Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
ADF435x_v4_5_0.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\ADI_RFG_Drivers.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\$shtdwn$.req
|
data
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\1028\LocalizedData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (388), with CRLF line terminators
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\1028\SetupResources.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\1028\eula.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\1031\LocalizedData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (615), with CRLF line terminators
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\1031\SetupResources.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\1031\eula.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\1033\LocalizedData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (565), with CRLF line terminators
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\1033\SetupResources.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\1033\eula.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\1036\LocalizedData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (619), with CRLF line terminators
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\1036\SetupResources.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\1036\eula.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\1040\LocalizedData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (601), with CRLF line terminators
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\1040\SetupResources.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\1040\eula.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\1041\LocalizedData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (440), with CRLF line terminators
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\1041\SetupResources.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\1041\eula.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\1042\LocalizedData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (439), with CRLF line terminators
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\1042\SetupResources.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\1042\eula.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\1049\LocalizedData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (634), with CRLF line terminators
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\1049\SetupResources.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\1049\eula.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\2052\LocalizedData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (390), with CRLF line terminators
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\2052\SetupResources.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\2052\eula.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\3082\LocalizedData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (616), with CRLF line terminators
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\3082\SetupResources.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\3082\eula.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\DHtmlHeader.html
|
HTML document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\DisplayIcon.ico
|
MS Windows icon resource - 13 icons, 16x16, 16 colors, 4 bits/pixel, 16x16, 8 bits/pixel
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\Print.ico
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\Rotate1.ico
|
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\Rotate2.ico
|
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\Rotate3.ico
|
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\Rotate4.ico
|
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\Rotate5.ico
|
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\Rotate6.ico
|
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\Rotate7.ico
|
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\Rotate8.ico
|
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\Save.ico
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\Setup.ico
|
MS Windows icon resource - 12 icons, 16x16, 16 colors, 4 bits/pixel, 16x16, 8 bits/pixel
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\SysReqMet.ico
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\SysReqNotMet.ico
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\stop.ico
|
MS Windows icon resource - 6 icons, 32x32, 16 colors, 4 bits/pixel, 16x16, 16 colors, 4 bits/pixel
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\Graphics\warn.ico
|
MS Windows icon resource - 6 icons, 32x32, 16 colors, 4 bits/pixel, 16x16, 16 colors, 4 bits/pixel
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\ParameterInfo.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (314), with CRLF line terminators
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\Setup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\SetupEngine.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\SetupUi.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\SetupUi.xsd
|
XML 1.0 document, ASCII text, with very long lines (335), with CRLF line terminators
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\SplashScreen.bmp
|
PC bitmap, Windows 3.x format, 200 x 200 x 8, image size 40000, resolution 3779 x 3779 px/m, cbSize 41078, bits offset 1078
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\Strings.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\UiInfo.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\header.bmp
|
PC bitmap, Windows 3.x format, 49 x 49 x 24, image size 7254, resolution 2834 x 2834 px/m, cbSize 7308, bits offset 54
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\sqmapi.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\vc_red.cab
|
Microsoft Cabinet archive data, 4218761 bytes, 19 files, at 0x44 +A "F_CENTRAL_atl100_x86" +A "F_CENTRAL_mfc100_x86", flags
0x4, number 1, extra bytes 20 in head, 357 datablocks, 0x1503 compression
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\vc_red.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2010 x86 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219.,
Template: Intel;0, Revision Number: {461C455E-DA40-49B3-871B-14308CC7CEFF}, Create Time/Date: Sun Feb 20 07:03:10 2011, Last
Saved Time/Date: Sun Feb 20 07:03:10 2011, Number of Pages: 200, Name of Creating Application: Windows Installer XML (3.5.0626.3),
Security: 2, Number of Words: 2
|
dropped
|
||
C:\6cd6594ee40f26ffb7ca6883eb\watermark.bmp
|
PC bitmap, Windows 3.x format, 164 x 628 x 24, image size 308978, resolution 2834 x 2834 px/m, cbSize 309032, bits offset
54
|
dropped
|
||
C:\Config.Msi\4908e8.rbs
|
data
|
modified
|
||
C:\Config.Msi\492e90.rbs
|
data
|
modified
|
||
C:\Config.Msi\49acc8.rbs
|
data
|
modified
|
||
C:\Program Files (x86)\Analog Devices\ADF435x\ADF435x.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Analog Devices\ADF435x\ADF435x.pdb
|
MSVC program database ver 7.00, 512*207 bytes
|
dropped
|
||
C:\Program Files (x86)\Analog Devices\ADF435x\ADF435x.vshost.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Analog Devices\ADF435x\CyUSB.DLL
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Analog Devices\ADF435x\INIFileParser.DLL
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Analog Devices\ADF435x\Microsoft.VisualStudio.HostingProcess.Utilities.Sync.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Analog Devices\ADF435x\SDP_Blackfin_Firmware.ldr
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Analog Devices\ADF435x\adf4xxx_usb_fw_1_0.hex
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Analog Devices\ADF435x\adf4xxx_usb_fw_2_0.hex
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Analog Devices\ADF435x\sdpApi1.DLL
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Analog Devices\SDP\DriversR2\AdiSdp_x64.inf
|
Windows setup INFormation
|
dropped
|
||
C:\Program Files (x86)\Analog Devices\SDP\DriversR2\WdfCoInstaller01007.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Analog Devices\SDP\DriversR2\WinUSBCoInstaller.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Analog Devices\SDP\DriversR2\adisdp_x64.cat
|
data
|
dropped
|
||
C:\Program Files (x86)\Analog Devices\SDP\DriversR2\dpinst.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Analog Devices\SDP\DriversR2\uninst.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
modified
|
||
C:\Program Files (x86)\Common Files\Microsoft Shared\VC\msdia100.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\Analog Devices\USB Drivers\ADI_CYUSB_USB4.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\Analog Devices\USB Drivers\ADI_CYUSB_USB4.lib
|
current ar archive
|
dropped
|
||
C:\Program Files\Analog Devices\USB Drivers\RFG\ADI_CYUSB_RFG_x64.inf
|
Windows setup INFormation
|
dropped
|
||
C:\Program Files\Analog Devices\USB Drivers\RFG\adi_cyusb.sys
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\Analog Devices\USB Drivers\RFG\adi_cyusb_rfg.cat
|
data
|
dropped
|
||
C:\Program Files\Analog Devices\USB Drivers\RFG\uninstall.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
modified
|
||
C:\Program Files\Analog Devices\USB Drivers\dpinst.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\Analog Devices\USB Drivers\dpinst.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\Common Files\microsoft shared\VC\msdia100.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Analog Devices\ADF435x\ADF435x.lnk
|
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, Icon number=0, ctime=Sun Dec 31 23:06:32
1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_20241024_050342548.html (copy)
|
HTML document, Unicode text, UTF-16, little-endian text, with very long lines (322), with CRLF line terminators
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_20241024_050332743.html (copy)
|
HTML document, Unicode text, UTF-16, little-endian text, with very long lines (322), with CRLF line terminators
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\Setup_20241024_050330680.html (copy)
|
HTML document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\Setup_20241024_050340251.html (copy)
|
HTML document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\{d55074ba-c19a-bb44-89de-a58a465055fb}\ADI_CYUSB.sys (copy)
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\{d55074ba-c19a-bb44-89de-a58a465055fb}\ADI_CYUSB_RFG.cat (copy)
|
data
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\{d55074ba-c19a-bb44-89de-a58a465055fb}\adi_cyusb_rfg_x64.inf (copy)
|
Windows setup INFormation
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\{e893f925-8aa1-9045-bd56-cfe82a26da46}\AdiSdp_x64.cat (copy)
|
data
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\{e893f925-8aa1-9045-bd56-cfe82a26da46}\WdfCoInstaller01007.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\{e893f925-8aa1-9045-bd56-cfe82a26da46}\WinUSBCoInstaller.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\{e893f925-8aa1-9045-bd56-cfe82a26da46}\adisdp_x64.inf (copy)
|
Windows setup INFormation
|
dropped
|
||
C:\Users\Public\Desktop\ADF435x.lnk
|
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, Icon number=0, ctime=Sun Dec 31 23:06:32
1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ADF435x.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Create Time/Date: Mon Jun 21
08:00:00 1999, Name of Creating Application: Windows Installer, Security: 1, Code page: 1252, Template: Intel;1033, Number
of Pages: 200, Revision Number: {F064EA81-5458-45CE-937E-DA006A1C64FD}, Title: ADF435x, Author: Analog Devices, Number of
Words: 2, Last Saved Time/Date: Mon Jan 19 21:08:14 2015, Last Printed: Mon Jan 19 21:08:14 2015
|
modified
|
||
C:\Users\user\AppData\Local\Temp\CFG79D0.tmp
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\CFGADE0.tmp
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\HFI2009.tmp.html
|
HTML document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\HFI2962.tmp.html
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\HFI2FE.tmp.html
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\HFIFAAE.tmp.html
|
HTML document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MSI7934.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MSI79E1.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_20241024_050342548-MSI_vc_red.msi.txt
|
Unicode text, UTF-16, little-endian text, with very long lines (319), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_20241024_050342548.html
|
HTML document, Unicode text, UTF-16, little-endian text, with very long lines (356), with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_20241024_050332743-MSI_vc_red.msi.txt
|
Unicode text, UTF-16, little-endian text, with very long lines (319), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_20241024_050332743.html
|
HTML document, Unicode text, UTF-16, little-endian text, with very long lines (356), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\SDPDrivers.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Setup_20241024_050330680.html
|
HTML document, Unicode text, UTF-16, little-endian text, with very long lines (322), with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Setup_20241024_050340251.html
|
HTML document, Unicode text, UTF-16, little-endian text, with very long lines (322), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsn5F06.tmp\GetVersion.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsn5F06.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsn5F06.tmp\dpinst.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsn5F06.tmp\dpinst_amd64.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsn5F06.tmp\nsExec.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsp180A.tmp\GetVersion.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsp180A.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\vcredist_x64.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\vcredist_x86.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{d55074ba-c19a-bb44-89de-a58a465055fb}\SET6108.tmp
|
Windows setup INFormation
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{d55074ba-c19a-bb44-89de-a58a465055fb}\SET6119.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{d55074ba-c19a-bb44-89de-a58a465055fb}\SET612A.tmp
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e893f925-8aa1-9045-bd56-cfe82a26da46}\SET4061.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e893f925-8aa1-9045-bd56-cfe82a26da46}\SET40DF.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e893f925-8aa1-9045-bd56-cfe82a26da46}\SET40FF.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{e893f925-8aa1-9045-bd56-cfe82a26da46}\SET411F.tmp
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\DPINST.LOG
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
modified
|
||
C:\Windows\INF\oem4.inf
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\INF\oem5.inf
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\INF\setupapi.dev.log
|
Generic INItialization configuration [BeginLog]
|
dropped
|
||
C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_msvcp100_x86
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENTRAL_msvcr100_x86
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\4908e6.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2010 x86 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219.,
Template: Intel;0, Revision Number: {461C455E-DA40-49B3-871B-14308CC7CEFF}, Create Time/Date: Sun Feb 20 07:03:10 2011, Last
Saved Time/Date: Sun Feb 20 07:03:10 2011, Number of Pages: 200, Name of Creating Application: Windows Installer XML (3.5.0626.3),
Security: 2, Number of Words: 2
|
dropped
|
||
C:\Windows\Installer\4908e9.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2010 x86 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219.,
Template: Intel;0, Revision Number: {461C455E-DA40-49B3-871B-14308CC7CEFF}, Create Time/Date: Sun Feb 20 07:03:10 2011, Last
Saved Time/Date: Sun Feb 20 07:03:10 2011, Number of Pages: 200, Name of Creating Application: Windows Installer XML (3.5.0626.3),
Security: 2, Number of Words: 2
|
dropped
|
||
C:\Windows\Installer\492e8e.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2010 x64 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219.,
Template: x64;0, Revision Number: {80902F2D-E1EF-43CA-B366-74496197E004}, Create Time/Date: Sun Feb 20 06:51:54 2011, Last
Saved Time/Date: Sun Feb 20 06:51:54 2011, Number of Pages: 200, Name of Creating Application: Windows Installer XML (3.5.0626.3),
Security: 2, Number of Words: 2
|
dropped
|
||
C:\Windows\Installer\492e91.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2010 x64 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219.,
Template: x64;0, Revision Number: {80902F2D-E1EF-43CA-B366-74496197E004}, Create Time/Date: Sun Feb 20 06:51:54 2011, Last
Saved Time/Date: Sun Feb 20 06:51:54 2011, Number of Pages: 200, Name of Creating Application: Windows Installer XML (3.5.0626.3),
Security: 2, Number of Words: 2
|
dropped
|
||
C:\Windows\Installer\49acc7.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Create Time/Date: Mon Jun 21
08:00:00 1999, Name of Creating Application: Windows Installer, Security: 1, Code page: 1252, Template: Intel;1033, Number
of Pages: 200, Revision Number: {F064EA81-5458-45CE-937E-DA006A1C64FD}, Title: ADF435x, Author: Analog Devices, Number of
Words: 2, Last Saved Time/Date: Mon Jan 19 21:08:14 2015, Last Printed: Mon Jan 19 21:08:14 2015
|
dropped
|
||
C:\Windows\Installer\49acc9.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Create Time/Date: Mon Jun 21
08:00:00 1999, Name of Creating Application: Windows Installer, Security: 1, Code page: 1252, Template: Intel;1033, Number
of Pages: 200, Revision Number: {F064EA81-5458-45CE-937E-DA006A1C64FD}, Title: ADF435x, Author: Analog Devices, Number of
Words: 2, Last Saved Time/Date: Mon Jan 19 21:08:14 2015, Last Printed: Mon Jan 19 21:08:14 2015
|
dropped
|
||
C:\Windows\Installer\MSI32A5.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSIAD92.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIADF1.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIAE50.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSIC80.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\SourceHash{491647C1-1281-4343-AA61-F87CA00A92A2}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\SourceHash{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\{491647C1-1281-4343-AA61-F87CA00A92A2}\_853F67D554F05449430E7E.exe
|
MS Windows icon resource - 1 icon, 32x32, 24 bits/pixel
|
dropped
|
||
C:\Windows\Installer\{491647C1-1281-4343-AA61-F87CA00A92A2}\_86E302AD3AEF842FD2938A.exe
|
MS Windows icon resource - 1 icon, 32x32, 24 bits/pixel
|
dropped
|
||
C:\Windows\Installer\{491647C1-1281-4343-AA61-F87CA00A92A2}\_CBDBE159E3FB79ADDB2047.exe
|
MS Windows icon resource - 1 icon, 32x32, 24 bits/pixel
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\SysWOW64\atl100.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\csaDriverInterface.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc100.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc100chs.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc100cht.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc100deu.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc100enu.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc100esn.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc100fra.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc100ita.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc100jpn.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc100kor.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc100rus.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfc100u.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfcm100.dll
|
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\mfcm100u.dll
|
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\sdpDriverInterface.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\vcomp100.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{20a4443f-2192-184e-868a-e7d67d434dc5}\AdiSdp_x64.cat (copy)
|
data
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{20a4443f-2192-184e-868a-e7d67d434dc5}\SET4301.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{20a4443f-2192-184e-868a-e7d67d434dc5}\SET4340.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{20a4443f-2192-184e-868a-e7d67d434dc5}\SET4361.tmp
|
data
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{20a4443f-2192-184e-868a-e7d67d434dc5}\SET4371.tmp
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{20a4443f-2192-184e-868a-e7d67d434dc5}\WdfCoInstaller01007.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{20a4443f-2192-184e-868a-e7d67d434dc5}\WinUSBCoInstaller.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{20a4443f-2192-184e-868a-e7d67d434dc5}\adisdp_x64.inf (copy)
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{56f22667-61e0-6e49-a66d-9e6684a6bc0f}\ADI_CYUSB.sys (copy)
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{56f22667-61e0-6e49-a66d-9e6684a6bc0f}\ADI_CYUSB_RFG.cat (copy)
|
data
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{56f22667-61e0-6e49-a66d-9e6684a6bc0f}\SET62CD.tmp
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{56f22667-61e0-6e49-a66d-9e6684a6bc0f}\SET62DE.tmp
|
data
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{56f22667-61e0-6e49-a66d-9e6684a6bc0f}\SET62EF.tmp
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\DriverStore\Temp\{56f22667-61e0-6e49-a66d-9e6684a6bc0f}\adi_cyusb_rfg_x64.inf (copy)
|
Windows setup INFormation
|
dropped
|
||
C:\Windows\System32\atl100.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\catroot2\dberr.txt
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Windows\System32\csaDriverInterface.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc100.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc100chs.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc100cht.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc100deu.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc100enu.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc100esn.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc100fra.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc100ita.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc100jpn.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc100kor.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc100rus.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfc100u.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfcm100.dll
|
PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\System32\mfcm100u.dll
|
PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\System32\msvcr100.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\vcomp100.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Temp\~DF0BF4FE35254667E0.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF0D349C9EB046A1FA.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF140D1C5C7903DA80.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF1584CA2BBDAC4817.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF1719906563B11C1C.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF2B5012B416294129.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF3FF453D044D91FFD.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF49C405C3171A414D.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF4D3CB7A0CC9E7792.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF5420854C3A87633F.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF62CC5CE32E4A088A.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF66DE84377DC405FE.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF691C92894497FA42.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF7C44E4BD25C9F52E.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF80EDA7E49A791F57.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF85F499DD9ABD453B.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF871F1E113550E2E2.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF8EA2BFE7A60C32FC.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF8F71C48CEF7C399C.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF9005A7037A3A713B.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFA0D1AA9982529511.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFA139F683AC50605D.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFA6F32B35A482A2C5.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFAAB7DAF9BACB3564.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFAF185B776E76105E.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFBAD756434B86160D.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFC9E1088408D069D0.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFCD55BED8B1546660.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFDAE97CE9C109F1FB.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFDC470667D1AB2379.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFE4074C354C3BCE5A.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFE82E7AD86EE2AEE3.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFECD158738B1F0D9A.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFEE433A894E418079.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFF5EFDFE28C0A1B4C.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFFF8B6C0C63C7DDE8.TMP
|
data
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\$shtdwn$.req
|
data
|
modified
|
||
C:\dd75838cbf6dd04545e5fee87fbf\1028\LocalizedData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (388), with CRLF line terminators
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\1028\SetupResources.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\1028\eula.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\1031\LocalizedData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (615), with CRLF line terminators
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\1031\SetupResources.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\1031\eula.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\1033\LocalizedData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (565), with CRLF line terminators
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\1033\SetupResources.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\1033\eula.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\1036\LocalizedData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (619), with CRLF line terminators
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\1036\SetupResources.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\1036\eula.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\1040\LocalizedData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (601), with CRLF line terminators
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\1040\SetupResources.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\1040\eula.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\1041\LocalizedData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (440), with CRLF line terminators
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\1041\SetupResources.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\1041\eula.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\1042\LocalizedData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (439), with CRLF line terminators
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\1042\SetupResources.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\1042\eula.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\1049\LocalizedData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (634), with CRLF line terminators
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\1049\SetupResources.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\1049\eula.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\2052\LocalizedData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (390), with CRLF line terminators
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\2052\SetupResources.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\2052\eula.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\3082\LocalizedData.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (616), with CRLF line terminators
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\3082\SetupResources.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\3082\eula.rtf
|
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\DHtmlHeader.html
|
HTML document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\DisplayIcon.ico
|
MS Windows icon resource - 13 icons, 16x16, 16 colors, 4 bits/pixel, 16x16, 8 bits/pixel
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\Print.ico
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\Rotate1.ico
|
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\Rotate2.ico
|
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\Rotate3.ico
|
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\Rotate4.ico
|
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\Rotate5.ico
|
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\Rotate6.ico
|
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\Rotate7.ico
|
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\Rotate8.ico
|
MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\Save.ico
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\Setup.ico
|
MS Windows icon resource - 12 icons, 16x16, 16 colors, 4 bits/pixel, 16x16, 8 bits/pixel
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\SysReqMet.ico
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\SysReqNotMet.ico
|
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\stop.ico
|
MS Windows icon resource - 6 icons, 32x32, 16 colors, 4 bits/pixel, 16x16, 16 colors, 4 bits/pixel
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\Graphics\warn.ico
|
MS Windows icon resource - 6 icons, 32x32, 16 colors, 4 bits/pixel, 16x16, 16 colors, 4 bits/pixel
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\ParameterInfo.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (314), with CRLF line terminators
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\Setup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\SetupEngine.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\SetupUi.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\SetupUi.xsd
|
XML 1.0 document, ASCII text, with very long lines (335), with CRLF line terminators
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\SplashScreen.bmp
|
PC bitmap, Windows 3.x format, 200 x 200 x 8, image size 40000, resolution 3779 x 3779 px/m, cbSize 41078, bits offset 1078
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\Strings.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\UiInfo.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\header.bmp
|
PC bitmap, Windows 3.x format, 49 x 49 x 24, image size 7254, resolution 2834 x 2834 px/m, cbSize 7308, bits offset 54
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\sqmapi.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\vc_red.cab
|
Microsoft Cabinet archive data, 4872031 bytes, 19 files, at 0x44 +A "F_CENTRAL_atl100_x64" +A "F_CENTRAL_mfc100_x64", flags
0x4, number 1, extra bytes 20 in head, 444 datablocks, 0x1503 compression
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\vc_red.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Visual C++ 2010 x64 Redistributable, Author: Microsoft Corporation, Keywords: Installer, Comments: This
installer database contains the logic and data required to install Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219.,
Template: x64;0, Revision Number: {80902F2D-E1EF-43CA-B366-74496197E004}, Create Time/Date: Sun Feb 20 06:51:54 2011, Last
Saved Time/Date: Sun Feb 20 06:51:54 2011, Number of Pages: 200, Name of Creating Application: Windows Installer XML (3.5.0626.3),
Security: 2, Number of Words: 2
|
dropped
|
||
C:\dd75838cbf6dd04545e5fee87fbf\watermark.bmp
|
PC bitmap, Windows 3.x format, 164 x 628 x 24, image size 308978, resolution 2834 x 2834 px/m, cbSize 309032, bits offset
54
|
dropped
|
There are 300 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\6cd6594ee40f26ffb7ca6883eb\Setup.exe
|
c:\6cd6594ee40f26ffb7ca6883eb\Setup.exe /q
|
||
C:\Windows\System32\drvinst.exe
|
DrvInst.exe "4" "0" "C:\Users\user~1\AppData\Local\Temp\{e893f925-8aa1-9045-bd56-cfe82a26da46}\adisdp_x64.inf" "9" "4efe11aab"
"0000000000000158" "WinSta0\Default" "000000000000016C" "208" "c:\program files (x86)\analog devices\sdp\driversr2"
|
||
C:\Users\user\AppData\Local\Temp\ADI_RFG_Drivers.exe
|
C:\Users\user~1\AppData\Local\Temp\ADI_RFG_Drivers.exe /S
|
||
C:\Windows\System32\drvinst.exe
|
DrvInst.exe "4" "0" "C:\Users\user~1\AppData\Local\Temp\{d55074ba-c19a-bb44-89de-a58a465055fb}\adi_cyusb_rfg_x64.inf" "9"
"4f41e6c43" "0000000000000170" "WinSta0\Default" "000000000000016C" "208" "c:\program files\analog devices\usb drivers\rfg"
|
||
C:\Users\user\Desktop\ADF435x_v4_5_0.exe
|
"C:\Users\user\Desktop\ADF435x_v4_5_0.exe"
|
||
C:\Users\user\AppData\Local\Temp\SDPDrivers.exe
|
C:\Users\user~1\AppData\Local\Temp\SDPDrivers.exe /S
|
||
C:\Users\user\AppData\Local\Temp\vcredist_x86.exe
|
C:\Users\user~1\AppData\Local\Temp\vcredist_x86.exe /q
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Users\user\AppData\Local\Temp\vcredist_x64.exe
|
C:\Users\user~1\AppData\Local\Temp\vcredist_x64.exe /q
|
||
C:\dd75838cbf6dd04545e5fee87fbf\Setup.exe
|
c:\dd75838cbf6dd04545e5fee87fbf\Setup.exe /q
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Program Files (x86)\Analog Devices\SDP\DriversR2\dpinst.exe
|
"C:\Program Files (x86)\Analog Devices\SDP\DriversR2\dpinst.exe" /sw /sa /path "C:\Program Files (x86)\Analog Devices\SDP\DriversR2"
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{e75da1e8-debd-1d48-8eb4-57c7f25d3f2a} Global\{02855856-448c-0b4c-9dc0-f42f67f33c11}
C:\Windows\System32\DriverStore\Temp\{20a4443f-2192-184e-868a-e7d67d434dc5}\adisdp_x64.inf C:\Windows\System32\DriverStore\Temp\{20a4443f-2192-184e-868a-e7d67d434dc5}\AdiSdp_x64.cat
|
||
C:\Users\user\AppData\Local\Temp\nsn5F06.tmp\dpinst_amd64.exe
|
"C:\Users\user~1\AppData\Local\Temp\nsn5F06.tmp\dpinst_amd64.exe" /sw /sa /path "C:\Program Files\Analog Devices\USB Drivers\RFG"
/lm
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{e5e3580a-288d-8044-bc87-e0b602ccf4f0} Global\{a48a4ac5-05ee-5148-b49d-b491db96c803}
C:\Windows\System32\DriverStore\Temp\{56f22667-61e0-6e49-a66d-9e6684a6bc0f}\adi_cyusb_rfg_x64.inf C:\Windows\System32\DriverStore\Temp\{56f22667-61e0-6e49-a66d-9e6684a6bc0f}\ADI_CYUSB_RFG.cat
|
||
C:\Windows\SysWOW64\msiexec.exe
|
"msiexec" /i "C:\Users\user~1\AppData\Local\Temp\ADF435x.msi"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 6B5A3C60BB00D53DB335AFC1B0CDDA21 C
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 3EAB4146E26D2C9785A5EA8A5DAF2D23
|
There are 9 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
|
unknown
|
||
http://www.analog.comPublisherAnalog
|
unknown
|
||
http://www.e-me.lv/repository0
|
unknown
|
||
http://www.acabogacia.org/doc0
|
unknown
|
||
http://crl.chambersign.org/chambersroot.crl0
|
unknown
|
||
http://ocsp.suscerte.gob.ve0
|
unknown
|
||
http://www.postsignum.cz/crl/psrootqca2.crl02
|
unknown
|
||
http://crl.dhimyotis.com/certignarootca.crl0
|
unknown
|
||
http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0
|
unknown
|
||
http://www.chambersign.org1
|
unknown
|
||
http://www.pkioverheid.nl/policies/root-policy0
|
unknown
|
||
http://repository.swisssign.com/0
|
unknown
|
||
http://www.suscerte.gob.ve/lcr0#
|
unknown
|
||
http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0
|
unknown
|
||
http://crl.ssc.lt/root-c/cacrl.crl0
|
unknown
|
||
http://postsignum.ttc.cz/crl/psrootqca2.crl0
|
unknown
|
||
http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
|
unknown
|
||
http://ca.disig.sk/ca/crl/ca_disig.crl0
|
unknown
|
||
http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0
|
unknown
|
||
http://www.certplus.com/CRL/class3P.crl0
|
unknown
|
||
http://www.suscerte.gob.ve/dpc0
|
unknown
|
||
http://www.certeurope.fr/reference/root2.crl0
|
unknown
|
||
http://ocsp.thawte.com
|
unknown
|
||
http://www.certplus.com/CRL/class2.crl0
|
unknown
|
||
http://www.disig.sk/ca/crl/ca_disig.crl0
|
unknown
|
||
http://www.defence.gov.au/pki0
|
unknown
|
||
http://www.sk.ee/cps/0
|
unknown
|
||
http://www.globaltrust.info0=
|
unknown
|
||
http://www.anf.es
|
unknown
|
||
http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09
|
unknown
|
||
http://crl.postsignum.cz/crl/psrootqca4.crl02
|
unknown
|
||
http://pki.registradores.org/normativa/index.htm0
|
unknown
|
||
http://schemas.microsof
|
unknown
|
||
http://policy.camerfirma.com0
|
unknown
|
||
http://www.ssc.lt/cps03
|
unknown
|
||
http://ocsp.pki.gva.es0
|
unknown
|
||
http://www.anf.es/es/address-direccion.html
|
unknown
|
||
https://www.anf.es/address/)1(0&
|
unknown
|
||
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?
|
unknown
|
||
http://ca.mtin.es/mtin/ocsp0
|
unknown
|
||
http://crl.ssc.lt/root-b/cacrl.crl0
|
unknown
|
||
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0
|
unknown
|
||
http://web.ncdc.gov.sa/crl/nrcacomb1.crl0
|
unknown
|
||
http://www.certicamara.com/dpc/0Z
|
unknown
|
||
http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G
|
unknown
|
||
https://wwww.certigna.fr/autorites/0m
|
unknown
|
||
http://www.dnie.es/dpc0
|
unknown
|
||
http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0
|
unknown
|
||
http://ca.mtin.es/mtin/DPCyPoliticas0
|
unknown
|
||
https://wwgn.com/r
|
unknown
|
||
https://www.anf.es/AC/ANFServerCA.crl0
|
unknown
|
||
https://repository.tsp.zetes.com0
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://www.globaltrust.info0
|
unknown
|
||
http://certificates.starfieldtech.com/repository/1604
|
unknown
|
||
http://acedicom.edicomgroup.com/doc0
|
unknown
|
||
http://www.certplus.com/CRL/class3TS.crl0
|
unknown
|
||
https://crl.anf.es/AC/ANFServerCA.crl0
|
unknown
|
||
http://www.analog.com
|
unknown
|
||
http://www.certeurope.fr/reference/pc-root2.pdf0
|
unknown
|
||
http://ac.economia.gob.mx/last.crl0G
|
unknown
|
||
https://www.catcert.net/verarrel
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
http://www.disig.sk/ca0f
|
unknown
|
||
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
|
unknown
|
||
http://www.e-szigno.hu/RootCA.crl
|
unknown
|
||
http://crl.microsof
|
unknown
|
||
http://www.sk.ee/juur/crl/0
|
unknown
|
||
http://crl.chambersign.org/chambersignroot.crl0
|
unknown
|
||
http://crl.xrampsecurity.com/XGCA.crl0
|
unknown
|
||
http://certs.oati.net/repository/OATICA2.crl0
|
unknown
|
||
http://crl.oces.trust2408.com/oces.crl0
|
unknown
|
||
http://www.quovadis.bm0
|
unknown
|
||
http://crl.ssc.lt/root-a/cacrl.crl0
|
unknown
|
||
http://certs.oaticerts.com/repository/OATICA2.crl
|
unknown
|
||
http://certs.oati.net/repository/OATICA2.crt0
|
unknown
|
||
http://www.accv.es00
|
unknown
|
||
http://www.pkioverheid.nl/policies/root-policy-G20
|
unknown
|
||
https://www.netlock.net/docs
|
unknown
|
||
http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
|
unknown
|
||
http://www.e-trust.be/CPS/QNcerts
|
unknown
|
||
http://ocsp.ncdc.gov.sa0
|
unknown
|
||
http://fedir.comsign.co.il/crl/ComSignCA.crl0
|
unknown
|
||
http://acraiz.icpbrasil.gov.br/LCRacraizv5.crl0
|
unknown
|
||
http://crl2.postsignum.cz/crl/psrootqca4.crl01
|
unknown
|
||
http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0
|
unknown
|
||
http://web.ncdc.gov.sa/crl/nrcaparta1.crl
|
unknown
|
||
http://www.datev.de/zertifikat-policy-int0
|
unknown
|
||
http://fedir.comsign.co.il/crl/comsignglobalrootca.crl0;
|
unknown
|
||
https://repository.luxtrust.lu0
|
unknown
|
||
http://cps.chambersign.org/cps/chambersroot.html0
|
unknown
|
||
http://www.acabogacia.org0
|
unknown
|
||
http://www.firmaprofesional.com/cps0
|
unknown
|
||
http://www.uce.gub.uy/acrn/acrn.crl0
|
unknown
|
||
http://crl.securetrust.com/SGCA.crl0
|
unknown
|
||
http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt0
|
unknown
|
||
http://www.agesic.gub.uy/acrn/acrn.crl0)
|
unknown
|
||
http://crl.securetrust.com/STCA.crl0
|
unknown
|
||
http://www.rcsc.lt/repository0
|
unknown
|
||
http://www2.postsignum.cz/crl/psrootqca2.crl01
|
unknown
|
There are 90 hidden URLs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A43489159A520F0D93D032CCAF37E7FE20A8B419
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A43489159A520F0D93D032CCAF37E7FE20A8B419
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\BE36A4562FB2EE05DBB3D32323ADF445084ED656
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\sdpDriverInterface.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\csaDriverInterface.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Analog Devices\SDP\Drivers_R2
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ADI SDP Drivers R2
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ADI SDP Drivers R2
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ADI SDP Drivers R2
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ADI SDP Drivers R2
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ADI SDP Drivers R2
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\csaDriverInterface.dll
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\VSSetup
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\VSSetup
|
TypesSupported
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
c:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
c:\Config.Msi\4908e8.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
c:\Config.Msi\4908e8.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E4C35488E6280433B4A9504AC59CB06
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\48DB41415A9D5EE3AA3711D8C7703207
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
c:\Program Files (x86)\Common Files\Microsoft Shared\VC\msdia100.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\33964F2EF4FF0E649B796FD4C2D6F41A
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\atl100.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\06A0D925C8932A8379FE28AFAF97A860
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\339F228ED07C4FC39AD227368BCAFC03
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc100.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8EBEE9DB288E3EA36B66B61AD16E6844
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc100u.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6432CE2221869C437BF73206B4A1E41B
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfcm100.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\724137509B874A03688844BF844518FB
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfcm100u.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\22ADB29655D63AE309B41371AFB2D2E9
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc100cht.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\179FE72998B7B4C319AD15ECF0D789A2
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc100chs.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3121A08DAA1666E37A639F747E57545C
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc100enu.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\653ED3563DFD92235AEDBE6C434DA014
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc100deu.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D1896C2474BDF2C319AE7F4B6C2E628A
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc100esn.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8CFAF524C51FA013D98AF03737CB8863
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc100fra.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\465777D8C2D35073D89B3E56588E2F01
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc100ita.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\33BEF75DAFB5F5C329FE5CA253A07615
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc100jpn.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9796DE27DAA0C7132AC5BAA921E1D603
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc100kor.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\EDEBFFDD9304B413CAD812F52A578C3A
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\mfc100rus.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\047DE1C57A5C26139B5BF06B6D9DFF6F
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\vcomp100.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0A6B7DEC5302BF73F923C8C583CA5653
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\56111199315302F42AC73C5FF3218BB7
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7CF850295E2D47645AEFFBA1C9CC66EA
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3359B1A2C0F81F946AEF6C0290F0A763
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\903AA223F4959C147984F03FDC1CEFDF
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\700723D95B27753439A8F4809CA1D185
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\68385A979AE027C4DBB7F53B1AD0CA9F
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\82030D4870482E948B98A5D438C2775A
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3808C13B64A39CB4999AD62BB57ED0AC
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C249A6ED1F4061548B2F0596C0EA89BC
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D421FD5597707BC45B38AA8D09FA3C83
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\51CDBAC9106C61A499B3BFD01FAB4E25
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\67D910D9E436BC4468B47775A9D6A5D7
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\115EA997438B7F93F8EBF155CE5AC35E
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\89D167C9B8F306038ADB87ABC137D43C
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\875C7AC1A0E5BC73CB72373226AAD9BD
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5B04B31931FA00D3AA3B549FD8C294E4
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\68906D3817F80033788F39B2CDB04A46
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2D17D06B78004283AA6BF0AA19CB15E7
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7B309DE9782D3B03BA3458C9AA813CAF
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\910EF7B196FE3FC3DBAD7F52B0B08C90
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C75EBF6F23C451638BFC95A448A5DF5A
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
c:\Program Files (x86)\Common Files\Microsoft Shared\VC\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\139C3899EB73E6C3DA23B8E687B98618\1D5E3C0FEDA1E123187686FED06E995A
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\339F228ED07C4FC39AD227368BCAFC03\1D5E3C0FEDA1E123187686FED06E995A
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86
|
Installed
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86
|
MajorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86
|
MinorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86
|
Bld
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x86
|
Rbld
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
|
Install
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
|
InstallerType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
|
SP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
|
SPIndex
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
|
SPName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
|
Bld
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\x86\1033
|
Rbld
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0
|
SP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0
|
SPIndex
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red
|
Install
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red
|
InstallerType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red
|
SP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red
|
SPIndex
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red
|
SPName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}.KB2467173
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
|
ThisVersionInstalled
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
|
PackageVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
|
PublishingGroup
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
|
ReleaseType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
|
InstalledBy
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
|
InstalledDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
|
InstallerName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2467173
|
InstallerVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}.KB2151757
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2151757
|
ThisVersionInstalled
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2151757
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2151757
|
PackageVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2151757
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2151757
|
PublishingGroup
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2151757
|
ReleaseType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2151757
|
InstalledBy
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2151757
|
InstalledDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2151757
|
InstallerName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB2151757
|
InstallerVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}.KB982573
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB982573
|
ThisVersionInstalled
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB982573
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB982573
|
PackageVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB982573
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB982573
|
PublishingGroup
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB982573
|
ReleaseType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB982573
|
InstalledBy
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB982573
|
InstalledDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB982573
|
InstallerName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219\KB982573
|
InstallerVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\A2D1F4F1AD9DFC2399908484D50AD65D
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1D5E3C0FEDA1E123187686FED06E995A
|
VCRedist_x86_enu
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Features
|
VCRedist_x86_enu
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1D5E3C0FEDA1E123187686FED06E995A
|
VC_RED_enu_x86_net_SETUP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Features
|
VC_RED_enu_x86_net_SETUP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1D5E3C0FEDA1E123187686FED06E995A
|
Servicing_Key
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Features
|
Servicing_Key
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1D5E3C0FEDA1E123187686FED06E995A
|
KB2467173
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Features
|
KB2467173
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1D5E3C0FEDA1E123187686FED06E995A
|
KB2151757
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Features
|
KB2151757
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1D5E3C0FEDA1E123187686FED06E995A
|
KB982573
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Features
|
KB982573
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1D5E3C0FEDA1E123187686FED06E995A\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\A2D1F4F1AD9DFC2399908484D50AD65D
|
1D5E3C0FEDA1E123187686FED06E995A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A\SourceList\Media
|
DiskPrompt
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A\SourceList
|
LastUsedSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\msvcr100.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
|
C:\Windows\system32\msvcp100.dll
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
c:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
c:\Config.Msi\492e90.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
c:\Config.Msi\492e90.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0480DC222D01C4F37A2077C032048022
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C065BA555D648923380AAA2171113286
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
c:\Program Files\Common Files\Microsoft Shared\VC\msdia100.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\94422102FB8324F41B3E7CD7B422BDC7
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
c:\Windows\system32\atl100.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CC55BAE45466EF63487E80325EFD4699
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
c:\Windows\system32\msvcr100.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\620139E0B929C2837B208B4B3039995E
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
c:\Windows\system32\msvcp100.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\03EA91DAF1821523AAA0556E73E73D5F
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
c:\Windows\system32\mfc100.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\ECB55D8E45AD89E3ABDB0106D70A6E43
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
c:\Windows\system32\mfc100u.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D6D942287155543986F9D6AA8A889D8
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
c:\Windows\system32\mfcm100.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\85DC899F7C7D0943287A010C770E5157
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
c:\Windows\system32\mfcm100u.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7C47EBEC423D7F53DB1EEE945FDBCD8A
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
c:\Windows\system32\mfc100cht.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BCC9D60832651123697145128BA363CD
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
c:\Windows\system32\mfc100chs.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D36DFC997E9185F35AB455F4D8BD1B1A
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
c:\Windows\system32\mfc100enu.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F8EB9A0EB7EC15836A7C7990CEBED33B
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
c:\Windows\system32\mfc100deu.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D78CB0019EFD4A33A0ABCFAA2C03AB4
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
c:\Windows\system32\mfc100esn.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BDB781F79E72FF43CAB8883AFF23E660
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
c:\Windows\system32\mfc100fra.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D4362D900DD7D6230A3E66C3B0972A6F
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
c:\Windows\system32\mfc100ita.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\287437C084320CB3089DE68F3E9FE6B0
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
c:\Windows\system32\mfc100jpn.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\89A8B17E1D05AB33A8A8E29029641CEA
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
c:\Windows\system32\mfc100kor.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0B27EEBBB25368A34A89A4C36060B816
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
c:\Windows\system32\mfc100rus.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A5F2E2998E12FC436878E5B253CCE503
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
c:\Windows\system32\vcomp100.dll
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\044B2B18FBDD5823299BD88873C05DE3
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B06753C403720374B9E802BE9E719431
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5CAF4A81CCE45D84F9FC1C3B54B9687A
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C3179B36BEC743044A0A333654942EFD
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\493CFFC2983388A4D9B7298C2C87E508
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0595BAD9DB1D2B943A35DF12A932B367
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0E8D57C26BBC0BA4086B6AE65D820A79
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\115EA997438B7F93F8EBF155CE5AC35E
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\89D167C9B8F306038ADB87ABC137D43C
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\875C7AC1A0E5BC73CB72373226AAD9BD
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\90F69BE67CFD67C358567DC8B6FCE330
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BA8D27FBFAFD537398A986A1F078560B
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\59156F9E7CA1EA7339861E2DEB3E61E3
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\EE0424FCA4735153A96ECB40175811C1
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DCF641B65CE867A3FA014E05B4FFB233
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2CBF9AE5E7D63D437A0A3CB6E3246D65
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\03EA91DAF1821523AAA0556E73E73D5F\1926E8D15D0BCE53481466615F760A7F
|
PatchGUID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\03EA91DAF1821523AAA0556E73E73D5F\1926E8D15D0BCE53481466615F760A7F
|
MediaCabinet
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\03EA91DAF1821523AAA0556E73E73D5F\1926E8D15D0BCE53481466615F760A7F
|
File
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\03EA91DAF1821523AAA0556E73E73D5F\1926E8D15D0BCE53481466615F760A7F
|
ComponentVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\03EA91DAF1821523AAA0556E73E73D5F\1926E8D15D0BCE53481466615F760A7F
|
ProductVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\03EA91DAF1821523AAA0556E73E73D5F\1926E8D15D0BCE53481466615F760A7F
|
PatchSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\03EA91DAF1821523AAA0556E73E73D5F\1926E8D15D0BCE53481466615F760A7F
|
PatchAttributes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\03EA91DAF1821523AAA0556E73E73D5F\1926E8D15D0BCE53481466615F760A7F
|
PatchSequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\03EA91DAF1821523AAA0556E73E73D5F\1926E8D15D0BCE53481466615F760A7F
|
SharedComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\03EA91DAF1821523AAA0556E73E73D5F\1926E8D15D0BCE53481466615F760A7F
|
IsFullFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
c:\Program Files\Common Files\Microsoft Shared\VC\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x64
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x64
|
Installed
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x64
|
MajorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x64
|
MinorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x64
|
Bld
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\10.0\VC\VCRedist\x64
|
Rbld
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\amd64\1033
|
Install
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\amd64\1033
|
InstallerType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\amd64\1033
|
SP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\amd64\1033
|
SPIndex
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\amd64\1033
|
SPName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\10.0\red\amd64\1033
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2467173
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2467173
|
ThisVersionInstalled
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2467173
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2467173
|
PackageVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2467173
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2467173
|
PublishingGroup
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2467173
|
ReleaseType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2467173
|
InstalledBy
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2467173
|
InstalledDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2467173
|
InstallerName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2467173
|
InstallerVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2151757
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2151757
|
ThisVersionInstalled
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2151757
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2151757
|
PackageVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2151757
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2151757
|
PublishingGroup
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2151757
|
ReleaseType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2151757
|
InstalledBy
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2151757
|
InstalledDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2151757
|
InstallerName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB2151757
|
InstallerVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB982573
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB982573
|
ThisVersionInstalled
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB982573
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB982573
|
PackageVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB982573
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB982573
|
PublishingGroup
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB982573
|
ReleaseType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB982573
|
InstalledBy
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB982573
|
InstalledDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB982573
|
InstallerName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Updates\Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219\KB982573
|
InstallerVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\167F57B58CABCB333A1864D4DD8D313A
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1926E8D15D0BCE53481466615F760A7F
|
VCRedist_amd64_enu
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\Features
|
VCRedist_amd64_enu
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1926E8D15D0BCE53481466615F760A7F
|
VC_RED_enu_amd64_net_SETUP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\Features
|
VC_RED_enu_amd64_net_SETUP
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1926E8D15D0BCE53481466615F760A7F
|
Servicing_Key
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\Features
|
Servicing_Key
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1926E8D15D0BCE53481466615F760A7F
|
KB2467173
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\Features
|
KB2467173
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1926E8D15D0BCE53481466615F760A7F
|
KB2151757
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\Features
|
KB2151757
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1926E8D15D0BCE53481466615F760A7F
|
KB982573
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\Features
|
KB982573
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1926E8D15D0BCE53481466615F760A7F\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\167F57B58CABCB333A1864D4DD8D313A
|
1926E8D15D0BCE53481466615F760A7F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F\SourceList\Media
|
DiskPrompt
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F\SourceList
|
LastUsedSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
|
c:\Windows\system32\msvcp100.dll
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupapiLogStatus
|
setupapi.dev.log
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CE8D888A7214455FA1DBBE83729D9F33A39A3846
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\742C3192E607E424EB4549542BE1BBC53E6174E2
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
|
Blob
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ADI RFG Drivers Install
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ADI RFG Drivers Install
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ADI RFG Drivers Install
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ADI RFG Drivers Install
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ADI RFG Drivers Install
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\A6610214E110CBE34344DE22BA821F64C2BE341B
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
|
GlobalAssocChangedCounter
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\49acc8.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\49acc8.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\551AAB2A5F3DF7043B073CB51BE0192E
|
1C74619418213434AA168FC70AA0292A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1E2ECE996C53602BEFF347D3BC89B6AB
|
1C74619418213434AA168FC70AA0292A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\507CA6AA29486A6B689079F07AFD42F2
|
1C74619418213434AA168FC70AA0292A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2FE702938A035799E9ABD066A36AE9EE
|
1C74619418213434AA168FC70AA0292A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\523DA7B97ED641252A714EC05955AF02
|
1C74619418213434AA168FC70AA0292A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B5A4655ECAAAF624DF3EE42C2EE2B6B3
|
1C74619418213434AA168FC70AA0292A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CB2C6E1246253E9FF490A7F088387D1D
|
1C74619418213434AA168FC70AA0292A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\26282674267E3ADA909906DD813C14FB
|
1C74619418213434AA168FC70AA0292A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BFFEF651E17B42940C4F8F5F5E61D926
|
1C74619418213434AA168FC70AA0292A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5C386E26753057A467AAAFA1452C08A1
|
1C74619418213434AA168FC70AA0292A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1C74619418213434AA168FC70AA0292A
|
1C74619418213434AA168FC70AA0292A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\24CBDFC95F5CCBDCE82CEABA2F856261
|
1C74619418213434AA168FC70AA0292A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9602F1674A8DF9347272143DAB3E5051
|
1C74619418213434AA168FC70AA0292A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\Analog Devices\ADF435x\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Windows\Installer\{491647C1-1281-4343-AA61-F87CA00A92A2}\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Analog Devices\ADF435x\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Analog Devices\
|
||
HKEY_CURRENT_USER\SOFTWARE\Analog Devices\ADIsimPLL\Chip Prog
|
ADF4351
|
||
HKEY_CURRENT_USER\SOFTWARE\Analog Devices\ADIsimPLL\Chip Prog
|
ADF4350
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\F80478E2C12513843874D6931F770191
|
1C74619418213434AA168FC70AA0292A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{491647C1-1281-4343-AA61-F87CA00A92A2}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|Analog Devices|ADF435x|INIFileParser.DLL
|
INIFileParser,Version="1.7.1.0",Culture="neutral",PublicKeyToken="79AF7B307B65CF3C",ProcessorArchitecture="MSIL"
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|Analog Devices|ADF435x|sdpApi1.DLL
|
sdpApi1,Version="2.1.908.0",Culture="neutral",ProcessorArchitecture="x86"
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|Analog Devices|ADF435x|Microsoft.VisualStudio.HostingProcess.Utilities.Sync.dll
|
Microsoft.VisualStudio.HostingProcess.Utilities.Sync,Version="10.0.0.0",Culture="neutral",PublicKeyToken="B03F5F7F11D50A3A",ProcessorArchitecture="MSIL"
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|Analog Devices|ADF435x|ADF435x.vshost.exe
|
vshost32-clr2,Version="10.0.0.0",Culture="neutral",PublicKeyToken="B03F5F7F11D50A3A",ProcessorArchitecture="x86"
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|Analog Devices|ADF435x|CyUSB.DLL
|
CyUSB,Version="3.4.2.0",Culture="neutral",PublicKeyToken="01F1D2B6C851AE92",ProcessorArchitecture="MSIL"
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|Analog Devices|ADF435x|ADF435x.exe
|
ADF435x,Version="7.0.1.0",Culture="neutral",ProcessorArchitecture="x86"
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\1C74619418213434AA168FC70AA0292A
|
DefaultFeature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\Features
|
DefaultFeature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\1C74619418213434AA168FC70AA0292A\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A
|
ProductIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\F80478E2C12513843874D6931F770191
|
1C74619418213434AA168FC70AA0292A
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\1C74619418213434AA168FC70AA0292A\SourceList
|
LastUsedSource
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
There are 551 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
110B000
|
heap
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
3409000
|
trusted library allocation
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
137D000
|
heap
|
page read and write
|
||
1CB8F566000
|
heap
|
page read and write
|
||
1E348EA9000
|
heap
|
page read and write
|
||
36EC000
|
trusted library allocation
|
page read and write
|
||
2B63000
|
trusted library allocation
|
page read and write
|
||
C6A000
|
unkown
|
page readonly
|
||
21FF000
|
stack
|
page read and write
|
||
1CB8D6AE000
|
heap
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
2CA0000
|
trusted library allocation
|
page read and write
|
||
25D0FA33000
|
heap
|
page read and write
|
||
2D8C000
|
trusted library allocation
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
8C7000
|
heap
|
page read and write
|
||
2CF2000
|
trusted library allocation
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
25D0FA0E000
|
heap
|
page read and write
|
||
27218684000
|
heap
|
page read and write
|
||
ECE000
|
heap
|
page read and write
|
||
380A000
|
trusted library allocation
|
page read and write
|
||
2C9A000
|
trusted library allocation
|
page read and write
|
||
2721869B000
|
heap
|
page read and write
|
||
75A000
|
heap
|
page read and write
|
||
434000
|
unkown
|
page read and write
|
||
25D0FA14000
|
heap
|
page read and write
|
||
376D000
|
trusted library allocation
|
page read and write
|
||
1CB8F616000
|
heap
|
page read and write
|
||
26D6000
|
heap
|
page read and write
|
||
2C34000
|
trusted library allocation
|
page read and write
|
||
2721864D000
|
heap
|
page read and write
|
||
7FF644B10000
|
unkown
|
page readonly
|
||
27218AEB000
|
heap
|
page read and write
|
||
8C7000
|
heap
|
page read and write
|
||
2D78000
|
trusted library allocation
|
page read and write
|
||
307C000
|
stack
|
page read and write
|
||
1E348F12000
|
heap
|
page read and write
|
||
1CB8F5BD000
|
heap
|
page read and write
|
||
639000
|
heap
|
page read and write
|
||
3752000
|
trusted library allocation
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
27218AC1000
|
heap
|
page read and write
|
||
188000
|
unkown
|
page write copy
|
||
7FF7107D3000
|
unkown
|
page readonly
|
||
564000
|
heap
|
page read and write
|
||
7FFB2FD000
|
stack
|
page read and write
|
||
27218B5A000
|
heap
|
page read and write
|
||
10E2000
|
heap
|
page read and write
|
||
25D0FA87000
|
heap
|
page read and write
|
||
272186B9000
|
heap
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
138A000
|
heap
|
page read and write
|
||
272186A4000
|
heap
|
page read and write
|
||
804000
|
heap
|
page read and write
|
||
8B2000
|
heap
|
page read and write
|
||
2B64000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
27218B42000
|
heap
|
page read and write
|
||
25D0FA21000
|
heap
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
8C3000
|
heap
|
page read and write
|
||
376E000
|
trusted library allocation
|
page read and write
|
||
25D0FA22000
|
heap
|
page read and write
|
||
2E51000
|
heap
|
page read and write
|
||
10B9000
|
heap
|
page read and write
|
||
1CB8D715000
|
heap
|
page read and write
|
||
27218680000
|
heap
|
page read and write
|
||
35AE000
|
trusted library allocation
|
page read and write
|
||
3406000
|
trusted library allocation
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
1374000
|
heap
|
page read and write
|
||
8DC000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page write copy
|
||
2CFD000
|
trusted library allocation
|
page read and write
|
||
10EC000
|
heap
|
page read and write
|
||
27218AFB000
|
heap
|
page read and write
|
||
1E348F6E000
|
heap
|
page read and write
|
||
2D7C000
|
trusted library allocation
|
page read and write
|
||
2B6A000
|
trusted library allocation
|
page read and write
|
||
2520000
|
trusted library allocation
|
page read and write
|
||
8CC000
|
heap
|
page read and write
|
||
25D0FA49000
|
heap
|
page read and write
|
||
2540000
|
heap
|
page read and write
|
||
1112000
|
heap
|
page read and write
|
||
2A38000
|
heap
|
page read and write
|
||
27218B1F000
|
heap
|
page read and write
|
||
27218AE6000
|
heap
|
page read and write
|
||
4CC000
|
heap
|
page read and write
|
||
1102000
|
heap
|
page read and write
|
||
35A2000
|
trusted library allocation
|
page read and write
|
||
27218653000
|
heap
|
page read and write
|
||
36EA000
|
trusted library allocation
|
page read and write
|
||
2F05000
|
trusted library allocation
|
page read and write
|
||
8C7000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
1CB8F5C2000
|
heap
|
page read and write
|
||
653000
|
heap
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
1CB8F5D2000
|
heap
|
page read and write
|
||
255F000
|
stack
|
page read and write
|
||
136D000
|
heap
|
page read and write
|
||
3559000
|
trusted library allocation
|
page read and write
|
||
928000
|
heap
|
page read and write
|
||
27218AFD000
|
heap
|
page read and write
|
||
27218B09000
|
heap
|
page read and write
|
||
EBF000
|
heap
|
page read and write
|
||
138A000
|
heap
|
page read and write
|
||
ACD000
|
stack
|
page read and write
|
||
8C3000
|
heap
|
page read and write
|
||
25D0FB8A000
|
heap
|
page read and write
|
||
27218688000
|
heap
|
page read and write
|
||
F09000
|
heap
|
page read and write
|
||
10A5000
|
heap
|
page read and write
|
||
10D1000
|
heap
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
10B9000
|
heap
|
page read and write
|
||
EB5000
|
heap
|
page read and write
|
||
35A7000
|
trusted library allocation
|
page read and write
|
||
ECC000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
1E348EF2000
|
heap
|
page read and write
|
||
ED2000
|
heap
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
27218C48000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
2C3D000
|
trusted library allocation
|
page read and write
|
||
298A000
|
heap
|
page read and write
|
||
2CE4000
|
trusted library allocation
|
page read and write
|
||
353D000
|
trusted library allocation
|
page read and write
|
||
6D180000
|
unkown
|
page read and write
|
||
1CB8D78C000
|
heap
|
page read and write
|
||
F2C000
|
heap
|
page read and write
|
||
10A9000
|
heap
|
page read and write
|
||
2F0E000
|
trusted library allocation
|
page read and write
|
||
10D9000
|
heap
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
8C8000
|
heap
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
438000
|
unkown
|
page readonly
|
||
10CC000
|
heap
|
page read and write
|
||
2550000
|
trusted library allocation
|
page read and write
|
||
35A1000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
25D0FAE2000
|
heap
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
3776000
|
trusted library allocation
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
10A5000
|
heap
|
page read and write
|
||
2C90000
|
trusted library allocation
|
page read and write
|
||
3A7C000
|
stack
|
page read and write
|
||
2CF9000
|
trusted library allocation
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
1E346F60000
|
heap
|
page read and write
|
||
27218C24000
|
heap
|
page read and write
|
||
10D1000
|
heap
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
E73000
|
heap
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
3731000
|
heap
|
page read and write
|
||
3762000
|
trusted library allocation
|
page read and write
|
||
25D0FB8F000
|
heap
|
page read and write
|
||
135C000
|
heap
|
page read and write
|
||
112F000
|
heap
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
10FC000
|
stack
|
page read and write
|
||
1389000
|
heap
|
page read and write
|
||
2A86000
|
trusted library allocation
|
page read and write
|
||
35A3000
|
trusted library allocation
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
2540000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
135C000
|
heap
|
page read and write
|
||
1112000
|
heap
|
page read and write
|
||
1CB8F5C0000
|
heap
|
page read and write
|
||
25D0FA1B000
|
heap
|
page read and write
|
||
25D0FB74000
|
heap
|
page read and write
|
||
322F000
|
heap
|
page read and write
|
||
3A1E000
|
stack
|
page read and write
|
||
25D0FA48000
|
heap
|
page read and write
|
||
135C000
|
heap
|
page read and write
|
||
2E3B000
|
trusted library allocation
|
page read and write
|
||
27218C20000
|
heap
|
page read and write
|
||
1E347089000
|
heap
|
page read and write
|
||
27218AE6000
|
heap
|
page read and write
|
||
3473000
|
trusted library allocation
|
page read and write
|
||
2E52000
|
heap
|
page read and write
|
||
35A0000
|
trusted library allocation
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
7FF710751000
|
unkown
|
page execute read
|
||
EE9000
|
heap
|
page read and write
|
||
135B000
|
heap
|
page read and write
|
||
1002000
|
unkown
|
page execute read
|
||
110B000
|
heap
|
page read and write
|
||
25C2000
|
heap
|
page read and write
|
||
1CB8F5C1000
|
heap
|
page read and write
|
||
1E348F6A000
|
heap
|
page read and write
|
||
27218460000
|
heap
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
1E348F1E000
|
heap
|
page read and write
|
||
3315000
|
trusted library allocation
|
page read and write
|
||
1374000
|
heap
|
page read and write
|
||
2E37000
|
trusted library allocation
|
page read and write
|
||
F3E000
|
heap
|
page read and write
|
||
2721865B000
|
heap
|
page read and write
|
||
AA0331D000
|
stack
|
page read and write
|
||
438000
|
unkown
|
page readonly
|
||
EE9000
|
heap
|
page read and write
|
||
27218B46000
|
heap
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
2C92000
|
trusted library allocation
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
2CFE000
|
trusted library allocation
|
page read and write
|
||
27218661000
|
heap
|
page read and write
|
||
298A000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
107D000
|
heap
|
page read and write
|
||
1CB8F5DE000
|
heap
|
page read and write
|
||
2721864A000
|
heap
|
page read and write
|
||
25D0FA3B000
|
heap
|
page read and write
|
||
8B3000
|
heap
|
page read and write
|
||
37CC000
|
trusted library allocation
|
page read and write
|
||
381F000
|
stack
|
page read and write
|
||
8CA000
|
heap
|
page read and write
|
||
2CF4000
|
trusted library allocation
|
page read and write
|
||
3560000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
101E000
|
unkown
|
page readonly
|
||
2CC6000
|
trusted library allocation
|
page read and write
|
||
25D0F9FE000
|
heap
|
page read and write
|
||
C6A000
|
unkown
|
page readonly
|
||
2B20000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
1E348F6A000
|
heap
|
page read and write
|
||
27218684000
|
heap
|
page read and write
|
||
10D1000
|
heap
|
page read and write
|
||
27218657000
|
heap
|
page read and write
|
||
3810000
|
heap
|
page read and write
|
||
5FB000
|
heap
|
page read and write
|
||
25D0FA2C000
|
heap
|
page read and write
|
||
37C1000
|
trusted library allocation
|
page read and write
|
||
374A000
|
trusted library allocation
|
page read and write
|
||
25D0FBC3000
|
heap
|
page read and write
|
||
2721864A000
|
heap
|
page read and write
|
||
2F08000
|
trusted library allocation
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
35E3000
|
trusted library allocation
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
1CB8F5F9000
|
heap
|
page read and write
|
||
1112000
|
heap
|
page read and write
|
||
2CFF000
|
trusted library allocation
|
page read and write
|
||
25D0FA2C000
|
heap
|
page read and write
|
||
3740000
|
trusted library allocation
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
2A80000
|
trusted library allocation
|
page read and write
|
||
10C9000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
2721867A000
|
heap
|
page read and write
|
||
8C7000
|
heap
|
page read and write
|
||
1071000
|
heap
|
page read and write
|
||
1108000
|
heap
|
page read and write
|
||
1E348A40000
|
heap
|
page read and write
|
||
25D0FA1B000
|
heap
|
page read and write
|
||
37CD000
|
trusted library allocation
|
page read and write
|
||
377B000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
2010000
|
heap
|
page read and write
|
||
1E3470F9000
|
heap
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
EE3000
|
heap
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
2E31000
|
trusted library allocation
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
923000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
A8D000
|
stack
|
page read and write
|
||
2E51000
|
heap
|
page read and write
|
||
1379000
|
heap
|
page read and write
|
||
27218691000
|
heap
|
page read and write
|
||
25D104F4000
|
heap
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
1E346FF9000
|
heap
|
page read and write
|
||
1E347010000
|
heap
|
page read and write
|
||
37C2000
|
trusted library allocation
|
page read and write
|
||
2F06000
|
trusted library allocation
|
page read and write
|
||
1108000
|
heap
|
page read and write
|
||
3764000
|
trusted library allocation
|
page read and write
|
||
8CC000
|
heap
|
page read and write
|
||
934000
|
heap
|
page read and write
|
||
25D0FA21000
|
heap
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
25D0FA2C000
|
heap
|
page read and write
|
||
3316000
|
trusted library allocation
|
page read and write
|
||
2FE0000
|
direct allocation
|
page read and write
|
||
27218B63000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
135F000
|
heap
|
page read and write
|
||
25D0FA5B000
|
heap
|
page read and write
|
||
35A9000
|
trusted library allocation
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
54E000
|
stack
|
page read and write
|
||
2F02000
|
heap
|
page read and write
|
||
1CB8F5C2000
|
heap
|
page read and write
|
||
F7993FE000
|
stack
|
page read and write
|
||
110C000
|
heap
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
355D000
|
trusted library allocation
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
1379000
|
heap
|
page read and write
|
||
170000
|
heap
|
page read and write
|
||
1CB8D6A0000
|
heap
|
page read and write
|
||
1374000
|
heap
|
page read and write
|
||
27218644000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
25D0FA2C000
|
heap
|
page read and write
|
||
E82000
|
heap
|
page read and write
|
||
2D7B000
|
trusted library allocation
|
page read and write
|
||
25D0FA32000
|
heap
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
2C98000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
35ED000
|
trusted library allocation
|
page read and write
|
||
2D75000
|
trusted library allocation
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
F3E000
|
heap
|
page read and write
|
||
2560000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
2C94000
|
trusted library allocation
|
page read and write
|
||
797000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
112F000
|
heap
|
page read and write
|
||
35F0000
|
heap
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
1CB8F5BF000
|
heap
|
page read and write
|
||
2ED8000
|
trusted library allocation
|
page read and write
|
||
3800000
|
trusted library allocation
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
6CEE0000
|
unkown
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
37CA000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
25D0FA27000
|
heap
|
page read and write
|
||
27218698000
|
heap
|
page read and write
|
||
112F000
|
heap
|
page read and write
|
||
2C53000
|
heap
|
page read and write
|
||
27218719000
|
heap
|
page read and write
|
||
25D0FB6E000
|
heap
|
page read and write
|
||
2CCC000
|
trusted library allocation
|
page read and write
|
||
2E41000
|
trusted library allocation
|
page read and write
|
||
3472000
|
trusted library allocation
|
page read and write
|
||
27218AFD000
|
heap
|
page read and write
|
||
380F000
|
trusted library allocation
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
1E347035000
|
heap
|
page read and write
|
||
27218C2F000
|
heap
|
page read and write
|
||
2F0B000
|
trusted library allocation
|
page read and write
|
||
13C8000
|
heap
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
27218665000
|
heap
|
page read and write
|
||
6D161000
|
unkown
|
page execute read
|
||
8D5000
|
heap
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
36E6000
|
trusted library allocation
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
934000
|
heap
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
413F000
|
stack
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
1E348F1F000
|
heap
|
page read and write
|
||
2721867B000
|
heap
|
page read and write
|
||
72A000
|
heap
|
page read and write
|
||
393C000
|
stack
|
page read and write
|
||
10F5000
|
heap
|
page read and write
|
||
ED4000
|
heap
|
page read and write
|
||
705000
|
heap
|
page read and write
|
||
376C000
|
trusted library allocation
|
page read and write
|
||
27218B44000
|
heap
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
27218ADD000
|
heap
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
1102000
|
heap
|
page read and write
|
||
1CB8F0E0000
|
heap
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
35E9000
|
trusted library allocation
|
page read and write
|
||
150000
|
heap
|
page read and write
|
||
76D000
|
heap
|
page read and write
|
||
1108000
|
heap
|
page read and write
|
||
10CC000
|
heap
|
page read and write
|
||
785000
|
heap
|
page read and write
|
||
1CB8D8B9000
|
heap
|
page read and write
|
||
1CB8F5D2000
|
heap
|
page read and write
|
||
2560000
|
trusted library allocation
|
page read and write
|
||
380B000
|
trusted library allocation
|
page read and write
|
||
1E348EF2000
|
heap
|
page read and write
|
||
374E000
|
trusted library allocation
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
340B000
|
trusted library allocation
|
page read and write
|
||
8CE000
|
heap
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
2F5F000
|
stack
|
page read and write
|
||
200E000
|
stack
|
page read and write
|
||
B0D000
|
stack
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
1BE000
|
stack
|
page read and write
|
||
36E2000
|
trusted library allocation
|
page read and write
|
||
3534000
|
trusted library allocation
|
page read and write
|
||
25D0FA1B000
|
heap
|
page read and write
|
||
36E9000
|
trusted library allocation
|
page read and write
|
||
EC3000
|
heap
|
page read and write
|
||
3479000
|
trusted library allocation
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
EAC000
|
heap
|
page read and write
|
||
EF8000
|
heap
|
page read and write
|
||
27218669000
|
heap
|
page read and write
|
||
1CB8D792000
|
heap
|
page read and write
|
||
13A9000
|
heap
|
page read and write
|
||
1CB8F5F3000
|
heap
|
page read and write
|
||
17A000
|
heap
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
27218AE3000
|
heap
|
page read and write
|
||
2C93000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
25A0000
|
heap
|
page read and write
|
||
1112000
|
heap
|
page read and write
|
||
36E4000
|
trusted library allocation
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
2CC4000
|
trusted library allocation
|
page read and write
|
||
391E000
|
stack
|
page read and write
|
||
25D0F9F0000
|
heap
|
page read and write
|
||
35A6000
|
trusted library allocation
|
page read and write
|
||
1CB8D79A000
|
heap
|
page read and write
|
||
1CB8F571000
|
heap
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
25D0FB70000
|
heap
|
page read and write
|
||
1E348F59000
|
heap
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
3408000
|
heap
|
page read and write
|
||
2D72000
|
trusted library allocation
|
page read and write
|
||
3311000
|
trusted library allocation
|
page read and write
|
||
25D0FA3F000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
7FFB57F000
|
stack
|
page read and write
|
||
1E348EF4000
|
heap
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
F2C000
|
heap
|
page read and write
|
||
2E3E000
|
trusted library allocation
|
page read and write
|
||
50F000
|
stack
|
page read and write
|
||
10B9000
|
heap
|
page read and write
|
||
110C000
|
heap
|
page read and write
|
||
7FF644B93000
|
unkown
|
page readonly
|
||
1CB8F5B8000
|
heap
|
page read and write
|
||
355C000
|
trusted library allocation
|
page read and write
|
||
8D8000
|
heap
|
page read and write
|
||
2721864D000
|
heap
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
25D0FA2C000
|
heap
|
page read and write
|
||
2CEC000
|
trusted library allocation
|
page read and write
|
||
340F000
|
trusted library allocation
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
25D0FB58000
|
heap
|
page read and write
|
||
7FF710750000
|
unkown
|
page readonly
|
||
2A83000
|
trusted library allocation
|
page read and write
|
||
1E34708B000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
2550000
|
heap
|
page read and write
|
||
2570000
|
trusted library allocation
|
page read and write
|
||
37DD000
|
trusted library allocation
|
page read and write
|
||
F13000
|
heap
|
page read and write
|
||
2B69000
|
trusted library allocation
|
page read and write
|
||
2D8A000
|
trusted library allocation
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
F39000
|
heap
|
page read and write
|
||
136B000
|
heap
|
page read and write
|
||
1E347089000
|
heap
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
3225000
|
heap
|
page read and write
|
||
1174000
|
heap
|
page read and write
|
||
2C56000
|
heap
|
page read and write
|
||
1108000
|
heap
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
27218C48000
|
heap
|
page read and write
|
||
3746000
|
trusted library allocation
|
page read and write
|
||
27218656000
|
heap
|
page read and write
|
||
3804000
|
trusted library allocation
|
page read and write
|
||
3805000
|
trusted library allocation
|
page read and write
|
||
303B000
|
stack
|
page read and write
|
||
2580000
|
heap
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
25D0FB56000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
F79947F000
|
stack
|
page read and write
|
||
2D8B000
|
trusted library allocation
|
page read and write
|
||
ECA000
|
heap
|
page read and write
|
||
27218C6F000
|
heap
|
page read and write
|
||
2D8D000
|
trusted library allocation
|
page read and write
|
||
25D0F990000
|
heap
|
page read and write
|
||
25D0FA45000
|
heap
|
page read and write
|
||
27218C27000
|
heap
|
page read and write
|
||
F3A000
|
heap
|
page read and write
|
||
25D0FB68000
|
heap
|
page read and write
|
||
1E346F50000
|
heap
|
page read and write
|
||
35E2000
|
trusted library allocation
|
page read and write
|
||
2D7A000
|
trusted library allocation
|
page read and write
|
||
37D9000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
25D104F0000
|
heap
|
page read and write
|
||
8CC000
|
heap
|
page read and write
|
||
25D0FA45000
|
heap
|
page read and write
|
||
2C39000
|
trusted library allocation
|
page read and write
|
||
104C000
|
heap
|
page read and write
|
||
35B0000
|
heap
|
page read and write
|
||
27218675000
|
heap
|
page read and write
|
||
27218C21000
|
heap
|
page read and write
|
||
3402000
|
trusted library allocation
|
page read and write
|
||
EEA000
|
heap
|
page read and write
|
||
4E7000
|
heap
|
page read and write
|
||
277E000
|
stack
|
page read and write
|
||
EAC000
|
heap
|
page read and write
|
||
37CB000
|
trusted library allocation
|
page read and write
|
||
2C37000
|
trusted library allocation
|
page read and write
|
||
1E347018000
|
heap
|
page read and write
|
||
132B000
|
heap
|
page read and write
|
||
10AC000
|
heap
|
page read and write
|
||
272186D7000
|
heap
|
page read and write
|
||
27218648000
|
heap
|
page read and write
|
||
26DA000
|
heap
|
page read and write
|
||
F13000
|
heap
|
page read and write
|
||
2D7B000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
6D24A000
|
unkown
|
page readonly
|
||
276D000
|
heap
|
page read and write
|
||
3763000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
1E349200000
|
heap
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
10D1000
|
heap
|
page read and write
|
||
37F0000
|
heap
|
page read and write
|
||
128E000
|
stack
|
page read and write
|
||
1E3470FA000
|
heap
|
page read and write
|
||
25D0FB5B000
|
heap
|
page read and write
|
||
8BB000
|
heap
|
page read and write
|
||
57E000
|
stack
|
page read and write
|
||
2721865B000
|
heap
|
page read and write
|
||
2C99000
|
trusted library allocation
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
1CB8F56E000
|
heap
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
2A85000
|
trusted library allocation
|
page read and write
|
||
2ED5000
|
trusted library allocation
|
page read and write
|
||
27218B6E000
|
heap
|
page read and write
|
||
1CB8F5DF000
|
heap
|
page read and write
|
||
1CB8F5D2000
|
heap
|
page read and write
|
||
2F01000
|
heap
|
page read and write
|
||
35EC000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
1379000
|
heap
|
page read and write
|
||
1E348F0B000
|
heap
|
page read and write
|
||
138A000
|
heap
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
8CB000
|
heap
|
page read and write
|
||
37C5000
|
trusted library allocation
|
page read and write
|
||
BEE000
|
stack
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
2B3C000
|
stack
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
C61000
|
unkown
|
page execute read
|
||
25D0FBF5000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
340E000
|
trusted library allocation
|
page read and write
|
||
10A5000
|
heap
|
page read and write
|
||
27218B52000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
2100000
|
heap
|
page read and write
|
||
259E000
|
stack
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
ED2000
|
heap
|
page read and write
|
||
6CEC1000
|
unkown
|
page execute read
|
||
10A9000
|
heap
|
page read and write
|
||
137C000
|
heap
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
F18000
|
heap
|
page read and write
|
||
135F000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
27218A71000
|
heap
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
27218ACF000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
A8F000
|
stack
|
page read and write
|
||
895000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
36E8000
|
trusted library allocation
|
page read and write
|
||
10B1000
|
heap
|
page read and write
|
||
2721867A000
|
heap
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
1E34710A000
|
heap
|
page read and write
|
||
135C000
|
heap
|
page read and write
|
||
13A9000
|
heap
|
page read and write
|
||
25D0FA1D000
|
heap
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
25D0FA48000
|
heap
|
page read and write
|
||
1E348EC8000
|
heap
|
page read and write
|
||
427F000
|
stack
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
2D78000
|
trusted library allocation
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
38FE000
|
stack
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
1E348F1E000
|
heap
|
page read and write
|
||
1CB8D799000
|
heap
|
page read and write
|
||
2C96000
|
trusted library allocation
|
page read and write
|
||
25D0FA5B000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
135F000
|
heap
|
page read and write
|
||
2D75000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
36D0000
|
heap
|
page read and write
|
||
2C3F000
|
trusted library allocation
|
page read and write
|
||
340D000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
3761000
|
trusted library allocation
|
page read and write
|
||
269F000
|
stack
|
page read and write
|
||
3221000
|
heap
|
page read and write
|
||
804000
|
heap
|
page read and write
|
||
1CB8D79B000
|
heap
|
page read and write
|
||
8C3000
|
heap
|
page read and write
|
||
3222000
|
heap
|
page read and write
|
||
1374000
|
heap
|
page read and write
|
||
2D7E000
|
trusted library allocation
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
2721865F000
|
heap
|
page read and write
|
||
1377000
|
heap
|
page read and write
|
||
10A9000
|
heap
|
page read and write
|
||
2A87000
|
trusted library allocation
|
page read and write
|
||
2CE5000
|
trusted library allocation
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
1374000
|
heap
|
page read and write
|
||
2F0A000
|
trusted library allocation
|
page read and write
|
||
2D79000
|
trusted library allocation
|
page read and write
|
||
29A0000
|
heap
|
page read and write
|
||
7FF644B93000
|
unkown
|
page readonly
|
||
27218665000
|
heap
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
1CB8D790000
|
heap
|
page read and write
|
||
734000
|
heap
|
page read and write
|
||
C60000
|
unkown
|
page readonly
|
||
1378000
|
heap
|
page read and write
|
||
1CB8F5F9000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page write copy
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
2D7A000
|
trusted library allocation
|
page read and write
|
||
1E348F52000
|
heap
|
page read and write
|
||
8C3000
|
heap
|
page read and write
|
||
1CB8F590000
|
heap
|
page read and write
|
||
10EC000
|
heap
|
page read and write
|
||
3760000
|
trusted library allocation
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
25D0FA28000
|
heap
|
page read and write
|
||
25D0FA4C000
|
heap
|
page read and write
|
||
1118000
|
heap
|
page read and write
|
||
25D0FB69000
|
heap
|
page read and write
|
||
25D0FA52000
|
heap
|
page read and write
|
||
438000
|
unkown
|
page readonly
|
||
490000
|
heap
|
page read and write
|
||
138A000
|
heap
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
7AC000
|
heap
|
page read and write
|
||
27218C46000
|
heap
|
page read and write
|
||
1CB8F549000
|
heap
|
page read and write
|
||
1381000
|
heap
|
page read and write
|
||
37C7000
|
trusted library allocation
|
page read and write
|
||
27218B1D000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2C51000
|
heap
|
page read and write
|
||
3403000
|
trusted library allocation
|
page read and write
|
||
1E348F6E000
|
heap
|
page read and write
|
||
27218C47000
|
heap
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
10CC000
|
heap
|
page read and write
|
||
EEA000
|
heap
|
page read and write
|
||
10EC000
|
heap
|
page read and write
|
||
2AFE000
|
stack
|
page read and write
|
||
36FE000
|
stack
|
page read and write
|
||
37C5000
|
trusted library allocation
|
page read and write
|
||
110E000
|
heap
|
page read and write
|
||
3538000
|
trusted library allocation
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
8CC000
|
heap
|
page read and write
|
||
1E34710D000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
3478000
|
trusted library allocation
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
351E000
|
stack
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
25D0FA3B000
|
heap
|
page read and write
|
||
2550000
|
heap
|
page read and write
|
||
10C1000
|
heap
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
3554000
|
trusted library allocation
|
page read and write
|
||
1E348A43000
|
heap
|
page read and write
|
||
8C9000
|
heap
|
page read and write
|
||
25D0FB79000
|
heap
|
page read and write
|
||
3550000
|
trusted library allocation
|
page read and write
|
||
25D0F9FF000
|
heap
|
page read and write
|
||
135C000
|
heap
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
10A9000
|
heap
|
page read and write
|
||
35E1000
|
trusted library allocation
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
8B2000
|
heap
|
page read and write
|
||
35E8000
|
trusted library allocation
|
page read and write
|
||
C43D275000
|
stack
|
page read and write
|
||
37C8000
|
trusted library allocation
|
page read and write
|
||
2C51000
|
heap
|
page read and write
|
||
2CF7000
|
trusted library allocation
|
page read and write
|
||
133E000
|
heap
|
page read and write
|
||
25D0FA5B000
|
heap
|
page read and write
|
||
1112000
|
heap
|
page read and write
|
||
1CB8D785000
|
heap
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
2E35000
|
trusted library allocation
|
page read and write
|
||
2CFA000
|
trusted library allocation
|
page read and write
|
||
2C56000
|
heap
|
page read and write
|
||
1CB8F900000
|
heap
|
page read and write
|
||
25C2000
|
heap
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
37DB000
|
trusted library allocation
|
page read and write
|
||
10E6000
|
heap
|
page read and write
|
||
8B3000
|
heap
|
page read and write
|
||
403C000
|
stack
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
3590000
|
heap
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
25D0FA3A000
|
heap
|
page read and write
|
||
2550000
|
trusted library allocation
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
F2C000
|
heap
|
page read and write
|
||
1CB8F5F9000
|
heap
|
page read and write
|
||
2B6E000
|
trusted library allocation
|
page read and write
|
||
37D6000
|
trusted library allocation
|
page read and write
|
||
10B9000
|
heap
|
page read and write
|
||
8CB000
|
heap
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
10F3000
|
heap
|
page read and write
|
||
37D7000
|
trusted library allocation
|
page read and write
|
||
ED2000
|
heap
|
page read and write
|
||
37CA000
|
trusted library allocation
|
page read and write
|
||
1102000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
1102000
|
heap
|
page read and write
|
||
1E348EE5000
|
heap
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
AA03298000
|
stack
|
page read and write
|
||
1CB8F5B5000
|
heap
|
page read and write
|
||
72C000
|
heap
|
page read and write
|
||
EFB000
|
heap
|
page read and write
|
||
6D190000
|
unkown
|
page readonly
|
||
4E0000
|
heap
|
page read and write
|
||
6DA000
|
heap
|
page read and write
|
||
2CE6000
|
trusted library allocation
|
page read and write
|
||
2F0F000
|
heap
|
page read and write
|
||
1112000
|
heap
|
page read and write
|
||
2D75000
|
trusted library allocation
|
page read and write
|
||
1118000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
EA8000
|
heap
|
page read and write
|
||
10D9000
|
heap
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
ED2000
|
heap
|
page read and write
|
||
2560000
|
heap
|
page read and write
|
||
6D23F000
|
unkown
|
page write copy
|
||
7C5000
|
heap
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
1369000
|
heap
|
page read and write
|
||
EED000
|
heap
|
page read and write
|
||
25D0FA48000
|
heap
|
page read and write
|
||
135C000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
25D0FA3B000
|
heap
|
page read and write
|
||
10FA000
|
heap
|
page read and write
|
||
3773000
|
trusted library allocation
|
page read and write
|
||
2CF5000
|
trusted library allocation
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
1374000
|
heap
|
page read and write
|
||
1E346F80000
|
heap
|
page read and write
|
||
27218B54000
|
heap
|
page read and write
|
||
377E000
|
trusted library allocation
|
page read and write
|
||
3751000
|
trusted library allocation
|
page read and write
|
||
8B3000
|
heap
|
page read and write
|
||
25D0FA28000
|
heap
|
page read and write
|
||
E46000
|
heap
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
1E348EE5000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
36EE000
|
trusted library allocation
|
page read and write
|
||
1E347046000
|
heap
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
8B3000
|
heap
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
27218B44000
|
heap
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
2590000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page read and write
|
||
8BB000
|
heap
|
page read and write
|
||
112F000
|
heap
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
3580000
|
heap
|
page read and write
|
||
3404000
|
trusted library allocation
|
page read and write
|
||
1118000
|
heap
|
page read and write
|
||
27218656000
|
heap
|
page read and write
|
||
8B2000
|
heap
|
page read and write
|
||
2D7A000
|
trusted library allocation
|
page read and write
|
||
1376000
|
heap
|
page read and write
|
||
25D0FA14000
|
heap
|
page read and write
|
||
27218665000
|
heap
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
27218661000
|
heap
|
page read and write
|
||
27218C27000
|
heap
|
page read and write
|
||
2B66000
|
trusted library allocation
|
page read and write
|
||
1046000
|
heap
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
27218C27000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
EA8000
|
heap
|
page read and write
|
||
2D84000
|
trusted library allocation
|
page read and write
|
||
F39000
|
heap
|
page read and write
|
||
CF7000
|
stack
|
page read and write
|
||
6CEE1000
|
unkown
|
page readonly
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
1CB8D8B0000
|
heap
|
page read and write
|
||
3777000
|
trusted library allocation
|
page read and write
|
||
3557000
|
trusted library allocation
|
page read and write
|
||
27218B6B000
|
heap
|
page read and write
|
||
1364000
|
heap
|
page read and write
|
||
25D0FA1B000
|
heap
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
434000
|
unkown
|
page read and write
|
||
2CE2000
|
trusted library allocation
|
page read and write
|
||
DC000
|
stack
|
page read and write
|
||
27218AC1000
|
heap
|
page read and write
|
||
1E348F1F000
|
heap
|
page read and write
|
||
F23000
|
heap
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
10EF000
|
heap
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
7B6000
|
heap
|
page read and write
|
||
27218656000
|
heap
|
page read and write
|
||
3313000
|
trusted library allocation
|
page read and write
|
||
7FFB37E000
|
stack
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
13CA000
|
heap
|
page read and write
|
||
329E000
|
stack
|
page read and write
|
||
8CD000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
3731000
|
heap
|
page read and write
|
||
2C20000
|
heap
|
page read and write
|
||
1E348F14000
|
heap
|
page read and write
|
||
1CB8F574000
|
heap
|
page read and write
|
||
F18000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
138A000
|
heap
|
page read and write
|
||
137A000
|
heap
|
page read and write
|
||
1381000
|
heap
|
page read and write
|
||
8C7000
|
heap
|
page read and write
|
||
347A000
|
trusted library allocation
|
page read and write
|
||
2D71000
|
trusted library allocation
|
page read and write
|
||
27218B44000
|
heap
|
page read and write
|
||
7FF644BA8000
|
unkown
|
page readonly
|
||
25D0FA49000
|
heap
|
page read and write
|
||
3558000
|
trusted library allocation
|
page read and write
|
||
353B000
|
trusted library allocation
|
page read and write
|
||
3810000
|
trusted library allocation
|
page read and write
|
||
2D69000
|
heap
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
1E348F5F000
|
heap
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
E82000
|
heap
|
page read and write
|
||
1CB8D79E000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
2D85000
|
trusted library allocation
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
2ED6000
|
trusted library allocation
|
page read and write
|
||
2C51000
|
heap
|
page read and write
|
||
347B000
|
trusted library allocation
|
page read and write
|
||
2A89000
|
trusted library allocation
|
page read and write
|
||
37C0000
|
heap
|
page read and write
|
||
3808000
|
trusted library allocation
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
27218AFD000
|
heap
|
page read and write
|
||
1CB8D797000
|
heap
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
10AF000
|
heap
|
page read and write
|
||
25D0FA52000
|
heap
|
page read and write
|
||
2F02000
|
trusted library allocation
|
page read and write
|
||
3475000
|
trusted library allocation
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
3747000
|
trusted library allocation
|
page read and write
|
||
653000
|
heap
|
page read and write
|
||
3741000
|
trusted library allocation
|
page read and write
|
||
27218B3C000
|
heap
|
page read and write
|
||
F09000
|
heap
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
25D0FAF0000
|
heap
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
728000
|
heap
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
1000000
|
unkown
|
page readonly
|
||
10F5000
|
heap
|
page read and write
|
||
136F000
|
heap
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
136D000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
5F5000
|
heap
|
page read and write
|
||
1E348ECC000
|
heap
|
page read and write
|
||
27218661000
|
heap
|
page read and write
|
||
27218560000
|
heap
|
page read and write
|
||
2721865B000
|
heap
|
page read and write
|
||
1E348EA9000
|
heap
|
page read and write
|
||
355A000
|
trusted library allocation
|
page read and write
|
||
6D190000
|
unkown
|
page readonly
|
||
913000
|
heap
|
page read and write
|
||
37C1000
|
trusted library allocation
|
page read and write
|
||
68E000
|
stack
|
page read and write
|
||
2520000
|
trusted library allocation
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
8C5000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
42B000
|
unkown
|
page read and write
|
||
27218651000
|
heap
|
page read and write
|
||
135C000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
25B0000
|
heap
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
2CC2000
|
trusted library allocation
|
page read and write
|
||
27218C91000
|
heap
|
page read and write
|
||
27218B44000
|
heap
|
page read and write
|
||
EFD000
|
heap
|
page read and write
|
||
10D6000
|
heap
|
page read and write
|
||
33CE000
|
stack
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
3551000
|
trusted library allocation
|
page read and write
|
||
37DE000
|
trusted library allocation
|
page read and write
|
||
8C7000
|
heap
|
page read and write
|
||
138A000
|
heap
|
page read and write
|
||
27218691000
|
heap
|
page read and write
|
||
2C32000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
2D74000
|
trusted library allocation
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
211F000
|
stack
|
page read and write
|
||
1E347030000
|
heap
|
page read and write
|
||
3312000
|
trusted library allocation
|
page read and write
|
||
25D0FA4A000
|
heap
|
page read and write
|
||
25D0FA3A000
|
heap
|
page read and write
|
||
2721865B000
|
heap
|
page read and write
|
||
2ED9000
|
heap
|
page read and write
|
||
272186D3000
|
heap
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
ECE000
|
heap
|
page read and write
|
||
1E3470F9000
|
heap
|
page read and write
|
||
3731000
|
heap
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
1E347049000
|
heap
|
page read and write
|
||
1E34705D000
|
heap
|
page read and write
|
||
2D79000
|
trusted library allocation
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
2D89000
|
trusted library allocation
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
8D8000
|
heap
|
page read and write
|
||
2721872E000
|
heap
|
page read and write
|
||
3779000
|
trusted library allocation
|
page read and write
|
||
377C000
|
trusted library allocation
|
page read and write
|
||
1CB8F5BA000
|
heap
|
page read and write
|
||
10A5000
|
heap
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
136D000
|
heap
|
page read and write
|
||
10EC000
|
heap
|
page read and write
|
||
8D8000
|
heap
|
page read and write
|
||
2E34000
|
trusted library allocation
|
page read and write
|
||
112F000
|
heap
|
page read and write
|
||
26E0000
|
direct allocation
|
page read and write
|
||
21A5000
|
heap
|
page read and write
|
||
272186B9000
|
heap
|
page read and write
|
||
2B60000
|
trusted library allocation
|
page read and write
|
||
5AE000
|
stack
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
1CB8F5F9000
|
heap
|
page read and write
|
||
355F000
|
trusted library allocation
|
page read and write
|
||
3771000
|
trusted library allocation
|
page read and write
|
||
27218B44000
|
heap
|
page read and write
|
||
25D0FA2C000
|
heap
|
page read and write
|
||
E4C000
|
heap
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
283D000
|
heap
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
10C3000
|
heap
|
page read and write
|
||
25D0FA3A000
|
heap
|
page read and write
|
||
27218C48000
|
heap
|
page read and write
|
||
180000
|
unkown
|
page readonly
|
||
2C58000
|
heap
|
page read and write
|
||
25D0FA2C000
|
heap
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
27218B5A000
|
heap
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
27218B44000
|
heap
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
8B3000
|
heap
|
page read and write
|
||
10F2000
|
heap
|
page read and write
|
||
27218665000
|
heap
|
page read and write
|
||
25D0FA5B000
|
heap
|
page read and write
|
||
37C6000
|
trusted library allocation
|
page read and write
|
||
13A2000
|
heap
|
page read and write
|
||
2D73000
|
trusted library allocation
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
25D0FA1B000
|
heap
|
page read and write
|
||
1112000
|
heap
|
page read and write
|
||
1E348EF4000
|
heap
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
2D79000
|
trusted library allocation
|
page read and write
|
||
25D0FA3F000
|
heap
|
page read and write
|
||
1108000
|
heap
|
page read and write
|
||
25D0F890000
|
heap
|
page read and write
|
||
3767000
|
trusted library allocation
|
page read and write
|
||
8C7000
|
heap
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
2C65000
|
heap
|
page read and write
|
||
EE9000
|
heap
|
page read and write
|
||
27218650000
|
heap
|
page read and write
|
||
D7B000
|
stack
|
page read and write
|
||
8BB000
|
heap
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
E73000
|
heap
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
2CC8000
|
trusted library allocation
|
page read and write
|
||
3520000
|
heap
|
page read and write
|
||
10DD000
|
heap
|
page read and write
|
||
2CF3000
|
trusted library allocation
|
page read and write
|
||
8C3000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
8C3000
|
heap
|
page read and write
|
||
1E348EF5000
|
heap
|
page read and write
|
||
2CCF000
|
trusted library allocation
|
page read and write
|
||
2CF1000
|
trusted library allocation
|
page read and write
|
||
2C9B000
|
trusted library allocation
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
3540000
|
heap
|
page read and write
|
||
1CB8F520000
|
heap
|
page read and write
|
||
6CB000
|
heap
|
page read and write
|
||
7FFB3FF000
|
stack
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
EC4000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2D78000
|
trusted library allocation
|
page read and write
|
||
37C9000
|
trusted library allocation
|
page read and write
|
||
25D0FB74000
|
heap
|
page read and write
|
||
1E34920C000
|
heap
|
page read and write
|
||
25D0FB4C000
|
heap
|
page read and write
|
||
1CB8F561000
|
heap
|
page read and write
|
||
36ED000
|
trusted library allocation
|
page read and write
|
||
7FF710751000
|
unkown
|
page execute read
|
||
8B2000
|
heap
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
3743000
|
trusted library allocation
|
page read and write
|
||
25A0000
|
heap
|
page read and write
|
||
7FF7107D1000
|
unkown
|
page read and write
|
||
26E0000
|
heap
|
page read and write
|
||
340A000
|
trusted library allocation
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
1102000
|
heap
|
page read and write
|
||
F799275000
|
stack
|
page read and write
|
||
2A8A000
|
trusted library allocation
|
page read and write
|
||
F3A000
|
heap
|
page read and write
|
||
F09000
|
heap
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
42B000
|
unkown
|
page read and write
|
||
1CB8F5E9000
|
heap
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
2E39000
|
trusted library allocation
|
page read and write
|
||
ED2000
|
heap
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
353C000
|
trusted library allocation
|
page read and write
|
||
2721864A000
|
heap
|
page read and write
|
||
3748000
|
trusted library allocation
|
page read and write
|
||
27218B3C000
|
heap
|
page read and write
|
||
ECE000
|
heap
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
10B9000
|
heap
|
page read and write
|
||
EB2000
|
heap
|
page read and write
|
||
7FFB278000
|
stack
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
37C7000
|
trusted library allocation
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
2C95000
|
trusted library allocation
|
page read and write
|
||
5CC000
|
stack
|
page read and write
|
||
1E348F1F000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3778000
|
trusted library allocation
|
page read and write
|
||
2D73000
|
trusted library allocation
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
2B70000
|
heap
|
page read and write
|
||
3537000
|
trusted library allocation
|
page read and write
|
||
1000000
|
unkown
|
page readonly
|
||
110B000
|
heap
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
2CEA000
|
trusted library allocation
|
page read and write
|
||
8B3000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
621000
|
heap
|
page read and write
|
||
380C000
|
trusted library allocation
|
page read and write
|
||
8B3000
|
heap
|
page read and write
|
||
1374000
|
heap
|
page read and write
|
||
2A81000
|
trusted library allocation
|
page read and write
|
||
1002000
|
unkown
|
page execute read
|
||
25D0FB40000
|
heap
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
355B000
|
trusted library allocation
|
page read and write
|
||
25D0FA27000
|
heap
|
page read and write
|
||
1E348F54000
|
heap
|
page read and write
|
||
2A8D000
|
trusted library allocation
|
page read and write
|
||
3530000
|
heap
|
page read and write
|
||
2ED7000
|
trusted library allocation
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
355E000
|
trusted library allocation
|
page read and write
|
||
8D8000
|
heap
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
3807000
|
trusted library allocation
|
page read and write
|
||
136D000
|
heap
|
page read and write
|
||
1E348F4C000
|
heap
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
27218B00000
|
heap
|
page read and write
|
||
F7992FE000
|
stack
|
page read and write
|
||
2520000
|
trusted library allocation
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
7FF644B11000
|
unkown
|
page execute read
|
||
36E1000
|
trusted library allocation
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
1CB8F5F3000
|
heap
|
page read and write
|
||
EAC000
|
heap
|
page read and write
|
||
25D0FA32000
|
heap
|
page read and write
|
||
2D0D000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
25D104F1000
|
heap
|
page read and write
|
||
3535000
|
trusted library allocation
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
916000
|
heap
|
page read and write
|
||
1102000
|
heap
|
page read and write
|
||
1CB8F5D5000
|
heap
|
page read and write
|
||
25D0FB5C000
|
heap
|
page read and write
|
||
10A5000
|
heap
|
page read and write
|
||
1002000
|
unkown
|
page execute read
|
||
3190000
|
heap
|
page read and write
|
||
1000000
|
unkown
|
page readonly
|
||
3590000
|
heap
|
page read and write
|
||
F09000
|
heap
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
409000
|
unkown
|
page read and write
|
||
2D7E000
|
trusted library allocation
|
page read and write
|
||
2570000
|
heap
|
page read and write
|
||
1CB8F565000
|
heap
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
ED7000
|
heap
|
page read and write
|
||
10A9000
|
heap
|
page read and write
|
||
ED4000
|
heap
|
page read and write
|
||
2D70000
|
trusted library allocation
|
page read and write
|
||
111E000
|
heap
|
page read and write
|
||
8C3000
|
heap
|
page read and write
|
||
ECC000
|
heap
|
page read and write
|
||
1E347040000
|
heap
|
page read and write
|
||
100C000
|
unkown
|
page read and write
|
||
25D0FA24000
|
heap
|
page read and write
|
||
1E348F72000
|
heap
|
page read and write
|
||
27218C27000
|
heap
|
page read and write
|
||
136D000
|
heap
|
page read and write
|
||
111E000
|
heap
|
page read and write
|
||
27218ADE000
|
heap
|
page read and write
|
||
3710000
|
heap
|
page read and write
|
||
27218AC9000
|
heap
|
page read and write
|
||
25D0FB67000
|
heap
|
page read and write
|
||
8E6000
|
heap
|
page read and write
|
||
3317000
|
trusted library allocation
|
page read and write
|
||
3760000
|
heap
|
page read and write
|
||
1E34710D000
|
heap
|
page read and write
|
||
27218C47000
|
heap
|
page read and write
|
||
35E7000
|
trusted library allocation
|
page read and write
|
||
6D23E000
|
unkown
|
page read and write
|
||
376A000
|
trusted library allocation
|
page read and write
|
||
25D0FA46000
|
heap
|
page read and write
|
||
27218B3C000
|
heap
|
page read and write
|
||
C61000
|
unkown
|
page execute read
|
||
110B000
|
heap
|
page read and write
|
||
1E348F44000
|
heap
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
ED7000
|
heap
|
page read and write
|
||
27218AC9000
|
heap
|
page read and write
|
||
27218AE8000
|
heap
|
page read and write
|
||
1CB8D792000
|
heap
|
page read and write
|
||
25D0FB77000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
EBC000
|
heap
|
page read and write
|
||
272186CB000
|
heap
|
page read and write
|
||
25D0FA28000
|
heap
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
ECE000
|
heap
|
page read and write
|
||
3730000
|
heap
|
page read and write
|
||
25D0FB62000
|
heap
|
page read and write
|
||
10B9000
|
heap
|
page read and write
|
||
1E34704E000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
2E3A000
|
trusted library allocation
|
page read and write
|
||
25D0FA52000
|
heap
|
page read and write
|
||
136D000
|
heap
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page read and write
|
||
2D7D000
|
trusted library allocation
|
page read and write
|
||
25D0FA5B000
|
heap
|
page read and write
|
||
1CB8F601000
|
heap
|
page read and write
|
||
7FF7107D3000
|
unkown
|
page readonly
|
||
2721867A000
|
heap
|
page read and write
|
||
1C4000
|
heap
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
112F000
|
heap
|
page read and write
|
||
18A000
|
unkown
|
page readonly
|
||
27218AE9000
|
heap
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
112F000
|
heap
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
C43D37E000
|
stack
|
page read and write
|
||
10E5000
|
heap
|
page read and write
|
||
2B68000
|
trusted library allocation
|
page read and write
|
||
54D000
|
stack
|
page read and write
|
||
27218AFB000
|
heap
|
page read and write
|
||
27218ACB000
|
heap
|
page read and write
|
||
F13000
|
heap
|
page read and write
|
||
6D23F000
|
unkown
|
page write copy
|
||
1381000
|
heap
|
page read and write
|
||
181000
|
unkown
|
page execute read
|
||
2CE0000
|
trusted library allocation
|
page read and write
|
||
1382000
|
heap
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
139A000
|
heap
|
page read and write
|
||
10B9000
|
heap
|
page read and write
|
||
27218650000
|
heap
|
page read and write
|
||
272186A1000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
8D8000
|
heap
|
page read and write
|
||
1CB8F5DD000
|
heap
|
page read and write
|
||
37D1000
|
trusted library allocation
|
page read and write
|
||
2F07000
|
trusted library allocation
|
page read and write
|
||
3775000
|
trusted library allocation
|
page read and write
|
||
25D0FA3C000
|
heap
|
page read and write
|
||
1EF000
|
stack
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
27218680000
|
heap
|
page read and write
|
||
137D000
|
heap
|
page read and write
|
||
2F09000
|
heap
|
page read and write
|
||
1379000
|
heap
|
page read and write
|
||
27218B6D000
|
heap
|
page read and write
|
||
3400000
|
trusted library allocation
|
page read and write
|
||
2D72000
|
trusted library allocation
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
8D8000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
1174000
|
heap
|
page read and write
|
||
27218B3F000
|
heap
|
page read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
EAC000
|
heap
|
page read and write
|
||
2D76000
|
trusted library allocation
|
page read and write
|
||
25D0FA4C000
|
heap
|
page read and write
|
||
EF8000
|
heap
|
page read and write
|
||
1CB8D6A7000
|
heap
|
page read and write
|
||
1E346FF5000
|
heap
|
page read and write
|
||
1CB8F5C1000
|
heap
|
page read and write
|
||
27218AC7000
|
heap
|
page read and write
|
||
3532000
|
trusted library allocation
|
page read and write
|
||
135C000
|
heap
|
page read and write
|
||
110E000
|
heap
|
page read and write
|
||
1E348F72000
|
heap
|
page read and write
|
||
EE5000
|
heap
|
page read and write
|
||
25D0FA2B000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
1E348F72000
|
heap
|
page read and write
|
||
3744000
|
trusted library allocation
|
page read and write
|
||
27218A70000
|
heap
|
page read and write
|
||
25D0FA24000
|
heap
|
page read and write
|
||
2D75000
|
trusted library allocation
|
page read and write
|
||
3766000
|
trusted library allocation
|
page read and write
|
||
25D0FA5B000
|
heap
|
page read and write
|
||
2C9D000
|
trusted library allocation
|
page read and write
|
||
1CB8F5E9000
|
heap
|
page read and write
|
||
128F000
|
stack
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
36E7000
|
trusted library allocation
|
page read and write
|
||
25D0FA24000
|
heap
|
page read and write
|
||
2C3C000
|
trusted library allocation
|
page read and write
|
||
27218661000
|
heap
|
page read and write
|
||
8B9000
|
heap
|
page read and write
|
||
112F000
|
heap
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
35AD000
|
trusted library allocation
|
page read and write
|
||
1E347109000
|
heap
|
page read and write
|
||
1E348F6E000
|
heap
|
page read and write
|
||
1CB8D680000
|
heap
|
page read and write
|
||
36E0000
|
trusted library allocation
|
page read and write
|
||
8D8000
|
heap
|
page read and write
|
||
1E348F5E000
|
heap
|
page read and write
|
||
4E5000
|
heap
|
page read and write
|
||
107F000
|
heap
|
page read and write
|
||
110E000
|
heap
|
page read and write
|
||
101E000
|
unkown
|
page readonly
|
||
10B9000
|
heap
|
page read and write
|
||
2D74000
|
trusted library allocation
|
page read and write
|
||
3806000
|
trusted library allocation
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
1102000
|
heap
|
page read and write
|
||
2D70000
|
trusted library allocation
|
page read and write
|
||
F09000
|
heap
|
page read and write
|
||
3765000
|
trusted library allocation
|
page read and write
|
||
2F04000
|
trusted library allocation
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
272185B5000
|
heap
|
page read and write
|
||
2C53000
|
heap
|
page read and write
|
||
4CB000
|
stack
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
25C1000
|
heap
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
2721866B000
|
heap
|
page read and write
|
||
30BC000
|
stack
|
page read and write
|
||
1386000
|
heap
|
page read and write
|
||
1389000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
35EE000
|
trusted library allocation
|
page read and write
|
||
25D0FA28000
|
heap
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
7FF710750000
|
unkown
|
page readonly
|
||
111E000
|
heap
|
page read and write
|
||
1E348EF2000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
27218ACB000
|
heap
|
page read and write
|
||
25D0FAA1000
|
heap
|
page read and write
|
||
27218B52000
|
heap
|
page read and write
|
||
3474000
|
trusted library allocation
|
page read and write
|
||
2D70000
|
trusted library allocation
|
page read and write
|
||
25D0FA12000
|
heap
|
page read and write
|
||
2C9C000
|
trusted library allocation
|
page read and write
|
||
1E348F54000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
1112000
|
heap
|
page read and write
|
||
13C5000
|
heap
|
page read and write
|
||
2ED2000
|
trusted library allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
2570000
|
heap
|
page read and write
|
||
2E3C000
|
trusted library allocation
|
page read and write
|
||
10CD000
|
heap
|
page read and write
|
||
ED2000
|
heap
|
page read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
3407000
|
trusted library allocation
|
page read and write
|
||
EA8000
|
heap
|
page read and write
|
||
3801000
|
trusted library allocation
|
page read and write
|
||
EBF000
|
heap
|
page read and write
|
||
8CA000
|
heap
|
page read and write
|
||
25D0FAA1000
|
heap
|
page read and write
|
||
F23000
|
heap
|
page read and write
|
||
1CB8F571000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
2CE8000
|
trusted library allocation
|
page read and write
|
||
7FF7107D1000
|
unkown
|
page write copy
|
||
10F4000
|
heap
|
page read and write
|
||
2C3E000
|
trusted library allocation
|
page read and write
|
||
10F2000
|
heap
|
page read and write
|
||
25D0FA37000
|
heap
|
page read and write
|
||
2CFB000
|
trusted library allocation
|
page read and write
|
||
1CB8F5E9000
|
heap
|
page read and write
|
||
2D77000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
8B2000
|
heap
|
page read and write
|
||
25D0FA3B000
|
heap
|
page read and write
|
||
43BF000
|
stack
|
page read and write
|
||
2C30000
|
trusted library allocation
|
page read and write
|
||
1E348F54000
|
heap
|
page read and write
|
||
C68000
|
unkown
|
page read and write
|
||
374D000
|
trusted library allocation
|
page read and write
|
||
AA0339E000
|
stack
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
37C0000
|
trusted library allocation
|
page read and write
|
||
35A0000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
25D0FA1F000
|
heap
|
page read and write
|
||
2F0C000
|
trusted library allocation
|
page read and write
|
||
2D7C000
|
trusted library allocation
|
page read and write
|
||
2580000
|
trusted library allocation
|
page read and write
|
||
1112000
|
heap
|
page read and write
|
||
3552000
|
trusted library allocation
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
2A88000
|
trusted library allocation
|
page read and write
|
||
130F000
|
stack
|
page read and write
|
||
36E5000
|
trusted library allocation
|
page read and write
|
||
78C000
|
heap
|
page read and write
|
||
25D0FB45000
|
heap
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
C68000
|
unkown
|
page write copy
|
||
27218B3C000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
37D5000
|
trusted library allocation
|
page read and write
|
||
25D0FA87000
|
heap
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
1102000
|
heap
|
page read and write
|
||
1174000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
10C3000
|
heap
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
27218AFD000
|
heap
|
page read and write
|
||
1E348ED1000
|
heap
|
page read and write
|
||
1382000
|
heap
|
page read and write
|
||
2721865B000
|
heap
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
717000
|
heap
|
page read and write
|
||
2D70000
|
trusted library allocation
|
page read and write
|
||
2D81000
|
trusted library allocation
|
page read and write
|
||
2D76000
|
trusted library allocation
|
page read and write
|
||
1E348F5C000
|
heap
|
page read and write
|
||
F2C000
|
heap
|
page read and write
|
||
27218B3C000
|
heap
|
page read and write
|
||
EC7000
|
heap
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
1E348E80000
|
heap
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
3730000
|
heap
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
37D3000
|
trusted library allocation
|
page read and write
|
||
EE5000
|
heap
|
page read and write
|
||
1361000
|
heap
|
page read and write
|
||
1CB8F5D2000
|
heap
|
page read and write
|
||
136B000
|
heap
|
page read and write
|
||
25D0FA46000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
1388000
|
heap
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
106C000
|
heap
|
page read and write
|
||
1CB8D78A000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
2CFC000
|
trusted library allocation
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
7FF7107E8000
|
unkown
|
page readonly
|
||
35E0000
|
trusted library allocation
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
37D8000
|
trusted library allocation
|
page read and write
|
||
2DBF000
|
stack
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
F3E000
|
heap
|
page read and write
|
||
2CF6000
|
trusted library allocation
|
page read and write
|
||
8C3000
|
heap
|
page read and write
|
||
2E52000
|
heap
|
page read and write
|
||
3460000
|
heap
|
page read and write
|
||
361F000
|
stack
|
page read and write
|
||
1E348F6A000
|
heap
|
page read and write
|
||
AE5000
|
heap
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
25D0FA09000
|
heap
|
page read and write
|
||
25D0FB4B000
|
heap
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
7FF644B10000
|
unkown
|
page readonly
|
||
50A000
|
stack
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
27218B44000
|
heap
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
377A000
|
trusted library allocation
|
page read and write
|
||
EEE000
|
heap
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
10EC000
|
heap
|
page read and write
|
||
8C3000
|
heap
|
page read and write
|
||
6D24A000
|
unkown
|
page readonly
|
||
2C9E000
|
trusted library allocation
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
70C000
|
heap
|
page read and write
|
||
ED2000
|
heap
|
page read and write
|
||
3774000
|
trusted library allocation
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
2B61000
|
trusted library allocation
|
page read and write
|
||
1CB8F593000
|
heap
|
page read and write
|
||
36E3000
|
trusted library allocation
|
page read and write
|
||
35AC000
|
trusted library allocation
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
27218637000
|
heap
|
page read and write
|
||
10C7000
|
heap
|
page read and write
|
||
25D0FA3A000
|
heap
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
25D0FA99000
|
heap
|
page read and write
|
||
1102000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
30C0000
|
heap
|
page read and write
|
||
2D7C000
|
trusted library allocation
|
page read and write
|
||
42C000
|
unkown
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
135F000
|
heap
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
2721872E000
|
heap
|
page read and write
|
||
27218650000
|
heap
|
page read and write
|
||
25D0FA5B000
|
heap
|
page read and write
|
||
26D0000
|
heap
|
page read and write
|
||
ECE000
|
heap
|
page read and write
|
||
180000
|
unkown
|
page readonly
|
||
112F000
|
heap
|
page read and write
|
||
8D6000
|
heap
|
page read and write
|
||
1E34BF70000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
25D0FB74000
|
heap
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
307D000
|
heap
|
page read and write
|
||
1E348F52000
|
heap
|
page read and write
|
||
2E40000
|
trusted library allocation
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
2C5B000
|
heap
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
1E348EF5000
|
heap
|
page read and write
|
||
1E348EF7000
|
heap
|
page read and write
|
||
8C7000
|
heap
|
page read and write
|
||
1CB8F58D000
|
heap
|
page read and write
|
||
35E5000
|
trusted library allocation
|
page read and write
|
||
409000
|
unkown
|
page write copy
|
||
2CD0000
|
heap
|
page read and write
|
||
2CCA000
|
trusted library allocation
|
page read and write
|
||
3401000
|
trusted library allocation
|
page read and write
|
||
10EC000
|
heap
|
page read and write
|
||
25D0FA85000
|
heap
|
page read and write
|
||
10E5000
|
heap
|
page read and write
|
||
1E348F57000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
2550000
|
heap
|
page read and write
|
||
27218AE9000
|
heap
|
page read and write
|
||
804000
|
heap
|
page read and write
|
||
25D0FBA1000
|
heap
|
page read and write
|
||
F26000
|
heap
|
page read and write
|
||
10AC000
|
heap
|
page read and write
|
||
25D0FA1B000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
27218B43000
|
heap
|
page read and write
|
||
25D0FB3F000
|
heap
|
page read and write
|
||
2C31000
|
trusted library allocation
|
page read and write
|
||
3310000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
3768000
|
trusted library allocation
|
page read and write
|
||
1CB8F5BA000
|
heap
|
page read and write
|
||
302E000
|
stack
|
page read and write
|
||
137A000
|
heap
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
353E000
|
trusted library allocation
|
page read and write
|
||
2E38000
|
trusted library allocation
|
page read and write
|
||
2D72000
|
trusted library allocation
|
page read and write
|
||
2F03000
|
trusted library allocation
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
10CF000
|
heap
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
2ED4000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
5FE000
|
stack
|
page read and write
|
||
2570000
|
heap
|
page read and write
|
||
1CB8F575000
|
heap
|
page read and write
|
||
2A84000
|
trusted library allocation
|
page read and write
|
||
35E4000
|
trusted library allocation
|
page read and write
|
||
25D0FB6D000
|
heap
|
page read and write
|
||
2ED1000
|
trusted library allocation
|
page read and write
|
||
37C3000
|
trusted library allocation
|
page read and write
|
||
F3E000
|
heap
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
3B7F000
|
stack
|
page read and write
|
||
2D82000
|
trusted library allocation
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
3870000
|
heap
|
page read and write
|
||
6D23E000
|
unkown
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
2430000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
8C3000
|
heap
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
49A000
|
heap
|
page read and write
|
||
2B7C000
|
stack
|
page read and write
|
||
10B9000
|
heap
|
page read and write
|
||
1E348F54000
|
heap
|
page read and write
|
||
2D74000
|
trusted library allocation
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
3726000
|
heap
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
27218B44000
|
heap
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
273F000
|
stack
|
page read and write
|
||
255D000
|
heap
|
page read and write
|
||
625000
|
heap
|
page read and write
|
||
112F000
|
heap
|
page read and write
|
||
1FAF000
|
stack
|
page read and write
|
||
1FB0000
|
heap
|
page read and write
|
||
1CB8D78C000
|
heap
|
page read and write
|
||
2B65000
|
trusted library allocation
|
page read and write
|
||
27218667000
|
heap
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
8C2000
|
heap
|
page read and write
|
||
136D000
|
heap
|
page read and write
|
||
6D246000
|
unkown
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
27218C27000
|
heap
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
434000
|
unkown
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
3536000
|
trusted library allocation
|
page read and write
|
||
101E000
|
unkown
|
page readonly
|
||
1E34BF7A000
|
heap
|
page read and write
|
||
1E349420000
|
heap
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
2F00000
|
trusted library allocation
|
page read and write
|
||
25D0FA48000
|
heap
|
page read and write
|
||
377F000
|
trusted library allocation
|
page read and write
|
||
7B6000
|
heap
|
page read and write
|
||
25D0FA1F000
|
heap
|
page read and write
|
||
3555000
|
trusted library allocation
|
page read and write
|
||
3FFE000
|
stack
|
page read and write
|
||
25D0FA45000
|
heap
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
10E1000
|
heap
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
2D71000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
380E000
|
trusted library allocation
|
page read and write
|
||
25D0FA9A000
|
heap
|
page read and write
|
||
3553000
|
trusted library allocation
|
page read and write
|
||
1002000
|
unkown
|
page execute read
|
||
6D191000
|
unkown
|
page execute read
|
||
EAC000
|
heap
|
page read and write
|
||
C43D2FD000
|
stack
|
page read and write
|
||
35A8000
|
trusted library allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
2721871B000
|
heap
|
page read and write
|
||
27218B3C000
|
heap
|
page read and write
|
||
2F09000
|
trusted library allocation
|
page read and write
|
||
731000
|
heap
|
page read and write
|
||
8BB000
|
heap
|
page read and write
|
||
1E348ECA000
|
heap
|
page read and write
|
||
10E5000
|
heap
|
page read and write
|
||
1CB8F572000
|
heap
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
2550000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
25D0FA1F000
|
heap
|
page read and write
|
||
1102000
|
heap
|
page read and write
|
||
2E3F000
|
trusted library allocation
|
page read and write
|
||
1CB8D78F000
|
heap
|
page read and write
|
||
ECE000
|
heap
|
page read and write
|
||
1E348EA9000
|
heap
|
page read and write
|
||
37C4000
|
trusted library allocation
|
page read and write
|
||
27218661000
|
heap
|
page read and write
|
||
EA8000
|
heap
|
page read and write
|
||
188000
|
unkown
|
page read and write
|
||
2721868E000
|
heap
|
page read and write
|
||
1112000
|
heap
|
page read and write
|
||
27218665000
|
heap
|
page read and write
|
||
6CEC0000
|
unkown
|
page readonly
|
||
27218ACE000
|
heap
|
page read and write
|
||
136B000
|
heap
|
page read and write
|
||
27218664000
|
heap
|
page read and write
|
||
ACA000
|
stack
|
page read and write
|
||
8C7000
|
heap
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
25D0FAA1000
|
heap
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
2B6B000
|
trusted library allocation
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
37C6000
|
trusted library allocation
|
page read and write
|
||
2D7A000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
2C91000
|
trusted library allocation
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
1CB8D78A000
|
heap
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
10DA000
|
heap
|
page read and write
|
||
1CB8F5D2000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
18A000
|
unkown
|
page readonly
|
||
584000
|
heap
|
page read and write
|
||
1E348F1D000
|
heap
|
page read and write
|
||
ED2000
|
heap
|
page read and write
|
||
25D0FA87000
|
heap
|
page read and write
|
||
376B000
|
trusted library allocation
|
page read and write
|
||
F26000
|
heap
|
page read and write
|
||
2B6F000
|
trusted library allocation
|
page read and write
|
||
3809000
|
trusted library allocation
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
3720000
|
heap
|
page read and write
|
||
1E348F6A000
|
heap
|
page read and write
|
||
13A3000
|
heap
|
page read and write
|
||
2C3B000
|
trusted library allocation
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
AA0367E000
|
stack
|
page read and write
|
||
112F000
|
heap
|
page read and write
|
||
10CB000
|
heap
|
page read and write
|
||
137A000
|
heap
|
page read and write
|
||
3520000
|
heap
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
27218B1B000
|
heap
|
page read and write
|
||
10A5000
|
heap
|
page read and write
|
||
EAC000
|
heap
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
3476000
|
trusted library allocation
|
page read and write
|
||
EB2000
|
heap
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
2C63000
|
heap
|
page read and write
|
||
138A000
|
heap
|
page read and write
|
||
1CB8F5F3000
|
heap
|
page read and write
|
||
2D7D000
|
trusted library allocation
|
page read and write
|
||
3318000
|
trusted library allocation
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
27218B6E000
|
heap
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
10E5000
|
heap
|
page read and write
|
||
4AE000
|
stack
|
page read and write
|
||
37C9000
|
trusted library allocation
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
35A5000
|
trusted library allocation
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
35E6000
|
trusted library allocation
|
page read and write
|
||
25D0F970000
|
heap
|
page read and write
|
||
25D0FA5B000
|
heap
|
page read and write
|
||
27218B3C000
|
heap
|
page read and write
|
||
10CC000
|
heap
|
page read and write
|
||
2A8B000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
F13000
|
heap
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
25D0FA5B000
|
heap
|
page read and write
|
||
3570000
|
heap
|
page read and write
|
||
2C65000
|
heap
|
page read and write
|
||
7FF7107E8000
|
unkown
|
page readonly
|
||
135C000
|
heap
|
page read and write
|
||
37B0000
|
heap
|
page read and write
|
||
272186A6000
|
heap
|
page read and write
|
||
35EA000
|
trusted library allocation
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
2E42000
|
trusted library allocation
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
F3A000
|
heap
|
page read and write
|
||
8CB000
|
heap
|
page read and write
|
||
F79937F000
|
stack
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
263F000
|
stack
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
112F000
|
heap
|
page read and write
|
||
31CA000
|
heap
|
page read and write
|
||
1CB8F5C2000
|
heap
|
page read and write
|
||
E6E000
|
heap
|
page read and write
|
||
1108000
|
heap
|
page read and write
|
||
EF8000
|
heap
|
page read and write
|
||
703000
|
heap
|
page read and write
|
||
1E348F72000
|
heap
|
page read and write
|
||
37CC000
|
trusted library allocation
|
page read and write
|
||
2E33000
|
trusted library allocation
|
page read and write
|
||
1E346FF0000
|
heap
|
page read and write
|
||
37B0000
|
heap
|
page read and write
|
||
12B0000
|
trusted library allocation
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
37C2000
|
trusted library allocation
|
page read and write
|
||
1CB8D660000
|
heap
|
page read and write
|
||
2F01000
|
trusted library allocation
|
page read and write
|
||
112F000
|
heap
|
page read and write
|
||
2F2C000
|
stack
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
12B0000
|
trusted library allocation
|
page read and write
|
||
1E348ECA000
|
heap
|
page read and write
|
||
2CC3000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
25C1000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
8DA000
|
heap
|
page read and write
|
||
25D0FA32000
|
heap
|
page read and write
|
||
2D87000
|
trusted library allocation
|
page read and write
|
||
EC6000
|
heap
|
page read and write
|
||
731000
|
heap
|
page read and write
|
||
2D77000
|
trusted library allocation
|
page read and write
|
||
1E348F4C000
|
heap
|
page read and write
|
||
AA036FF000
|
stack
|
page read and write
|
||
25D0FA4C000
|
heap
|
page read and write
|
||
27218665000
|
heap
|
page read and write
|
||
37CB000
|
trusted library allocation
|
page read and write
|
||
1000000
|
unkown
|
page readonly
|
||
2A82000
|
trusted library allocation
|
page read and write
|
||
1E348F4C000
|
heap
|
page read and write
|
||
27218B44000
|
heap
|
page read and write
|
||
796000
|
heap
|
page read and write
|
||
8CB000
|
heap
|
page read and write
|
||
107F000
|
heap
|
page read and write
|
||
136D000
|
heap
|
page read and write
|
||
322A000
|
heap
|
page read and write
|
||
1CB8F575000
|
heap
|
page read and write
|
||
2D83000
|
trusted library allocation
|
page read and write
|
||
2550000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
25D0FA4C000
|
heap
|
page read and write
|
||
25D0FA85000
|
heap
|
page read and write
|
||
10EC000
|
heap
|
page read and write
|
||
1CB8F5B7000
|
heap
|
page read and write
|
||
10CB000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
1108000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
2E36000
|
trusted library allocation
|
page read and write
|
||
137D000
|
heap
|
page read and write
|
||
25D0FA32000
|
heap
|
page read and write
|
||
2721865B000
|
heap
|
page read and write
|
||
C60000
|
unkown
|
page readonly
|
||
3470000
|
trusted library allocation
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
EFA000
|
heap
|
page read and write
|
||
1CB8F549000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
2CC5000
|
trusted library allocation
|
page read and write
|
||
8C3000
|
heap
|
page read and write
|
||
2C5F000
|
heap
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
27218719000
|
heap
|
page read and write
|
||
37D4000
|
trusted library allocation
|
page read and write
|
||
27218654000
|
heap
|
page read and write
|
||
2D80000
|
trusted library allocation
|
page read and write
|
||
2D73000
|
trusted library allocation
|
page read and write
|
||
27218678000
|
heap
|
page read and write
|
||
1374000
|
heap
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
2D73000
|
trusted library allocation
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
27218630000
|
heap
|
page read and write
|
||
1E34BF77000
|
heap
|
page read and write
|
||
27218B0A000
|
heap
|
page read and write
|
||
2530000
|
heap
|
page read and write
|
||
100C000
|
unkown
|
page read and write
|
||
253E000
|
heap
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
705000
|
heap
|
page read and write
|
||
2CC7000
|
trusted library allocation
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
1E348F5D000
|
heap
|
page read and write
|
||
321E000
|
stack
|
page read and write
|
||
101E000
|
unkown
|
page readonly
|
||
107D000
|
heap
|
page read and write
|
||
25D0FB89000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
2D7E000
|
trusted library allocation
|
page read and write
|
||
2F0A000
|
heap
|
page read and write
|
||
2D71000
|
trusted library allocation
|
page read and write
|
||
3314000
|
trusted library allocation
|
page read and write
|
||
27218C70000
|
heap
|
page read and write
|
||
2E52000
|
heap
|
page read and write
|
||
1CB8F579000
|
heap
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
2B6D000
|
trusted library allocation
|
page read and write
|
||
8B3000
|
heap
|
page read and write
|
||
ECE000
|
heap
|
page read and write
|
||
1E348F4C000
|
heap
|
page read and write
|
||
1AE000
|
stack
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
37D2000
|
trusted library allocation
|
page read and write
|
||
1CB8F5E9000
|
heap
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
1102000
|
heap
|
page read and write
|
||
EA8000
|
heap
|
page read and write
|
||
EE9000
|
heap
|
page read and write
|
||
6D160000
|
unkown
|
page readonly
|
||
27A0000
|
heap
|
page read and write
|
||
25D0FA3F000
|
heap
|
page read and write
|
||
3408000
|
trusted library allocation
|
page read and write
|
||
27218AE8000
|
heap
|
page read and write
|
||
EE3000
|
heap
|
page read and write
|
||
EC6000
|
heap
|
page read and write
|
||
27218AE8000
|
heap
|
page read and write
|
||
6D246000
|
unkown
|
page read and write
|
||
2C20000
|
heap
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
10A9000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
27218646000
|
heap
|
page read and write
|
||
10BC000
|
heap
|
page read and write
|
||
27218B5F000
|
heap
|
page read and write
|
||
1381000
|
heap
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
2D78000
|
trusted library allocation
|
page read and write
|
||
37CE000
|
trusted library allocation
|
page read and write
|
||
27218C47000
|
heap
|
page read and write
|
||
F23000
|
heap
|
page read and write
|
||
181000
|
unkown
|
page execute read
|
||
2830000
|
heap
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
35AA000
|
trusted library allocation
|
page read and write
|
||
25D0FB47000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
2D88000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
27218719000
|
heap
|
page read and write
|
||
25D0FA99000
|
heap
|
page read and write
|
||
2550000
|
heap
|
page read and write
|
||
2590000
|
heap
|
page read and write
|
||
1108000
|
heap
|
page read and write
|
||
1CB8F5D2000
|
heap
|
page read and write
|
||
7FF644BA8000
|
unkown
|
page readonly
|
||
4E4000
|
heap
|
page read and write
|
||
25D0FA52000
|
heap
|
page read and write
|
||
27218B0A000
|
heap
|
page read and write
|
||
2D7B000
|
trusted library allocation
|
page read and write
|
||
2A8E000
|
trusted library allocation
|
page read and write
|
||
3556000
|
trusted library allocation
|
page read and write
|
||
27218B6D000
|
heap
|
page read and write
|
||
2D7F000
|
trusted library allocation
|
page read and write
|
||
EAC000
|
heap
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
F2C000
|
heap
|
page read and write
|
||
2CE1000
|
trusted library allocation
|
page read and write
|
||
3749000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
35EF000
|
trusted library allocation
|
page read and write
|
||
25D0FA01000
|
heap
|
page read and write
|
||
2C3A000
|
trusted library allocation
|
page read and write
|
||
2104000
|
heap
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
10B9000
|
heap
|
page read and write
|
||
40B000
|
unkown
|
page read and write
|
||
1386000
|
heap
|
page read and write
|
||
25D0FA26000
|
heap
|
page read and write
|
||
F3E000
|
heap
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
13D7000
|
heap
|
page read and write
|
||
25D0FA3A000
|
heap
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
35C0000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
6DD000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
25D0FA48000
|
heap
|
page read and write
|
||
3742000
|
trusted library allocation
|
page read and write
|
||
438000
|
unkown
|
page readonly
|
||
3802000
|
trusted library allocation
|
page read and write
|
||
25D0FA5B000
|
heap
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
1112000
|
heap
|
page read and write
|
||
25D0FA1C000
|
heap
|
page read and write
|
||
F39000
|
heap
|
page read and write
|
||
2CCB000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
C97000
|
stack
|
page read and write
|
||
315D000
|
heap
|
page read and write
|
||
25D0FB62000
|
heap
|
page read and write
|
||
F39000
|
heap
|
page read and write
|
||
2430000
|
heap
|
page read and write
|
||
25D0FA52000
|
heap
|
page read and write
|
||
135B000
|
heap
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
1108000
|
heap
|
page read and write
|
||
1CB8F593000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
1CB8D8B5000
|
heap
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
800000
|
heap
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
37C4000
|
trusted library allocation
|
page read and write
|
||
374C000
|
trusted library allocation
|
page read and write
|
||
1355000
|
heap
|
page read and write
|
||
2B62000
|
trusted library allocation
|
page read and write
|
||
2721865E000
|
heap
|
page read and write
|
||
87B000
|
heap
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
36EB000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
EC3000
|
heap
|
page read and write
|
||
2D8E000
|
trusted library allocation
|
page read and write
|
||
1377000
|
heap
|
page read and write
|
||
25D0FA3A000
|
heap
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
1CB8F5D6000
|
heap
|
page read and write
|
||
8C5000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
35D0000
|
heap
|
page read and write
|
||
25D0FA5B000
|
heap
|
page read and write
|
||
25C2000
|
heap
|
page read and write
|
||
2CF8000
|
trusted library allocation
|
page read and write
|
||
2E3D000
|
trusted library allocation
|
page read and write
|
||
3745000
|
trusted library allocation
|
page read and write
|
||
10A9000
|
heap
|
page read and write
|
||
35A4000
|
trusted library allocation
|
page read and write
|
||
EBC000
|
heap
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
1102000
|
heap
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
10CC000
|
heap
|
page read and write
|
||
27218ACE000
|
heap
|
page read and write
|
||
49E000
|
heap
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
25D0FAA3000
|
heap
|
page read and write
|
||
2540000
|
heap
|
page read and write
|
||
2E51000
|
heap
|
page read and write
|
||
1369000
|
heap
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
C43D4FF000
|
stack
|
page read and write
|
||
1CB8D6CF000
|
heap
|
page read and write
|
||
1108000
|
heap
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
7FF644B91000
|
unkown
|
page write copy
|
||
2530000
|
heap
|
page read and write
|
||
1CB8F5BA000
|
heap
|
page read and write
|
||
27218B44000
|
heap
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
25D0F9FB000
|
heap
|
page read and write
|
||
37DC000
|
trusted library allocation
|
page read and write
|
||
2B67000
|
trusted library allocation
|
page read and write
|
||
2550000
|
trusted library allocation
|
page read and write
|
||
1CB8F5DF000
|
heap
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
2721872E000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
27218540000
|
heap
|
page read and write
|
||
8C7000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
2533000
|
heap
|
page read and write
|
||
1382000
|
heap
|
page read and write
|
||
3533000
|
trusted library allocation
|
page read and write
|
||
112F000
|
heap
|
page read and write
|
||
2D79000
|
trusted library allocation
|
page read and write
|
||
2ED0000
|
trusted library allocation
|
page read and write
|
||
8D8000
|
heap
|
page read and write
|
||
2520000
|
trusted library allocation
|
page read and write
|
||
2721865B000
|
heap
|
page read and write
|
||
312A000
|
heap
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
EC9000
|
heap
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
F39000
|
heap
|
page read and write
|
||
251E000
|
stack
|
page read and write
|
||
25D0FA3B000
|
heap
|
page read and write
|
||
1E348F52000
|
heap
|
page read and write
|
||
1125000
|
heap
|
page read and write
|
||
37D0000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1366000
|
heap
|
page read and write
|
||
3531000
|
trusted library allocation
|
page read and write
|
||
2FD6000
|
heap
|
page read and write
|
||
2721872E000
|
heap
|
page read and write
|
||
27FF000
|
stack
|
page read and write
|
||
27218AFD000
|
heap
|
page read and write
|
||
340C000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
6ED000
|
heap
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
25D0FA0E000
|
heap
|
page read and write
|
||
137B000
|
heap
|
page read and write
|
||
2721871D000
|
heap
|
page read and write
|
||
1118000
|
heap
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
25D0FB5E000
|
heap
|
page read and write
|
||
2D7D000
|
trusted library allocation
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
3530000
|
trusted library allocation
|
page read and write
|
||
2C97000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
27218C27000
|
heap
|
page read and write
|
||
F23000
|
heap
|
page read and write
|
||
112F000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
136D000
|
heap
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
27218663000
|
heap
|
page read and write
|
||
2CCD000
|
trusted library allocation
|
page read and write
|
||
150000
|
heap
|
page read and write
|
||
C43D47E000
|
stack
|
page read and write
|
||
2D77000
|
trusted library allocation
|
page read and write
|
||
3769000
|
trusted library allocation
|
page read and write
|
||
1CB8F578000
|
heap
|
page read and write
|
||
1E348F6E000
|
heap
|
page read and write
|
||
EE9000
|
heap
|
page read and write
|
||
175000
|
heap
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
2D00000
|
trusted library allocation
|
page read and write
|
||
8B3000
|
heap
|
page read and write
|
||
8DC000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
27218B3C000
|
heap
|
page read and write
|
||
27218B2D000
|
heap
|
page read and write
|
||
2721865B000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
1E348F0E000
|
heap
|
page read and write
|
||
1379000
|
heap
|
page read and write
|
||
1CB8F572000
|
heap
|
page read and write
|
||
136D000
|
heap
|
page read and write
|
||
1F9E000
|
stack
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
10CC000
|
heap
|
page read and write
|
||
708000
|
heap
|
page read and write
|
||
2721865E000
|
heap
|
page read and write
|
||
2CC9000
|
trusted library allocation
|
page read and write
|
||
135C000
|
heap
|
page read and write
|
||
1CB8D791000
|
heap
|
page read and write
|
||
2CE7000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
3477000
|
trusted library allocation
|
page read and write
|
||
EC6000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
2D71000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
417C000
|
stack
|
page read and write
|
||
6D191000
|
unkown
|
page execute read
|
||
2980000
|
heap
|
page read and write
|
||
35EB000
|
trusted library allocation
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
7FFB47E000
|
stack
|
page read and write
|
||
1374000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
2CC1000
|
trusted library allocation
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
1392000
|
heap
|
page read and write
|
||
35D0000
|
heap
|
page read and write
|
||
27218664000
|
heap
|
page read and write
|
||
25D0FB62000
|
heap
|
page read and write
|
||
116D000
|
stack
|
page read and write
|
||
EF2000
|
heap
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
10C7000
|
heap
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
2C9F000
|
trusted library allocation
|
page read and write
|
||
3803000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
1118000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
27218B1D000
|
heap
|
page read and write
|
||
3539000
|
trusted library allocation
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
25D0FA4C000
|
heap
|
page read and write
|
||
1382000
|
heap
|
page read and write
|
||
42BB000
|
stack
|
page read and write
|
||
8D8000
|
heap
|
page read and write
|
||
27218665000
|
heap
|
page read and write
|
||
2E32000
|
trusted library allocation
|
page read and write
|
||
377D000
|
trusted library allocation
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
25D0FA85000
|
heap
|
page read and write
|
||
1E34710B000
|
heap
|
page read and write
|
||
10CC000
|
heap
|
page read and write
|
||
27218719000
|
heap
|
page read and write
|
||
136D000
|
heap
|
page read and write
|
||
2B6C000
|
trusted library allocation
|
page read and write
|
||
7FF644B91000
|
unkown
|
page read and write
|
||
EFA000
|
heap
|
page read and write
|
||
25D0FA32000
|
heap
|
page read and write
|
||
2721866F000
|
heap
|
page read and write
|
||
7FF644B11000
|
unkown
|
page execute read
|
||
27218651000
|
heap
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
25D0FA4C000
|
heap
|
page read and write
|
||
3750000
|
heap
|
page read and write
|
||
2D72000
|
trusted library allocation
|
page read and write
|
||
2D76000
|
trusted library allocation
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
2CE0000
|
trusted library allocation
|
page read and write
|
||
ED7000
|
heap
|
page read and write
|
||
2C36000
|
trusted library allocation
|
page read and write
|
||
3471000
|
trusted library allocation
|
page read and write
|
||
25D0FA87000
|
heap
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
27218AF2000
|
heap
|
page read and write
|
||
10D3000
|
heap
|
page read and write
|
||
3405000
|
trusted library allocation
|
page read and write
|
||
2A8C000
|
trusted library allocation
|
page read and write
|
||
EF4000
|
heap
|
page read and write
|
||
10BC000
|
heap
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
374B000
|
trusted library allocation
|
page read and write
|
||
8C2000
|
heap
|
page read and write
|
||
C43D3FF000
|
stack
|
page read and write
|
||
27218B09000
|
heap
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
1CB8F5BC000
|
heap
|
page read and write
|
||
6D181000
|
unkown
|
page readonly
|
||
3560000
|
heap
|
page read and write
|
||
1E3470C2000
|
heap
|
page read and write
|
||
37CF000
|
trusted library allocation
|
page read and write
|
||
1CB8D650000
|
heap
|
page read and write
|
||
27218667000
|
heap
|
page read and write
|
||
1CB8F5C3000
|
heap
|
page read and write
|
||
2D76000
|
trusted library allocation
|
page read and write
|
||
1CB8F5F3000
|
heap
|
page read and write
|
||
25D0FA2F000
|
heap
|
page read and write
|
||
2C35000
|
trusted library allocation
|
page read and write
|
||
37C3000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
1CB8F0E3000
|
heap
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
3772000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
trusted library allocation
|
page read and write
|
||
2721869D000
|
heap
|
page read and write
|
||
21A0000
|
heap
|
page read and write
|
||
25D0FBF0000
|
heap
|
page read and write
|
||
1CB8F590000
|
heap
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
35AB000
|
trusted library allocation
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
DC000
|
stack
|
page read and write
|
||
1CB8F588000
|
heap
|
page read and write
|
||
27218654000
|
heap
|
page read and write
|
||
135F000
|
heap
|
page read and write
|
||
3B90000
|
trusted library allocation
|
page read and write
|
||
138A000
|
heap
|
page read and write
|
||
25D0FB67000
|
heap
|
page read and write
|
||
110C000
|
heap
|
page read and write
|
||
8C9000
|
heap
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
8DC000
|
heap
|
page read and write
|
||
8EB000
|
heap
|
page read and write
|
||
F23000
|
heap
|
page read and write
|
||
272186D1000
|
heap
|
page read and write
|
||
3780000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
27E0000
|
heap
|
page read and write
|
||
10CC000
|
heap
|
page read and write
|
||
2D86000
|
trusted library allocation
|
page read and write
|
||
2D77000
|
trusted library allocation
|
page read and write
|
||
785000
|
heap
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
25D0FA09000
|
heap
|
page read and write
|
||
27218B05000
|
heap
|
page read and write
|
||
27218B2B000
|
heap
|
page read and write
|
||
ED7000
|
heap
|
page read and write
|
||
27218B1D000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
2F0D000
|
trusted library allocation
|
page read and write
|
||
27218B3C000
|
heap
|
page read and write
|
||
20FF000
|
stack
|
page read and write
|
||
2CE3000
|
trusted library allocation
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
8CB000
|
heap
|
page read and write
|
||
27218AF7000
|
heap
|
page read and write
|
||
2C38000
|
trusted library allocation
|
page read and write
|
||
1E348F52000
|
heap
|
page read and write
|
||
27218AC1000
|
heap
|
page read and write
|
||
10DD000
|
heap
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
1FF0000
|
heap
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
110D000
|
heap
|
page read and write
|
||
EA8000
|
heap
|
page read and write
|
||
25D0FA37000
|
heap
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
EB2000
|
heap
|
page read and write
|
||
272186A4000
|
heap
|
page read and write
|
||
60D000
|
heap
|
page read and write
|
||
25D0FA14000
|
heap
|
page read and write
|
||
2560000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
585000
|
heap
|
page read and write
|
||
1E34708B000
|
heap
|
page read and write
|
||
2C33000
|
trusted library allocation
|
page read and write
|
||
1E347047000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
27218B4B000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
5EF000
|
stack
|
page read and write
|
||
3750000
|
trusted library allocation
|
page read and write
|
||
110C000
|
heap
|
page read and write
|
||
37C0000
|
trusted library allocation
|
page read and write
|
||
27218688000
|
heap
|
page read and write
|
||
2D7B000
|
trusted library allocation
|
page read and write
|
||
8CF000
|
heap
|
page read and write
|
||
2CF0000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
8C3000
|
heap
|
page read and write
|
||
2ED3000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
10CC000
|
heap
|
page read and write
|
||
8DC000
|
heap
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
1E34C170000
|
trusted library allocation
|
page read and write
|
||
F13000
|
heap
|
page read and write
|
||
8C7000
|
heap
|
page read and write
|
||
2CCE000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
10D3000
|
heap
|
page read and write
|
||
272185B0000
|
heap
|
page read and write
|
||
3BBB000
|
stack
|
page read and write
|
||
27218654000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
22AE000
|
stack
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
8CB000
|
heap
|
page read and write
|
||
374F000
|
trusted library allocation
|
page read and write
|
||
2B5D000
|
heap
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
25D0FA48000
|
heap
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
1377000
|
heap
|
page read and write
|
||
25D0FA85000
|
heap
|
page read and write
|
||
2CE9000
|
trusted library allocation
|
page read and write
|
||
37DA000
|
trusted library allocation
|
page read and write
|
||
2CEB000
|
trusted library allocation
|
page read and write
|
||
380D000
|
trusted library allocation
|
page read and write
|
||
8B3000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
32B0000
|
heap
|
page read and write
|
||
20EE000
|
stack
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
25D0FA48000
|
heap
|
page read and write
|
||
25D0FA0A000
|
heap
|
page read and write
|
||
37C8000
|
trusted library allocation
|
page read and write
|
||
27218B3C000
|
heap
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
2D74000
|
trusted library allocation
|
page read and write
|
||
25C1000
|
heap
|
page read and write
|
||
27218665000
|
heap
|
page read and write
|
||
1382000
|
heap
|
page read and write
|
There are 2445 hidden memdumps, click here to show them.