap
page read and write
475000
unkown
page read and write
71A000
heap
page read and write
24145462000
heap
page read and write
24146F10000
trusted library allocation
page read and write
241475F1000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
26B0000
trusted library allocation
page read and write
570000
heap
page read and write
24146F10000
trusted library allocation
page read and write
2827000
heap
page read and write
28B8000
heap
page read and write
AAA000
unkown
page readonly
27C7000
heap
page read and write
241475EB000
trusted library allocation
page read and write
729000
heap
page read and write
241475F1000
trusted library allocation
page read and write
24145463000
heap
page read and write
27CB000
heap
page read and write
241475F4000
trusted library allocation
page read and write
714000
heap
page read and write
393E000
stack
page read and write
27CA000
heap
page read and write
71A000
heap
page read and write
24146F10000
trusted library allocation
page read and write
24146F14000
trusted library allocation
page read and write
2EED000
stack
page read and write
241475ED000
trusted library allocation
page read and write
2414544E000
heap
page read and write
24146F10000
trusted library allocation
page read and write
241475EE000
trusted library allocation
page read and write
2FB8000
heap
page read and write
D3E000
heap
page read and write
24145405000
heap
page read and write
241475ED000
trusted library allocation
page read and write
241475F1000
trusted library allocation
page read and write
241475EA000
trusted library allocation
page read and write
24145460000
heap
page read and write
71A000
heap
page read and write
A8A000
unkown
page readonly
241475F3000
trusted library allocation
page read and write
714000
heap
page read and write
3990000
trusted library allocation
page read and write
2912000
heap
page read and write
241475EA000
trusted library allocation
page read and write
70B000
heap
page read and write
39B0000
heap
page read and write
24145421000
heap
page read and write
2EF0000
heap
page read and write
241475F5000
trusted library allocation
page read and write
24145472000
heap
page read and write
714000
heap
page read and write
D3E000
heap
page read and write
6FF000
heap
page read and write
D09000
heap
page read and write
D5B000
heap
page read and write
241475EA000
trusted library allocation
page read and write
4F9000
heap
page read and write
71A000
heap
page read and write
D2E000
heap
page read and write
24146F10000
trusted library allocation
page read and write
24145462000
heap
page read and write
241475EA000
trusted library allocation
page read and write
401000
unkown
page execute read
202FDF30000
heap
page read and write
6FF000
heap
page read and write
D1D000
heap
page read and write
241475F3000
trusted library allocation
page read and write
202FDCE8000
heap
page read and write
241475EC000
trusted library allocation
page read and write
241475EA000
trusted library allocation
page read and write
241475ED000
trusted library allocation
page read and write
241475EB000
trusted library allocation
page read and write
241475EC000
trusted library allocation
page read and write
241475F2000
trusted library allocation
page read and write
66E000
heap
page read and write
24145405000
heap
page read and write
520000
heap
page read and write
28BB000
heap
page read and write
241475EC000
trusted library allocation
page read and write
24145463000
heap
page read and write
714000
heap
page read and write
83C567F000
stack
page read and write
6FF000
heap
page read and write
73C000
heap
page read and write
70B000
heap
page read and write
3990000
trusted library allocation
page read and write
71A000
heap
page read and write
710000
heap
page read and write
24145462000
heap
page read and write
241475EC000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
130000
heap
page read and write
400000
unkown
page readonly
2414544B000
heap
page read and write
24145405000
heap
page read and write
24145405000
heap
page read and write
241475EE000
trusted library allocation
page read and write
24145421000
heap
page read and write
710000
heap
page read and write
2414546E000
heap
page read and write
241475F2000
trusted library allocation
page read and write
2414546E000
heap
page read and write
6FF000
heap
page read and write
241475F1000
trusted library allocation
page read and write
714000
heap
page read and write
241475F0000
trusted library allocation
page read and write
241475F6000
trusted library allocation
page read and write
24145463000
heap
page read and write
24145421000
heap
page read and write
730000
heap
page read and write
62E000
stack
page read and write
42BB000
stack
page read and write
241475EF000
trusted library allocation
page read and write
241475EF000
trusted library allocation
page read and write
24145460000
heap
page read and write
2414544F000
heap
page read and write
2380000
heap
page read and write
71A000
heap
page read and write
241475F6000
trusted library allocation
page read and write
241475F4000
trusted library allocation
page read and write
24145423000
heap
page read and write
539000
heap
page read and write
6FF000
heap
page read and write
2414544C000
heap
page read and write
70B000
heap
page read and write
3100000
heap
page read and write
70B000
heap
page read and write
710000
heap
page read and write
241475F2000
trusted library allocation
page read and write
241475F2000
trusted library allocation
page read and write
24145423000
heap
page read and write
24145423000
heap
page read and write
19E000
stack
page read and write
714000
heap
page read and write
710000
heap
page read and write
730000
heap
page read and write
241475F5000
trusted library allocation
page read and write
241475F2000
trusted library allocation
page read and write
241475EA000
trusted library allocation
page read and write
E50000
heap
page read and write
539000
heap
page read and write
24145423000
heap
page read and write
3990000
trusted library allocation
page read and write
D05000
heap
page read and write
241475EE000
trusted library allocation
page read and write
714000
heap
page read and write
241475F0000
trusted library allocation
page read and write
241475EC000
trusted library allocation
page read and write
241475EB000
trusted library allocation
page read and write
241475F7000
trusted library allocation
page read and write
70B000
heap
page read and write
729000
heap
page read and write
24145472000
heap
page read and write
241475EC000
trusted library allocation
page read and write
24146F10000
trusted library allocation
page read and write
729000
heap
page read and write
27C0000
heap
page read and write
710000
heap
page read and write
CD3000
heap
page read and write
730000
heap
page read and write
3990000
trusted library allocation
page read and write
241454E0000
heap
page read and write
24145423000
heap
page read and write
241475EE000
trusted library allocation
page read and write
24145423000
heap
page read and write
2414544D000
heap
page read and write
71A000
heap
page read and write
24145405000
heap
page read and write
3990000
trusted library allocation
page read and write
24145462000
heap
page read and write
2414546E000
heap
page read and write
6FF000
heap
page read and write
241475EC000
trusted library allocation
page read and write
241475EA000
trusted library allocation
page read and write
6C5000
heap
page read and write
241475ED000
trusted library allocation
page read and write
2414544D000
heap
page read and write
241475F3000
trusted library allocation
page read and write
24146F10000
trusted library allocation
page read and write
241475EC000
trusted library allocation
page read and write
70B000
heap
page read and write
24145421000
heap
page read and write
24145462000
heap
page read and write
241475FE000
trusted library allocation
page read and write
241475ED000
trusted library allocation
page read and write
241475FD000
trusted library allocation
page read and write
729000
heap
page read and write
731000
heap
page read and write
520000
heap
page read and write
714000
heap
page read and write
10004000
unkown
page read and write
241475EA000
trusted library allocation
page read and write
24145405000
heap
page read and write
241475EA000
trusted library allocation
page read and write
729000
heap
page read and write
241475F0000
trusted library allocation
page read and write
6F8A1000
unkown
page execute read
241475EA000
trusted library allocation
page read and write
3B24000
heap
page read and write
B80000
heap
page read and write
70B000
heap
page read and write
241475F1000
trusted library allocation
page read and write
2B05000
heap
page read and write
24146F10000
trusted library allocation
page read and write
241475F3000
trusted library allocation
page read and write
24145421000
heap
page read and write
714000
heap
page read and write
714000
heap
page read and write
5C0000
heap
page read and write
241475F5000
trusted library allocation
page read and write
729000
heap
page read and write
2B20000
heap
page read and write
27CA000
heap
page read and write
24145421000
heap
page read and write
714000
heap
page read and write
71A000
heap
page read and write
4FB000
stack
page read and write
24145466000
heap
page read and write
3990000
trusted library allocation
page read and write
24145421000
heap
page read and write
24145460000
heap
page read and write
D65000
heap
page read and write
241475EE000
trusted library allocation
page read and write
710000
heap
page read and write
2275000
heap
page read and write
24145463000
heap
page read and write
241475E6000
trusted library allocation
page read and write
241475E0000
trusted library allocation
page read and write
241475EB000
trusted library allocation
page read and write
70B000
heap
page read and write
241475EB000
trusted library allocation
page read and write
DB0000
heap
page read and write
710000
heap
page read and write
3990000
trusted library allocation
page read and write
241475EA000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
E10000
heap
page read and write
6BA000
heap
page read and write
27C2000
heap
page read and write
24145405000
heap
page read and write
2864000
heap
page read and write
71A000
heap
page read and write
241475F3000
trusted library allocation
page read and write
27C0000
heap
page read and write
1DF000
stack
page read and write
2DBE000
stack
page read and write
714000
heap
page read and write
FAE000
stack
page read and write
241475F3000
trusted library allocation
page read and write
27C4000
heap
page read and write
2414544B000
heap
page read and write
241475F1000
trusted library allocation
page read and write
2414544E000
heap
page read and write
6FF000
heap
page read and write
71A000
heap
page read and write
6FF000
heap
page read and write
24145421000
heap
page read and write
241475EF000
trusted library allocation
page read and write
2934000
heap
page read and write
1001000
unkown
page execute read
241475EF000
trusted library allocation
page read and write
2410000
heap
page read and write
24145470000
heap
page read and write
43E000
unkown
page read and write
241475F3000
trusted library allocation
page read and write
D15000
heap
page read and write
24145466000
heap
page read and write
241475EB000
trusted library allocation
page read and write
70B000
heap
page read and write
714000
heap
page read and write
4142000
heap
page read and write
241475F5000
trusted library allocation
page read and write
730000
heap
page read and write
70B000
heap
page read and write
202FDF35000
heap
page read and write
518000
heap
page read and write
241475F6000
trusted library allocation
page read and write
24145421000
heap
page read and write
24145423000
heap
page read and write
732000
heap
page read and write
27F0000
heap
page read and write
71A000
heap
page read and write
28A9000
heap
page read and write
73B000
heap
page read and write
71A000
heap
page read and write
241475EB000
trusted library allocation
page read and write
24145462000
heap
page read and write
70B000
heap
page read and write
24146F14000
trusted library allocation
page read and write
6AC000
heap
page read and write
241475EF000
trusted library allocation
page read and write
729000
heap
page read and write
241475FB000
trusted library allocation
page read and write
729000
heap
page read and write
400000
unkown
page readonly
730000
heap
page read and write
D17000
heap
page read and write
24145423000
heap
page read and write
737000
heap
page read and write
710000
heap
page read and write
C9E000
heap
page read and write
2414544B000
heap
page read and write
710000
heap
page read and write
512F000
heap
page read and write
24145605000
heap
page read and write
710000
heap
page read and write
D0D000
heap
page read and write
241475EC000
trusted library allocation
page read and write
241475ED000
trusted library allocation
page read and write
241475F6000
trusted library allocation
page read and write
24145405000
heap
page read and write
241475F0000
trusted library allocation
page read and write
730000
heap
page read and write
241475EA000
trusted library allocation
page read and write
24145469000
heap
page read and write
24145463000
heap
page read and write
710000
heap
page read and write
24145405000
heap
page read and write
6FF000
heap
page read and write
2414546E000
heap
page read and write
241475F5000
trusted library allocation
page read and write
730000
heap
page read and write
710000
heap
page read and write
6FF000
heap
page read and write
241475EE000
trusted library allocation
page read and write
24146F10000
trusted library allocation
page read and write
24145463000
heap
page read and write
729000
heap
page read and write
71A000
heap
page read and write
241475EA000
trusted library allocation
page read and write
24146F10000
trusted library allocation
page read and write
730000
heap
page read and write
70B000
heap
page read and write
24145463000
heap
page read and write
100D000
unkown
page readonly
2414544B000
heap
page read and write
759000
heap
page read and write
71A000
heap
page read and write
241475EF000
trusted library allocation
page read and write
2414546E000
heap
page read and write
2244000
heap
page read and write
3990000
trusted library allocation
page read and write
24145423000
heap
page read and write
3990000
trusted library allocation
page read and write
241475F5000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
24145405000
heap
page read and write
241475F1000
trusted library allocation
page read and write
DA0000
unkown
page read and write
24146F10000
trusted library allocation
page read and write
27C8000
heap
page read and write
2CF0000
heap
page read and write
241453F2000
heap
page read and write
27C8000
heap
page read and write
710000
heap
page read and write
24145463000
heap
page read and write
241475EE000
trusted library allocation
page read and write
D0D000
heap
page read and write
6FF000
heap
page read and write
24145421000
heap
page read and write
710000
heap
page read and write
730000
heap
page read and write
2414546E000
heap
page read and write
3990000
trusted library allocation
page read and write
24145421000
heap
page read and write
52F000
heap
page read and write
241475F3000
trusted library allocation
page read and write
710000
heap
page read and write
241475F5000
trusted library allocation
page read and write
6FF000
heap
page read and write
6B0000
heap
page read and write
CD3000
heap
page read and write
2F9C000
heap
page read and write
70B000
heap
page read and write
714000
heap
page read and write
729000
heap
page read and write
241475F3000
trusted library allocation
page read and write
2EE0000
trusted library section
page read and write
710000
heap
page read and write
51D000
heap
page read and write
241475EE000
trusted library allocation
page read and write
24146F14000
trusted library allocation
page read and write
241475EE000
trusted library allocation
page read and write
710000
heap
page read and write
CD1000
heap
page read and write
D3F000
heap
page read and write
3990000
trusted library allocation
page read and write
729000
heap
page read and write
2AE0000
heap
page read and write
241475E8000
trusted library allocation
page read and write
570000
heap
page read and write
241475EE000
trusted library allocation
page read and write
241475F3000
trusted library allocation
page read and write
241475F1000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
2F93000
heap
page read and write
2414544C000
heap
page read and write
2859000
heap
page read and write
1000A000
unkown
page readonly
6FF000
heap
page read and write
729000
heap
page read and write
3990000
trusted library allocation
page read and write
3B20000
heap
page read and write
241475EE000
trusted library allocation
page read and write
241475F4000
trusted library allocation
page read and write
24145421000
heap
page read and write
714000
heap
page read and write
504000
heap
page read and write
241475EF000
trusted library allocation
page read and write
2414544B000
heap
page read and write
729000
heap
page read and write
24146F10000
trusted library allocation
page read and write
83C557E000
stack
page read and write
24145462000
heap
page read and write
241475F1000
trusted library allocation
page read and write
241475F6000
trusted library allocation
page read and write
24145423000
heap
page read and write
6FF000
heap
page read and write
100B000
unkown
page read and write
710000
heap
page read and write
5E0000
heap
page read and write
202FDCA0000
heap
page read and write
241475F6000
trusted library allocation
page read and write
2F6C000
heap
page read and write
714000
heap
page read and write
6B3000
heap
page read and write
241475F5000
trusted library allocation
page read and write
241475EA000
trusted library allocation
page read and write
241475F6000
trusted library allocation
page read and write
24145405000
heap
page read and write
4D0000
heap
page read and write
24146F14000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
2414544D000
heap
page read and write
3990000
trusted library allocation
page read and write
3BAB000
stack
page read and write
710000
heap
page read and write
729000
heap
page read and write
241475F3000
trusted library allocation
page read and write
241475EA000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
710000
heap
page read and write
27C2000
heap
page read and write
3E1F000
stack
page read and write
24145471000
heap
page read and write
F71C37C000
stack
page read and write
714000
heap
page read and write
241475EB000
trusted library allocation
page read and write
241475F0000
trusted library allocation
page read and write
24145463000
heap
page read and write
241475F2000
trusted library allocation
page read and write
24145423000
heap
page read and write
2400000
heap
page read and write
70B000
heap
page read and write
23E0000
heap
page read and write
710000
heap
page read and write
39C4000
heap
page read and write
241475F2000
trusted library allocation
page read and write
24145466000
heap
page read and write
3990000
trusted library allocation
page read and write
710000
heap
page read and write
241475EA000
trusted library allocation
page read and write
729000
heap
page read and write
2414544E000
heap
page read and write
2414544D000
heap
page read and write
8B0000
heap
page read and write
2414546E000
heap
page read and write
3DFF000
stack
page read and write
2414544E000
heap
page read and write
241475EE000
trusted library allocation
page read and write
24145423000
heap
page read and write
72F000
heap
page read and write
5124000
heap
page read and write
24147270000
heap
page read and write
70B000
heap
page read and write
6FF000
heap
page read and write
241475F4000
trusted library allocation
page read and write
24145463000
heap
page read and write
2414544E000
heap
page read and write
5E9000
heap
page read and write
24146F14000
trusted library allocation
page read and write
24145466000
heap
page read and write
714000
heap
page read and write
2414544D000
heap
page read and write
241475EF000
trusted library allocation
page read and write
241475ED000
trusted library allocation
page read and write
24145466000
heap
page read and write
71A000
heap
page read and write
24146F14000
trusted library allocation
page read and write
70B000
heap
page read and write
241475EA000
trusted library allocation
page read and write
24145466000
heap
page read and write
241475F6000
trusted library allocation
page read and write
241475F6000
trusted library allocation
page read and write
65D000
heap
page read and write
70B000
heap
page read and write
241475EA000
trusted library allocation
page read and write
C20000
heap
page read and write
2827000
heap
page read and write
24145405000
heap
page read and write
710000
heap
page read and write
241475EB000
trusted library allocation
page read and write
463E000
stack
page read and write
2843000
heap
page read and write
471000
unkown
page read and write
3990000
trusted library allocation
page read and write
512F000
heap
page read and write
710000
heap
page read and write
6F8A0000
unkown
page readonly
6FF000
heap
page read and write
714000
heap
page read and write
241475EA000
trusted library allocation
page read and write
241475EF000
trusted library allocation
page read and write
AA4000
unkown
page read and write
24145423000
heap
page read and write
241475EE000
trusted library allocation
page read and write
71A000
heap
page read and write
24146F14000
trusted library allocation
page read and write
241475F6000
trusted library allocation
page read and write
520000
heap
page read and write
70B000
heap
page read and write
2414544E000
heap
page read and write
70B000
heap
page read and write
24146F10000
trusted library allocation
page read and write
500000
heap
page read and write
241475F1000
trusted library allocation
page read and write
24146F14000
trusted library allocation
page read and write
526000
heap
page read and write
6F8BC000
unkown
page read and write
241475EE000
trusted library allocation
page read and write
730000
heap
page read and write
241475F4000
trusted library allocation
page read and write
39C0000
heap
page read and write
24145421000
heap
page read and write
241475EF000
trusted library allocation
page read and write
27E4000
heap
page read and write
241475EE000
trusted library allocation
page read and write
2414546E000
heap
page read and write
714000
heap
page read and write
D1E000
heap
page read and write
729000
heap
page read and write
729000
heap
page read and write
241475F1000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
477F000
stack
page read and write
524000
heap
page read and write
241475F6000
trusted library allocation
page read and write
41E000
unkown
page read and write
241475F2000
trusted library allocation
page read and write
AAA000
unkown
page readonly
2AD0000
trusted library allocation
page read and write
241475EC000
trusted library allocation
page read and write
202FDBA0000
heap
page read and write
729000
heap
page read and write
27C6000
heap
page read and write
730000
heap
page read and write
D1D000
heap
page read and write
70B000
heap
page read and write
241453D8000
heap
page read and write
3990000
trusted library allocation
page read and write
2414546E000
heap
page read and write
241475EC000
trusted library allocation
page read and write
D09000
heap
page read and write
241475F3000
trusted library allocation
page read and write
24145462000
heap
page read and write
241475F2000
trusted library allocation
page read and write
A51000
unkown
page execute read
2414544D000
heap
page read and write
66F000
stack
page read and write
2D52000
heap
page read and write
241475EC000
trusted library allocation
page read and write
2414546E000
heap
page read and write
241475F3000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
27C1000
heap
page read and write
24145600000
heap
page read and write
E5C000
heap
page read and write
241475F6000
trusted library allocation
page read and write
512F000
heap
page read and write
24146F14000
trusted library allocation
page read and write
71A000
heap
page read and write
24145465000
heap
page read and write
2A3A000
heap
page read and write
241475EC000
trusted library allocation
page read and write
710000
heap
page read and write
241475F4000
trusted library allocation
page read and write
241475F4000
trusted library allocation
page read and write
241475F0000
trusted library allocation
page read and write
241475F3000
trusted library allocation
page read and write
241475F6000
trusted library allocation
page read and write
241475EB000
trusted library allocation
page read and write
2414546E000
heap
page read and write
4FE000
unkown
page readonly
241475F0000
trusted library allocation
page read and write
E0E000
stack
page read and write
460000
unkown
page read and write
2C0D000
heap
page read and write
2414546E000
heap
page read and write
24146F10000
trusted library allocation
page read and write
F71C3FF000
stack
page read and write
24145423000
heap
page read and write
307F000
heap
page read and write
241475EC000
trusted library allocation
page read and write
241475ED000
trusted library allocation
page read and write
414E000
heap
page read and write
241475EC000
trusted library allocation
page read and write
2414544B000
heap
page read and write
241475EC000
trusted library allocation
page read and write
241475ED000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
27C9000
heap
page read and write
24145462000
heap
page read and write
241475FC000
trusted library allocation
page read and write
27C5000
heap
page read and write
241475EC000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
96000
stack
page read and write
24145473000
heap
page read and write
2414546E000
heap
page read and write
241475F1000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
71A000
heap
page read and write
241475EA000
trusted library allocation
page read and write
70B000
heap
page read and write
27FE000
heap
page read and write
24146F14000
trusted library allocation
page read and write
6FF000
heap
page read and write
730000
heap
page read and write
241475EE000
trusted library allocation
page read and write
71A000
heap
page read and write
4F1000
unkown
page read and write
241475F0000
trusted library allocation
page read and write
2414544D000
heap
page read and write
D15000
heap
page read and write
730000
heap
page read and write
241475F9000
trusted library allocation
page read and write
70B000
heap
page read and write
2414544C000
heap
page read and write
24145423000
heap
page read and write
2850000
heap
page read and write
27C4000
heap
page read and write
714000
heap
page read and write
241475F3000
trusted library allocation
page read and write
24145462000
heap
page read and write
241475F2000
trusted library allocation
page read and write
6FF000
heap
page read and write
2F62000
heap
page read and write
A51000
unkown
page execute read
241475EA000
trusted library allocation
page read and write
241475F5000
trusted library allocation
page read and write
24145421000
heap
page read and write
3A50000
trusted library allocation
page read and write
24145462000
heap
page read and write
24145463000
heap
page read and write
730000
heap
page read and write
100D000
unkown
page readonly
730000
heap
page read and write
24146F10000
trusted library allocation
page read and write
241475F4000
trusted library allocation
page read and write
714000
heap
page read and write
71A000
heap
page read and write
729000
heap
page read and write
729000
heap
page read and write
550000
heap
page read and write
241475EC000
trusted library allocation
page read and write
2240000
heap
page read and write
27C7000
heap
page read and write
714000
heap
page read and write
24145421000
heap
page read and write
729000
heap
page read and write
70B000
heap
page read and write
3BFF000
stack
page read and write
714000
heap
page read and write
24145473000
heap
page read and write
24145466000
heap
page read and write
453C000
stack
page read and write
3990000
trusted library allocation
page read and write
24146F10000
trusted library allocation
page read and write
710000
heap
page read and write
729000
heap
page read and write
3990000
trusted library allocation
page read and write
729000
heap
page read and write
24145405000
heap
page read and write
241475F3000
trusted library allocation
page read and write
241475F5000
trusted library allocation
page read and write
241475F2000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
730000
heap
page read and write
241475F4000
trusted library allocation
page read and write
2414546E000
heap
page read and write
6A8000
heap
page read and write
24146F10000
trusted library allocation
page read and write
70B000
heap
page read and write
241475F1000
trusted library allocation
page read and write
2EEE000
stack
page read and write
730000
heap
page read and write
3990000
trusted library allocation
page read and write
732000
heap
page read and write
6FF000
heap
page read and write
241472A4000
heap
page read and write
2360000
trusted library allocation
page read and write
24145472000
heap
page read and write
27CA000
heap
page read and write
714000
heap
page read and write
241475F7000
trusted library allocation
page read and write
6FF000
heap
page read and write
241475F3000
trusted library allocation
page read and write
27C5000
heap
page read and write
2270000
heap
page read and write
B84000
heap
page read and write
730000
heap
page read and write
24145462000
heap
page read and write
241475F4000
trusted library allocation
page read and write
710000
heap
page read and write
412000
unkown
page read and write
522000
heap
page read and write
2D3C000
stack
page read and write
714000
heap
page read and write
140000
heap
page read and write
241475EF000
trusted library allocation
page read and write
241475F1000
trusted library allocation
page read and write
467B000
stack
page read and write
241475FA000
trusted library allocation
page read and write
730000
heap
page read and write
24146F10000
trusted library allocation
page read and write
714000
heap
page read and write
24145463000
heap
page read and write
24146F14000
trusted library allocation
page read and write
714000
heap
page read and write
10003000
unkown
page readonly
3990000
trusted library allocation
page read and write
241475E1000
trusted library allocation
page read and write
710000
heap
page read and write
3990000
trusted library allocation
page read and write
C9A000
heap
page read and write
D06000
heap
page read and write
3990000
trusted library allocation
page read and write
241475EE000
trusted library allocation
page read and write
24145471000
heap
page read and write
241475F5000
trusted library allocation
page read and write
24146E00000
heap
page read and write
24145466000
heap
page read and write
414B000
heap
page read and write
2414544E000
heap
page read and write
24145405000
heap
page read and write
38FE000
stack
page read and write
24145471000
heap
page read and write
241475F1000
trusted library allocation
page read and write
241475EA000
trusted library allocation
page read and write
241475F3000
trusted library allocation
page read and write
710000
heap
page read and write
241475EB000
trusted library allocation
page read and write
241475EE000
trusted library allocation
page read and write
241475F3000
trusted library allocation
page read and write
710000
heap
page read and write
D54000
heap
page read and write
241475F5000
trusted library allocation
page read and write
98000
stack
page read and write
2414544D000
heap
page read and write
AAA000
unkown
page readonly
27EC000
heap
page read and write
66E000
heap
page read and write
241475F2000
trusted library allocation
page read and write
24145471000
heap
page read and write
27CC000
heap
page read and write
24145463000
heap
page read and write
241475EF000
trusted library allocation
page read and write
241475F0000
trusted library allocation
page read and write
729000
heap
page read and write
2FB0000
heap
page read and write
241475EF000
trusted library allocation
page read and write
2FC2000
heap
page read and write
6A1000
heap
page read and write
241475E3000
trusted library allocation
page read and write
24145466000
heap
page read and write
241475F1000
trusted library allocation
page read and write
507000
heap
page read and write
C78000
stack
page read and write
241475F4000
trusted library allocation
page read and write
6FF000
heap
page read and write
6FF000
heap
page read and write
757000
heap
page read and write
24145405000
heap
page read and write
27C8000
heap
page read and write
241475F5000
trusted library allocation
page read and write
241475F6000
trusted library allocation
page read and write
24145463000
heap
page read and write
6FF000
heap
page read and write
24145405000
heap
page read and write
70B000
heap
page read and write
241475F1000
trusted library allocation
page read and write
24145423000
heap
page read and write
730000
heap
page read and write
241475F6000
trusted library allocation
page read and write
241475F0000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
241475F1000
trusted library allocation
page read and write
27DA000
heap
page read and write
241475F4000
trusted library allocation
page read and write
70B000
heap
page read and write
2414544E000
heap
page read and write
6FF000
heap
page read and write
241475F1000
trusted library allocation
page read and write
71A000
heap
page read and write
241475F1000
trusted library allocation
page read and write
241475EE000
trusted library allocation
page read and write
710000
heap
page read and write
24146FA0000
heap
page read and write
3990000
trusted library allocation
page read and write
24145421000
heap
page read and write
729000
heap
page read and write
27C7000
heap
page read and write
70B000
heap
page read and write
714000
heap
page read and write
241475F5000
trusted library allocation
page read and write
4DB000
heap
page read and write
241475F5000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
FEF000
stack
page read and write
71A000
heap
page read and write
64A000
heap
page read and write
241475F2000
trusted library allocation
page read and write
24146F10000
trusted library allocation
page read and write
241475F4000
trusted library allocation
page read and write
24145405000
heap
page read and write
714000
heap
page read and write
241475EF000
trusted library allocation
page read and write
71A000
heap
page read and write
71A000
heap
page read and write
714000
heap
page read and write
730000
heap
page read and write
24145421000
heap
page read and write
71A000
heap
page read and write
24145423000
heap
page read and write
2B70000
heap
page read and write
71A000
heap
page read and write
24145423000
heap
page read and write
3990000
trusted library allocation
page read and write
6FF000
heap
page read and write
241475ED000
trusted library allocation
page read and write
24146F14000
trusted library allocation
page read and write
729000
heap
page read and write
729000
heap
page read and write
714000
heap
page read and write
241475F6000
trusted library allocation
page read and write
2360000
trusted library allocation
page read and write
241475EF000
trusted library allocation
page read and write
3A50000
trusted library allocation
page read and write
3D1F000
stack
page read and write
710000
heap
page read and write
241475EB000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
2F86000
heap
page read and write
241475F4000
trusted library allocation
page read and write
241475F8000
trusted library allocation
page read and write
2414544D000
heap
page read and write
710000
heap
page read and write
2ED0000
trusted library section
page read and write
24145415000
heap
page read and write
3990000
trusted library allocation
page read and write
241475EE000
trusted library allocation
page read and write
CD1000
heap
page read and write
241475F4000
trusted library allocation
page read and write
630000
heap
page read and write
70B000
heap
page read and write
1000000
unkown
page readonly
729000
heap
page read and write
241475EB000
trusted library allocation
page read and write
A50000
unkown
page readonly
241475F5000
trusted library allocation
page read and write
2835000
stack
page read and write
24147420000
heap
page read and write
3C20000
trusted library allocation
page read and write
241475EB000
trusted library allocation
page read and write
2414546E000
heap
page read and write
710000
heap
page read and write
241475F0000
trusted library allocation
page read and write
2414544F000
heap
page read and write
241475F0000
trusted library allocation
page read and write
241475EC000
trusted library allocation
page read and write
24145405000
heap
page read and write
241475F3000
trusted library allocation
page read and write
241475F0000
trusted library allocation
page read and write
3990000
trusted library allocation
page read and write
24145421000
heap
page read and write
2414544D000
heap
page read and write
241475F2000
trusted library allocation
page read and write
24146F14000
trusted library allocation
page read and write
241475F3000
trusted library allocation
page read and write
520000
heap
page read and write
2414544E000
heap
page read and write
512F000
heap
page read and write
A50000
unkown
page readonly
24145423000
heap
page read and write
9FC000
stack
page read and write
2808000
heap
page read and write
2414546E000
heap
page read and write
730000
heap
page read and write
24145460000
heap
page read and write
3B10000
heap
page read and write
70B000
heap
page read and write
730000
heap
page read and write
241472A0000
heap
page read and write
24145421000
heap
page read and write
202FF810000
heap
page read and write
40A000
unkown
page write copy
241475F2000
trusted library allocation
page read and write
24145423000
heap
page read and write
729000
heap
page read and write
24146F14000
trusted library allocation
page read and write
24146F10000
trusted library allocation
page read and write
24145421000
heap
page read and write
70B000
heap
page read and write
D3E000
heap
page read and write
241475EC000
trusted library allocation
page read and write
83C55FF000
stack
page read and write
241475EF000
trusted library allocation
page read and write
There are 1512 hidden memdumps, click here to show them.