IOC Report
ADF435x_v4_5_0.exe

loading gif

Files

File Path
Type
Category
Malicious
ADF435x_v4_5_0.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
C:\Users\user\AppData\Local\Temp\ADI_RFG_Drivers.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\6cd6594ee40f26ffb7ca6883eb\$shtdwn$.req
data
dropped
C:\6cd6594ee40f26ffb7ca6883eb\1028\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (388), with CRLF line terminators
dropped
C:\6cd6594ee40f26ffb7ca6883eb\1028\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\6cd6594ee40f26ffb7ca6883eb\1028\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\6cd6594ee40f26ffb7ca6883eb\1031\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (615), with CRLF line terminators
dropped
C:\6cd6594ee40f26ffb7ca6883eb\1031\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\6cd6594ee40f26ffb7ca6883eb\1031\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\6cd6594ee40f26ffb7ca6883eb\1033\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (565), with CRLF line terminators
dropped
C:\6cd6594ee40f26ffb7ca6883eb\1033\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\6cd6594ee40f26ffb7ca6883eb\1033\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\6cd6594ee40f26ffb7ca6883eb\1036\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (619), with CRLF line terminators
dropped
C:\6cd6594ee40f26ffb7ca6883eb\1036\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\6cd6594ee40f26ffb7ca6883eb\1036\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\6cd6594ee40f26ffb7ca6883eb\1040\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (601), with CRLF line terminators
dropped
C:\6cd6594ee40f26ffb7ca6883eb\1040\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\6cd6594ee40f26ffb7ca6883eb\1040\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\6cd6594ee40f26ffb7ca6883eb\1041\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (440), with CRLF line terminators
dropped
C:\6cd6594ee40f26ffb7ca6883eb\1041\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\6cd6594ee40f26ffb7ca6883eb\1041\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\6cd6594ee40f26ffb7ca6883eb\1042\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (439), with CRLF line terminators
dropped
C:\6cd6594ee40f26ffb7ca6883eb\1042\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\6cd6594ee40f26ffb7ca6883eb\1042\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\6cd6594ee40f26ffb7ca6883eb\1049\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (634), with CRLF line terminators
dropped
C:\6cd6594ee40f26ffb7ca6883eb\1049\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\6cd6594ee40f26ffb7ca6883eb\1049\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\6cd6594ee40f26ffb7ca6883eb\2052\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (390), with CRLF line terminators
dropped
C:\6cd6594ee40f26ffb7ca6883eb\2052\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\6cd6594ee40f26ffb7ca6883eb\2052\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\6cd6594ee40f26ffb7ca6883eb\3082\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (616), with CRLF line terminators
dropped
C:\6cd6594ee40f26ffb7ca6883eb\3082\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\6cd6594ee40f26ffb7ca6883eb\3082\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\6cd6594ee40f26ffb7ca6883eb\DHtmlHeader.html
HTML document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\6cd6594ee40f26ffb7ca6883eb\DisplayIcon.ico
MS Windows icon resource - 13 icons, 16x16, 16 colors, 4 bits/pixel, 16x16, 8 bits/pixel
dropped
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\Print.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\Rotate1.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\Rotate2.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\Rotate3.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\Rotate4.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\Rotate5.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\Rotate6.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\Rotate7.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\Rotate8.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\Save.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\Setup.ico
MS Windows icon resource - 12 icons, 16x16, 16 colors, 4 bits/pixel, 16x16, 8 bits/pixel
dropped
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\SysReqMet.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\SysReqNotMet.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\stop.ico
MS Windows icon resource - 6 icons, 32x32, 16 colors, 4 bits/pixel, 16x16, 16 colors, 4 bits/pixel
dropped
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\warn.ico
MS Windows icon resource - 6 icons, 32x32, 16 colors, 4 bits/pixel, 16x16, 16 colors, 4 bits/pixel
dropped
C:\6cd6594ee40f26ffb7ca6883eb\ParameterInfo.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (314), with CRLF line terminators
dropped
C:\6cd6594ee40f26ffb7ca6883eb\Setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\6cd6594ee40f26ffb7ca6883eb\SetupEngine.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\6cd6594ee40f26ffb7ca6883eb\SetupUi.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\6cd6594ee40f26ffb7ca6883eb\SetupUi.xsd
XML 1.0 document, ASCII text, with very long lines (335), with CRLF line terminators
dropped
C:\6cd6594ee40f26ffb7ca6883eb\SplashScreen.bmp
PC bitmap, Windows 3.x format, 200 x 200 x 8, image size 40000, resolution 3779 x 3779 px/m, cbSize 41078, bits offset 1078
dropped
C:\6cd6594ee40f26ffb7ca6883eb\Strings.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\6cd6594ee40f26ffb7ca6883eb\UiInfo.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\6cd6594ee40f26ffb7ca6883eb\header.bmp
PC bitmap, Windows 3.x format, 49 x 49 x 24, image size 7254, resolution 2834 x 2834 px/m, cbSize 7308, bits offset 54
dropped
C:\6cd6594ee40f26ffb7ca6883eb\sqmapi.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\6cd6594ee40f26ffb7ca6883eb\vc_red.cab
Microsoft Cabinet archive data, 4218761 bytes, 19 files, at 0x44 +A "F_CENTRAL_atl100_x86" +A "F_CENTRAL_mfc100_x86", flags 0x4, number 1, extra bytes 20 in head, 357 datablocks, 0x1503 compression
dropped
C:\6cd6594ee40f26ffb7ca6883eb\vc_red.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x86 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219., Template: Intel;0, Revision Number: {461C455E-DA40-49B3-871B-14308CC7CEFF}, Create Time/Date: Sun Feb 20 07:03:10 2011, Last Saved Time/Date: Sun Feb 20 07:03:10 2011, Number of Pages: 200, Name of Creating Application: Windows Installer XML (3.5.0626.3), Security: 2, Number of Words: 2
dropped
C:\6cd6594ee40f26ffb7ca6883eb\watermark.bmp
PC bitmap, Windows 3.x format, 164 x 628 x 24, image size 308978, resolution 2834 x 2834 px/m, cbSize 309032, bits offset 54
dropped
C:\Config.Msi\4908e8.rbs
data
modified
C:\Config.Msi\492e90.rbs
data
modified
C:\Config.Msi\49acc8.rbs
data
modified
C:\Program Files (x86)\Analog Devices\ADF435x\ADF435x.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Analog Devices\ADF435x\ADF435x.pdb
MSVC program database ver 7.00, 512*207 bytes
dropped
C:\Program Files (x86)\Analog Devices\ADF435x\ADF435x.vshost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Analog Devices\ADF435x\CyUSB.DLL
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Analog Devices\ADF435x\INIFileParser.DLL
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Analog Devices\ADF435x\Microsoft.VisualStudio.HostingProcess.Utilities.Sync.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Analog Devices\ADF435x\SDP_Blackfin_Firmware.ldr
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Analog Devices\ADF435x\adf4xxx_usb_fw_1_0.hex
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Analog Devices\ADF435x\adf4xxx_usb_fw_2_0.hex
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Analog Devices\ADF435x\sdpApi1.DLL
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Analog Devices\SDP\DriversR2\AdiSdp_x64.inf
Windows setup INFormation
dropped
C:\Program Files (x86)\Analog Devices\SDP\DriversR2\WdfCoInstaller01007.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files (x86)\Analog Devices\SDP\DriversR2\WinUSBCoInstaller.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files (x86)\Analog Devices\SDP\DriversR2\adisdp_x64.cat
data
dropped
C:\Program Files (x86)\Analog Devices\SDP\DriversR2\dpinst.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files (x86)\Analog Devices\SDP\DriversR2\uninst.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
modified
C:\Program Files (x86)\Common Files\Microsoft Shared\VC\msdia100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\Analog Devices\USB Drivers\ADI_CYUSB_USB4.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files\Analog Devices\USB Drivers\ADI_CYUSB_USB4.lib
current ar archive
dropped
C:\Program Files\Analog Devices\USB Drivers\RFG\ADI_CYUSB_RFG_x64.inf
Windows setup INFormation
dropped
C:\Program Files\Analog Devices\USB Drivers\RFG\adi_cyusb.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Program Files\Analog Devices\USB Drivers\RFG\adi_cyusb_rfg.cat
data
dropped
C:\Program Files\Analog Devices\USB Drivers\RFG\uninstall.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
modified
C:\Program Files\Analog Devices\USB Drivers\dpinst.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Analog Devices\USB Drivers\dpinst.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Common Files\microsoft shared\VC\msdia100.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Analog Devices\ADF435x\ADF435x.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, Icon number=0, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
C:\Users\user~1\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_20241024_050342548.html (copy)
HTML document, Unicode text, UTF-16, little-endian text, with very long lines (322), with CRLF line terminators
dropped
C:\Users\user~1\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_20241024_050332743.html (copy)
HTML document, Unicode text, UTF-16, little-endian text, with very long lines (322), with CRLF line terminators
dropped
C:\Users\user~1\AppData\Local\Temp\Setup_20241024_050330680.html (copy)
HTML document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user~1\AppData\Local\Temp\Setup_20241024_050340251.html (copy)
HTML document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user~1\AppData\Local\Temp\{d55074ba-c19a-bb44-89de-a58a465055fb}\ADI_CYUSB.sys (copy)
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Users\user~1\AppData\Local\Temp\{d55074ba-c19a-bb44-89de-a58a465055fb}\ADI_CYUSB_RFG.cat (copy)
data
dropped
C:\Users\user~1\AppData\Local\Temp\{d55074ba-c19a-bb44-89de-a58a465055fb}\adi_cyusb_rfg_x64.inf (copy)
Windows setup INFormation
dropped
C:\Users\user~1\AppData\Local\Temp\{e893f925-8aa1-9045-bd56-cfe82a26da46}\AdiSdp_x64.cat (copy)
data
dropped
C:\Users\user~1\AppData\Local\Temp\{e893f925-8aa1-9045-bd56-cfe82a26da46}\WdfCoInstaller01007.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user~1\AppData\Local\Temp\{e893f925-8aa1-9045-bd56-cfe82a26da46}\WinUSBCoInstaller.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user~1\AppData\Local\Temp\{e893f925-8aa1-9045-bd56-cfe82a26da46}\adisdp_x64.inf (copy)
Windows setup INFormation
dropped
C:\Users\Public\Desktop\ADF435x.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, Icon number=0, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
C:\Users\user\AppData\Local\Temp\ADF435x.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Create Time/Date: Mon Jun 21 08:00:00 1999, Name of Creating Application: Windows Installer, Security: 1, Code page: 1252, Template: Intel;1033, Number of Pages: 200, Revision Number: {F064EA81-5458-45CE-937E-DA006A1C64FD}, Title: ADF435x, Author: Analog Devices, Number of Words: 2, Last Saved Time/Date: Mon Jan 19 21:08:14 2015, Last Printed: Mon Jan 19 21:08:14 2015
modified
C:\Users\user\AppData\Local\Temp\CFG79D0.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\CFGADE0.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\HFI2009.tmp.html
HTML document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\HFI2962.tmp.html
data
dropped
C:\Users\user\AppData\Local\Temp\HFI2FE.tmp.html
data
dropped
C:\Users\user\AppData\Local\Temp\HFIFAAE.tmp.html
HTML document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\MSI7934.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI79E1.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
C:\Users\user\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_20241024_050342548-MSI_vc_red.msi.txt
Unicode text, UTF-16, little-endian text, with very long lines (319), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_20241024_050342548.html
HTML document, Unicode text, UTF-16, little-endian text, with very long lines (356), with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_20241024_050332743-MSI_vc_red.msi.txt
Unicode text, UTF-16, little-endian text, with very long lines (319), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_20241024_050332743.html
HTML document, Unicode text, UTF-16, little-endian text, with very long lines (356), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\SDPDrivers.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
C:\Users\user\AppData\Local\Temp\Setup_20241024_050330680.html
HTML document, Unicode text, UTF-16, little-endian text, with very long lines (322), with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\Setup_20241024_050340251.html
HTML document, Unicode text, UTF-16, little-endian text, with very long lines (322), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsn5F06.tmp\GetVersion.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsn5F06.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsn5F06.tmp\dpinst.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsn5F06.tmp\dpinst_amd64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsn5F06.tmp\nsExec.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsp180A.tmp\GetVersion.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsp180A.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\vcredist_x64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\vcredist_x86.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{d55074ba-c19a-bb44-89de-a58a465055fb}\SET6108.tmp
Windows setup INFormation
dropped
C:\Users\user\AppData\Local\Temp\{d55074ba-c19a-bb44-89de-a58a465055fb}\SET6119.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\{d55074ba-c19a-bb44-89de-a58a465055fb}\SET612A.tmp
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{e893f925-8aa1-9045-bd56-cfe82a26da46}\SET4061.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{e893f925-8aa1-9045-bd56-cfe82a26da46}\SET40DF.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{e893f925-8aa1-9045-bd56-cfe82a26da46}\SET40FF.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\{e893f925-8aa1-9045-bd56-cfe82a26da46}\SET411F.tmp
Windows setup INFormation
dropped
C:\Windows\DPINST.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\Windows\INF\oem4.inf
Windows setup INFormation
dropped
C:\Windows\INF\oem5.inf
Windows setup INFormation
dropped
C:\Windows\INF\setupapi.dev.log
Generic INItialization configuration [BeginLog]
dropped
C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_msvcp100_x86
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_msvcr100_x86
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\4908e6.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x86 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219., Template: Intel;0, Revision Number: {461C455E-DA40-49B3-871B-14308CC7CEFF}, Create Time/Date: Sun Feb 20 07:03:10 2011, Last Saved Time/Date: Sun Feb 20 07:03:10 2011, Number of Pages: 200, Name of Creating Application: Windows Installer XML (3.5.0626.3), Security: 2, Number of Words: 2
dropped
C:\Windows\Installer\4908e9.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x86 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219., Template: Intel;0, Revision Number: {461C455E-DA40-49B3-871B-14308CC7CEFF}, Create Time/Date: Sun Feb 20 07:03:10 2011, Last Saved Time/Date: Sun Feb 20 07:03:10 2011, Number of Pages: 200, Name of Creating Application: Windows Installer XML (3.5.0626.3), Security: 2, Number of Words: 2
dropped
C:\Windows\Installer\492e8e.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x64 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219., Template: x64;0, Revision Number: {80902F2D-E1EF-43CA-B366-74496197E004}, Create Time/Date: Sun Feb 20 06:51:54 2011, Last Saved Time/Date: Sun Feb 20 06:51:54 2011, Number of Pages: 200, Name of Creating Application: Windows Installer XML (3.5.0626.3), Security: 2, Number of Words: 2
dropped
C:\Windows\Installer\492e91.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x64 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219., Template: x64;0, Revision Number: {80902F2D-E1EF-43CA-B366-74496197E004}, Create Time/Date: Sun Feb 20 06:51:54 2011, Last Saved Time/Date: Sun Feb 20 06:51:54 2011, Number of Pages: 200, Name of Creating Application: Windows Installer XML (3.5.0626.3), Security: 2, Number of Words: 2
dropped
C:\Windows\Installer\49acc7.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Create Time/Date: Mon Jun 21 08:00:00 1999, Name of Creating Application: Windows Installer, Security: 1, Code page: 1252, Template: Intel;1033, Number of Pages: 200, Revision Number: {F064EA81-5458-45CE-937E-DA006A1C64FD}, Title: ADF435x, Author: Analog Devices, Number of Words: 2, Last Saved Time/Date: Mon Jan 19 21:08:14 2015, Last Printed: Mon Jan 19 21:08:14 2015
dropped
C:\Windows\Installer\49acc9.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Create Time/Date: Mon Jun 21 08:00:00 1999, Name of Creating Application: Windows Installer, Security: 1, Code page: 1252, Template: Intel;1033, Number of Pages: 200, Revision Number: {F064EA81-5458-45CE-937E-DA006A1C64FD}, Title: ADF435x, Author: Analog Devices, Number of Words: 2, Last Saved Time/Date: Mon Jan 19 21:08:14 2015, Last Printed: Mon Jan 19 21:08:14 2015
dropped
C:\Windows\Installer\MSI32A5.tmp
data
dropped
C:\Windows\Installer\MSIAD92.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIADF1.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIAE50.tmp
data
dropped
C:\Windows\Installer\MSIC80.tmp
data
dropped
C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\SourceHash{491647C1-1281-4343-AA61-F87CA00A92A2}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\SourceHash{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\{491647C1-1281-4343-AA61-F87CA00A92A2}\_853F67D554F05449430E7E.exe
MS Windows icon resource - 1 icon, 32x32, 24 bits/pixel
dropped
C:\Windows\Installer\{491647C1-1281-4343-AA61-F87CA00A92A2}\_86E302AD3AEF842FD2938A.exe
MS Windows icon resource - 1 icon, 32x32, 24 bits/pixel
dropped
C:\Windows\Installer\{491647C1-1281-4343-AA61-F87CA00A92A2}\_CBDBE159E3FB79ADDB2047.exe
MS Windows icon resource - 1 icon, 32x32, 24 bits/pixel
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\SysWOW64\atl100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\csaDriverInterface.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100chs.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100cht.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100deu.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100enu.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100esn.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100fra.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100ita.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100jpn.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100kor.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100rus.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc100u.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfcm100.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\SysWOW64\mfcm100u.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\SysWOW64\sdpDriverInterface.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\vcomp100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{20a4443f-2192-184e-868a-e7d67d434dc5}\AdiSdp_x64.cat (copy)
data
dropped
C:\Windows\System32\DriverStore\Temp\{20a4443f-2192-184e-868a-e7d67d434dc5}\SET4301.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{20a4443f-2192-184e-868a-e7d67d434dc5}\SET4340.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{20a4443f-2192-184e-868a-e7d67d434dc5}\SET4361.tmp
data
dropped
C:\Windows\System32\DriverStore\Temp\{20a4443f-2192-184e-868a-e7d67d434dc5}\SET4371.tmp
Windows setup INFormation
dropped
C:\Windows\System32\DriverStore\Temp\{20a4443f-2192-184e-868a-e7d67d434dc5}\WdfCoInstaller01007.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{20a4443f-2192-184e-868a-e7d67d434dc5}\WinUSBCoInstaller.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{20a4443f-2192-184e-868a-e7d67d434dc5}\adisdp_x64.inf (copy)
Windows setup INFormation
dropped
C:\Windows\System32\DriverStore\Temp\{56f22667-61e0-6e49-a66d-9e6684a6bc0f}\ADI_CYUSB.sys (copy)
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{56f22667-61e0-6e49-a66d-9e6684a6bc0f}\ADI_CYUSB_RFG.cat (copy)
data
dropped
C:\Windows\System32\DriverStore\Temp\{56f22667-61e0-6e49-a66d-9e6684a6bc0f}\SET62CD.tmp
Windows setup INFormation
dropped
C:\Windows\System32\DriverStore\Temp\{56f22667-61e0-6e49-a66d-9e6684a6bc0f}\SET62DE.tmp
data
dropped
C:\Windows\System32\DriverStore\Temp\{56f22667-61e0-6e49-a66d-9e6684a6bc0f}\SET62EF.tmp
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Windows\System32\DriverStore\Temp\{56f22667-61e0-6e49-a66d-9e6684a6bc0f}\adi_cyusb_rfg_x64.inf (copy)
Windows setup INFormation
dropped
C:\Windows\System32\atl100.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\catroot2\dberr.txt
ASCII text, with CRLF line terminators
modified
C:\Windows\System32\csaDriverInterface.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc100.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc100chs.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc100cht.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc100deu.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc100enu.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc100esn.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc100fra.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc100ita.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc100jpn.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc100kor.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc100rus.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc100u.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfcm100.dll
PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\System32\mfcm100u.dll
PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\System32\msvcr100.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\vcomp100.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Temp\~DF0BF4FE35254667E0.TMP
data
dropped
C:\Windows\Temp\~DF0D349C9EB046A1FA.TMP
data
dropped
C:\Windows\Temp\~DF140D1C5C7903DA80.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF1584CA2BBDAC4817.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF1719906563B11C1C.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF2B5012B416294129.TMP
data
dropped
C:\Windows\Temp\~DF3FF453D044D91FFD.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF49C405C3171A414D.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF4D3CB7A0CC9E7792.TMP
data
dropped
C:\Windows\Temp\~DF5420854C3A87633F.TMP
data
dropped
C:\Windows\Temp\~DF62CC5CE32E4A088A.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF66DE84377DC405FE.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF691C92894497FA42.TMP
data
dropped
C:\Windows\Temp\~DF7C44E4BD25C9F52E.TMP
data
dropped
C:\Windows\Temp\~DF80EDA7E49A791F57.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF85F499DD9ABD453B.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF871F1E113550E2E2.TMP
data
dropped
C:\Windows\Temp\~DF8EA2BFE7A60C32FC.TMP
data
dropped
C:\Windows\Temp\~DF8F71C48CEF7C399C.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF9005A7037A3A713B.TMP
data
dropped
C:\Windows\Temp\~DFA0D1AA9982529511.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFA139F683AC50605D.TMP
data
dropped
C:\Windows\Temp\~DFA6F32B35A482A2C5.TMP
data
dropped
C:\Windows\Temp\~DFAAB7DAF9BACB3564.TMP
data
dropped
C:\Windows\Temp\~DFAF185B776E76105E.TMP
data
dropped
C:\Windows\Temp\~DFBAD756434B86160D.TMP
data
dropped
C:\Windows\Temp\~DFC9E1088408D069D0.TMP
data
dropped
C:\Windows\Temp\~DFCD55BED8B1546660.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFDAE97CE9C109F1FB.TMP
data
dropped
C:\Windows\Temp\~DFDC470667D1AB2379.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFE4074C354C3BCE5A.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFE82E7AD86EE2AEE3.TMP
data
dropped
C:\Windows\Temp\~DFECD158738B1F0D9A.TMP
data
dropped
C:\Windows\Temp\~DFEE433A894E418079.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFF5EFDFE28C0A1B4C.TMP
data
dropped
C:\Windows\Temp\~DFFF8B6C0C63C7DDE8.TMP
data
dropped
C:\dd75838cbf6dd04545e5fee87fbf\$shtdwn$.req
data
modified
C:\dd75838cbf6dd04545e5fee87fbf\1028\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (388), with CRLF line terminators
dropped
C:\dd75838cbf6dd04545e5fee87fbf\1028\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\dd75838cbf6dd04545e5fee87fbf\1028\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\dd75838cbf6dd04545e5fee87fbf\1031\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (615), with CRLF line terminators
dropped
C:\dd75838cbf6dd04545e5fee87fbf\1031\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\dd75838cbf6dd04545e5fee87fbf\1031\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\dd75838cbf6dd04545e5fee87fbf\1033\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (565), with CRLF line terminators
dropped
C:\dd75838cbf6dd04545e5fee87fbf\1033\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\dd75838cbf6dd04545e5fee87fbf\1033\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\dd75838cbf6dd04545e5fee87fbf\1036\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (619), with CRLF line terminators
dropped
C:\dd75838cbf6dd04545e5fee87fbf\1036\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\dd75838cbf6dd04545e5fee87fbf\1036\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\dd75838cbf6dd04545e5fee87fbf\1040\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (601), with CRLF line terminators
dropped
C:\dd75838cbf6dd04545e5fee87fbf\1040\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\dd75838cbf6dd04545e5fee87fbf\1040\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\dd75838cbf6dd04545e5fee87fbf\1041\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (440), with CRLF line terminators
dropped
C:\dd75838cbf6dd04545e5fee87fbf\1041\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\dd75838cbf6dd04545e5fee87fbf\1041\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\dd75838cbf6dd04545e5fee87fbf\1042\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (439), with CRLF line terminators
dropped
C:\dd75838cbf6dd04545e5fee87fbf\1042\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\dd75838cbf6dd04545e5fee87fbf\1042\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\dd75838cbf6dd04545e5fee87fbf\1049\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (634), with CRLF line terminators
dropped
C:\dd75838cbf6dd04545e5fee87fbf\1049\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\dd75838cbf6dd04545e5fee87fbf\1049\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\dd75838cbf6dd04545e5fee87fbf\2052\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (390), with CRLF line terminators
dropped
C:\dd75838cbf6dd04545e5fee87fbf\2052\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\dd75838cbf6dd04545e5fee87fbf\2052\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\dd75838cbf6dd04545e5fee87fbf\3082\LocalizedData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (616), with CRLF line terminators
dropped
C:\dd75838cbf6dd04545e5fee87fbf\3082\SetupResources.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\dd75838cbf6dd04545e5fee87fbf\3082\eula.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\dd75838cbf6dd04545e5fee87fbf\DHtmlHeader.html
HTML document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\dd75838cbf6dd04545e5fee87fbf\DisplayIcon.ico
MS Windows icon resource - 13 icons, 16x16, 16 colors, 4 bits/pixel, 16x16, 8 bits/pixel
dropped
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\Print.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\Rotate1.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\Rotate2.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\Rotate3.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\Rotate4.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\Rotate5.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\Rotate6.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\Rotate7.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\Rotate8.ico
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
dropped
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\Save.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\Setup.ico
MS Windows icon resource - 12 icons, 16x16, 16 colors, 4 bits/pixel, 16x16, 8 bits/pixel
dropped
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\SysReqMet.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\SysReqNotMet.ico
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\stop.ico
MS Windows icon resource - 6 icons, 32x32, 16 colors, 4 bits/pixel, 16x16, 16 colors, 4 bits/pixel
dropped
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\warn.ico
MS Windows icon resource - 6 icons, 32x32, 16 colors, 4 bits/pixel, 16x16, 16 colors, 4 bits/pixel
dropped
C:\dd75838cbf6dd04545e5fee87fbf\ParameterInfo.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (314), with CRLF line terminators
dropped
C:\dd75838cbf6dd04545e5fee87fbf\Setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\dd75838cbf6dd04545e5fee87fbf\SetupEngine.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\dd75838cbf6dd04545e5fee87fbf\SetupUi.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\dd75838cbf6dd04545e5fee87fbf\SetupUi.xsd
XML 1.0 document, ASCII text, with very long lines (335), with CRLF line terminators
dropped
C:\dd75838cbf6dd04545e5fee87fbf\SplashScreen.bmp
PC bitmap, Windows 3.x format, 200 x 200 x 8, image size 40000, resolution 3779 x 3779 px/m, cbSize 41078, bits offset 1078
dropped
C:\dd75838cbf6dd04545e5fee87fbf\Strings.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\dd75838cbf6dd04545e5fee87fbf\UiInfo.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\dd75838cbf6dd04545e5fee87fbf\header.bmp
PC bitmap, Windows 3.x format, 49 x 49 x 24, image size 7254, resolution 2834 x 2834 px/m, cbSize 7308, bits offset 54
dropped
C:\dd75838cbf6dd04545e5fee87fbf\sqmapi.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\dd75838cbf6dd04545e5fee87fbf\vc_red.cab
Microsoft Cabinet archive data, 4872031 bytes, 19 files, at 0x44 +A "F_CENTRAL_atl100_x64" +A "F_CENTRAL_mfc100_x64", flags 0x4, number 1, extra bytes 20 in head, 444 datablocks, 0x1503 compression
dropped
C:\dd75838cbf6dd04545e5fee87fbf\vc_red.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2010 x64 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219., Template: x64;0, Revision Number: {80902F2D-E1EF-43CA-B366-74496197E004}, Create Time/Date: Sun Feb 20 06:51:54 2011, Last Saved Time/Date: Sun Feb 20 06:51:54 2011, Number of Pages: 200, Name of Creating Application: Windows Installer XML (3.5.0626.3), Security: 2, Number of Words: 2
dropped
C:\dd75838cbf6dd04545e5fee87fbf\watermark.bmp
PC bitmap, Windows 3.x format, 164 x 628 x 24, image size 308978, resolution 2834 x 2834 px/m, cbSize 309032, bits offset 54
dropped
There are 300 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\6cd6594ee40f26ffb7ca6883eb\Setup.exe
c:\6cd6594ee40f26ffb7ca6883eb\Setup.exe /q
malicious
C:\Windows\System32\drvinst.exe
DrvInst.exe "4" "0" "C:\Users\user~1\AppData\Local\Temp\{e893f925-8aa1-9045-bd56-cfe82a26da46}\adisdp_x64.inf" "9" "4efe11aab" "0000000000000158" "WinSta0\Default" "000000000000016C" "208" "c:\program files (x86)\analog devices\sdp\driversr2"
malicious
C:\Users\user\AppData\Local\Temp\ADI_RFG_Drivers.exe
C:\Users\user~1\AppData\Local\Temp\ADI_RFG_Drivers.exe /S
malicious
C:\Windows\System32\drvinst.exe
DrvInst.exe "4" "0" "C:\Users\user~1\AppData\Local\Temp\{d55074ba-c19a-bb44-89de-a58a465055fb}\adi_cyusb_rfg_x64.inf" "9" "4f41e6c43" "0000000000000170" "WinSta0\Default" "000000000000016C" "208" "c:\program files\analog devices\usb drivers\rfg"
malicious
C:\Users\user\Desktop\ADF435x_v4_5_0.exe
"C:\Users\user\Desktop\ADF435x_v4_5_0.exe"
C:\Users\user\AppData\Local\Temp\SDPDrivers.exe
C:\Users\user~1\AppData\Local\Temp\SDPDrivers.exe /S
C:\Users\user\AppData\Local\Temp\vcredist_x86.exe
C:\Users\user~1\AppData\Local\Temp\vcredist_x86.exe /q
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Users\user\AppData\Local\Temp\vcredist_x64.exe
C:\Users\user~1\AppData\Local\Temp\vcredist_x64.exe /q
C:\dd75838cbf6dd04545e5fee87fbf\Setup.exe
c:\dd75838cbf6dd04545e5fee87fbf\Setup.exe /q
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Program Files (x86)\Analog Devices\SDP\DriversR2\dpinst.exe
"C:\Program Files (x86)\Analog Devices\SDP\DriversR2\dpinst.exe" /sw /sa /path "C:\Program Files (x86)\Analog Devices\SDP\DriversR2"
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{e75da1e8-debd-1d48-8eb4-57c7f25d3f2a} Global\{02855856-448c-0b4c-9dc0-f42f67f33c11} C:\Windows\System32\DriverStore\Temp\{20a4443f-2192-184e-868a-e7d67d434dc5}\adisdp_x64.inf C:\Windows\System32\DriverStore\Temp\{20a4443f-2192-184e-868a-e7d67d434dc5}\AdiSdp_x64.cat
C:\Users\user\AppData\Local\Temp\nsn5F06.tmp\dpinst_amd64.exe
"C:\Users\user~1\AppData\Local\Temp\nsn5F06.tmp\dpinst_amd64.exe" /sw /sa /path "C:\Program Files\Analog Devices\USB Drivers\RFG" /lm
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{e5e3580a-288d-8044-bc87-e0b602ccf4f0} Global\{a48a4ac5-05ee-5148-b49d-b491db96c803} C:\Windows\System32\DriverStore\Temp\{56f22667-61e0-6e49-a66d-9e6684a6bc0f}\adi_cyusb_rfg_x64.inf C:\Windows\System32\DriverStore\Temp\{56f22667-61e0-6e49-a66d-9e6684a6bc0f}\ADI_CYUSB_RFG.cat
C:\Windows\SysWOW64\msiexec.exe
"msiexec" /i "C:\Users\user~1\AppData\Local\Temp\ADF435x.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 6B5A3C60BB00D53DB335AFC1B0CDDA21 C
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 3EAB4146E26D2C9785A5EA8A5DAF2D23
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
unknown
http://www.analog.comPublisherAnalog
unknown
http://www.e-me.lv/repository0
unknown
http://www.acabogacia.org/doc0
unknown
http://crl.chambersign.org/chambersroot.crl0
unknown
http://ocsp.suscerte.gob.ve0
unknown
http://www.postsignum.cz/crl/psrootqca2.crl02
unknown
http://crl.dhimyotis.com/certignarootca.crl0
unknown
http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0
unknown
http://www.chambersign.org1
unknown
http://www.pkioverheid.nl/policies/root-policy0
unknown
http://repository.swisssign.com/0
unknown
http://www.suscerte.gob.ve/lcr0#
unknown
http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0
unknown
http://crl.ssc.lt/root-c/cacrl.crl0
unknown
http://postsignum.ttc.cz/crl/psrootqca2.crl0
unknown
http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
unknown
http://ca.disig.sk/ca/crl/ca_disig.crl0
unknown
http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0
unknown
http://www.certplus.com/CRL/class3P.crl0
unknown
http://www.suscerte.gob.ve/dpc0
unknown
http://www.certeurope.fr/reference/root2.crl0
unknown
http://ocsp.thawte.com
unknown
http://www.certplus.com/CRL/class2.crl0
unknown
http://www.disig.sk/ca/crl/ca_disig.crl0
unknown
http://www.defence.gov.au/pki0
unknown
http://www.sk.ee/cps/0
unknown
http://www.globaltrust.info0=
unknown
http://www.anf.es
unknown
http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09
unknown
http://crl.postsignum.cz/crl/psrootqca4.crl02
unknown
http://pki.registradores.org/normativa/index.htm0
unknown
http://schemas.microsof
unknown
http://policy.camerfirma.com0
unknown
http://www.ssc.lt/cps03
unknown
http://ocsp.pki.gva.es0
unknown
http://www.anf.es/es/address-direccion.html
unknown
https://www.anf.es/address/)1(0&
unknown
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?
unknown
http://ca.mtin.es/mtin/ocsp0
unknown
http://crl.ssc.lt/root-b/cacrl.crl0
unknown
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0
unknown
http://web.ncdc.gov.sa/crl/nrcacomb1.crl0
unknown
http://www.certicamara.com/dpc/0Z
unknown
http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G
unknown
https://wwww.certigna.fr/autorites/0m
unknown
http://www.dnie.es/dpc0
unknown
http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0
unknown
http://ca.mtin.es/mtin/DPCyPoliticas0
unknown
https://wwgn.com/r
unknown
https://www.anf.es/AC/ANFServerCA.crl0
unknown
https://repository.tsp.zetes.com0
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.globaltrust.info0
unknown
http://certificates.starfieldtech.com/repository/1604
unknown
http://acedicom.edicomgroup.com/doc0
unknown
http://www.certplus.com/CRL/class3TS.crl0
unknown
https://crl.anf.es/AC/ANFServerCA.crl0
unknown
http://www.analog.com
unknown
http://www.certeurope.fr/reference/pc-root2.pdf0
unknown
http://ac.economia.gob.mx/last.crl0G
unknown
https://www.catcert.net/verarrel
unknown
http://nsis.sf.net/NSIS_Error
unknown
http://www.disig.sk/ca0f
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
unknown
http://www.e-szigno.hu/RootCA.crl
unknown
http://crl.microsof
unknown
http://www.sk.ee/juur/crl/0
unknown
http://crl.chambersign.org/chambersignroot.crl0
unknown
http://crl.xrampsecurity.com/XGCA.crl0
unknown
http://certs.oati.net/repository/OATICA2.crl0
unknown
http://crl.oces.trust2408.com/oces.crl0
unknown
http://www.quovadis.bm0
unknown
http://crl.ssc.lt/root-a/cacrl.crl0
unknown
http://certs.oaticerts.com/repository/OATICA2.crl
unknown
http://certs.oati.net/repository/OATICA2.crt0
unknown
http://www.accv.es00
unknown
http://www.pkioverheid.nl/policies/root-policy-G20
unknown
https://www.netlock.net/docs
unknown
http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
unknown
http://www.e-trust.be/CPS/QNcerts
unknown
http://ocsp.ncdc.gov.sa0
unknown
http://fedir.comsign.co.il/crl/ComSignCA.crl0
unknown
http://acraiz.icpbrasil.gov.br/LCRacraizv5.crl0
unknown
http://crl2.postsignum.cz/crl/psrootqca4.crl01
unknown
http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0
unknown
http://web.ncdc.gov.sa/crl/nrcaparta1.crl
unknown
http://www.datev.de/zertifikat-policy-int0
unknown
http://fedir.comsign.co.il/crl/comsignglobalrootca.crl0;
unknown
https://repository.luxtrust.lu0
unknown
http://cps.chambersign.org/cps/chambersroot.html0
unknown
http://www.acabogacia.org0
unknown
http://www.firmaprofesional.com/cps0
unknown
http://www.uce.gub.uy/acrn/acrn.crl0
unknown
http://crl.securetrust.com/SGCA.crl0
unknown
http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt0
unknown
http://www.agesic.gub.uy/acrn/acrn.crl0)
unknown
http://crl.securetrust.com/STCA.crl0
unknown
http://www.rcsc.lt/repository0
unknown
http://www2.postsignum.cz/crl/psrootqca2.crl01
unknown
There are 90 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A43489159A520F0D93D032CCAF37E7FE20A8B419
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A43489159A520F0D93D032CCAF37E7FE20A8B419
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\BE36A4562FB2EE05DBB3D32323ADF445084ED656
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\sdpDriverInterface.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\csaDriverInterface.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Analog Devices\SDP\Drivers_R2
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ADI SDP Drivers R2
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ADI SDP Drivers R2
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ADI SDP Drivers R2
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ADI SDP Drivers R2
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ADI SDP Drivers R2
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\csaDriverInterface.dll
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\VSSetup
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\VSSetup
TypesSupported
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
c:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
c:\Config.Msi\4908e8.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
c:\Config.Msi\4908e8.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E4C35488E6280433B4A9504AC59CB06
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\48DB41415A9D5EE3AA3711D8C7703207
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
c:\Program Files (x86)\Common Files\Microsoft Shared\VC\msdia100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\33964F2EF4FF0E649B796FD4C2D6F41A
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\atl100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\06A0D925C8932A8379FE28AFAF97A860
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\339F228ED07C4FC39AD227368BCAFC03
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8EBEE9DB288E3EA36B66B61AD16E6844
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100u.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6432CE2221869C437BF73206B4A1E41B
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfcm100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\724137509B874A03688844BF844518FB
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfcm100u.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\22ADB29655D63AE309B41371AFB2D2E9
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100cht.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\179FE72998B7B4C319AD15ECF0D789A2
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100chs.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3121A08DAA1666E37A639F747E57545C
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100enu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\653ED3563DFD92235AEDBE6C434DA014
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100deu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D1896C2474BDF2C319AE7F4B6C2E628A
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100esn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8CFAF524C51FA013D98AF03737CB8863
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100fra.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\465777D8C2D35073D89B3E56588E2F01
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100ita.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\33BEF75DAFB5F5C329FE5CA253A07615
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100jpn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9796DE27DAA0C7132AC5BAA921E1D603
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100kor.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\EDEBFFDD9304B413CAD812F52A578C3A
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc100rus.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\047DE1C57A5C26139B5BF06B6D9DFF6F
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\vcomp100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0A6B7DEC5302BF73F923C8C583CA5653
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\56111199315302F42AC73C5FF3218BB7
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7CF850295E2D47645AEFFBA1C9CC66EA
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3359B1A2C0F81F946AEF6C0290F0A763
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\903AA223F4959C147984F03FDC1CEFDF
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\700723D95B27753439A8F4809CA1D185
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\68385A979AE027C4DBB7F53B1AD0CA9F
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\82030D4870482E948B98A5D438C2775A
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3808C13B64A39CB4999AD62BB57ED0AC
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C249A6ED1F4061548B2F0596C0EA89BC
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D421FD5597707BC45B38AA8D09FA3C83
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\51CDBAC9106C61A499B3BFD01FAB4E25
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\67D910D9E436BC4468B47775A9D6A5D7
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\115EA997438B7F93F8EBF155CE5AC35E
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\89D167C9B8F306038ADB87ABC137D43C
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\875C7AC1A0E5BC73CB72373226AAD9BD
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5B04B31931FA00D3AA3B549FD8C294E4
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\68906D3817F80033788F39B2CDB04A46
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2D17D06B78004283AA6BF0AA19CB15E7
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7B309DE9782D3B03BA3458C9AA813CAF
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\910EF7B196FE3FC3DBAD7F52B0B08C90
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C75EBF6F23C451638BFC95A448A5DF5A
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
c:\Program Files (x86)\Common Files\Microsoft Shared\VC\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\339F228ED07C4FC39AD227368BCAFC03\1D5E3C0FEDA1E123187686FED06E995A
File
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86
Installed
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86
MajorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86
MinorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86
Bld
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86
Rbld
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
Install
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
InstallerType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
SP
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
SPIndex
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
SPName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
Bld
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
Rbld
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0
SP
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0
SPIndex
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red
Install
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red
InstallerType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red
SP
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red
SPIndex
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red
SPName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}.KB2467173
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
ThisVersionInstalled
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
PackageVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
PublishingGroup
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
ReleaseType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
InstalledBy
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
InstalledDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
InstallerName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
InstallerVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}.KB2151757
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2151757
ThisVersionInstalled
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2151757
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2151757
PackageVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2151757
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2151757
PublishingGroup
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2151757
ReleaseType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2151757
InstalledBy
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2151757
InstalledDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2151757
InstallerName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2151757
InstallerVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}.KB982573
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB982573
ThisVersionInstalled
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB982573
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB982573
PackageVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB982573
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB982573
PublishingGroup
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB982573
ReleaseType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB982573
InstalledBy
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB982573
InstalledDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB982573
InstallerName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB982573
InstallerVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\A2D1F4F1AD9DFC2399908484D50AD65D
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1D5E3C0FEDA1E123187686FED06E995A
VCRedist_x86_enu
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Features
VCRedist_x86_enu
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1D5E3C0FEDA1E123187686FED06E995A
VC_RED_enu_x86_net_SETUP
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Features
VC_RED_enu_x86_net_SETUP
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1D5E3C0FEDA1E123187686FED06E995A
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Features
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1D5E3C0FEDA1E123187686FED06E995A
KB2467173
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Features
KB2467173
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1D5E3C0FEDA1E123187686FED06E995A
KB2151757
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Features
KB2151757
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1D5E3C0FEDA1E123187686FED06E995A
KB982573
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Features
KB982573
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\A2D1F4F1AD9DFC2399908484D50AD65D
1D5E3C0FEDA1E123187686FED06E995A
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A\SourceList\Media
DiskPrompt
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcr100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcp100.dll
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
c:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
c:\Config.Msi\492e90.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
c:\Config.Msi\492e90.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0480DC222D01C4F37A2077C032048022
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C065BA555D648923380AAA2171113286
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Program Files\Common Files\Microsoft Shared\VC\msdia100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\94422102FB8324F41B3E7CD7B422BDC7
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\atl100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CC55BAE45466EF63487E80325EFD4699
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\msvcr100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\620139E0B929C2837B208B4B3039995E
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\msvcp100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\03EA91DAF1821523AAA0556E73E73D5F
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfc100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\ECB55D8E45AD89E3ABDB0106D70A6E43
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfc100u.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D6D942287155543986F9D6AA8A889D8
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfcm100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\85DC899F7C7D0943287A010C770E5157
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfcm100u.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7C47EBEC423D7F53DB1EEE945FDBCD8A
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfc100cht.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BCC9D60832651123697145128BA363CD
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfc100chs.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D36DFC997E9185F35AB455F4D8BD1B1A
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfc100enu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F8EB9A0EB7EC15836A7C7990CEBED33B
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfc100deu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D78CB0019EFD4A33A0ABCFAA2C03AB4
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfc100esn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BDB781F79E72FF43CAB8883AFF23E660
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfc100fra.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D4362D900DD7D6230A3E66C3B0972A6F
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfc100ita.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\287437C084320CB3089DE68F3E9FE6B0
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfc100jpn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\89A8B17E1D05AB33A8A8E29029641CEA
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfc100kor.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0B27EEBBB25368A34A89A4C36060B816
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\mfc100rus.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A5F2E2998E12FC436878E5B253CCE503
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\vcomp100.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\044B2B18FBDD5823299BD88873C05DE3
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B06753C403720374B9E802BE9E719431
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5CAF4A81CCE45D84F9FC1C3B54B9687A
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C3179B36BEC743044A0A333654942EFD
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\493CFFC2983388A4D9B7298C2C87E508
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0595BAD9DB1D2B943A35DF12A932B367
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0E8D57C26BBC0BA4086B6AE65D820A79
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\115EA997438B7F93F8EBF155CE5AC35E
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\89D167C9B8F306038ADB87ABC137D43C
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\875C7AC1A0E5BC73CB72373226AAD9BD
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\90F69BE67CFD67C358567DC8B6FCE330
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BA8D27FBFAFD537398A986A1F078560B
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\59156F9E7CA1EA7339861E2DEB3E61E3
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\EE0424FCA4735153A96ECB40175811C1
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DCF641B65CE867A3FA014E05B4FFB233
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2CBF9AE5E7D63D437A0A3CB6E3246D65
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\03EA91DAF1821523AAA0556E73E73D5F\1926E8D15D0BCE53481466615F760A7F
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\03EA91DAF1821523AAA0556E73E73D5F\1926E8D15D0BCE53481466615F760A7F
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\03EA91DAF1821523AAA0556E73E73D5F\1926E8D15D0BCE53481466615F760A7F
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\03EA91DAF1821523AAA0556E73E73D5F\1926E8D15D0BCE53481466615F760A7F
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\03EA91DAF1821523AAA0556E73E73D5F\1926E8D15D0BCE53481466615F760A7F
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\03EA91DAF1821523AAA0556E73E73D5F\1926E8D15D0BCE53481466615F760A7F
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\03EA91DAF1821523AAA0556E73E73D5F\1926E8D15D0BCE53481466615F760A7F
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\03EA91DAF1821523AAA0556E73E73D5F\1926E8D15D0BCE53481466615F760A7F
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\03EA91DAF1821523AAA0556E73E73D5F\1926E8D15D0BCE53481466615F760A7F
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\03EA91DAF1821523AAA0556E73E73D5F\1926E8D15D0BCE53481466615F760A7F
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
c:\Program Files\Common Files\Microsoft Shared\VC\
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x64
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x64
Installed
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x64
MajorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x64
MinorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x64
Bld
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x64
Rbld
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\amd64\1033
Install
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\amd64\1033
InstallerType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\amd64\1033
SP
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\amd64\1033
SPIndex
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\amd64\1033
SPName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\amd64\1033
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2467173
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2467173
ThisVersionInstalled
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2467173
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2467173
PackageVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2467173
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2467173
PublishingGroup
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2467173
ReleaseType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2467173
InstalledBy
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2467173
InstalledDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2467173
InstallerName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2467173
InstallerVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2151757
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2151757
ThisVersionInstalled
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2151757
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2151757
PackageVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2151757
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2151757
PublishingGroup
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2151757
ReleaseType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2151757
InstalledBy
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2151757
InstalledDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2151757
InstallerName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2151757
InstallerVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB982573
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB982573
ThisVersionInstalled
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB982573
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB982573
PackageVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB982573
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB982573
PublishingGroup
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB982573
ReleaseType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB982573
InstalledBy
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB982573
InstalledDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB982573
InstallerName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB982573
InstallerVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\167F57B58CABCB333A1864D4DD8D313A
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1926E8D15D0BCE53481466615F760A7F
VCRedist_amd64_enu
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\Features
VCRedist_amd64_enu
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1926E8D15D0BCE53481466615F760A7F
VC_RED_enu_amd64_net_SETUP
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\Features
VC_RED_enu_amd64_net_SETUP
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1926E8D15D0BCE53481466615F760A7F
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\Features
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1926E8D15D0BCE53481466615F760A7F
KB2467173
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\Features
KB2467173
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1926E8D15D0BCE53481466615F760A7F
KB2151757
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\Features
KB2151757
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1926E8D15D0BCE53481466615F760A7F
KB982573
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\Features
KB982573
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\167F57B58CABCB333A1864D4DD8D313A
1926E8D15D0BCE53481466615F760A7F
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F\SourceList\Media
DiskPrompt
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
c:\Windows\system32\msvcp100.dll
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupapiLogStatus
setupapi.dev.log
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CE8D888A7214455FA1DBBE83729D9F33A39A3846
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\742C3192E607E424EB4549542BE1BBC53E6174E2
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Blob
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ADI RFG Drivers Install
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ADI RFG Drivers Install
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ADI RFG Drivers Install
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ADI RFG Drivers Install
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ADI RFG Drivers Install
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\A6610214E110CBE34344DE22BA821F64C2BE341B
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\49acc8.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\49acc8.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\551AAB2A5F3DF7043B073CB51BE0192E
1C74619418213434AA168FC70AA0292A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1E2ECE996C53602BEFF347D3BC89B6AB
1C74619418213434AA168FC70AA0292A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\507CA6AA29486A6B689079F07AFD42F2
1C74619418213434AA168FC70AA0292A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2FE702938A035799E9ABD066A36AE9EE
1C74619418213434AA168FC70AA0292A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\523DA7B97ED641252A714EC05955AF02
1C74619418213434AA168FC70AA0292A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B5A4655ECAAAF624DF3EE42C2EE2B6B3
1C74619418213434AA168FC70AA0292A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CB2C6E1246253E9FF490A7F088387D1D
1C74619418213434AA168FC70AA0292A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\26282674267E3ADA909906DD813C14FB
1C74619418213434AA168FC70AA0292A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BFFEF651E17B42940C4F8F5F5E61D926
1C74619418213434AA168FC70AA0292A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5C386E26753057A467AAAFA1452C08A1
1C74619418213434AA168FC70AA0292A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1C74619418213434AA168FC70AA0292A
1C74619418213434AA168FC70AA0292A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\24CBDFC95F5CCBDCE82CEABA2F856261
1C74619418213434AA168FC70AA0292A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9602F1674A8DF9347272143DAB3E5051
1C74619418213434AA168FC70AA0292A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Analog Devices\ADF435x\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Windows\Installer\{491647C1-1281-4343-AA61-F87CA00A92A2}\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Analog Devices\ADF435x\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Analog Devices\
HKEY_CURRENT_USER\SOFTWARE\Analog Devices\ADIsimPLL\Chip Prog
ADF4351
HKEY_CURRENT_USER\SOFTWARE\Analog Devices\ADIsimPLL\Chip Prog
ADF4350
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\F80478E2C12513843874D6931F770191
1C74619418213434AA168FC70AA0292A
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|Analog Devices|ADF435x|INIFileParser.DLL
INIFileParser,Version="1.7.1.0",Culture="neutral",PublicKeyToken="79AF7B307B65CF3C",ProcessorArchitecture="MSIL"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|Analog Devices|ADF435x|sdpApi1.DLL
sdpApi1,Version="2.1.908.0",Culture="neutral",ProcessorArchitecture="x86"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|Analog Devices|ADF435x|Microsoft.VisualStudio.HostingProcess.Utilities.Sync.dll
Microsoft.VisualStudio.HostingProcess.Utilities.Sync,Version="10.0.0.0",Culture="neutral",PublicKeyToken="B03F5F7F11D50A3A",ProcessorArchitecture="MSIL"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|Analog Devices|ADF435x|ADF435x.vshost.exe
vshost32-clr2,Version="10.0.0.0",Culture="neutral",PublicKeyToken="B03F5F7F11D50A3A",ProcessorArchitecture="x86"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|Analog Devices|ADF435x|CyUSB.DLL
CyUSB,Version="3.4.2.0",Culture="neutral",PublicKeyToken="01F1D2B6C851AE92",ProcessorArchitecture="MSIL"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|Analog Devices|ADF435x|ADF435x.exe
ADF435x,Version="7.0.1.0",Culture="neutral",ProcessorArchitecture="x86"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1C74619418213434AA168FC70AA0292A
DefaultFeature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\Features
DefaultFeature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A
ProductIcon
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\F80478E2C12513843874D6931F770191
1C74619418213434AA168FC70AA0292A
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
There are 551 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
110B000
heap
page read and write
2A20000
heap
page read and write
3409000
trusted library allocation
page read and write
2BC0000
heap
page read and write
137D000
heap
page read and write
1CB8F566000
heap
page read and write
1E348EA9000
heap
page read and write
36EC000
trusted library allocation
page read and write
2B63000
trusted library allocation
page read and write
C6A000
unkown
page readonly
21FF000
stack
page read and write
1CB8D6AE000
heap
page read and write
334E000
stack
page read and write
584000
heap
page read and write
2CA0000
trusted library allocation
page read and write
25D0FA33000
heap
page read and write
2D8C000
trusted library allocation
page read and write
8D7000
heap
page read and write
2760000
heap
page read and write
8C7000
heap
page read and write
2CF2000
trusted library allocation
page read and write
6C0000
heap
page read and write
25D0FA0E000
heap
page read and write
27218684000
heap
page read and write
ECE000
heap
page read and write
380A000
trusted library allocation
page read and write
2C9A000
trusted library allocation
page read and write
2721869B000
heap
page read and write
75A000
heap
page read and write
434000
unkown
page read and write
25D0FA14000
heap
page read and write
376D000
trusted library allocation
page read and write
1CB8F616000
heap
page read and write
26D6000
heap
page read and write
2C34000
trusted library allocation
page read and write
2721864D000
heap
page read and write
7FF644B10000
unkown
page readonly
27218AEB000
heap
page read and write
8C7000
heap
page read and write
2D78000
trusted library allocation
page read and write
307C000
stack
page read and write
1E348F12000
heap
page read and write
1CB8F5BD000
heap
page read and write
639000
heap
page read and write
3752000
trusted library allocation
page read and write
2750000
heap
page read and write
1366000
heap
page read and write
110B000
heap
page read and write
27218AC1000
heap
page read and write
188000
unkown
page write copy
7FF7107D3000
unkown
page readonly
564000
heap
page read and write
7FFB2FD000
stack
page read and write
27218B5A000
heap
page read and write
10E2000
heap
page read and write
25D0FA87000
heap
page read and write
272186B9000
heap
page read and write
2CC0000
trusted library allocation
page read and write
138A000
heap
page read and write
272186A4000
heap
page read and write
804000
heap
page read and write
8B2000
heap
page read and write
2B64000
trusted library allocation
page read and write
8C0000
heap
page read and write
27218B42000
heap
page read and write
25D0FA21000
heap
page read and write
2CC0000
trusted library allocation
page read and write
2FD0000
heap
page read and write
8C3000
heap
page read and write
376E000
trusted library allocation
page read and write
25D0FA22000
heap
page read and write
2E51000
heap
page read and write
10B9000
heap
page read and write
1CB8D715000
heap
page read and write
27218680000
heap
page read and write
35AE000
trusted library allocation
page read and write
3406000
trusted library allocation
page read and write
3400000
heap
page read and write
1374000
heap
page read and write
8DC000
heap
page read and write
409000
unkown
page write copy
2CFD000
trusted library allocation
page read and write
10EC000
heap
page read and write
27218AFB000
heap
page read and write
1E348F6E000
heap
page read and write
2D7C000
trusted library allocation
page read and write
2B6A000
trusted library allocation
page read and write
2520000
trusted library allocation
page read and write
8CC000
heap
page read and write
25D0FA49000
heap
page read and write
2540000
heap
page read and write
1112000
heap
page read and write
2A38000
heap
page read and write
27218B1F000
heap
page read and write
27218AE6000
heap
page read and write
4CC000
heap
page read and write
1102000
heap
page read and write
35A2000
trusted library allocation
page read and write
27218653000
heap
page read and write
36EA000
trusted library allocation
page read and write
2F05000
trusted library allocation
page read and write
8C7000
heap
page read and write
401000
unkown
page execute read
2CC0000
trusted library allocation
page read and write
1CB8F5C2000
heap
page read and write
653000
heap
page read and write
2A90000
heap
page read and write
1CB8F5D2000
heap
page read and write
255F000
stack
page read and write
136D000
heap
page read and write
3559000
trusted library allocation
page read and write
928000
heap
page read and write
27218AFD000
heap
page read and write
27218B09000
heap
page read and write
EBF000
heap
page read and write
138A000
heap
page read and write
ACD000
stack
page read and write
8C3000
heap
page read and write
25D0FB8A000
heap
page read and write
27218688000
heap
page read and write
F09000
heap
page read and write
10A5000
heap
page read and write
10D1000
heap
page read and write
407000
unkown
page readonly
10B9000
heap
page read and write
EB5000
heap
page read and write
35A7000
trusted library allocation
page read and write
ECC000
heap
page read and write
D50000
heap
page read and write
1E348EF2000
heap
page read and write
ED2000
heap
page read and write
2770000
heap
page read and write
27218C48000
heap
page read and write
2F90000
heap
page read and write
DF0000
heap
page read and write
3140000
heap
page read and write
2C3D000
trusted library allocation
page read and write
298A000
heap
page read and write
2CE4000
trusted library allocation
page read and write
353D000
trusted library allocation
page read and write
6D180000
unkown
page read and write
1CB8D78C000
heap
page read and write
F2C000
heap
page read and write
10A9000
heap
page read and write
2F0E000
trusted library allocation
page read and write
10D9000
heap
page read and write
407000
unkown
page readonly
8C8000
heap
page read and write
1368000
heap
page read and write
440000
heap
page read and write
438000
unkown
page readonly
10CC000
heap
page read and write
2550000
trusted library allocation
page read and write
35A1000
trusted library allocation
page read and write
2CC0000
trusted library allocation
page read and write
25D0FAE2000
heap
page read and write
10C0000
heap
page read and write
3776000
trusted library allocation
page read and write
1366000
heap
page read and write
2590000
trusted library allocation
page read and write
584000
heap
page read and write
2990000
heap
page read and write
10A5000
heap
page read and write
2C90000
trusted library allocation
page read and write
3A7C000
stack
page read and write
2CF9000
trusted library allocation
page read and write
2B50000
heap
page read and write
1E346F60000
heap
page read and write
27218C24000
heap
page read and write
10D1000
heap
page read and write
2CC0000
trusted library allocation
page read and write
E73000
heap
page read and write
2540000
trusted library allocation
page read and write
3731000
heap
page read and write
3762000
trusted library allocation
page read and write
25D0FB8F000
heap
page read and write
135C000
heap
page read and write
112F000
heap
page read and write
30E0000
heap
page read and write
10FC000
stack
page read and write
1389000
heap
page read and write
2A86000
trusted library allocation
page read and write
35A3000
trusted library allocation
page read and write
450000
heap
page read and write
C10000
heap
page read and write
2540000
heap
page read and write
8C0000
heap
page read and write
135C000
heap
page read and write
1112000
heap
page read and write
1CB8F5C0000
heap
page read and write
25D0FA1B000
heap
page read and write
25D0FB74000
heap
page read and write
322F000
heap
page read and write
3A1E000
stack
page read and write
25D0FA48000
heap
page read and write
135C000
heap
page read and write
2E3B000
trusted library allocation
page read and write
27218C20000
heap
page read and write
1E347089000
heap
page read and write
27218AE6000
heap
page read and write
3473000
trusted library allocation
page read and write
2E52000
heap
page read and write
35A0000
trusted library allocation
page read and write
2540000
trusted library allocation
page read and write
7FF710751000
unkown
page execute read
EE9000
heap
page read and write
135B000
heap
page read and write
1002000
unkown
page execute read
110B000
heap
page read and write
25C2000
heap
page read and write
1CB8F5C1000
heap
page read and write
1E348F6A000
heap
page read and write
27218460000
heap
page read and write
2FB0000
trusted library allocation
page read and write
1E348F1E000
heap
page read and write
3315000
trusted library allocation
page read and write
1374000
heap
page read and write
2E37000
trusted library allocation
page read and write
F3E000
heap
page read and write
2721865B000
heap
page read and write
AA0331D000
stack
page read and write
438000
unkown
page readonly
EE9000
heap
page read and write
27218B46000
heap
page read and write
1368000
heap
page read and write
2C92000
trusted library allocation
page read and write
2840000
heap
page read and write
890000
heap
page read and write
10C4000
heap
page read and write
110D000
heap
page read and write
2590000
trusted library allocation
page read and write
3770000
trusted library allocation
page read and write
2CFE000
trusted library allocation
page read and write
27218661000
heap
page read and write
298A000
heap
page read and write
564000
heap
page read and write
107D000
heap
page read and write
1CB8F5DE000
heap
page read and write
2721864A000
heap
page read and write
25D0FA3B000
heap
page read and write
8B3000
heap
page read and write
37CC000
trusted library allocation
page read and write
381F000
stack
page read and write
8CA000
heap
page read and write
2CF4000
trusted library allocation
page read and write
3560000
heap
page read and write
110B000
heap
page read and write
101E000
unkown
page readonly
2CC6000
trusted library allocation
page read and write
25D0F9FE000
heap
page read and write
C6A000
unkown
page readonly
2B20000
heap
page read and write
1300000
heap
page read and write
2540000
trusted library allocation
page read and write
1E348F6A000
heap
page read and write
27218684000
heap
page read and write
10D1000
heap
page read and write
27218657000
heap
page read and write
3810000
heap
page read and write
5FB000
heap
page read and write
25D0FA2C000
heap
page read and write
37C1000
trusted library allocation
page read and write
374A000
trusted library allocation
page read and write
25D0FBC3000
heap
page read and write
2721864A000
heap
page read and write
2F08000
trusted library allocation
page read and write
2D60000
heap
page read and write
35E3000
trusted library allocation
page read and write
27B0000
heap
page read and write
1368000
heap
page read and write
790000
heap
page read and write
1CB8F5F9000
heap
page read and write
1112000
heap
page read and write
2CFF000
trusted library allocation
page read and write
25D0FA2C000
heap
page read and write
3740000
trusted library allocation
page read and write
8D5000
heap
page read and write
5CE000
stack
page read and write
2A80000
trusted library allocation
page read and write
10C9000
heap
page read and write
110B000
heap
page read and write
2721867A000
heap
page read and write
8C7000
heap
page read and write
1071000
heap
page read and write
1108000
heap
page read and write
1E348A40000
heap
page read and write
25D0FA1B000
heap
page read and write
37CD000
trusted library allocation
page read and write
377B000
trusted library allocation
page read and write
564000
heap
page read and write
2010000
heap
page read and write
1E3470F9000
heap
page read and write
584000
heap
page read and write
EE3000
heap
page read and write
10D0000
heap
page read and write
2E31000
trusted library allocation
page read and write
2CF0000
heap
page read and write
923000
heap
page read and write
2760000
heap
page read and write
A8D000
stack
page read and write
2E51000
heap
page read and write
1379000
heap
page read and write
27218691000
heap
page read and write
25D104F4000
heap
page read and write
2FC0000
heap
page read and write
1E346FF9000
heap
page read and write
1E347010000
heap
page read and write
37C2000
trusted library allocation
page read and write
2F06000
trusted library allocation
page read and write
1108000
heap
page read and write
3764000
trusted library allocation
page read and write
8CC000
heap
page read and write
934000
heap
page read and write
25D0FA21000
heap
page read and write
8DA000
heap
page read and write
25D0FA2C000
heap
page read and write
3316000
trusted library allocation
page read and write
2FE0000
direct allocation
page read and write
27218B63000
heap
page read and write
2CB0000
heap
page read and write
135F000
heap
page read and write
25D0FA5B000
heap
page read and write
35A9000
trusted library allocation
page read and write
7B4000
heap
page read and write
54E000
stack
page read and write
2F02000
heap
page read and write
1CB8F5C2000
heap
page read and write
F7993FE000
stack
page read and write
110C000
heap
page read and write
1366000
heap
page read and write
2760000
heap
page read and write
30A0000
heap
page read and write
355D000
trusted library allocation
page read and write
3130000
heap
page read and write
1379000
heap
page read and write
170000
heap
page read and write
1CB8D6A0000
heap
page read and write
1374000
heap
page read and write
27218644000
heap
page read and write
8C0000
heap
page read and write
2CF0000
heap
page read and write
3120000
heap
page read and write
2E80000
heap
page read and write
25D0FA2C000
heap
page read and write
E82000
heap
page read and write
2D7B000
trusted library allocation
page read and write
25D0FA32000
heap
page read and write
32B0000
heap
page read and write
2590000
trusted library allocation
page read and write
2C98000
trusted library allocation
page read and write
2D10000
heap
page read and write
35ED000
trusted library allocation
page read and write
2D75000
trusted library allocation
page read and write
407000
unkown
page readonly
F3E000
heap
page read and write
2560000
trusted library allocation
page read and write
2CC0000
trusted library allocation
page read and write
2C94000
trusted library allocation
page read and write
797000
heap
page read and write
840000
heap
page read and write
112F000
heap
page read and write
35F0000
heap
page read and write
2860000
heap
page read and write
1CB8F5BF000
heap
page read and write
2ED8000
trusted library allocation
page read and write
3800000
trusted library allocation
page read and write
584000
heap
page read and write
6CEE0000
unkown
page read and write
2FB0000
trusted library allocation
page read and write
37CA000
trusted library allocation
page read and write
2CC0000
trusted library allocation
page read and write
25D0FA27000
heap
page read and write
27218698000
heap
page read and write
112F000
heap
page read and write
2C53000
heap
page read and write
27218719000
heap
page read and write
25D0FB6E000
heap
page read and write
2CCC000
trusted library allocation
page read and write
2E41000
trusted library allocation
page read and write
3472000
trusted library allocation
page read and write
27218AFD000
heap
page read and write
380F000
trusted library allocation
page read and write
8D7000
heap
page read and write
1E347035000
heap
page read and write
27218C2F000
heap
page read and write
2F0B000
trusted library allocation
page read and write
13C8000
heap
page read and write
2C50000
heap
page read and write
27218665000
heap
page read and write
6D161000
unkown
page execute read
8D5000
heap
page read and write
8D5000
heap
page read and write
1366000
heap
page read and write
36E6000
trusted library allocation
page read and write
2C80000
heap
page read and write
934000
heap
page read and write
3070000
heap
page read and write
413F000
stack
page read and write
2810000
heap
page read and write
1E348F1F000
heap
page read and write
2721867B000
heap
page read and write
72A000
heap
page read and write
393C000
stack
page read and write
10F5000
heap
page read and write
ED4000
heap
page read and write
705000
heap
page read and write
376C000
trusted library allocation
page read and write
27218B44000
heap
page read and write
2FB0000
trusted library allocation
page read and write
870000
heap
page read and write
27218ADD000
heap
page read and write
2540000
trusted library allocation
page read and write
1102000
heap
page read and write
1CB8F0E0000
heap
page read and write
2DFE000
stack
page read and write
10C0000
heap
page read and write
3160000
heap
page read and write
9C000
stack
page read and write
35E9000
trusted library allocation
page read and write
150000
heap
page read and write
76D000
heap
page read and write
1108000
heap
page read and write
10CC000
heap
page read and write
785000
heap
page read and write
1CB8D8B9000
heap
page read and write
1CB8F5D2000
heap
page read and write
2560000
trusted library allocation
page read and write
380B000
trusted library allocation
page read and write
1E348EF2000
heap
page read and write
374E000
trusted library allocation
page read and write
8D5000
heap
page read and write
340B000
trusted library allocation
page read and write
8CE000
heap
page read and write
1368000
heap
page read and write
564000
heap
page read and write
2F5F000
stack
page read and write
200E000
stack
page read and write
B0D000
stack
page read and write
8D7000
heap
page read and write
2B60000
heap
page read and write
1BE000
stack
page read and write
36E2000
trusted library allocation
page read and write
3534000
trusted library allocation
page read and write
25D0FA1B000
heap
page read and write
36E9000
trusted library allocation
page read and write
EC3000
heap
page read and write
3479000
trusted library allocation
page read and write
8D5000
heap
page read and write
EAC000
heap
page read and write
EF8000
heap
page read and write
27218669000
heap
page read and write
1CB8D792000
heap
page read and write
13A9000
heap
page read and write
1CB8F5F3000
heap
page read and write
17A000
heap
page read and write
1368000
heap
page read and write
27218AE3000
heap
page read and write
2C93000
trusted library allocation
page read and write
564000
heap
page read and write
25A0000
heap
page read and write
1112000
heap
page read and write
36E4000
trusted library allocation
page read and write
1366000
heap
page read and write
2CC4000
trusted library allocation
page read and write
391E000
stack
page read and write
25D0F9F0000
heap
page read and write
35A6000
trusted library allocation
page read and write
1CB8D79A000
heap
page read and write
1CB8F571000
heap
page read and write
2FB0000
trusted library allocation
page read and write
25D0FB70000
heap
page read and write
1E348F59000
heap
page read and write
8DA000
heap
page read and write
3408000
heap
page read and write
2D72000
trusted library allocation
page read and write
3311000
trusted library allocation
page read and write
25D0FA3F000
heap
page read and write
5D0000
heap
page read and write
7FFB57F000
stack
page read and write
1E348EF4000
heap
page read and write
2E4E000
stack
page read and write
F2C000
heap
page read and write
2E3E000
trusted library allocation
page read and write
50F000
stack
page read and write
10B9000
heap
page read and write
110C000
heap
page read and write
7FF644B93000
unkown
page readonly
1CB8F5B8000
heap
page read and write
355C000
trusted library allocation
page read and write
8D8000
heap
page read and write
2721864D000
heap
page read and write
1370000
heap
page read and write
2CE0000
heap
page read and write
25D0FA2C000
heap
page read and write
2CEC000
trusted library allocation
page read and write
340F000
trusted library allocation
page read and write
750000
heap
page read and write
25D0FB58000
heap
page read and write
7FF710750000
unkown
page readonly
2A83000
trusted library allocation
page read and write
1E34708B000
heap
page read and write
10F0000
heap
page read and write
2550000
heap
page read and write
2570000
trusted library allocation
page read and write
37DD000
trusted library allocation
page read and write
F13000
heap
page read and write
2B69000
trusted library allocation
page read and write
2D8A000
trusted library allocation
page read and write
584000
heap
page read and write
F39000
heap
page read and write
136B000
heap
page read and write
1E347089000
heap
page read and write
8D7000
heap
page read and write
3225000
heap
page read and write
1174000
heap
page read and write
2C56000
heap
page read and write
1108000
heap
page read and write
8D7000
heap
page read and write
27218C48000
heap
page read and write
3746000
trusted library allocation
page read and write
27218656000
heap
page read and write
3804000
trusted library allocation
page read and write
3805000
trusted library allocation
page read and write
303B000
stack
page read and write
2580000
heap
page read and write
1366000
heap
page read and write
25D0FB56000
heap
page read and write
1124000
heap
page read and write
F79947F000
stack
page read and write
2D8B000
trusted library allocation
page read and write
ECA000
heap
page read and write
27218C6F000
heap
page read and write
2D8D000
trusted library allocation
page read and write
25D0F990000
heap
page read and write
25D0FA45000
heap
page read and write
27218C27000
heap
page read and write
F3A000
heap
page read and write
25D0FB68000
heap
page read and write
1E346F50000
heap
page read and write
35E2000
trusted library allocation
page read and write
2D7A000
trusted library allocation
page read and write
37D9000
trusted library allocation
page read and write
5F0000
heap
page read and write
25D104F0000
heap
page read and write
8CC000
heap
page read and write
25D0FA45000
heap
page read and write
2C39000
trusted library allocation
page read and write
104C000
heap
page read and write
35B0000
heap
page read and write
27218675000
heap
page read and write
27218C21000
heap
page read and write
3402000
trusted library allocation
page read and write
EEA000
heap
page read and write
4E7000
heap
page read and write
277E000
stack
page read and write
EAC000
heap
page read and write
37CB000
trusted library allocation
page read and write
2C37000
trusted library allocation
page read and write
1E347018000
heap
page read and write
132B000
heap
page read and write
10AC000
heap
page read and write
272186D7000
heap
page read and write
27218648000
heap
page read and write
26DA000
heap
page read and write
F13000
heap
page read and write
2D7B000
trusted library allocation
page read and write
2CC0000
trusted library allocation
page read and write
6D24A000
unkown
page readonly
276D000
heap
page read and write
3763000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
8DA000
heap
page read and write
1E349200000
heap
page read and write
3130000
heap
page read and write
10D1000
heap
page read and write
37F0000
heap
page read and write
128E000
stack
page read and write
1E3470FA000
heap
page read and write
25D0FB5B000
heap
page read and write
8BB000
heap
page read and write
57E000
stack
page read and write
2721865B000
heap
page read and write
2C99000
trusted library allocation
page read and write
2B20000
heap
page read and write
1CB8F56E000
heap
page read and write
8D7000
heap
page read and write
2A85000
trusted library allocation
page read and write
2ED5000
trusted library allocation
page read and write
27218B6E000
heap
page read and write
1CB8F5DF000
heap
page read and write
1CB8F5D2000
heap
page read and write
2F01000
heap
page read and write
35EC000
trusted library allocation
page read and write
2CC0000
trusted library allocation
page read and write
1379000
heap
page read and write
1E348F0B000
heap
page read and write
138A000
heap
page read and write
8DA000
heap
page read and write
8CB000
heap
page read and write
37C5000
trusted library allocation
page read and write
BEE000
stack
page read and write
8BD000
heap
page read and write
2B3C000
stack
page read and write
8D5000
heap
page read and write
C61000
unkown
page execute read
25D0FBF5000
heap
page read and write
2E30000
trusted library allocation
page read and write
340E000
trusted library allocation
page read and write
10A5000
heap
page read and write
27218B52000
heap
page read and write
400000
unkown
page readonly
2FB0000
trusted library allocation
page read and write
2100000
heap
page read and write
259E000
stack
page read and write
2A90000
heap
page read and write
ED2000
heap
page read and write
6CEC1000
unkown
page execute read
10A9000
heap
page read and write
137C000
heap
page read and write
3150000
heap
page read and write
F18000
heap
page read and write
135F000
heap
page read and write
564000
heap
page read and write
400000
unkown
page readonly
27218A71000
heap
page read and write
1368000
heap
page read and write
27218ACF000
heap
page read and write
560000
heap
page read and write
A8F000
stack
page read and write
895000
heap
page read and write
880000
heap
page read and write
36E8000
trusted library allocation
page read and write
10B1000
heap
page read and write
2721867A000
heap
page read and write
2590000
trusted library allocation
page read and write
1E34710A000
heap
page read and write
135C000
heap
page read and write
13A9000
heap
page read and write
25D0FA1D000
heap
page read and write
1368000
heap
page read and write
25D0FA48000
heap
page read and write
1E348EC8000
heap
page read and write
427F000
stack
page read and write
2CC0000
trusted library allocation
page read and write
2D78000
trusted library allocation
page read and write
2EFE000
stack
page read and write
38FE000
stack
page read and write
2880000
heap
page read and write
1E348F1E000
heap
page read and write
1CB8D799000
heap
page read and write
2C96000
trusted library allocation
page read and write
25D0FA5B000
heap
page read and write
1340000
heap
page read and write
135F000
heap
page read and write
2D75000
trusted library allocation
page read and write
2CC0000
trusted library allocation
page read and write
36D0000
heap
page read and write
2C3F000
trusted library allocation
page read and write
340D000
trusted library allocation
page read and write
10B0000
heap
page read and write
3761000
trusted library allocation
page read and write
269F000
stack
page read and write
3221000
heap
page read and write
804000
heap
page read and write
1CB8D79B000
heap
page read and write
8C3000
heap
page read and write
3222000
heap
page read and write
1374000
heap
page read and write
2D7E000
trusted library allocation
page read and write
2540000
trusted library allocation
page read and write
2721865F000
heap
page read and write
1377000
heap
page read and write
10A9000
heap
page read and write
2A87000
trusted library allocation
page read and write
2CE5000
trusted library allocation
page read and write
2540000
trusted library allocation
page read and write
1374000
heap
page read and write
2F0A000
trusted library allocation
page read and write
2D79000
trusted library allocation
page read and write
29A0000
heap
page read and write
7FF644B93000
unkown
page readonly
27218665000
heap
page read and write
2BB0000
heap
page read and write
1CB8D790000
heap
page read and write
734000
heap
page read and write
C60000
unkown
page readonly
1378000
heap
page read and write
1CB8F5F9000
heap
page read and write
409000
unkown
page write copy
2CC0000
trusted library allocation
page read and write
2D7A000
trusted library allocation
page read and write
1E348F52000
heap
page read and write
8C3000
heap
page read and write
1CB8F590000
heap
page read and write
10EC000
heap
page read and write
3760000
trusted library allocation
page read and write
2590000
trusted library allocation
page read and write
1368000
heap
page read and write
25D0FA28000
heap
page read and write
25D0FA4C000
heap
page read and write
1118000
heap
page read and write
25D0FB69000
heap
page read and write
25D0FA52000
heap
page read and write
438000
unkown
page readonly
490000
heap
page read and write
138A000
heap
page read and write
437000
unkown
page readonly
7AC000
heap
page read and write
27218C46000
heap
page read and write
1CB8F549000
heap
page read and write
1381000
heap
page read and write
37C7000
trusted library allocation
page read and write
27218B1D000
heap
page read and write
10F4000
heap
page read and write
2C51000
heap
page read and write
3403000
trusted library allocation
page read and write
1E348F6E000
heap
page read and write
27218C47000
heap
page read and write
2950000
heap
page read and write
10CC000
heap
page read and write
EEA000
heap
page read and write
10EC000
heap
page read and write
2AFE000
stack
page read and write
36FE000
stack
page read and write
37C5000
trusted library allocation
page read and write
110E000
heap
page read and write
3538000
trusted library allocation
page read and write
8DA000
heap
page read and write
1368000
heap
page read and write
140000
heap
page read and write
2CF0000
heap
page read and write
8CC000
heap
page read and write
1E34710D000
heap
page read and write
2CE0000
heap
page read and write
2760000
heap
page read and write
3478000
trusted library allocation
page read and write
584000
heap
page read and write
27C0000
heap
page read and write
351E000
stack
page read and write
654000
heap
page read and write
2FB0000
trusted library allocation
page read and write
25D0FA3B000
heap
page read and write
2550000
heap
page read and write
10C1000
heap
page read and write
1368000
heap
page read and write
3554000
trusted library allocation
page read and write
1E348A43000
heap
page read and write
8C9000
heap
page read and write
25D0FB79000
heap
page read and write
3550000
trusted library allocation
page read and write
25D0F9FF000
heap
page read and write
135C000
heap
page read and write
1170000
heap
page read and write
10A9000
heap
page read and write
35E1000
trusted library allocation
page read and write
8DA000
heap
page read and write
8B2000
heap
page read and write
35E8000
trusted library allocation
page read and write
C43D275000
stack
page read and write
37C8000
trusted library allocation
page read and write
2C51000
heap
page read and write
2CF7000
trusted library allocation
page read and write
133E000
heap
page read and write
25D0FA5B000
heap
page read and write
1112000
heap
page read and write
1CB8D785000
heap
page read and write
30A0000
heap
page read and write
12B0000
heap
page read and write
2E35000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page read and write
2C56000
heap
page read and write
1CB8F900000
heap
page read and write
25C2000
heap
page read and write
2720000
heap
page read and write
37DB000
trusted library allocation
page read and write
10E6000
heap
page read and write
8B3000
heap
page read and write
403C000
stack
page read and write
2CC0000
trusted library allocation
page read and write
3590000
heap
page read and write
2830000
heap
page read and write
2790000
heap
page read and write
25D0FA3A000
heap
page read and write
2550000
trusted library allocation
page read and write
407000
unkown
page readonly
F2C000
heap
page read and write
1CB8F5F9000
heap
page read and write
2B6E000
trusted library allocation
page read and write
37D6000
trusted library allocation
page read and write
10B9000
heap
page read and write
8CB000
heap
page read and write
2A90000
heap
page read and write
10F3000
heap
page read and write
37D7000
trusted library allocation
page read and write
ED2000
heap
page read and write
37CA000
trusted library allocation
page read and write
1102000
heap
page read and write
31C0000
heap
page read and write
1102000
heap
page read and write
1E348EE5000
heap
page read and write
2730000
heap
page read and write
AA03298000
stack
page read and write
1CB8F5B5000
heap
page read and write
72C000
heap
page read and write
EFB000
heap
page read and write
6D190000
unkown
page readonly
4E0000
heap
page read and write
6DA000
heap
page read and write
2CE6000
trusted library allocation
page read and write
2F0F000
heap
page read and write
1112000
heap
page read and write
2D75000
trusted library allocation
page read and write
1118000
heap
page read and write
2B50000
heap
page read and write
EA8000
heap
page read and write
10D9000
heap
page read and write
8D5000
heap
page read and write
600000
heap
page read and write
2980000
heap
page read and write
2FB0000
trusted library allocation
page read and write
ED2000
heap
page read and write
2560000
heap
page read and write
6D23F000
unkown
page write copy
7C5000
heap
page read and write
31B0000
heap
page read and write
2760000
heap
page read and write
1369000
heap
page read and write
EED000
heap
page read and write
25D0FA48000
heap
page read and write
135C000
heap
page read and write
19A000
stack
page read and write
25D0FA3B000
heap
page read and write
10FA000
heap
page read and write
3773000
trusted library allocation
page read and write
2CF5000
trusted library allocation
page read and write
1368000
heap
page read and write
1374000
heap
page read and write
1E346F80000
heap
page read and write
27218B54000
heap
page read and write
377E000
trusted library allocation
page read and write
3751000
trusted library allocation
page read and write
8B3000
heap
page read and write
25D0FA28000
heap
page read and write
E46000
heap
page read and write
2A90000
heap
page read and write
19A000
stack
page read and write
1E348EE5000
heap
page read and write
2ED0000
heap
page read and write
36EE000
trusted library allocation
page read and write
1E347046000
heap
page read and write
440000
heap
page read and write
8B3000
heap
page read and write
8D7000
heap
page read and write
2CC0000
trusted library allocation
page read and write
27218B44000
heap
page read and write
2CBE000
stack
page read and write
2590000
heap
page read and write
409000
unkown
page read and write
8BB000
heap
page read and write
112F000
heap
page read and write
1393000
heap
page read and write
3580000
heap
page read and write
3404000
trusted library allocation
page read and write
1118000
heap
page read and write
27218656000
heap
page read and write
8B2000
heap
page read and write
2D7A000
trusted library allocation
page read and write
1376000
heap
page read and write
25D0FA14000
heap
page read and write
27218665000
heap
page read and write
353A000
trusted library allocation
page read and write
27218661000
heap
page read and write
27218C27000
heap
page read and write
2B66000
trusted library allocation
page read and write
1046000
heap
page read and write
1368000
heap
page read and write
1366000
heap
page read and write
27218C27000
heap
page read and write
9B000
stack
page read and write
EA8000
heap
page read and write
2D84000
trusted library allocation
page read and write
F39000
heap
page read and write
CF7000
stack
page read and write
6CEE1000
unkown
page readonly
2FB0000
trusted library allocation
page read and write
1CB8D8B0000
heap
page read and write
3777000
trusted library allocation
page read and write
3557000
trusted library allocation
page read and write
27218B6B000
heap
page read and write
1364000
heap
page read and write
25D0FA1B000
heap
page read and write
8D7000
heap
page read and write
1393000
heap
page read and write
434000
unkown
page read and write
2CE2000
trusted library allocation
page read and write
DC000
stack
page read and write
27218AC1000
heap
page read and write
1E348F1F000
heap
page read and write
F23000
heap
page read and write
8D5000
heap
page read and write
C30000
heap
page read and write
10EF000
heap
page read and write
8DA000
heap
page read and write
7B6000
heap
page read and write
27218656000
heap
page read and write
3313000
trusted library allocation
page read and write
7FFB37E000
stack
page read and write
2590000
trusted library allocation
page read and write
13CA000
heap
page read and write
329E000
stack
page read and write
8CD000
heap
page read and write
12A0000
heap
page read and write
3731000
heap
page read and write
2C20000
heap
page read and write
1E348F14000
heap
page read and write
1CB8F574000
heap
page read and write
F18000
heap
page read and write
13A0000
heap
page read and write
138A000
heap
page read and write
137A000
heap
page read and write
1381000
heap
page read and write
8C7000
heap
page read and write
347A000
trusted library allocation
page read and write
2D71000
trusted library allocation
page read and write
27218B44000
heap
page read and write
7FF644BA8000
unkown
page readonly
25D0FA49000
heap
page read and write
3558000
trusted library allocation
page read and write
353B000
trusted library allocation
page read and write
3810000
trusted library allocation
page read and write
2D69000
heap
page read and write
1393000
heap
page read and write
1E348F5F000
heap
page read and write
2590000
trusted library allocation
page read and write
E82000
heap
page read and write
1CB8D79E000
heap
page read and write
3240000
heap
page read and write
2D85000
trusted library allocation
page read and write
33D0000
heap
page read and write
2ED6000
trusted library allocation
page read and write
2C51000
heap
page read and write
347B000
trusted library allocation
page read and write
2A89000
trusted library allocation
page read and write
37C0000
heap
page read and write
3808000
trusted library allocation
page read and write
30B0000
heap
page read and write
27218AFD000
heap
page read and write
1CB8D797000
heap
page read and write
8D7000
heap
page read and write
10AF000
heap
page read and write
25D0FA52000
heap
page read and write
2F02000
trusted library allocation
page read and write
3475000
trusted library allocation
page read and write
3290000
heap
page read and write
3747000
trusted library allocation
page read and write
653000
heap
page read and write
3741000
trusted library allocation
page read and write
27218B3C000
heap
page read and write
F09000
heap
page read and write
2CC0000
trusted library allocation
page read and write
25D0FAF0000
heap
page read and write
1368000
heap
page read and write
1370000
heap
page read and write
728000
heap
page read and write
3250000
heap
page read and write
1000000
unkown
page readonly
10F5000
heap
page read and write
136F000
heap
page read and write
8DA000
heap
page read and write
136D000
heap
page read and write
564000
heap
page read and write
5F5000
heap
page read and write
1E348ECC000
heap
page read and write
27218661000
heap
page read and write
27218560000
heap
page read and write
2721865B000
heap
page read and write
1E348EA9000
heap
page read and write
355A000
trusted library allocation
page read and write
6D190000
unkown
page readonly
913000
heap
page read and write
37C1000
trusted library allocation
page read and write
68E000
stack
page read and write
2520000
trusted library allocation
page read and write
2B60000
heap
page read and write
8C5000
heap
page read and write
564000
heap
page read and write
42B000
unkown
page read and write
27218651000
heap
page read and write
135C000
heap
page read and write
D80000
heap
page read and write
2CC0000
trusted library allocation
page read and write
1124000
heap
page read and write
25B0000
heap
page read and write
1366000
heap
page read and write
2CC2000
trusted library allocation
page read and write
27218C91000
heap
page read and write
27218B44000
heap
page read and write
EFD000
heap
page read and write
10D6000
heap
page read and write
33CE000
stack
page read and write
8DA000
heap
page read and write
3551000
trusted library allocation
page read and write
37DE000
trusted library allocation
page read and write
8C7000
heap
page read and write
138A000
heap
page read and write
27218691000
heap
page read and write
2C32000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
2D74000
trusted library allocation
page read and write
31B0000
heap
page read and write
3400000
heap
page read and write
211F000
stack
page read and write
1E347030000
heap
page read and write
3312000
trusted library allocation
page read and write
25D0FA4A000
heap
page read and write
25D0FA3A000
heap
page read and write
2721865B000
heap
page read and write
2ED9000
heap
page read and write
272186D3000
heap
page read and write
2CD0000
heap
page read and write
ECE000
heap
page read and write
1E3470F9000
heap
page read and write
3731000
heap
page read and write
1368000
heap
page read and write
1E347049000
heap
page read and write
1E34705D000
heap
page read and write
2D79000
trusted library allocation
page read and write
8DA000
heap
page read and write
2D89000
trusted library allocation
page read and write
2E20000
heap
page read and write
8D8000
heap
page read and write
2721872E000
heap
page read and write
3779000
trusted library allocation
page read and write
377C000
trusted library allocation
page read and write
1CB8F5BA000
heap
page read and write
10A5000
heap
page read and write
3160000
heap
page read and write
136D000
heap
page read and write
10EC000
heap
page read and write
8D8000
heap
page read and write
2E34000
trusted library allocation
page read and write
112F000
heap
page read and write
26E0000
direct allocation
page read and write
21A5000
heap
page read and write
272186B9000
heap
page read and write
2B60000
trusted library allocation
page read and write
5AE000
stack
page read and write
3060000
heap
page read and write
2540000
trusted library allocation
page read and write
440000
heap
page read and write
1CB8F5F9000
heap
page read and write
355F000
trusted library allocation
page read and write
3771000
trusted library allocation
page read and write
27218B44000
heap
page read and write
25D0FA2C000
heap
page read and write
E4C000
heap
page read and write
8D7000
heap
page read and write
283D000
heap
page read and write
8D7000
heap
page read and write
10C3000
heap
page read and write
25D0FA3A000
heap
page read and write
27218C48000
heap
page read and write
180000
unkown
page readonly
2C58000
heap
page read and write
25D0FA2C000
heap
page read and write
3120000
heap
page read and write
584000
heap
page read and write
27218B5A000
heap
page read and write
12E0000
trusted library allocation
page read and write
2540000
trusted library allocation
page read and write
27218B44000
heap
page read and write
6C0000
heap
page read and write
8B3000
heap
page read and write
10F2000
heap
page read and write
27218665000
heap
page read and write
25D0FA5B000
heap
page read and write
37C6000
trusted library allocation
page read and write
13A2000
heap
page read and write
2D73000
trusted library allocation
page read and write
1368000
heap
page read and write
25D0FA1B000
heap
page read and write
1112000
heap
page read and write
1E348EF4000
heap
page read and write
1366000
heap
page read and write
2D79000
trusted library allocation
page read and write
25D0FA3F000
heap
page read and write
1108000
heap
page read and write
25D0F890000
heap
page read and write
3767000
trusted library allocation
page read and write
8C7000
heap
page read and write
2730000
heap
page read and write
2C65000
heap
page read and write
EE9000
heap
page read and write
27218650000
heap
page read and write
D7B000
stack
page read and write
8BB000
heap
page read and write
1366000
heap
page read and write
E73000
heap
page read and write
2830000
heap
page read and write
2CC8000
trusted library allocation
page read and write
3520000
heap
page read and write
10DD000
heap
page read and write
2CF3000
trusted library allocation
page read and write
8C3000
heap
page read and write
2EF0000
heap
page read and write
8C3000
heap
page read and write
1E348EF5000
heap
page read and write
2CCF000
trusted library allocation
page read and write
2CF1000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
2B50000
heap
page read and write
3540000
heap
page read and write
1CB8F520000
heap
page read and write
6CB000
heap
page read and write
7FFB3FF000
stack
page read and write
3090000
heap
page read and write
2980000
heap
page read and write
EC4000
heap
page read and write
400000
unkown
page readonly
2D78000
trusted library allocation
page read and write
37C9000
trusted library allocation
page read and write
25D0FB74000
heap
page read and write
1E34920C000
heap
page read and write
25D0FB4C000
heap
page read and write
1CB8F561000
heap
page read and write
36ED000
trusted library allocation
page read and write
7FF710751000
unkown
page execute read
8B2000
heap
page read and write
2540000
trusted library allocation
page read and write
3743000
trusted library allocation
page read and write
25A0000
heap
page read and write
7FF7107D1000
unkown
page read and write
26E0000
heap
page read and write
340A000
trusted library allocation
page read and write
8DA000
heap
page read and write
1102000
heap
page read and write
F799275000
stack
page read and write
2A8A000
trusted library allocation
page read and write
F3A000
heap
page read and write
F09000
heap
page read and write
8D7000
heap
page read and write
42B000
unkown
page read and write
1CB8F5E9000
heap
page read and write
2EC0000
heap
page read and write
2E39000
trusted library allocation
page read and write
ED2000
heap
page read and write
1368000
heap
page read and write
353C000
trusted library allocation
page read and write
2721864A000
heap
page read and write
3748000
trusted library allocation
page read and write
27218B3C000
heap
page read and write
ECE000
heap
page read and write
8B4000
heap
page read and write
10B9000
heap
page read and write
EB2000
heap
page read and write
7FFB278000
stack
page read and write
10C0000
heap
page read and write
2540000
trusted library allocation
page read and write
564000
heap
page read and write
37C7000
trusted library allocation
page read and write
2D70000
heap
page read and write
2C95000
trusted library allocation
page read and write
5CC000
stack
page read and write
1E348F1F000
heap
page read and write
401000
unkown
page execute read
3778000
trusted library allocation
page read and write
2D73000
trusted library allocation
page read and write
407000
unkown
page readonly
2B70000
heap
page read and write
3537000
trusted library allocation
page read and write
1000000
unkown
page readonly
110B000
heap
page read and write
1368000
heap
page read and write
2CEA000
trusted library allocation
page read and write
8B3000
heap
page read and write
8C0000
heap
page read and write
621000
heap
page read and write
380C000
trusted library allocation
page read and write
8B3000
heap
page read and write
1374000
heap
page read and write
2A81000
trusted library allocation
page read and write
1002000
unkown
page execute read
25D0FB40000
heap
page read and write
2590000
trusted library allocation
page read and write
355B000
trusted library allocation
page read and write
25D0FA27000
heap
page read and write
1E348F54000
heap
page read and write
2A8D000
trusted library allocation
page read and write
3530000
heap
page read and write
2ED7000
trusted library allocation
page read and write
2980000
heap
page read and write
355E000
trusted library allocation
page read and write
8D8000
heap
page read and write
2810000
heap
page read and write
3807000
trusted library allocation
page read and write
136D000
heap
page read and write
1E348F4C000
heap
page read and write
30B0000
heap
page read and write
27218B00000
heap
page read and write
F7992FE000
stack
page read and write
2520000
trusted library allocation
page read and write
2540000
trusted library allocation
page read and write
2590000
trusted library allocation
page read and write
7FF644B11000
unkown
page execute read
36E1000
trusted library allocation
page read and write
3080000
heap
page read and write
1CB8F5F3000
heap
page read and write
EAC000
heap
page read and write
25D0FA32000
heap
page read and write
2D0D000
heap
page read and write
9C000
stack
page read and write
8D5000
heap
page read and write
25D104F1000
heap
page read and write
3535000
trusted library allocation
page read and write
2590000
trusted library allocation
page read and write
1368000
heap
page read and write
916000
heap
page read and write
1102000
heap
page read and write
1CB8F5D5000
heap
page read and write
25D0FB5C000
heap
page read and write
10A5000
heap
page read and write
1002000
unkown
page execute read
3190000
heap
page read and write
1000000
unkown
page readonly
3590000
heap
page read and write
F09000
heap
page read and write
2540000
trusted library allocation
page read and write
409000
unkown
page read and write
2D7E000
trusted library allocation
page read and write
2570000
heap
page read and write
1CB8F565000
heap
page read and write
2CC0000
trusted library allocation
page read and write
ED7000
heap
page read and write
10A9000
heap
page read and write
ED4000
heap
page read and write
2D70000
trusted library allocation
page read and write
111E000
heap
page read and write
8C3000
heap
page read and write
ECC000
heap
page read and write
1E347040000
heap
page read and write
100C000
unkown
page read and write
25D0FA24000
heap
page read and write
1E348F72000
heap
page read and write
27218C27000
heap
page read and write
136D000
heap
page read and write
111E000
heap
page read and write
27218ADE000
heap
page read and write
3710000
heap
page read and write
27218AC9000
heap
page read and write
25D0FB67000
heap
page read and write
8E6000
heap
page read and write
3317000
trusted library allocation
page read and write
3760000
heap
page read and write
1E34710D000
heap
page read and write
27218C47000
heap
page read and write
35E7000
trusted library allocation
page read and write
6D23E000
unkown
page read and write
376A000
trusted library allocation
page read and write
25D0FA46000
heap
page read and write
27218B3C000
heap
page read and write
C61000
unkown
page execute read
110B000
heap
page read and write
1E348F44000
heap
page read and write
2A90000
heap
page read and write
ED7000
heap
page read and write
27218AC9000
heap
page read and write
27218AE8000
heap
page read and write
1CB8D792000
heap
page read and write
25D0FB77000
heap
page read and write
564000
heap
page read and write
EBC000
heap
page read and write
272186CB000
heap
page read and write
25D0FA28000
heap
page read and write
1393000
heap
page read and write
2D30000
heap
page read and write
ECE000
heap
page read and write
3730000
heap
page read and write
25D0FB62000
heap
page read and write
10B9000
heap
page read and write
1E34704E000
heap
page read and write
8C0000
heap
page read and write
2E3A000
trusted library allocation
page read and write
25D0FA52000
heap
page read and write
136D000
heap
page read and write
584000
heap
page read and write
409000
unkown
page read and write
2D7D000
trusted library allocation
page read and write
25D0FA5B000
heap
page read and write
1CB8F601000
heap
page read and write
7FF7107D3000
unkown
page readonly
2721867A000
heap
page read and write
1C4000
heap
page read and write
2CC0000
trusted library allocation
page read and write
8D7000
heap
page read and write
2D40000
heap
page read and write
112F000
heap
page read and write
18A000
unkown
page readonly
27218AE9000
heap
page read and write
2C90000
heap
page read and write
112F000
heap
page read and write
437000
unkown
page readonly
C43D37E000
stack
page read and write
10E5000
heap
page read and write
2B68000
trusted library allocation
page read and write
54D000
stack
page read and write
27218AFB000
heap
page read and write
27218ACB000
heap
page read and write
F13000
heap
page read and write
6D23F000
unkown
page write copy
1381000
heap
page read and write
181000
unkown
page execute read
2CE0000
trusted library allocation
page read and write
1382000
heap
page read and write
30A0000
heap
page read and write
139A000
heap
page read and write
10B9000
heap
page read and write
27218650000
heap
page read and write
272186A1000
heap
page read and write
8C0000
heap
page read and write
8D8000
heap
page read and write
1CB8F5DD000
heap
page read and write
37D1000
trusted library allocation
page read and write
2F07000
trusted library allocation
page read and write
3775000
trusted library allocation
page read and write
25D0FA3C000
heap
page read and write
1EF000
stack
page read and write
3050000
heap
page read and write
2A30000
heap
page read and write
27218680000
heap
page read and write
137D000
heap
page read and write
2F09000
heap
page read and write
1379000
heap
page read and write
27218B6D000
heap
page read and write
3400000
trusted library allocation
page read and write
2D72000
trusted library allocation
page read and write
2540000
trusted library allocation
page read and write
8D8000
heap
page read and write
2CB0000
heap
page read and write
8C0000
heap
page read and write
1174000
heap
page read and write
27218B3F000
heap
page read and write
2EBE000
stack
page read and write
EAC000
heap
page read and write
2D76000
trusted library allocation
page read and write
25D0FA4C000
heap
page read and write
EF8000
heap
page read and write
1CB8D6A7000
heap
page read and write
1E346FF5000
heap
page read and write
1CB8F5C1000
heap
page read and write
27218AC7000
heap
page read and write
3532000
trusted library allocation
page read and write
135C000
heap
page read and write
110E000
heap
page read and write
1E348F72000
heap
page read and write
EE5000
heap
page read and write
25D0FA2B000
heap
page read and write
DF0000
heap
page read and write
1E348F72000
heap
page read and write
3744000
trusted library allocation
page read and write
27218A70000
heap
page read and write
25D0FA24000
heap
page read and write
2D75000
trusted library allocation
page read and write
3766000
trusted library allocation
page read and write
25D0FA5B000
heap
page read and write
2C9D000
trusted library allocation
page read and write
1CB8F5E9000
heap
page read and write
128F000
stack
page read and write
22D0000
heap
page read and write
36E7000
trusted library allocation
page read and write
25D0FA24000
heap
page read and write
2C3C000
trusted library allocation
page read and write
27218661000
heap
page read and write
8B9000
heap
page read and write
112F000
heap
page read and write
1393000
heap
page read and write
35AD000
trusted library allocation
page read and write
1E347109000
heap
page read and write
1E348F6E000
heap
page read and write
1CB8D680000
heap
page read and write
36E0000
trusted library allocation
page read and write
8D8000
heap
page read and write
1E348F5E000
heap
page read and write
4E5000
heap
page read and write
107F000
heap
page read and write
110E000
heap
page read and write
101E000
unkown
page readonly
10B9000
heap
page read and write
2D74000
trusted library allocation
page read and write
3806000
trusted library allocation
page read and write
2540000
trusted library allocation
page read and write
1102000
heap
page read and write
2D70000
trusted library allocation
page read and write
F09000
heap
page read and write
3765000
trusted library allocation
page read and write
2F04000
trusted library allocation
page read and write
2C40000
heap
page read and write
272185B5000
heap
page read and write
2C53000
heap
page read and write
4CB000
stack
page read and write
1393000
heap
page read and write
25C1000
heap
page read and write
31F0000
heap
page read and write
2540000
trusted library allocation
page read and write
3280000
heap
page read and write
2CB0000
heap
page read and write
2721866B000
heap
page read and write
30BC000
stack
page read and write
1386000
heap
page read and write
1389000
heap
page read and write
2D30000
heap
page read and write
35EE000
trusted library allocation
page read and write
25D0FA28000
heap
page read and write
2D60000
heap
page read and write
790000
heap
page read and write
1368000
heap
page read and write
10E0000
heap
page read and write
7FF710750000
unkown
page readonly
111E000
heap
page read and write
1E348EF2000
heap
page read and write
401000
unkown
page execute read
27218ACB000
heap
page read and write
25D0FAA1000
heap
page read and write
27218B52000
heap
page read and write
3474000
trusted library allocation
page read and write
2D70000
trusted library allocation
page read and write
25D0FA12000
heap
page read and write
2C9C000
trusted library allocation
page read and write
1E348F54000
heap
page read and write
110B000
heap
page read and write
1112000
heap
page read and write
13C5000
heap
page read and write
2ED2000
trusted library allocation
page read and write
C50000
heap
page read and write
1366000
heap
page read and write
2570000
heap
page read and write
2E3C000
trusted library allocation
page read and write
10CD000
heap
page read and write
ED2000
heap
page read and write
3A3F000
stack
page read and write
3407000
trusted library allocation
page read and write
EA8000
heap
page read and write
3801000
trusted library allocation
page read and write
EBF000
heap
page read and write
8CA000
heap
page read and write
25D0FAA1000
heap
page read and write
F23000
heap
page read and write
1CB8F571000
heap
page read and write
3110000
heap
page read and write
2CE8000
trusted library allocation
page read and write
7FF7107D1000
unkown
page write copy
10F4000
heap
page read and write
2C3E000
trusted library allocation
page read and write
10F2000
heap
page read and write
25D0FA37000
heap
page read and write
2CFB000
trusted library allocation
page read and write
1CB8F5E9000
heap
page read and write
2D77000
trusted library allocation
page read and write
8C0000
heap
page read and write
8B2000
heap
page read and write
25D0FA3B000
heap
page read and write
43BF000
stack
page read and write
2C30000
trusted library allocation
page read and write
1E348F54000
heap
page read and write
C68000
unkown
page read and write
374D000
trusted library allocation
page read and write
AA0339E000
stack
page read and write
E80000
heap
page read and write
37C0000
trusted library allocation
page read and write
35A0000
heap
page read and write
8C0000
heap
page read and write
25D0FA1F000
heap
page read and write
2F0C000
trusted library allocation
page read and write
2D7C000
trusted library allocation
page read and write
2580000
trusted library allocation
page read and write
1112000
heap
page read and write
3552000
trusted library allocation
page read and write
8D5000
heap
page read and write
2A88000
trusted library allocation
page read and write
130F000
stack
page read and write
36E5000
trusted library allocation
page read and write
78C000
heap
page read and write
25D0FB45000
heap
page read and write
3090000
heap
page read and write
C68000
unkown
page write copy
27218B3C000
heap
page read and write
10F4000
heap
page read and write
37D5000
trusted library allocation
page read and write
25D0FA87000
heap
page read and write
2A40000
heap
page read and write
1102000
heap
page read and write
1174000
heap
page read and write
BF0000
heap
page read and write
10C3000
heap
page read and write
584000
heap
page read and write
12E0000
trusted library allocation
page read and write
2A80000
heap
page read and write
27218AFD000
heap
page read and write
1E348ED1000
heap
page read and write
1382000
heap
page read and write
2721865B000
heap
page read and write
2CD0000
heap
page read and write
717000
heap
page read and write
2D70000
trusted library allocation
page read and write
2D81000
trusted library allocation
page read and write
2D76000
trusted library allocation
page read and write
1E348F5C000
heap
page read and write
F2C000
heap
page read and write
27218B3C000
heap
page read and write
EC7000
heap
page read and write
1368000
heap
page read and write
1E348E80000
heap
page read and write
4D0000
heap
page read and write
3730000
heap
page read and write
2CC0000
trusted library allocation
page read and write
450000
heap
page read and write
37D3000
trusted library allocation
page read and write
EE5000
heap
page read and write
1361000
heap
page read and write
1CB8F5D2000
heap
page read and write
136B000
heap
page read and write
25D0FA46000
heap
page read and write
13A0000
heap
page read and write
1388000
heap
page read and write
2B20000
heap
page read and write
106C000
heap
page read and write
1CB8D78A000
heap
page read and write
8C0000
heap
page read and write
2CFC000
trusted library allocation
page read and write
2770000
heap
page read and write
7FF7107E8000
unkown
page readonly
35E0000
trusted library allocation
page read and write
2590000
trusted library allocation
page read and write
37D8000
trusted library allocation
page read and write
2DBF000
stack
page read and write
8D7000
heap
page read and write
F3E000
heap
page read and write
2CF6000
trusted library allocation
page read and write
8C3000
heap
page read and write
2E52000
heap
page read and write
3460000
heap
page read and write
361F000
stack
page read and write
1E348F6A000
heap
page read and write
AE5000
heap
page read and write
584000
heap
page read and write
25D0FA09000
heap
page read and write
25D0FB4B000
heap
page read and write
3150000
heap
page read and write
7FF644B10000
unkown
page readonly
50A000
stack
page read and write
8DB000
heap
page read and write
27218B44000
heap
page read and write
140000
heap
page read and write
3140000
heap
page read and write
377A000
trusted library allocation
page read and write
EEE000
heap
page read and write
2540000
trusted library allocation
page read and write
6D0000
heap
page read and write
2540000
trusted library allocation
page read and write
10EC000
heap
page read and write
8C3000
heap
page read and write
6D24A000
unkown
page readonly
2C9E000
trusted library allocation
page read and write
2540000
trusted library allocation
page read and write
70C000
heap
page read and write
ED2000
heap
page read and write
3774000
trusted library allocation
page read and write
520000
heap
page read and write
E40000
heap
page read and write
2B61000
trusted library allocation
page read and write
1CB8F593000
heap
page read and write
36E3000
trusted library allocation
page read and write
35AC000
trusted library allocation
page read and write
37D0000
trusted library allocation
page read and write
27218637000
heap
page read and write
10C7000
heap
page read and write
25D0FA3A000
heap
page read and write
2FB0000
trusted library allocation
page read and write
7B4000
heap
page read and write
25D0FA99000
heap
page read and write
1102000
heap
page read and write
13A0000
heap
page read and write
31C0000
heap
page read and write
30C0000
heap
page read and write
2D7C000
trusted library allocation
page read and write
42C000
unkown
page read and write
9B000
stack
page read and write
135F000
heap
page read and write
584000
heap
page read and write
2721872E000
heap
page read and write
27218650000
heap
page read and write
25D0FA5B000
heap
page read and write
26D0000
heap
page read and write
ECE000
heap
page read and write
180000
unkown
page readonly
112F000
heap
page read and write
8D6000
heap
page read and write
1E34BF70000
heap
page read and write
564000
heap
page read and write
25D0FB74000
heap
page read and write
2590000
trusted library allocation
page read and write
307D000
heap
page read and write
1E348F52000
heap
page read and write
2E40000
trusted library allocation
page read and write
2590000
trusted library allocation
page read and write
2C5B000
heap
page read and write
2A70000
heap
page read and write
1E348EF5000
heap
page read and write
1E348EF7000
heap
page read and write
8C7000
heap
page read and write
1CB8F58D000
heap
page read and write
35E5000
trusted library allocation
page read and write
409000
unkown
page write copy
2CD0000
heap
page read and write
2CCA000
trusted library allocation
page read and write
3401000
trusted library allocation
page read and write
10EC000
heap
page read and write
25D0FA85000
heap
page read and write
10E5000
heap
page read and write
1E348F57000
heap
page read and write
110B000
heap
page read and write
8DB000
heap
page read and write
2550000
heap
page read and write
27218AE9000
heap
page read and write
804000
heap
page read and write
25D0FBA1000
heap
page read and write
F26000
heap
page read and write
10AC000
heap
page read and write
25D0FA1B000
heap
page read and write
8C0000
heap
page read and write
2CC0000
trusted library allocation
page read and write
3150000
heap
page read and write
27218B43000
heap
page read and write
25D0FB3F000
heap
page read and write
2C31000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
2CC0000
trusted library allocation
page read and write
3768000
trusted library allocation
page read and write
1CB8F5BA000
heap
page read and write
302E000
stack
page read and write
137A000
heap
page read and write
1366000
heap
page read and write
353E000
trusted library allocation
page read and write
2E38000
trusted library allocation
page read and write
2D72000
trusted library allocation
page read and write
2F03000
trusted library allocation
page read and write
645000
heap
page read and write
620000
heap
page read and write
2BD0000
heap
page read and write
10CF000
heap
page read and write
27B0000
heap
page read and write
2ED4000
trusted library allocation
page read and write
13A0000
heap
page read and write
1366000
heap
page read and write
5FE000
stack
page read and write
2570000
heap
page read and write
1CB8F575000
heap
page read and write
2A84000
trusted library allocation
page read and write
35E4000
trusted library allocation
page read and write
25D0FB6D000
heap
page read and write
2ED1000
trusted library allocation
page read and write
37C3000
trusted library allocation
page read and write
F3E000
heap
page read and write
584000
heap
page read and write
3B7F000
stack
page read and write
2D82000
trusted library allocation
page read and write
850000
heap
page read and write
31A0000
heap
page read and write
3870000
heap
page read and write
6D23E000
unkown
page read and write
2CE0000
heap
page read and write
2430000
heap
page read and write
27D0000
heap
page read and write
8C3000
heap
page read and write
2750000
heap
page read and write
49A000
heap
page read and write
2B7C000
stack
page read and write
10B9000
heap
page read and write
1E348F54000
heap
page read and write
2D74000
trusted library allocation
page read and write
8DA000
heap
page read and write
3726000
heap
page read and write
2FB0000
trusted library allocation
page read and write
27218B44000
heap
page read and write
2CC0000
trusted library allocation
page read and write
273F000
stack
page read and write
255D000
heap
page read and write
625000
heap
page read and write
112F000
heap
page read and write
1FAF000
stack
page read and write
1FB0000
heap
page read and write
1CB8D78C000
heap
page read and write
2B65000
trusted library allocation
page read and write
27218667000
heap
page read and write
3400000
heap
page read and write
8C2000
heap
page read and write
136D000
heap
page read and write
6D246000
unkown
page read and write
1368000
heap
page read and write
27218C27000
heap
page read and write
2CC0000
trusted library allocation
page read and write
434000
unkown
page read and write
8D5000
heap
page read and write
3536000
trusted library allocation
page read and write
101E000
unkown
page readonly
1E34BF7A000
heap
page read and write
1E349420000
heap
page read and write
1370000
heap
page read and write
2F00000
trusted library allocation
page read and write
25D0FA48000
heap
page read and write
377F000
trusted library allocation
page read and write
7B6000
heap
page read and write
25D0FA1F000
heap
page read and write
3555000
trusted library allocation
page read and write
3FFE000
stack
page read and write
25D0FA45000
heap
page read and write
2FB0000
trusted library allocation
page read and write
10E1000
heap
page read and write
1366000
heap
page read and write
2D71000
trusted library allocation
page read and write
27D0000
heap
page read and write
380E000
trusted library allocation
page read and write
25D0FA9A000
heap
page read and write
3553000
trusted library allocation
page read and write
1002000
unkown
page execute read
6D191000
unkown
page execute read
EAC000
heap
page read and write
C43D2FD000
stack
page read and write
35A8000
trusted library allocation
page read and write
570000
heap
page read and write
2721871B000
heap
page read and write
27218B3C000
heap
page read and write
2F09000
trusted library allocation
page read and write
731000
heap
page read and write
8BB000
heap
page read and write
1E348ECA000
heap
page read and write
10E5000
heap
page read and write
1CB8F572000
heap
page read and write
2D60000
heap
page read and write
2550000
trusted library allocation
page read and write
12D0000
heap
page read and write
25D0FA1F000
heap
page read and write
1102000
heap
page read and write
2E3F000
trusted library allocation
page read and write
1CB8D78F000
heap
page read and write
ECE000
heap
page read and write
1E348EA9000
heap
page read and write
37C4000
trusted library allocation
page read and write
27218661000
heap
page read and write
EA8000
heap
page read and write
188000
unkown
page read and write
2721868E000
heap
page read and write
1112000
heap
page read and write
27218665000
heap
page read and write
6CEC0000
unkown
page readonly
27218ACE000
heap
page read and write
136B000
heap
page read and write
27218664000
heap
page read and write
ACA000
stack
page read and write
8C7000
heap
page read and write
371F000
stack
page read and write
25D0FAA1000
heap
page read and write
8D7000
heap
page read and write
2B6B000
trusted library allocation
page read and write
2540000
trusted library allocation
page read and write
2D60000
heap
page read and write
37C6000
trusted library allocation
page read and write
2D7A000
trusted library allocation
page read and write
19A000
stack
page read and write
5F0000
heap
page read and write
1040000
heap
page read and write
2C91000
trusted library allocation
page read and write
8D7000
heap
page read and write
1366000
heap
page read and write
2790000
heap
page read and write
1CB8D78A000
heap
page read and write
2540000
trusted library allocation
page read and write
10DA000
heap
page read and write
1CB8F5D2000
heap
page read and write
1D0000
heap
page read and write
1393000
heap
page read and write
18A000
unkown
page readonly
584000
heap
page read and write
1E348F1D000
heap
page read and write
ED2000
heap
page read and write
25D0FA87000
heap
page read and write
376B000
trusted library allocation
page read and write
F26000
heap
page read and write
2B6F000
trusted library allocation
page read and write
3809000
trusted library allocation
page read and write
32A0000
heap
page read and write
3720000
heap
page read and write
1E348F6A000
heap
page read and write
13A3000
heap
page read and write
2C3B000
trusted library allocation
page read and write
2980000
heap
page read and write
AA0367E000
stack
page read and write
112F000
heap
page read and write
10CB000
heap
page read and write
137A000
heap
page read and write
3520000
heap
page read and write
8DB000
heap
page read and write
D40000
heap
page read and write
27218B1B000
heap
page read and write
10A5000
heap
page read and write
EAC000
heap
page read and write
1370000
heap
page read and write
110B000
heap
page read and write
3476000
trusted library allocation
page read and write
EB2000
heap
page read and write
2CBE000
stack
page read and write
2CF0000
heap
page read and write
2C63000
heap
page read and write
138A000
heap
page read and write
1CB8F5F3000
heap
page read and write
2D7D000
trusted library allocation
page read and write
3318000
trusted library allocation
page read and write
2AF0000
heap
page read and write
27218B6E000
heap
page read and write
8DA000
heap
page read and write
98000
stack
page read and write
10E5000
heap
page read and write
4AE000
stack
page read and write
37C9000
trusted library allocation
page read and write
2A90000
heap
page read and write
35A5000
trusted library allocation
page read and write
8D5000
heap
page read and write
2CC0000
trusted library allocation
page read and write
35E6000
trusted library allocation
page read and write
25D0F970000
heap
page read and write
25D0FA5B000
heap
page read and write
27218B3C000
heap
page read and write
10CC000
heap
page read and write
2A8B000
trusted library allocation
page read and write
400000
unkown
page readonly
F13000
heap
page read and write
3130000
heap
page read and write
3160000
heap
page read and write
25D0FA5B000
heap
page read and write
3570000
heap
page read and write
2C65000
heap
page read and write
7FF7107E8000
unkown
page readonly
135C000
heap
page read and write
37B0000
heap
page read and write
272186A6000
heap
page read and write
35EA000
trusted library allocation
page read and write
3400000
heap
page read and write
2AB0000
heap
page read and write
8C0000
heap
page read and write
31B0000
heap
page read and write
2E42000
trusted library allocation
page read and write
3130000
heap
page read and write
F3A000
heap
page read and write
8CB000
heap
page read and write
F79937F000
stack
page read and write
8DA000
heap
page read and write
263F000
stack
page read and write
1366000
heap
page read and write
112F000
heap
page read and write
31CA000
heap
page read and write
1CB8F5C2000
heap
page read and write
E6E000
heap
page read and write
1108000
heap
page read and write
EF8000
heap
page read and write
703000
heap
page read and write
1E348F72000
heap
page read and write
37CC000
trusted library allocation
page read and write
2E33000
trusted library allocation
page read and write
1E346FF0000
heap
page read and write
37B0000
heap
page read and write
12B0000
trusted library allocation
page read and write
550000
heap
page read and write
37C2000
trusted library allocation
page read and write
1CB8D660000
heap
page read and write
2F01000
trusted library allocation
page read and write
112F000
heap
page read and write
2F2C000
stack
page read and write
8DA000
heap
page read and write
12B0000
trusted library allocation
page read and write
1E348ECA000
heap
page read and write
2CC3000
trusted library allocation
page read and write
2CC0000
trusted library allocation
page read and write
25C1000
heap
page read and write
401000
unkown
page execute read
8DA000
heap
page read and write
25D0FA32000
heap
page read and write
2D87000
trusted library allocation
page read and write
EC6000
heap
page read and write
731000
heap
page read and write
2D77000
trusted library allocation
page read and write
1E348F4C000
heap
page read and write
AA036FF000
stack
page read and write
25D0FA4C000
heap
page read and write
27218665000
heap
page read and write
37CB000
trusted library allocation
page read and write
1000000
unkown
page readonly
2A82000
trusted library allocation
page read and write
1E348F4C000
heap
page read and write
27218B44000
heap
page read and write
796000
heap
page read and write
8CB000
heap
page read and write
107F000
heap
page read and write
136D000
heap
page read and write
322A000
heap
page read and write
1CB8F575000
heap
page read and write
2D83000
trusted library allocation
page read and write
2550000
heap
page read and write
1120000
heap
page read and write
564000
heap
page read and write
30A0000
heap
page read and write
584000
heap
page read and write
25D0FA4C000
heap
page read and write
25D0FA85000
heap
page read and write
10EC000
heap
page read and write
1CB8F5B7000
heap
page read and write
10CB000
heap
page read and write
31C0000
heap
page read and write
27E0000
heap
page read and write
2590000
trusted library allocation
page read and write
8D5000
heap
page read and write
1108000
heap
page read and write
DE0000
heap
page read and write
2E36000
trusted library allocation
page read and write
137D000
heap
page read and write
25D0FA32000
heap
page read and write
2721865B000
heap
page read and write
C60000
unkown
page readonly
3470000
trusted library allocation
page read and write
584000
heap
page read and write
EFA000
heap
page read and write
1CB8F549000
heap
page read and write
3050000
heap
page read and write
2CC5000
trusted library allocation
page read and write
8C3000
heap
page read and write
2C5F000
heap
page read and write
8D7000
heap
page read and write
3140000
heap
page read and write
580000
heap
page read and write
27218719000
heap
page read and write
37D4000
trusted library allocation
page read and write
27218654000
heap
page read and write
2D80000
trusted library allocation
page read and write
2D73000
trusted library allocation
page read and write
27218678000
heap
page read and write
1374000
heap
page read and write
2CC0000
trusted library allocation
page read and write
2830000
heap
page read and write
2D73000
trusted library allocation
page read and write
650000
heap
page read and write
27218630000
heap
page read and write
1E34BF77000
heap
page read and write
27218B0A000
heap
page read and write
2530000
heap
page read and write
100C000
unkown
page read and write
253E000
heap
page read and write
1366000
heap
page read and write
705000
heap
page read and write
2CC7000
trusted library allocation
page read and write
2B60000
heap
page read and write
1E348F5D000
heap
page read and write
321E000
stack
page read and write
101E000
unkown
page readonly
107D000
heap
page read and write
25D0FB89000
heap
page read and write
564000
heap
page read and write
2D7E000
trusted library allocation
page read and write
2F0A000
heap
page read and write
2D71000
trusted library allocation
page read and write
3314000
trusted library allocation
page read and write
27218C70000
heap
page read and write
2E52000
heap
page read and write
1CB8F579000
heap
page read and write
2CC0000
trusted library allocation
page read and write
2B6D000
trusted library allocation
page read and write
8B3000
heap
page read and write
ECE000
heap
page read and write
1E348F4C000
heap
page read and write
1AE000
stack
page read and write
2CC0000
trusted library allocation
page read and write
37D2000
trusted library allocation
page read and write
1CB8F5E9000
heap
page read and write
13C0000
heap
page read and write
1102000
heap
page read and write
EA8000
heap
page read and write
EE9000
heap
page read and write
6D160000
unkown
page readonly
27A0000
heap
page read and write
25D0FA3F000
heap
page read and write
3408000
trusted library allocation
page read and write
27218AE8000
heap
page read and write
EE3000
heap
page read and write
EC6000
heap
page read and write
27218AE8000
heap
page read and write
6D246000
unkown
page read and write
2C20000
heap
page read and write
8DA000
heap
page read and write
10A9000
heap
page read and write
600000
heap
page read and write
27218646000
heap
page read and write
10BC000
heap
page read and write
27218B5F000
heap
page read and write
1381000
heap
page read and write
2B70000
heap
page read and write
2D78000
trusted library allocation
page read and write
37CE000
trusted library allocation
page read and write
27218C47000
heap
page read and write
F23000
heap
page read and write
181000
unkown
page execute read
2830000
heap
page read and write
1366000
heap
page read and write
35AA000
trusted library allocation
page read and write
25D0FB47000
heap
page read and write
8BD000
heap
page read and write
2D88000
trusted library allocation
page read and write
DC0000
heap
page read and write
1370000
heap
page read and write
27218719000
heap
page read and write
25D0FA99000
heap
page read and write
2550000
heap
page read and write
2590000
heap
page read and write
1108000
heap
page read and write
1CB8F5D2000
heap
page read and write
7FF644BA8000
unkown
page readonly
4E4000
heap
page read and write
25D0FA52000
heap
page read and write
27218B0A000
heap
page read and write
2D7B000
trusted library allocation
page read and write
2A8E000
trusted library allocation
page read and write
3556000
trusted library allocation
page read and write
27218B6D000
heap
page read and write
2D7F000
trusted library allocation
page read and write
EAC000
heap
page read and write
3070000
heap
page read and write
3080000
heap
page read and write
3150000
heap
page read and write
F2C000
heap
page read and write
2CE1000
trusted library allocation
page read and write
3749000
trusted library allocation
page read and write
1124000
heap
page read and write
35EF000
trusted library allocation
page read and write
25D0FA01000
heap
page read and write
2C3A000
trusted library allocation
page read and write
2104000
heap
page read and write
8D5000
heap
page read and write
10B9000
heap
page read and write
40B000
unkown
page read and write
1386000
heap
page read and write
25D0FA26000
heap
page read and write
F3E000
heap
page read and write
2F8E000
stack
page read and write
13D7000
heap
page read and write
25D0FA3A000
heap
page read and write
3230000
heap
page read and write
1124000
heap
page read and write
35C0000
heap
page read and write
E80000
heap
page read and write
6DD000
heap
page read and write
710000
heap
page read and write
25D0FA48000
heap
page read and write
3742000
trusted library allocation
page read and write
438000
unkown
page readonly
3802000
trusted library allocation
page read and write
25D0FA5B000
heap
page read and write
8DA000
heap
page read and write
1112000
heap
page read and write
25D0FA1C000
heap
page read and write
F39000
heap
page read and write
2CCB000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
C97000
stack
page read and write
315D000
heap
page read and write
25D0FB62000
heap
page read and write
F39000
heap
page read and write
2430000
heap
page read and write
25D0FA52000
heap
page read and write
135B000
heap
page read and write
2A80000
heap
page read and write
1108000
heap
page read and write
1CB8F593000
heap
page read and write
6C5000
heap
page read and write
1CB8D8B5000
heap
page read and write
407000
unkown
page readonly
800000
heap
page read and write
8D7000
heap
page read and write
37C4000
trusted library allocation
page read and write
374C000
trusted library allocation
page read and write
1355000
heap
page read and write
2B62000
trusted library allocation
page read and write
2721865E000
heap
page read and write
87B000
heap
page read and write
8DA000
heap
page read and write
36EB000
trusted library allocation
page read and write
13A0000
heap
page read and write
EC3000
heap
page read and write
2D8E000
trusted library allocation
page read and write
1377000
heap
page read and write
25D0FA3A000
heap
page read and write
8D5000
heap
page read and write
2B50000
heap
page read and write
1CB8F5D6000
heap
page read and write
8C5000
heap
page read and write
580000
heap
page read and write
35D0000
heap
page read and write
25D0FA5B000
heap
page read and write
25C2000
heap
page read and write
2CF8000
trusted library allocation
page read and write
2E3D000
trusted library allocation
page read and write
3745000
trusted library allocation
page read and write
10A9000
heap
page read and write
35A4000
trusted library allocation
page read and write
EBC000
heap
page read and write
2FB0000
trusted library allocation
page read and write
1102000
heap
page read and write
2CC0000
trusted library allocation
page read and write
10CC000
heap
page read and write
27218ACE000
heap
page read and write
49E000
heap
page read and write
2540000
trusted library allocation
page read and write
25D0FAA3000
heap
page read and write
2540000
heap
page read and write
2E51000
heap
page read and write
1369000
heap
page read and write
2D00000
heap
page read and write
C43D4FF000
stack
page read and write
1CB8D6CF000
heap
page read and write
1108000
heap
page read and write
1030000
heap
page read and write
7FF644B91000
unkown
page write copy
2530000
heap
page read and write
1CB8F5BA000
heap
page read and write
27218B44000
heap
page read and write
654000
heap
page read and write
25D0F9FB000
heap
page read and write
37DC000
trusted library allocation
page read and write
2B67000
trusted library allocation
page read and write
2550000
trusted library allocation
page read and write
1CB8F5DF000
heap
page read and write
2590000
trusted library allocation
page read and write
3080000
heap
page read and write
2721872E000
heap
page read and write
1350000
heap
page read and write
27218540000
heap
page read and write
8C7000
heap
page read and write
CE0000
heap
page read and write
2533000
heap
page read and write
1382000
heap
page read and write
3533000
trusted library allocation
page read and write
112F000
heap
page read and write
2D79000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
8D8000
heap
page read and write
2520000
trusted library allocation
page read and write
2721865B000
heap
page read and write
312A000
heap
page read and write
2A80000
heap
page read and write
EC9000
heap
page read and write
2A30000
heap
page read and write
F39000
heap
page read and write
251E000
stack
page read and write
25D0FA3B000
heap
page read and write
1E348F52000
heap
page read and write
1125000
heap
page read and write
37D0000
trusted library allocation
page read and write
401000
unkown
page execute read
1366000
heap
page read and write
3531000
trusted library allocation
page read and write
2FD6000
heap
page read and write
2721872E000
heap
page read and write
27FF000
stack
page read and write
27218AFD000
heap
page read and write
340C000
trusted library allocation
page read and write
8C0000
heap
page read and write
6ED000
heap
page read and write
1368000
heap
page read and write
25D0FA0E000
heap
page read and write
137B000
heap
page read and write
2721871D000
heap
page read and write
1118000
heap
page read and write
2D00000
heap
page read and write
25D0FB5E000
heap
page read and write
2D7D000
trusted library allocation
page read and write
88E000
heap
page read and write
3530000
trusted library allocation
page read and write
2C97000
trusted library allocation
page read and write
2D30000
heap
page read and write
27218C27000
heap
page read and write
F23000
heap
page read and write
112F000
heap
page read and write
3050000
heap
page read and write
136D000
heap
page read and write
8D5000
heap
page read and write
27218663000
heap
page read and write
2CCD000
trusted library allocation
page read and write
150000
heap
page read and write
C43D47E000
stack
page read and write
2D77000
trusted library allocation
page read and write
3769000
trusted library allocation
page read and write
1CB8F578000
heap
page read and write
1E348F6E000
heap
page read and write
EE9000
heap
page read and write
175000
heap
page read and write
654000
heap
page read and write
2D00000
trusted library allocation
page read and write
8B3000
heap
page read and write
8DC000
heap
page read and write
8C0000
heap
page read and write
27218B3C000
heap
page read and write
27218B2D000
heap
page read and write
2721865B000
heap
page read and write
1124000
heap
page read and write
1366000
heap
page read and write
1E348F0E000
heap
page read and write
1379000
heap
page read and write
1CB8F572000
heap
page read and write
136D000
heap
page read and write
1F9E000
stack
page read and write
564000
heap
page read and write
10CC000
heap
page read and write
708000
heap
page read and write
2721865E000
heap
page read and write
2CC9000
trusted library allocation
page read and write
135C000
heap
page read and write
1CB8D791000
heap
page read and write
2CE7000
trusted library allocation
page read and write
30E0000
heap
page read and write
3477000
trusted library allocation
page read and write
EC6000
heap
page read and write
2CE0000
heap
page read and write
2D71000
trusted library allocation
page read and write
2CC0000
trusted library allocation
page read and write
8C0000
heap
page read and write
3280000
heap
page read and write
8D7000
heap
page read and write
8D5000
heap
page read and write
417C000
stack
page read and write
6D191000
unkown
page execute read
2980000
heap
page read and write
35EB000
trusted library allocation
page read and write
30D0000
heap
page read and write
7FFB47E000
stack
page read and write
1374000
heap
page read and write
2D30000
heap
page read and write
2CC1000
trusted library allocation
page read and write
2770000
heap
page read and write
30D0000
heap
page read and write
1392000
heap
page read and write
35D0000
heap
page read and write
27218664000
heap
page read and write
25D0FB62000
heap
page read and write
116D000
stack
page read and write
EF2000
heap
page read and write
37FF000
stack
page read and write
2810000
heap
page read and write
2980000
heap
page read and write
10C7000
heap
page read and write
3040000
heap
page read and write
2C9F000
trusted library allocation
page read and write
3803000
trusted library allocation
page read and write
1124000
heap
page read and write
1118000
heap
page read and write
400000
unkown
page readonly
27218B1D000
heap
page read and write
3539000
trusted library allocation
page read and write
3110000
heap
page read and write
3230000
heap
page read and write
25D0FA4C000
heap
page read and write
1382000
heap
page read and write
42BB000
stack
page read and write
8D8000
heap
page read and write
27218665000
heap
page read and write
2E32000
trusted library allocation
page read and write
377D000
trusted library allocation
page read and write
584000
heap
page read and write
25D0FA85000
heap
page read and write
1E34710B000
heap
page read and write
10CC000
heap
page read and write
27218719000
heap
page read and write
136D000
heap
page read and write
2B6C000
trusted library allocation
page read and write
7FF644B91000
unkown
page read and write
EFA000
heap
page read and write
25D0FA32000
heap
page read and write
2721866F000
heap
page read and write
7FF644B11000
unkown
page execute read
27218651000
heap
page read and write
2A80000
heap
page read and write
25D0FA4C000
heap
page read and write
3750000
heap
page read and write
2D72000
trusted library allocation
page read and write
2D76000
trusted library allocation
page read and write
8D7000
heap
page read and write
2CE0000
trusted library allocation
page read and write
ED7000
heap
page read and write
2C36000
trusted library allocation
page read and write
3471000
trusted library allocation
page read and write
25D0FA87000
heap
page read and write
8D5000
heap
page read and write
27218AF2000
heap
page read and write
10D3000
heap
page read and write
3405000
trusted library allocation
page read and write
2A8C000
trusted library allocation
page read and write
EF4000
heap
page read and write
10BC000
heap
page read and write
3120000
heap
page read and write
374B000
trusted library allocation
page read and write
8C2000
heap
page read and write
C43D3FF000
stack
page read and write
27218B09000
heap
page read and write
2AD0000
heap
page read and write
1393000
heap
page read and write
1CB8F5BC000
heap
page read and write
6D181000
unkown
page readonly
3560000
heap
page read and write
1E3470C2000
heap
page read and write
37CF000
trusted library allocation
page read and write
1CB8D650000
heap
page read and write
27218667000
heap
page read and write
1CB8F5C3000
heap
page read and write
2D76000
trusted library allocation
page read and write
1CB8F5F3000
heap
page read and write
25D0FA2F000
heap
page read and write
2C35000
trusted library allocation
page read and write
37C3000
trusted library allocation
page read and write
2E60000
heap
page read and write
2CC0000
trusted library allocation
page read and write
1CB8F0E3000
heap
page read and write
2590000
trusted library allocation
page read and write
3772000
trusted library allocation
page read and write
2CD0000
trusted library allocation
page read and write
2721869D000
heap
page read and write
21A0000
heap
page read and write
25D0FBF0000
heap
page read and write
1CB8F590000
heap
page read and write
2980000
heap
page read and write
8D7000
heap
page read and write
35AB000
trusted library allocation
page read and write
2D60000
heap
page read and write
DC000
stack
page read and write
1CB8F588000
heap
page read and write
27218654000
heap
page read and write
135F000
heap
page read and write
3B90000
trusted library allocation
page read and write
138A000
heap
page read and write
25D0FB67000
heap
page read and write
110C000
heap
page read and write
8C9000
heap
page read and write
1310000
heap
page read and write
8DC000
heap
page read and write
8EB000
heap
page read and write
F23000
heap
page read and write
272186D1000
heap
page read and write
3780000
trusted library allocation
page read and write
401000
unkown
page execute read
27E0000
heap
page read and write
10CC000
heap
page read and write
2D86000
trusted library allocation
page read and write
2D77000
trusted library allocation
page read and write
785000
heap
page read and write
1320000
heap
page read and write
25D0FA09000
heap
page read and write
27218B05000
heap
page read and write
27218B2B000
heap
page read and write
ED7000
heap
page read and write
27218B1D000
heap
page read and write
1124000
heap
page read and write
2F0D000
trusted library allocation
page read and write
27218B3C000
heap
page read and write
20FF000
stack
page read and write
2CE3000
trusted library allocation
page read and write
8D7000
heap
page read and write
8CB000
heap
page read and write
27218AF7000
heap
page read and write
2C38000
trusted library allocation
page read and write
1E348F52000
heap
page read and write
27218AC1000
heap
page read and write
10DD000
heap
page read and write
1393000
heap
page read and write
1FF0000
heap
page read and write
3090000
heap
page read and write
110D000
heap
page read and write
EA8000
heap
page read and write
25D0FA37000
heap
page read and write
CA0000
heap
page read and write
EB2000
heap
page read and write
272186A4000
heap
page read and write
60D000
heap
page read and write
25D0FA14000
heap
page read and write
2560000
trusted library allocation
page read and write
2CC0000
trusted library allocation
page read and write
585000
heap
page read and write
1E34708B000
heap
page read and write
2C33000
trusted library allocation
page read and write
1E347047000
heap
page read and write
564000
heap
page read and write
27218B4B000
heap
page read and write
3110000
heap
page read and write
5EF000
stack
page read and write
3750000
trusted library allocation
page read and write
110C000
heap
page read and write
37C0000
trusted library allocation
page read and write
27218688000
heap
page read and write
2D7B000
trusted library allocation
page read and write
8CF000
heap
page read and write
2CF0000
trusted library allocation
page read and write
10F4000
heap
page read and write
1393000
heap
page read and write
8C3000
heap
page read and write
2ED3000
trusted library allocation
page read and write
AE0000
heap
page read and write
10CC000
heap
page read and write
8DC000
heap
page read and write
1C0000
heap
page read and write
2CC0000
trusted library allocation
page read and write
DF0000
heap
page read and write
1E34C170000
trusted library allocation
page read and write
F13000
heap
page read and write
8C7000
heap
page read and write
2CCE000
trusted library allocation
page read and write
8C0000
heap
page read and write
10D3000
heap
page read and write
272185B0000
heap
page read and write
3BBB000
stack
page read and write
27218654000
heap
page read and write
640000
heap
page read and write
30E0000
heap
page read and write
2C30000
heap
page read and write
2FB0000
trusted library allocation
page read and write
22AE000
stack
page read and write
4D0000
heap
page read and write
8CB000
heap
page read and write
374F000
trusted library allocation
page read and write
2B5D000
heap
page read and write
2540000
trusted library allocation
page read and write
25D0FA48000
heap
page read and write
2D00000
heap
page read and write
1377000
heap
page read and write
25D0FA85000
heap
page read and write
2CE9000
trusted library allocation
page read and write
37DA000
trusted library allocation
page read and write
2CEB000
trusted library allocation
page read and write
380D000
trusted library allocation
page read and write
8B3000
heap
page read and write
400000
unkown
page readonly
32B0000
heap
page read and write
20EE000
stack
page read and write
3250000
heap
page read and write
25D0FA48000
heap
page read and write
25D0FA0A000
heap
page read and write
37C8000
trusted library allocation
page read and write
27218B3C000
heap
page read and write
2540000
trusted library allocation
page read and write
2540000
trusted library allocation
page read and write
2D74000
trusted library allocation
page read and write
25C1000
heap
page read and write
27218665000
heap
page read and write
1382000
heap
page read and write
There are 2445 hidden memdumps, click here to show them.