IOC Report
LRF-Demonstration-Software-2.0.0.4.zip

loading gif

Files

File Path
Type
Category
Malicious
LRF-Demonstration-Software-2.0.0.4.zip
Zip archive data, at least v2.0 to extract, compression method=store
initial sample
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35\LRF Demonstration Software.exe.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35\noptel_logo_12d.ico
MS Windows icon resource - 1 icon, -86x-116, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\LRF Demonstration Software.cdf-ms
data
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\LRF Demonstration Software.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\LRF Demonstration Software.manifest
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\MathNet.Numerics.cdf-ms
data
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\MathNet.Numerics.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\MathNet.Numerics.manifest
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\NAudio.cdf-ms
data
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\NAudio.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\NAudio.manifest
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\manifests\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35.cdf-ms
data
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\manifests\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35.manifest
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (504), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\manifests\lrfd..tion_0000000000000000_0002.0000_none_d4004f438420bf16.cdf-ms
data
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\manifests\lrfd..tion_0000000000000000_0002.0000_none_d4004f438420bf16.manifest
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (550), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\manifests\micr..ions_31bf3856ad364e35_0004.0005_none_29fb1b4caf46359f.cdf-ms
data
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\manifests\micr..ions_31bf3856ad364e35_0004.0005_none_29fb1b4caf46359f.manifest
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\manifests\micr..ties_b03f5f7f11d50a3a_000a.0000_none_26248fa63945e711.cdf-ms
data
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\manifests\micr..ties_b03f5f7f11d50a3a_000a.0000_none_26248fa63945e711.manifest
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\manifests\syst..vity_31bf3856ad364e35_0004.0005_none_1b13e2ad9f564705.cdf-ms
data
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\manifests\syst..vity_31bf3856ad364e35_0004.0005_none_1b13e2ad9f564705.manifest
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\manifests\teec...wpf_7d79220c74c907b6_0004.07e2_none_99dee6c148ef9332.cdf-ms
data
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\manifests\teec...wpf_7d79220c74c907b6_0004.07e2_none_99dee6c148ef9332.manifest
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\manifests\teec..dard_7d79220c74c907b6_0004.07e2_none_9b188e4dd326a5a9.cdf-ms
data
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\manifests\teec..dard_7d79220c74c907b6_0004.07e2_none_9b188e4dd326a5a9.manifest
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\micr..ions_31bf3856ad364e35_0004.0005_none_29fb1b4caf46359f\Microsoft.Expression.Interactions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\micr..ties_b03f5f7f11d50a3a_000a.0000_none_26248fa63945e711\Microsoft.Office.Tools.Word.v4.0.Utilities.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\syst..vity_31bf3856ad364e35_0004.0005_none_1b13e2ad9f564705\System.Windows.Interactivity.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\teec...wpf_7d79220c74c907b6_0004.07e2_none_99dee6c148ef9332\TeeChart.Standard.WPF.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\teec..dard_7d79220c74c907b6_0004.07e2_none_9b188e4dd326a5a9\TeeChart.Standard.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\33CUD2J1\VP936N55.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\AN5UOLP8\Z5KN6MZ3.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Deployment\041RJV8M.1QV\3RQWGXPM.JDB.application
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (550), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Deployment\BHLMXEX4.7VR\VMNAL2P6.0H9.application
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (550), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Deployment\Z3AMQ27M.OL5\VJKVR2K8.GZT\LRF Demonstration Software.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Deployment\Z3AMQ27M.OL5\VJKVR2K8.GZT\LRF Demonstration Software.exe.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Deployment\Z3AMQ27M.OL5\VJKVR2K8.GZT\LRF Demonstration Software.exe.genman
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Deployment\Z3AMQ27M.OL5\VJKVR2K8.GZT\LRF Demonstration Software.exe.manifest
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (504), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Deployment\Z3AMQ27M.OL5\VJKVR2K8.GZT\MathNet.Numerics.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Deployment\Z3AMQ27M.OL5\VJKVR2K8.GZT\MathNet.Numerics.dll.genman
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Deployment\Z3AMQ27M.OL5\VJKVR2K8.GZT\Microsoft.Expression.Interactions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Deployment\Z3AMQ27M.OL5\VJKVR2K8.GZT\Microsoft.Expression.Interactions.dll.genman
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Deployment\Z3AMQ27M.OL5\VJKVR2K8.GZT\Microsoft.Office.Tools.Word.v4.0.Utilities.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Deployment\Z3AMQ27M.OL5\VJKVR2K8.GZT\Microsoft.Office.Tools.Word.v4.0.Utilities.dll.genman
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Deployment\Z3AMQ27M.OL5\VJKVR2K8.GZT\NAudio.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Deployment\Z3AMQ27M.OL5\VJKVR2K8.GZT\NAudio.dll.genman
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Deployment\Z3AMQ27M.OL5\VJKVR2K8.GZT\System.Windows.Interactivity.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Deployment\Z3AMQ27M.OL5\VJKVR2K8.GZT\System.Windows.Interactivity.dll.genman
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Deployment\Z3AMQ27M.OL5\VJKVR2K8.GZT\TeeChart.Standard.WPF.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Deployment\Z3AMQ27M.OL5\VJKVR2K8.GZT\TeeChart.Standard.WPF.dll.genman
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Deployment\Z3AMQ27M.OL5\VJKVR2K8.GZT\TeeChart.Standard.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Deployment\Z3AMQ27M.OL5\VJKVR2K8.GZT\TeeChart.Standard.dll.genman
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Deployment\Z3AMQ27M.OL5\VJKVR2K8.GZT\noptel_logo_12d.ico
MS Windows icon resource - 1 icon, -86x-116, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\VSDC16E.tmp\install.log
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Noptel Oy\LRF Demonstration Software online support.url
Generic INItialization configuration [InternetShortcut]
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Noptel Oy\LRF Demonstration Software.appref-ms
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\Desktop\-\diagnostics data\-_-0_20241001_09.13.00.dsp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\LRF Demonstration Software.appref-ms
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\Pictures\20241001_09.13.33----.0.png
PNG image data, 877 x 462, 8-bit/color RGBA, non-interlaced
dropped
There are 50 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Users\user\Desktop\LRF-Demonstration-Software-2.0.0.4\2.0.0.4\setup.exe
"C:\Users\user\Desktop\LRF-Demonstration-Software-2.0.0.4\2.0.0.4\setup.exe"
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\LRF Demonstration Software.exe
"C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\LRF Demonstration Software.exe"
C:\Windows\System32\rundll32.exe
"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\dfshim.dll",ShOpenVerbApplication C:\Users\user\Desktop\LRF-Demonstration-Software-2.0.0.4\2.0.0.4\LRF Demonstration Software.application
C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\LRF Demonstration Software.exe
"C:\Users\user\AppData\Local\Apps\2.0\Q8RBY9WD.CWT\05N1XM83.TV3\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\LRF Demonstration Software.exe"

URLs

Name
IP
Malicious
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://davidowens.wordpress.com/2010/09/07/html-5-canvas-and-dashed-lines/
unknown
http://www.newtone.co.jp/
unknown
https://www.steema.com/buy-https://www.steema.com/linkIn/tnetstd_startup
unknown
http://openoffice.org/2004/calc
unknown
http://www.steema.com/buy
unknown
http://www.tiro.com
unknown
http://www.steema.comT
unknown
http://www.fontbureau.com/designers
unknown
http://www.newtone.co.jp/store/home.asp
unknown
http://www.goodfont.co.kr
unknown
http://www.teechart.net/demo.ten
unknown
http://www.newtone.co.jp
unknown
http://www.noptel.fi/Begin
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.steema.com
unknown
http://fontfabrik.com
unknown
http://www.codeplex.com/DotNetZip.
unknown
http://www.newtone.co.jp/store/home.aspK0
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://www.newtone.co.jpK
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://openoffice.org/2005/report
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.xrml.org/schema/2001/11/xrml2coreE
unknown
http://www.urwpp.deDPlease
unknown
https://www.steema.com/buy
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
http://docs.oasis-open.org/opendocument/meta/rdfa#
unknown
http://www.steema.com/test.txt
unknown
http://www.noptel.fi/
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://fpdownload.macromedia.com/get/flashplayer/current/swflash.cab
unknown
http://www.steema.com/demo.ten
unknown
http://www.noptel.fi/00000
unknown
http://ocsp.thawte.com0
unknown
http://www.xrml.org/schema/2001/11/xrml2core
unknown
http://www.w3.op
unknown
http://www.carterandcone.coml
unknown
http://www.steema.com/demo.tee
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-jones.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.fontbureau.com/designers8
unknown
http://openoffice.org/2004/writer
unknown
https://www.steema.com/linkIn/tnetstd_startup
unknown
https://www.steema.com/files/public/teechart/html5/latest/src
unknown
http://www.noptel.fi/%%%
unknown
http://www.teechart.net/support/index.php
unknown
http://www.noptel.fi
unknown
http://www.steema.com/teechartnet/test.txt
unknown
http://openoffice.org/2004/office
unknown
There are 53 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
ComponentStore_RandomString
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
ComponentStore_RandomString
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager
StateStore_RandomString
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{60051b8f-4f12-400a-8e50-dd05ebd438d1}
NonCanonicalData
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{60051b8f-4f12-400a-8e50-dd05ebd438d1}\lrfd..tion_0000000000000000_0002.0000_a549107a3fb23252
appid
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{60051b8f-4f12-400a-8e50-dd05ebd438d1}\lrfd..tion_0000000000000000_0002.0000_a549107a3fb23252
{c989bb7a-8385-4715-98cf-a741a8edb823}!ApplicationTrust
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35
identity
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35
lock!010000004fcc7302b81b00003415000000000000000000007e1ee7c95214db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}
NonCanonicalData
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109
appid
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!DeploymentSourceUri
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!ApplicationSourceUri
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!IsFullTrust
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Visibility\lrfd..tion_0000000000000000_0002.0000_none_d4004f438420bf16
identity
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Visibility\lrfd..tion_0000000000000000_0002.0000_none_d4004f438420bf16\Applications
lrfd..tion_0000000000000000_0002.0000_a549107a3fb23252
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Visibility\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35
identity
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Visibility\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35\Applications
lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\lrfd..tion_0000000000000000_ef1284facd236a10
appid
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\lrfd..tion_0000000000000000_ef1284facd236a10
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!IsShellVisible
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\lrfd..tion_0000000000000000_ef1284facd236a10
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!PreviousBind
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\lrfd..tion_0000000000000000_ef1284facd236a10
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!PendingBind
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\lrfd..tion_0000000000000000_ef1284facd236a10
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!ExcludedDeployment
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\lrfd..tion_0000000000000000_ef1284facd236a10
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!PendingDeployment
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\lrfd..tion_0000000000000000_ef1284facd236a10
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!DeploymentProviderUri
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\lrfd..tion_0000000000000000_ef1284facd236a10
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!MinimumRequiredVersion
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\lrfd..tion_0000000000000000_ef1284facd236a10
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!LastCheckTime
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\lrfd..tion_0000000000000000_ef1284facd236a10
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!UpdateSkippedDeployment
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\lrfd..tion_0000000000000000_ef1284facd236a10
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!UpdateSkipTime
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\lrfd..tion_0000000000000000_ef1284facd236a10
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!AppType
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\lrfd..tion_0000000000000000_ef1284facd236a10
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!CurrentBind
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd..tion_0000000000000000_0002.0000_a549107a3fb23252
appid
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd..tion_0000000000000000_0002.0000_a549107a3fb23252
reference!S_{3f471841-eef2-47d6-89c0-d028f03a4ad5}
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109
appid
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109
implication!lrfd..tion_0000000000000000_0002.0000_a549107a3fb23252
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\micr..ties_b03f5f7f11d50a3a_000a.0000_none_26248fa63945e711
identity
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\micr..ions_31bf3856ad364e35_0004.0005_none_29fb1b4caf46359f
identity
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\micr..ions_31bf3856ad364e35_0004.0005_none_29fb1b4caf46359f
implication!lrfd..tion_0000000000000000_0002.0000_a549107a3fb23252
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\teec..dard_7d79220c74c907b6_0004.07e2_none_9b188e4dd326a5a9
identity
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\teec..dard_7d79220c74c907b6_0004.07e2_none_9b188e4dd326a5a9
implication!lrfd..tion_0000000000000000_0002.0000_a549107a3fb23252
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\syst..vity_31bf3856ad364e35_0004.0005_none_1b13e2ad9f564705
identity
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\syst..vity_31bf3856ad364e35_0004.0005_none_1b13e2ad9f564705
implication!lrfd..tion_0000000000000000_0002.0000_a549107a3fb23252
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\teec...wpf_7d79220c74c907b6_0004.07e2_none_99dee6c148ef9332
identity
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\teec...wpf_7d79220c74c907b6_0004.07e2_none_99dee6c148ef9332
implication!lrfd..tion_0000000000000000_0002.0000_a549107a3fb23252
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35
implication!lrfd..tion_0000000000000000_0002.0000_a549107a3fb23252
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd..tion_0000000000000000_0002.0000_none_d4004f438420bf16
identity
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd..tion_0000000000000000_0002.0000_none_d4004f438420bf16
implication!lrfd..tion_0000000000000000_0002.0000_a549107a3fb23252
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd..tion_0000000000000000_0002.0000_none_d4004f438420bf16
identity
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd..tion_0000000000000000_0002.0000_none_d4004f438420bf16
SizeOfStronglyNamedComponent
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35
identity
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35
SizeOfStronglyNamedComponent
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35
DigestValue
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35
Transform
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35
DigestMethod
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd..tion_0000000000000000_0002.0000_a549107a3fb23252\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35\Files
LRF Demonstration Software.exe.config_a37468b33123b464
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35\Files
LRF Demonstration Software.exe.config_a37468b33123b464
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd..tion_0000000000000000_0002.0000_a549107a3fb23252\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35\Files
noptel_logo_12d.ico_dcb050b5bf9c3d3f
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\teec...wpf_7d79220c74c907b6_0004.07e2_none_99dee6c148ef9332
identity
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\teec...wpf_7d79220c74c907b6_0004.07e2_none_99dee6c148ef9332
SizeOfStronglyNamedComponent
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\teec...wpf_7d79220c74c907b6_0004.07e2_none_99dee6c148ef9332
DigestValue
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\teec...wpf_7d79220c74c907b6_0004.07e2_none_99dee6c148ef9332
Transform
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\teec...wpf_7d79220c74c907b6_0004.07e2_none_99dee6c148ef9332
DigestMethod
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\teec...wpf_7d79220c74c907b6_0004.07e2_none_99dee6c148ef9332\Files
TeeChart.Standard.WPF.dll_ceb337115fa2ad36
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\teec...wpf_7d79220c74c907b6_0004.07e2_none_99dee6c148ef9332\Files
TeeChart.Standard.WPF.dll_ceb337115fa2ad36
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\math..rics_none_0004.000f_none_e582885136d8fb68
identity
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109
SizeOfPrivateComponentsInDeployment
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\math..rics_none_0004.000f_none_e582885136d8fb68\Files
MathNet.Numerics.dll_461d5046bc599edd
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\naudio_none_0001.0008_none_83998525481c5e45
identity
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\naudio_none_0001.0008_none_83998525481c5e45\Files
NAudio.dll_d6433ea6d19f6e34
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\syst..vity_31bf3856ad364e35_0004.0005_none_1b13e2ad9f564705
identity
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\syst..vity_31bf3856ad364e35_0004.0005_none_1b13e2ad9f564705
SizeOfStronglyNamedComponent
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\syst..vity_31bf3856ad364e35_0004.0005_none_1b13e2ad9f564705
DigestValue
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\syst..vity_31bf3856ad364e35_0004.0005_none_1b13e2ad9f564705
Transform
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\syst..vity_31bf3856ad364e35_0004.0005_none_1b13e2ad9f564705
DigestMethod
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\syst..vity_31bf3856ad364e35_0004.0005_none_1b13e2ad9f564705\Files
System.Windows.Interactivity.dll_49567d1f0585415b
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\syst..vity_31bf3856ad364e35_0004.0005_none_1b13e2ad9f564705\Files
System.Windows.Interactivity.dll_49567d1f0585415b
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\teec..dard_7d79220c74c907b6_0004.07e2_none_9b188e4dd326a5a9
identity
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\teec..dard_7d79220c74c907b6_0004.07e2_none_9b188e4dd326a5a9
SizeOfStronglyNamedComponent
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\teec..dard_7d79220c74c907b6_0004.07e2_none_9b188e4dd326a5a9
DigestValue
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\teec..dard_7d79220c74c907b6_0004.07e2_none_9b188e4dd326a5a9
Transform
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\teec..dard_7d79220c74c907b6_0004.07e2_none_9b188e4dd326a5a9
DigestMethod
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\teec..dard_7d79220c74c907b6_0004.07e2_none_9b188e4dd326a5a9\Files
TeeChart.Standard.dll_5b0b72221d960745
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\teec..dard_7d79220c74c907b6_0004.07e2_none_9b188e4dd326a5a9\Files
TeeChart.Standard.dll_5b0b72221d960745
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\micr..ions_31bf3856ad364e35_0004.0005_none_29fb1b4caf46359f
identity
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\micr..ions_31bf3856ad364e35_0004.0005_none_29fb1b4caf46359f
SizeOfStronglyNamedComponent
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\micr..ions_31bf3856ad364e35_0004.0005_none_29fb1b4caf46359f
DigestValue
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\micr..ions_31bf3856ad364e35_0004.0005_none_29fb1b4caf46359f
Transform
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\micr..ions_31bf3856ad364e35_0004.0005_none_29fb1b4caf46359f
DigestMethod
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\micr..ions_31bf3856ad364e35_0004.0005_none_29fb1b4caf46359f\Files
Microsoft.Expression.Interactions.dll_f3ba7da44b1984a9
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\lrfd..ware_none_0002.0000_none_d2237de830da36d1
identity
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\lrfd..ware_none_0002.0000_none_d2237de830da36d1\Files
LRF Demonstration Software.exe_bcb4364586d0d6d0
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\micr..ties_b03f5f7f11d50a3a_000a.0000_none_26248fa63945e711
identity
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\micr..ties_b03f5f7f11d50a3a_000a.0000_none_26248fa63945e711
SizeOfStronglyNamedComponent
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\micr..ties_b03f5f7f11d50a3a_000a.0000_none_26248fa63945e711
DigestValue
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\micr..ties_b03f5f7f11d50a3a_000a.0000_none_26248fa63945e711
Transform
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\micr..ties_b03f5f7f11d50a3a_000a.0000_none_26248fa63945e711
DigestMethod
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\micr..ties_b03f5f7f11d50a3a_000a.0000_none_26248fa63945e711\Files
Microsoft.Office.Tools.Word.v4.0.Utilities.dll_d393ee88350fee6f
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\micr..ties_b03f5f7f11d50a3a_000a.0000_none_26248fa63945e711\Files
Microsoft.Office.Tools.Word.v4.0.Utilities.dll_d393ee88350fee6f
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment
OnlineAppQuotaUsageEstimate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\15ca9238891111f0
ShortcutAppId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\15ca9238891111f0
SupportShortcutFileName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\15ca9238891111f0
ShortcutFileName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\15ca9238891111f0
ShortcutFolderName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\15ca9238891111f0
UrlUpdateInfo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\15ca9238891111f0
HelpLink
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\15ca9238891111f0
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\15ca9238891111f0
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\15ca9238891111f0
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\15ca9238891111f0
DisplayIcon
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\15ca9238891111f0
DisplayName
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\teec...wpf_7d79220c74c907b6_0004.07e2_none_99dee6c148ef9332
lock!100000003618aa02b81b00003415000000000000000000006676e2125b14db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\micr..ties_b03f5f7f11d50a3a_000a.0000_none_26248fa63945e711
lock!0e0000003618aa02b81b00003415000000000000000000006676e2125b14db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\micr..ions_31bf3856ad364e35_0004.0005_none_29fb1b4caf46359f
lock!0c0000003618aa02b81b00003415000000000000000000006676e2125b14db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\syst..vity_31bf3856ad364e35_0004.0005_none_1b13e2ad9f564705
lock!0a0000003618aa02b81b00003415000000000000000000006676e2125b14db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\teec..dard_7d79220c74c907b6_0004.07e2_none_9b188e4dd326a5a9
lock!080000003618aa02b81b00003415000000000000000000006676e2125b14db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35
lock!060000003618aa02b81b00003415000000000000000000006676e2125b14db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd..tion_0000000000000000_0002.0000_none_d4004f438420bf16
lock!040000003618aa02b81b00003415000000000000000000006676e2125b14db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Applications\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109
identity
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Applications\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109
PreparedForExecution
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109
lock!110000003618aa02b81b00003415000000000000000000006676e2125b14db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35\Files
LRF Demonstration Software.exe.config_3a0d1d183f075484
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35\Files
noptel_logo_12d.ico_dcb050b5bf9c3d3f
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\syst..vity_31bf3856ad364e35_0004.0005_none_1b13e2ad9f564705\Files
System.Windows.Interactivity.dll_b13c64c76f00adfb
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\micr..ions_31bf3856ad364e35_0004.0005_none_29fb1b4caf46359f\Files
Microsoft.Expression.Interactions.dll_fc7c3f9e2848f4c9
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\teec..dard_7d79220c74c907b6_0004.07e2_none_9b188e4dd326a5a9\Files
TeeChart.Standard.dll_f0699b792fcab9e5
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\micr..ties_b03f5f7f11d50a3a_000a.0000_none_26248fa63945e711\Files
Microsoft.Office.Tools.Word.v4.0.Utilities.dll_8c7bda9334ec88cf
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109\teec...wpf_7d79220c74c907b6_0004.07e2_none_99dee6c148ef9332\Files
TeeChart.Standard.WPF.dll_7d2772b3e9714e76
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Components\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109
SubstructureCreated
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\teec...wpf_7d79220c74c907b6_0004.07e2_none_99dee6c148ef9332
lock!20000000c71a1d09b81b00000c1000000000000000000000190c4a005715db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\micr..ties_b03f5f7f11d50a3a_000a.0000_none_26248fa63945e711
lock!1e000000c71a1d09b81b00000c1000000000000000000000190c4a005715db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\micr..ions_31bf3856ad364e35_0004.0005_none_29fb1b4caf46359f
lock!1c000000c71a1d09b81b00000c1000000000000000000000190c4a005715db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\syst..vity_31bf3856ad364e35_0004.0005_none_1b13e2ad9f564705
lock!1a000000c71a1d09b81b00000c1000000000000000000000190c4a005715db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\teec..dard_7d79220c74c907b6_0004.07e2_none_9b188e4dd326a5a9
lock!18000000c71a1d09b81b00000c1000000000000000000000190c4a005715db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35
lock!16000000c71a1d09b81b00000c1000000000000000000000190c4a005715db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd..tion_0000000000000000_0002.0000_none_d4004f438420bf16
lock!14000000c71a1d09b81b00000c1000000000000000000000190c4a005715db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109
lock!21000000d71a1d09b81b00000c1000000000000000000000087d4c005715db01
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\PackageMetadata\{2ec93463-b0c3-45e1-8364-327e96aea856}_{3f471841-eef2-47d6-89c0-d028f03a4ad5}\lrfd..tion_0000000000000000_ef1284facd236a10
{2ad613da-6fdb-4671-af9e-18ab2e4df4d8}!LastCheckTime
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\teec...wpf_7d79220c74c907b6_0004.07e2_none_99dee6c148ef9332
lock!0e00000089e16c00e40800008808000000000000000000001820719b0314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\micr..ties_b03f5f7f11d50a3a_000a.0000_none_26248fa63945e711
lock!0c00000089e16c00e40800008808000000000000000000001820719b0314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\micr..ions_31bf3856ad364e35_0004.0005_none_29fb1b4caf46359f
lock!0a00000089e16c00e40800008808000000000000000000001820719b0314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\syst..vity_31bf3856ad364e35_0004.0005_none_1b13e2ad9f564705
lock!0800000089e16c00e40800008808000000000000000000001820719b0314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\teec..dard_7d79220c74c907b6_0004.07e2_none_9b188e4dd326a5a9
lock!0600000089e16c00e40800008808000000000000000000001820719b0314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35
lock!0400000089e16c00e40800008808000000000000000000001820719b0314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd..tion_0000000000000000_0002.0000_none_d4004f438420bf16
lock!0200000089e16c00e40800008808000000000000000000001820719b0314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\teec...wpf_7d79220c74c907b6_0004.07e2_none_99dee6c148ef9332
lock!1c00000098e16c00e4080000880800000000000000000000d26a739b0314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\micr..ties_b03f5f7f11d50a3a_000a.0000_none_26248fa63945e711
lock!1a00000098e16c00e4080000880800000000000000000000d26a739b0314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\micr..ions_31bf3856ad364e35_0004.0005_none_29fb1b4caf46359f
lock!1800000098e16c00e4080000880800000000000000000000d26a739b0314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\syst..vity_31bf3856ad364e35_0004.0005_none_1b13e2ad9f564705
lock!1600000098e16c00e4080000880800000000000000000000d26a739b0314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\teec..dard_7d79220c74c907b6_0004.07e2_none_9b188e4dd326a5a9
lock!1400000098e16c00e4080000880800000000000000000000d26a739b0314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35
lock!1200000098e16c00e4080000880800000000000000000000d26a739b0314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd..tion_0000000000000000_0002.0000_none_d4004f438420bf16
lock!1000000098e16c00e4080000880800000000000000000000d26a739b0314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109
lock!1d000000b7e16c00e4080000880800000000000000000000884c789b0314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Families\F_lrfd..tion_0000000000000000_19048fb6c9b095f8
LastRunVersion
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Families\Gc_lrfd..tion_19048fb6c9b095f8
LastRunVersion
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Families\Gi_lrfd..tion_0000000000000000_ef1284facd236a10
LastRunVersion
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager\Applications\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109
HasRunBefore
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\teec...wpf_7d79220c74c907b6_0004.07e2_none_99dee6c148ef9332
lock!0e000000cd366d00081b0000a009000000000000000000008f5272a80314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\micr..ties_b03f5f7f11d50a3a_000a.0000_none_26248fa63945e711
lock!0c000000cd366d00081b0000a009000000000000000000008f5272a80314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\micr..ions_31bf3856ad364e35_0004.0005_none_29fb1b4caf46359f
lock!0a000000cd366d00081b0000a009000000000000000000008f5272a80314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\syst..vity_31bf3856ad364e35_0004.0005_none_1b13e2ad9f564705
lock!08000000cd366d00081b0000a009000000000000000000008f5272a80314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\teec..dard_7d79220c74c907b6_0004.07e2_none_9b188e4dd326a5a9
lock!06000000cd366d00081b0000a009000000000000000000008f5272a80314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35
lock!04000000cd366d00081b0000a009000000000000000000008f5272a80314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd..tion_0000000000000000_0002.0000_none_d4004f438420bf16
lock!02000000cd366d00081b0000a009000000000000000000008f5272a80314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\teec...wpf_7d79220c74c907b6_0004.07e2_none_99dee6c148ef9332
lock!1c000000dc366d00081b0000a00900000000000000000000acc374a80314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\micr..ties_b03f5f7f11d50a3a_000a.0000_none_26248fa63945e711
lock!1a000000dc366d00081b0000a00900000000000000000000acc374a80314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\micr..ions_31bf3856ad364e35_0004.0005_none_29fb1b4caf46359f
lock!18000000dc366d00081b0000a00900000000000000000000acc374a80314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\syst..vity_31bf3856ad364e35_0004.0005_none_1b13e2ad9f564705
lock!16000000dc366d00081b0000a00900000000000000000000acc374a80314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\teec..dard_7d79220c74c907b6_0004.07e2_none_9b188e4dd326a5a9
lock!14000000dc366d00081b0000a00900000000000000000000acc374a80314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd...exe_0000000000000000_0002.0000_none_4224d59939602c35
lock!12000000dc366d00081b0000a00900000000000000000000acc374a80314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd..tion_0000000000000000_0002.0000_none_d4004f438420bf16
lock!10000000dc366d00081b0000a00900000000000000000000acc374a80314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109
lock!1d000000fc366d00081b0000a0090000000000000000000084a579a80314db01
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
MRUListEx
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
0
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
2
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\2
NodeSlot
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\2
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\16\Shell
SniffedFolderType
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@windows.storage.dll,-34583
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@windows.storage.dll,-21824
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\16\ComDlg\{B3690E58-E961-423B-B687-386EBFD83239}
Mode
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\16\ComDlg\{B3690E58-E961-423B-B687-386EBFD83239}
LogicalViewMode
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\16\ComDlg\{B3690E58-E961-423B-B687-386EBFD83239}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\16\ComDlg\{B3690E58-E961-423B-B687-386EBFD83239}
IconSize
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\16\ComDlg\{B3690E58-E961-423B-B687-386EBFD83239}
Sort
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\16\ComDlg\{B3690E58-E961-423B-B687-386EBFD83239}
ColInfo
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\16\ComDlg\{B3690E58-E961-423B-B687-386EBFD83239}
GroupView
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\16\ComDlg\{B3690E58-E961-423B-B687-386EBFD83239}
GroupByKey:FMTID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\16\ComDlg\{B3690E58-E961-423B-B687-386EBFD83239}
GroupByKey:PID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\16\ComDlg\{B3690E58-E961-423B-B687-386EBFD83239}
GroupByDirection
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\png
0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\png
MRUListEx
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\*
0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\*
MRUListEx
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
MRUListEx
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CIDSave\Modules\GlobalSettings\ProperTreeModuleInner
ProperTreeModuleInner
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
3
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\3
NodeSlot
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\3
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\17\Shell
KnownFolderDerivedFolderType
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\17\Shell
SniffedFolderType
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CIDOpen\Modules\GlobalSettings\ProperTreeModuleInner
ProperTreeModuleInner
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\oregres.dll,-123
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\oregres.dll,-101
HKEY_CURRENT_USER_Classes\Local Settings\MrtCache\C:%5CProgram Files%5CWindowsApps%5CMicrosoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe%5Cmicrosoft.system.package.metadata%5CS-1-5-21-2246122658-3693405117-2476756634-1003-MergedResources-5.pri\1d9f5d7d5f3fe76\50e7d6fd
@{microsoft.windows.photos_2019.19071.12548.0_x64__8wekyb3d8bbwe?ms-resource://microsoft.windows.photos/files/assets/photoslogoextensions.png}
HKEY_CURRENT_USER_Classes\Local Settings\MrtCache\C:%5CProgram Files%5CWindowsApps%5CMicrosoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe%5Cmicrosoft.system.package.metadata%5CS-1-5-21-2246122658-3693405117-2476756634-1003-MergedResources-0.pri\1d9f5d7d6155f79\50e7d6fd
@{microsoft.zunemusic_10.19071.19011.0_x64__8wekyb3d8bbwe?ms-resource://microsoft.zunemusic/files/assets/fileextension.png}
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\17\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}
Mode
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\17\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}
LogicalViewMode
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\17\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\17\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}
IconSize
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\17\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}
Sort
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\17\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}
ColInfo
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\17\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}
GroupView
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\17\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}
GroupByKey:FMTID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\17\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}
GroupByKey:PID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\17\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}
GroupByDirection
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\0
NodeSlot
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\Shell
SniffedFolderType
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
Mode
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
LogicalViewMode
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
IconSize
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
Sort
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
ColInfo
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
GroupView
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
GroupByKey:FMTID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
GroupByKey:PID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
GroupByDirection
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1
NodeSlot
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\20\Shell
SniffedFolderType
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109
lock!1f000000a0476e00081b0000900100000000000000000000667312d20314db01
HKEY_CURRENT_USER_Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\Marks\lrfd..tion_0000000000000000_0002.0000_a6c481c8d3f3a109
lock!21000000b0476e00081b000090010000000000000000000028e414d20314db01
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\20\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
Mode
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\20\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
LogicalViewMode
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\20\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\20\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
IconSize
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\20\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
Sort
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\20\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
ColInfo
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\20\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
GroupView
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\20\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
GroupByKey:FMTID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\20\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
GroupByKey:PID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\20\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
GroupByDirection
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
NodeSlots
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\16\ComDlg\{B3690E58-E961-423B-B687-386EBFD83239}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
NodeSlots
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\16\ComDlg\{B3690E58-E961-423B-B687-386EBFD83239}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\16\ComDlg\{B3690E58-E961-423B-B687-386EBFD83239}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
MRUListEx
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Modules\NavPane
ExpandedState
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\17\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
NodeSlots
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Modules\NavPane
ExpandedState
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
NodeSlots
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\20\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
FFlags
There are 259 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6782000
unkown
page readonly
77F0000
trusted library allocation
page read and write
3B2F000
trusted library allocation
page read and write
B5DC000
stack
page read and write
6046000
unkown
page readonly
861B000
heap
page read and write
44AA000
trusted library allocation
page read and write
7FFEC79D0000
trusted library allocation
page execute and read and write
9434000
trusted library allocation
page read and write
344A000
trusted library allocation
page read and write
6981000
unkown
page readonly
3B27000
trusted library allocation
page read and write
3AEF000
trusted library allocation
page read and write
1A50000
heap
page read and write
57AE000
trusted library allocation
page read and write
6955000
unkown
page readonly
4516000
trusted library allocation
page read and write
6249000
unkown
page readonly
711D000
unkown
page readonly
207EB700000
heap
page read and write
5FD0000
unkown
page readonly
1A58000
heap
page read and write
29FC000
trusted library allocation
page read and write
64C5000
heap
page read and write
7EAD000
heap
page read and write
6683000
unkown
page readonly
830000
heap
page read and write
869D000
heap
page read and write
2300000
heap
page read and write
701C000
unkown
page readonly
8663000
heap
page read and write
8460000
heap
page read and write
6100000
unkown
page readonly
288F000
stack
page read and write
4DEE000
stack
page read and write
3509000
trusted library allocation
page read and write
6BA000
heap
page read and write
5FDE000
unkown
page readonly
7EF7000
heap
page read and write
6ABC000
unkown
page readonly
5199000
unkown
page readonly
67A4000
unkown
page readonly
442C000
trusted library allocation
page read and write
6A53000
unkown
page readonly
6750000
unkown
page readonly
60A2000
unkown
page readonly
290B000
trusted library allocation
page read and write
7EA7000
heap
page read and write
7EF5000
heap
page read and write
A7E000
stack
page read and write
5B42000
unkown
page readonly
8689000
heap
page read and write
3070000
trusted library allocation
page read and write
7ECB000
heap
page read and write
4DEE000
trusted library allocation
page read and write
3B1B000
trusted library allocation
page read and write
6BC9000
unkown
page readonly
61E2000
unkown
page readonly
6754000
unkown
page readonly
6AA6000
unkown
page readonly
7F80000
trusted library allocation
page read and write
6987000
unkown
page readonly
603E000
unkown
page readonly
601E000
unkown
page readonly
5805000
trusted library allocation
page read and write
C91000
unkown
page readonly
67AE000
unkown
page readonly
2B15000
trusted library allocation
page read and write
207EFC7E000
heap
page read and write
6973000
unkown
page readonly
207EDFE5000
heap
page read and write
60C0000
unkown
page readonly
6784000
unkown
page readonly
7EE1000
heap
page read and write
6504000
trusted library allocation
page read and write
3076000
trusted library allocation
page execute and read and write
60B6000
unkown
page readonly
66F6000
unkown
page readonly
583B000
trusted library allocation
page read and write
5FC2000
unkown
page readonly
5B2C000
unkown
page readonly
308B000
trusted library allocation
page execute and read and write
87BB000
heap
page read and write
79D0000
trusted library allocation
page read and write
207EDAA0000
heap
page read and write
607C000
unkown
page readonly
7E87000
heap
page read and write
5E20000
trusted library allocation
page read and write
7EA5000
heap
page read and write
6876000
trusted library allocation
page read and write
3A54000
trusted library allocation
page read and write
3140000
heap
page read and write
4E50000
heap
page read and write
674E000
trusted library allocation
page read and write
6A81000
unkown
page readonly
1A33000
trusted library allocation
page execute and read and write
4291000
trusted library allocation
page read and write
CCD000
trusted library allocation
page execute and read and write
67A6000
unkown
page readonly
3AB6000
trusted library allocation
page read and write
5B4A000
unkown
page readonly
8A8A000
stack
page read and write
5FF6000
unkown
page readonly
608A000
unkown
page readonly
213AFDF0000
heap
page read and write
60B0000
unkown
page readonly
207EDB24000
heap
page read and write
7EB3000
heap
page read and write
6012000
unkown
page readonly
3AE1000
trusted library allocation
page read and write
207EDB29000
heap
page read and write
7FFEC7AD0000
trusted library allocation
page read and write
207EFCE1000
heap
page read and write
3F0000
heap
page read and write
51AB000
unkown
page readonly
69B5000
unkown
page readonly
7105000
unkown
page readonly
8635000
heap
page read and write
3170000
heap
page read and write
207EDAC5000
heap
page read and write
5FB2000
unkown
page readonly
6192000
unkown
page readonly
701A000
unkown
page readonly
3B4B000
trusted library allocation
page read and write
6989000
unkown
page readonly
7EC7000
heap
page read and write
207EDF13000
heap
page read and write
207EFD93000
heap
page read and write
207802AB000
trusted library allocation
page read and write
3BC7000
trusted library allocation
page read and write
709D000
unkown
page readonly
2B04000
trusted library allocation
page read and write
86A3000
heap
page read and write
29FE000
trusted library allocation
page read and write
6066000
unkown
page readonly
864F000
heap
page read and write
7109000
unkown
page readonly
83CC000
heap
page read and write
6129000
unkown
page readonly
3143000
heap
page read and write
5BAB000
stack
page read and write
69E3000
unkown
page readonly
4E30000
trusted library allocation
page read and write
3B0B000
trusted library allocation
page read and write
676A000
unkown
page readonly
93B000
heap
page read and write
6A87000
unkown
page readonly
7F13000
heap
page read and write
6991000
unkown
page readonly
5193000
unkown
page readonly
516B000
unkown
page readonly
86AD000
heap
page read and write
DE5000
unkown
page readonly
66F4000
unkown
page readonly
63CE000
heap
page read and write
70E1000
unkown
page readonly
6014000
unkown
page readonly
8CEE000
trusted library allocation
page read and write
5FD4000
unkown
page readonly
30A0000
trusted library allocation
page read and write
676C000
unkown
page readonly
6AAA000
unkown
page readonly
207EFBF0000
heap
page read and write
207EB7E0000
heap
page read and write
3B3B000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
5FB4000
unkown
page readonly
207EDB5B000
heap
page read and write
5B0C000
unkown
page readonly
5B26000
unkown
page readonly
6262000
unkown
page readonly
698D000
unkown
page readonly
64B2000
heap
page read and write
6A49000
unkown
page readonly
69FB000
unkown
page readonly
8697000
heap
page read and write
6070000
unkown
page readonly
9543000
trusted library allocation
page read and write
CBDF000
trusted library allocation
page read and write
451C000
trusted library allocation
page read and write
3AB0000
trusted library allocation
page read and write
587E000
stack
page read and write
640000
heap
page read and write
70FF000
unkown
page readonly
720D000
heap
page read and write
8BD0000
trusted library allocation
page read and write
2A5C000
trusted library allocation
page read and write
6E8000
heap
page read and write
28D1000
trusted library allocation
page read and write
8653000
heap
page read and write
207EDACB000
heap
page read and write
709F000
unkown
page readonly
3B39000
trusted library allocation
page read and write
7E8D000
heap
page read and write
6284000
unkown
page readonly
7049000
unkown
page readonly
207EB7FE000
heap
page read and write
6993000
unkown
page readonly
6965000
unkown
page readonly
5D83000
trusted library allocation
page read and write
207EFCDD000
heap
page read and write
6090000
unkown
page readonly
7870000
trusted library allocation
page read and write
5D80000
trusted library allocation
page read and write
87D3000
heap
page read and write
207EDFE0000
heap
page read and write
F00000
trusted library allocation
page read and write
213AFE50000
heap
page read and write
708B000
unkown
page readonly
218555C0000
heap
page read and write
6AFF000
unkown
page readonly
5FCE000
unkown
page readonly
6780000
unkown
page readonly
DC8F000
heap
page read and write
722000
heap
page read and write
619C000
unkown
page readonly
6438000
heap
page read and write
6A47000
unkown
page readonly
5B18000
unkown
page readonly
6E8000
heap
page read and write
6002000
unkown
page readonly
207F1A0D000
heap
page read and write
6C15000
unkown
page readonly
6A57000
unkown
page readonly
70F7000
unkown
page readonly
7980000
trusted library allocation
page execute and read and write
2B37000
trusted library allocation
page read and write
7FFEC78CD000
trusted library allocation
page execute and read and write
AA97000
heap
page read and write
51A3000
unkown
page readonly
4416000
trusted library allocation
page read and write
6148000
unkown
page readonly
8615000
heap
page read and write
7016000
unkown
page readonly
705C000
unkown
page readonly
69F5000
unkown
page readonly
71FE000
heap
page read and write
4F10000
heap
page read and write
7FFEC7A60000
trusted library allocation
page read and write
32DA000
trusted library allocation
page read and write
518B000
unkown
page readonly
5B0A000
unkown
page readonly
670C000
unkown
page readonly
44A0000
trusted library allocation
page read and write
6AA2000
unkown
page readonly
604C000
unkown
page readonly
711B000
unkown
page readonly
5FE2000
unkown
page readonly
7E89000
heap
page read and write
7F60000
trusted library allocation
page execute and read and write
69A000
heap
page read and write
6295000
unkown
page readonly
6008000
unkown
page readonly
6F8000
heap
page read and write
7131000
unkown
page readonly
207EDB09000
heap
page read and write
3ADB000
trusted library allocation
page read and write
6BF1000
unkown
page readonly
7E9F000
heap
page read and write
44F0000
trusted library allocation
page read and write
207EFCC9000
heap
page read and write
5189000
unkown
page readonly
70B6000
unkown
page readonly
7081000
unkown
page readonly
5B14000
unkown
page readonly
B310000
trusted library allocation
page read and write
5DB0000
trusted library allocation
page read and write
60D2000
unkown
page readonly
5DF0000
trusted library allocation
page read and write
698B000
unkown
page readonly
DBA0000
heap
page read and write
3AE9000
trusted library allocation
page read and write
3296000
trusted library allocation
page read and write
EBE000
stack
page read and write
6052000
unkown
page readonly
60A4000
unkown
page readonly
83EF000
heap
page read and write
7850000
trusted library allocation
page read and write
519F000
unkown
page readonly
2A8B000
trusted library allocation
page read and write
8633000
heap
page read and write
A450000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page execute and read and write
7EC1000
heap
page read and write
6E30000
trusted library allocation
page execute and read and write
712F000
unkown
page readonly
69D9000
unkown
page readonly
6A0B000
unkown
page readonly
7800000
trusted library allocation
page read and write
6704000
unkown
page readonly
70CD000
unkown
page readonly
6700000
trusted library allocation
page read and write
7127000
unkown
page readonly
3B21000
trusted library allocation
page read and write
4DF1000
trusted library allocation
page read and write
3B03000
trusted library allocation
page read and write
4A80000
heap
page read and write
6A21000
unkown
page readonly
517F000
unkown
page readonly
207F1A13000
heap
page read and write
F44A000
stack
page read and write
3A62000
trusted library allocation
page read and write
3B47000
trusted library allocation
page read and write
6BDC000
unkown
page readonly
51E0000
heap
page execute and read and write
624B000
unkown
page readonly
E2491FB000
stack
page read and write
6024000
unkown
page readonly
8637000
heap
page read and write
6A55000
unkown
page readonly
44E6000
trusted library allocation
page read and write
207EFD5A000
heap
page read and write
6C6A000
heap
page read and write
713F000
unkown
page readonly
6530000
trusted library allocation
page read and write
207F19E0000
heap
page read and write
3B63000
trusted library allocation
page read and write
451A000
trusted library allocation
page read and write
6959000
unkown
page readonly
64D6000
trusted library allocation
page read and write
861D000
heap
page read and write
1405000
heap
page read and write
5B06000
unkown
page readonly
3AE3000
trusted library allocation
page read and write
69BB000
unkown
page readonly
44CA000
trusted library allocation
page read and write
3B3F000
trusted library allocation
page read and write
F05000
trusted library allocation
page execute and read and write
604E000
unkown
page readonly
FAC000
stack
page read and write
6706000
unkown
page readonly
8AB0000
trusted library allocation
page execute and read and write
3B59000
trusted library allocation
page read and write
5FCA000
unkown
page readonly
207EDB11000
heap
page read and write
6A15000
unkown
page readonly
693D000
unkown
page readonly
207EFD77000
heap
page read and write
7EA1000
heap
page read and write
67C0000
unkown
page readonly
20780348000
trusted library allocation
page read and write
213AFE80000
heap
page read and write
7F90000
trusted library allocation
page execute and read and write
22CE000
stack
page read and write
6BA8000
unkown
page readonly
6A37000
unkown
page readonly
3080000
trusted library allocation
page read and write
6B95000
unkown
page readonly
5BB0000
heap
page execute and read and write
8687000
heap
page read and write
6743000
trusted library allocation
page read and write
5ABE000
stack
page read and write
70D1000
unkown
page readonly
5FAA000
unkown
page readonly
69CB000
unkown
page readonly
600C000
unkown
page readonly
5FC6000
unkown
page readonly
1A30000
trusted library allocation
page read and write
82D000
stack
page read and write
34C5000
trusted library allocation
page read and write
207EFD18000
heap
page read and write
5B02000
unkown
page readonly
5B0E000
unkown
page readonly
207801C0000
trusted library allocation
page read and write
207EFCBA000
heap
page read and write
3B15000
trusted library allocation
page read and write
7FFEC7AB0000
trusted library allocation
page execute and read and write
7CCC000
stack
page read and write
7038000
unkown
page readonly
7FFEC7AC0000
trusted library allocation
page read and write
3470000
trusted library allocation
page read and write
5FEA000
unkown
page readonly
605E000
unkown
page readonly
44EC000
trusted library allocation
page read and write
674E000
unkown
page readonly
D1D9000
stack
page read and write
213AFE85000
heap
page read and write
32CB000
trusted library allocation
page read and write
69E7000
unkown
page readonly
6125000
unkown
page readonly
49AE000
stack
page read and write
3B2D000
trusted library allocation
page read and write
207EB690000
heap
page read and write
E24977D000
stack
page read and write
7C8C000
stack
page read and write
207EB640000
heap
page read and write
53EF000
stack
page read and write
8466000
heap
page read and write
696D000
unkown
page readonly
7EFF000
heap
page read and write
7EBD000
heap
page read and write
609A000
unkown
page readonly
8665000
heap
page read and write
676E000
unkown
page readonly
51A5000
unkown
page readonly
7089000
unkown
page readonly
7FFEC7996000
trusted library allocation
page execute and read and write
7062000
unkown
page readonly
70B4000
unkown
page readonly
6ED0000
unkown
page readonly
6204000
unkown
page readonly
5410000
trusted library allocation
page read and write
3B69000
trusted library allocation
page read and write
6076000
unkown
page readonly
2B26000
trusted library allocation
page read and write
4F03000
heap
page read and write
5DB0000
trusted library allocation
page read and write
BA0000
unkown
page readonly
8F14000
trusted library allocation
page read and write
6A7D000
unkown
page readonly
7FFEC78B3000
trusted library allocation
page execute and read and write
69B9000
unkown
page readonly
87A3000
heap
page read and write
69AF000
unkown
page readonly
70DD000
unkown
page readonly
2B59000
trusted library allocation
page read and write
4587000
trusted library allocation
page read and write
3AF7000
trusted library allocation
page read and write
30EE000
stack
page read and write
86A7000
heap
page read and write
3AB2000
trusted library allocation
page read and write
6762000
unkown
page readonly
8B10000
trusted library allocation
page read and write
5B1C000
unkown
page readonly
207EE153000
heap
page read and write
6A69000
unkown
page readonly
4520000
trusted library allocation
page read and write
7EE7000
heap
page read and write
5FEE000
unkown
page readonly
327E000
stack
page read and write
8B20000
trusted library allocation
page read and write
207F19E3000
heap
page read and write
7FFEC7970000
trusted library allocation
page execute and read and write
70C9000
unkown
page readonly
DC8A000
heap
page read and write
207EF624000
heap
page read and write
4473000
trusted library allocation
page read and write
7113000
unkown
page readonly
850000
unkown
page readonly
8E00000
trusted library allocation
page read and write
61C0000
unkown
page readonly
4490000
trusted library allocation
page read and write
207F1A28000
heap
page read and write
8669000
heap
page read and write
58DE000
heap
page read and write
3B35000
trusted library allocation
page read and write
66D1000
unkown
page readonly
60E6000
unkown
page readonly
706A000
unkown
page readonly
67C8000
unkown
page readonly
70F000
heap
page read and write
70A3000
unkown
page readonly
602A000
unkown
page readonly
DCCF000
heap
page read and write
64FE000
stack
page read and write
6038000
unkown
page readonly
207EF64E000
heap
page read and write
207EDB99000
heap
page read and write
4E77000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
B710000
trusted library allocation
page read and write
851000
unkown
page execute read
6696000
unkown
page readonly
69A7000
unkown
page readonly
5130000
heap
page read and write
7970000
trusted library allocation
page execute and read and write
5FFC000
unkown
page readonly
2078058E000
trusted library allocation
page read and write
6C8C000
heap
page read and write
611F000
unkown
page readonly
7091000
unkown
page readonly
207EFC71000
heap
page read and write
615D000
unkown
page readonly
6042000
unkown
page readonly
207EDB20000
heap
page read and write
2890000
heap
page read and write
6A27000
unkown
page readonly
8419000
heap
page read and write
6977000
unkown
page readonly
8798000
heap
page read and write
3AAC000
trusted library allocation
page read and write
608C000
unkown
page readonly
5F10000
unkown
page readonly
7EC5000
heap
page read and write
22E0000
heap
page read and write
F80000
heap
page read and write
207EF62F000
heap
page read and write
5175000
unkown
page readonly
6725000
unkown
page readonly
7ECF000
heap
page read and write
8D7A000
stack
page read and write
5D6E000
stack
page read and write
6A65000
unkown
page readonly
58EF000
heap
page read and write
4469000
trusted library allocation
page read and write
6219000
unkown
page readonly
6738000
unkown
page readonly
6963000
unkown
page readonly
CD3000
trusted library allocation
page read and write
7F09000
heap
page read and write
6ABA000
unkown
page readonly
6127000
unkown
page readonly
EC95F7E000
stack
page read and write
6A79000
unkown
page readonly
6AF0000
unkown
page readonly
624D000
unkown
page readonly
7960000
trusted library allocation
page read and write
6190000
unkown
page readonly
4423000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
3B01000
trusted library allocation
page read and write
678A000
unkown
page readonly
2AAF000
trusted library allocation
page read and write
719000
heap
page read and write
8647000
heap
page read and write
5770000
trusted library allocation
page read and write
6DF0000
trusted library allocation
page execute and read and write
5FC8000
unkown
page readonly
69DB000
unkown
page readonly
6AEE000
unkown
page readonly
4DF6000
trusted library allocation
page read and write
207EFCBF000
heap
page read and write
6690000
heap
page read and write
6687000
unkown
page readonly
6016000
unkown
page readonly
69EB000
unkown
page readonly
62C0000
heap
page read and write
6133000
unkown
page readonly
8569000
heap
page read and write
69A3000
unkown
page readonly
5833000
trusted library allocation
page read and write
7EBB000
heap
page read and write
207EE16C000
heap
page read and write
5177000
unkown
page readonly
6BB8000
unkown
page readonly
519D000
unkown
page readonly
69D1000
unkown
page readonly
6A6F000
unkown
page readonly
7014000
unkown
page readonly
CF9B000
stack
page read and write
67BA000
unkown
page readonly
207EBA75000
heap
page read and write
7EFB000
heap
page read and write
4DB0000
trusted library allocation
page read and write
63C0000
heap
page read and write
5B08000
unkown
page readonly
3B57000
trusted library allocation
page read and write
5B30000
unkown
page readonly
443C000
trusted library allocation
page read and write
697B000
unkown
page readonly
228F000
stack
page read and write
4477000
trusted library allocation
page read and write
F07000
stack
page read and write
7FFEC7ACB000
trusted library allocation
page read and write
5D89000
trusted library allocation
page read and write
9F4000
heap
page read and write
70D5000
unkown
page readonly
60EA000
unkown
page readonly
8685000
heap
page read and write
7EDD000
heap
page read and write
6A3B000
unkown
page readonly
7C20000
trusted library allocation
page execute and read and write
3AED000
trusted library allocation
page read and write
5D86000
trusted library allocation
page read and write
207F19EE000
heap
page read and write
4434000
trusted library allocation
page read and write
207EDAE2000
heap
page read and write
8673000
heap
page read and write
3A69000
trusted library allocation
page read and write
6010000
unkown
page readonly
67C6000
unkown
page readonly
207EDB93000
heap
page read and write
6969000
unkown
page readonly
4494000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page read and write
169E000
stack
page read and write
6939000
unkown
page readonly
CE0000
trusted library allocation
page read and write
9790000
trusted library allocation
page execute and read and write
6018000
unkown
page readonly
3B23000
trusted library allocation
page read and write
7FFEC78D4000
trusted library allocation
page read and write
8CE0000
trusted library allocation
page read and write
8675000
heap
page read and write
9EE000
heap
page read and write
674A000
unkown
page readonly
603C000
unkown
page readonly
6764000
unkown
page readonly
4A2E000
stack
page read and write
87AF000
heap
page read and write
5B46000
unkown
page readonly
6137000
unkown
page readonly
6967000
unkown
page readonly
6890000
trusted library allocation
page read and write
66F2000
unkown
page readonly
70CB000
unkown
page readonly
7153000
unkown
page readonly
6786000
unkown
page readonly
6C40000
heap
page read and write
4486000
trusted library allocation
page read and write
B7E0000
trusted library allocation
page read and write
207EDB78000
heap
page read and write
5FAE000
unkown
page readonly
3291000
trusted library allocation
page read and write
70D3000
unkown
page readonly
6A11000
unkown
page readonly
72E000
heap
page read and write
6B10000
unkown
page readonly
44BE000
trusted library allocation
page read and write
4418000
trusted library allocation
page read and write
740000
heap
page read and write
8380000
trusted library allocation
page execute and read and write
6714000
unkown
page readonly
207EFCE9000
heap
page read and write
516F000
unkown
page readonly
7FF458B90000
trusted library allocation
page execute and read and write
5195000
unkown
page readonly
6064000
unkown
page readonly
6196000
unkown
page readonly
677C000
unkown
page readonly
7101000
unkown
page readonly
20780428000
trusted library allocation
page read and write
6A1D000
unkown
page readonly
6947000
unkown
page readonly
7121000
unkown
page readonly
5E30000
trusted library allocation
page read and write
6A13000
unkown
page readonly
FE0000
heap
page read and write
207EE0E0000
heap
page read and write
8B00000
trusted library allocation
page read and write
619A000
unkown
page readonly
6B29000
unkown
page readonly
8452000
heap
page read and write
60DC000
unkown
page readonly
5B16000
unkown
page readonly
6113000
unkown
page readonly
5413000
trusted library allocation
page read and write
8F32000
trusted library allocation
page read and write
218539B0000
heap
page read and write
207ED410000
trusted library allocation
page read and write
EC9617E000
stack
page read and write
341B000
trusted library allocation
page read and write
6E50000
trusted library allocation
page execute and read and write
213AFDD0000
heap
page read and write
2B48000
trusted library allocation
page read and write
6A05000
unkown
page readonly
58C3000
heap
page read and write
207EFC32000
heap
page read and write
6796000
unkown
page readonly
86ED000
heap
page read and write
207EB9B0000
heap
page read and write
3175000
heap
page read and write
E249B7D000
stack
page read and write
6A4B000
unkown
page readonly
6F2000
heap
page read and write
207EE164000
heap
page read and write
69DF000
unkown
page readonly
6FF000
heap
page read and write
CEA000
trusted library allocation
page execute and read and write
64E0000
trusted library allocation
page read and write
213AFE99000
heap
page read and write
6074000
unkown
page readonly
5B6E000
stack
page read and write
8B60000
trusted library allocation
page read and write
6440000
heap
page read and write
8D5000
stack
page read and write
79A0000
trusted library allocation
page execute and read and write
33BF000
trusted library allocation
page read and write
6A45000
unkown
page readonly
8C70000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
8643000
heap
page read and write
4AE0000
heap
page read and write
4F6C000
heap
page read and write
14C2000
heap
page read and write
706C000
unkown
page readonly
DCE3000
heap
page read and write
699D000
unkown
page readonly
5FAC000
unkown
page readonly
CF5B000
stack
page read and write
7FFEC78B4000
trusted library allocation
page read and write
39CF000
trusted library allocation
page read and write
207805E9000
trusted library allocation
page read and write
6A61000
unkown
page readonly
207EE18C000
heap
page read and write
6AB8000
unkown
page readonly
711F000
unkown
page readonly
5B2A000
unkown
page readonly
3B53000
trusted library allocation
page read and write
6054000
unkown
page readonly
83A8000
heap
page read and write
3A6D000
trusted library allocation
page read and write
690000
heap
page read and write
5790000
trusted library allocation
page read and write
6961000
unkown
page readonly
603A000
unkown
page readonly
67BC000
unkown
page readonly
7F11000
heap
page read and write
5197000
unkown
page readonly
44C8000
trusted library allocation
page read and write
87B9000
heap
page read and write
5169000
unkown
page readonly
609C000
unkown
page readonly
7139000
unkown
page readonly
D3E000
stack
page read and write
5FF0000
unkown
page readonly
44C4000
trusted library allocation
page read and write
70F5000
unkown
page readonly
3B51000
trusted library allocation
page read and write
7F19000
heap
page read and write
6BEF000
unkown
page readonly
60F4000
unkown
page readonly
694D000
unkown
page readonly
3AD7000
trusted library allocation
page read and write
207900B7000
trusted library allocation
page read and write
6500000
trusted library allocation
page read and write
207EDB1C000
heap
page read and write
694B000
unkown
page readonly
7F0F000
heap
page read and write
7F50000
trusted library allocation
page read and write
704B000
unkown
page readonly
DC04000
heap
page read and write
604A000
unkown
page readonly
7F40000
trusted library allocation
page read and write
207EB960000
heap
page read and write
6AC0000
unkown
page readonly
AA50000
heap
page read and write
4504000
trusted library allocation
page read and write
7EB7000
heap
page read and write
7F70000
trusted library allocation
page execute and read and write
865F000
heap
page read and write
438D000
trusted library allocation
page read and write
6953000
unkown
page readonly
3B31000
trusted library allocation
page read and write
44FC000
trusted library allocation
page read and write
3B49000
trusted library allocation
page read and write
3B2B000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
6670000
trusted library allocation
page read and write
1490000
heap
page read and write
696B000
unkown
page readonly
862D000
heap
page read and write
7F17000
heap
page read and write
3AF5000
trusted library allocation
page read and write
144E000
stack
page read and write
85D0000
heap
page read and write
6AB6000
unkown
page readonly
5FB6000
unkown
page readonly
4526000
trusted library allocation
page read and write
5173000
unkown
page readonly
6260000
unkown
page readonly
703000
heap
page read and write
7129000
unkown
page readonly
7EDF000
heap
page read and write
207805AD000
trusted library allocation
page read and write
612B000
unkown
page readonly
6A2D000
unkown
page readonly
5B40000
unkown
page readonly
7103000
unkown
page readonly
44AE000
trusted library allocation
page read and write
6712000
unkown
page readonly
57D4000
trusted library allocation
page read and write
70FD000
unkown
page readonly
64C0000
heap
page read and write
707F000
unkown
page readonly
7A00000
trusted library allocation
page execute and read and write
6119000
unkown
page readonly
DCB4000
heap
page read and write
673C000
unkown
page readonly
449E000
trusted library allocation
page read and write
7068000
unkown
page readonly
44DA000
trusted library allocation
page read and write
5E10000
trusted library section
page readonly
C62000
unkown
page readonly
714D000
unkown
page readonly
668B000
unkown
page readonly
6A91000
unkown
page readonly
3B37000
trusted library allocation
page read and write
69DD000
unkown
page readonly
3B5B000
trusted library allocation
page read and write
60A8000
unkown
page readonly
7860000
trusted library allocation
page execute and read and write
213AFEBA000
heap
page read and write
8699000
heap
page read and write
44E2000
trusted library allocation
page read and write
44FA000
trusted library allocation
page read and write
62FD000
heap
page read and write
CB0000
trusted library allocation
page read and write
6A6B000
unkown
page readonly
321C000
trusted library allocation
page read and write
69D7000
unkown
page readonly
70CF000
unkown
page readonly
60E4000
unkown
page readonly
8617000
heap
page read and write
62CE000
heap
page read and write
6117000
unkown
page readonly
44C0000
trusted library allocation
page read and write
862F000
heap
page read and write
3A94000
trusted library allocation
page read and write
8B83000
trusted library allocation
page read and write
207EFCB7000
heap
page read and write
7FFEC7A90000
trusted library allocation
page read and write
60D6000
unkown
page readonly
7F05000
heap
page read and write
6744000
unkown
page readonly
12D5000
stack
page read and write
4508000
trusted library allocation
page read and write
7FFEC7A9B000
trusted library allocation
page read and write
51BC000
unkown
page readonly
605C000
unkown
page readonly
6D50000
trusted library allocation
page read and write
4454000
trusted library allocation
page read and write
449A000
trusted library allocation
page read and write
207EE170000
heap
page read and write
83A0000
trusted library allocation
page read and write
6B27000
unkown
page readonly
E24953E000
stack
page read and write
8661000
heap
page read and write
BA2000
unkown
page readonly
8691000
heap
page read and write
7FFEC7A80000
trusted library allocation
page read and write
8639000
heap
page read and write
29C0000
trusted library allocation
page read and write
6560000
heap
page read and write
213AFED8000
heap
page read and write
8CD0000
trusted library allocation
page read and write
7FFEC7AE0000
trusted library allocation
page read and write
7111000
unkown
page readonly
5B12000
unkown
page readonly
DC71000
heap
page read and write
69CF000
unkown
page readonly
57B6000
trusted library allocation
page read and write
7FFEC78BD000
trusted library allocation
page execute and read and write
7FFEC7AF0000
trusted library allocation
page execute and read and write
6770000
unkown
page readonly
69F1000
unkown
page readonly
8A80000
trusted library allocation
page execute and read and write
3AA4000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
8679000
heap
page read and write
670E000
unkown
page readonly
6028000
unkown
page readonly
9430000
trusted library allocation
page read and write
69EF000
unkown
page readonly
7EEB000
heap
page read and write
3AAA000
trusted library allocation
page read and write
207EF635000
heap
page read and write
6C26000
unkown
page readonly
66EE000
unkown
page readonly
60C4000
unkown
page readonly
1A34000
trusted library allocation
page read and write
207EB8D0000
trusted library allocation
page read and write
E2490FF000
stack
page read and write
6778000
unkown
page readonly
8649000
heap
page read and write
B6DE000
stack
page read and write
695B000
unkown
page readonly
E6E000
unkown
page readonly
4395000
trusted library allocation
page read and write
3B17000
trusted library allocation
page read and write
8B80000
trusted library allocation
page read and write
63B0000
trusted library allocation
page read and write
3A6B000
trusted library allocation
page read and write
E2494FE000
stack
page read and write
6702000
unkown
page readonly
6194000
unkown
page readonly
686C000
trusted library allocation
page read and write
207EFC92000
heap
page read and write
4F00000
heap
page read and write
3AFF000
trusted library allocation
page read and write
4512000
trusted library allocation
page read and write
54E000
stack
page read and write
8CB0000
trusted library allocation
page execute and read and write
44B0000
trusted library allocation
page read and write
9780000
trusted library allocation
page execute and read and write
7EBF000
heap
page read and write
8D10000
trusted library allocation
page execute and read and write
9450000
trusted library allocation
page execute and read and write
6B84000
unkown
page readonly
44D4000
trusted library allocation
page read and write
6E40000
trusted library allocation
page read and write
207EFC08000
heap
page read and write
3AEB000
trusted library allocation
page read and write
3AA8000
trusted library allocation
page read and write
2B61000
trusted library allocation
page read and write
207EDB0D000
heap
page read and write
3130000
trusted library allocation
page execute and read and write
CAE000
stack
page read and write
6425000
heap
page read and write
6798000
unkown
page readonly
6111000
unkown
page readonly
5FDA000
unkown
page readonly
516D000
unkown
page readonly
5D90000
trusted library allocation
page read and write
6708000
unkown
page readonly
930000
heap
page read and write
6227000
unkown
page readonly
3B0F000
trusted library allocation
page read and write
60BC000
unkown
page readonly
69B7000
unkown
page readonly
606E000
unkown
page readonly
5B24000
unkown
page readonly
6A3F000
unkown
page readonly
44B8000
trusted library allocation
page read and write
307A000
trusted library allocation
page execute and read and write
5AD3000
heap
page execute and read and write
69ED000
unkown
page readonly
6088000
unkown
page readonly
5FD8000
unkown
page readonly
86A5000
heap
page read and write
869B000
heap
page read and write
5FD2000
unkown
page readonly
449C000
trusted library allocation
page read and write
3B61000
trusted library allocation
page read and write
8619000
heap
page read and write
44E8000
trusted library allocation
page read and write
869F000
heap
page read and write
207EB920000
trusted library allocation
page read and write
5827000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
3B41000
trusted library allocation
page read and write
60AC000
unkown
page readonly
207EFD89000
heap
page read and write
EC9607E000
stack
page read and write
6135000
unkown
page readonly
20780001000
trusted library allocation
page read and write
3ADD000
trusted library allocation
page read and write
7EC3000
heap
page read and write
7095000
unkown
page readonly
44A6000
trusted library allocation
page read and write
4467000
trusted library allocation
page read and write
60C8000
unkown
page readonly
5F0E000
stack
page read and write
3ACD000
trusted library allocation
page read and write
609E000
unkown
page readonly
44A2000
trusted library allocation
page read and write
69FD000
unkown
page readonly
351C000
trusted library allocation
page read and write
7A10000
trusted library allocation
page execute and read and write
5FBA000
unkown
page readonly
3A75000
trusted library allocation
page read and write
7FFEC790C000
trusted library allocation
page execute and read and write
6949000
unkown
page readonly
3AD3000
trusted library allocation
page read and write
7DDE000
heap
page read and write
207EB741000
heap
page read and write
207EF63B000
heap
page read and write
6E4000
heap
page read and write
7012000
unkown
page readonly
6AB4000
unkown
page readonly
86AB000
heap
page read and write
6AB2000
unkown
page readonly
1358000
heap
page read and write
58FB000
heap
page read and write
7099000
unkown
page readonly
3A59000
trusted library allocation
page read and write
6A5F000
unkown
page readonly
6746000
unkown
page readonly
6985000
unkown
page readonly
67A8000
unkown
page readonly
CF0000
heap
page read and write
5FE0000
unkown
page readonly
207EB7D1000
heap
page read and write
6AA8000
unkown
page readonly
6700000
unkown
page readonly
FE8000
heap
page read and write
C57000
unkown
page readonly
8C90000
trusted library allocation
page execute and read and write
3A73000
trusted library allocation
page read and write
6740000
unkown
page readonly
7E91000
heap
page read and write
3B19000
trusted library allocation
page read and write
6A19000
unkown
page readonly
DC77000
heap
page read and write
5B5D000
unkown
page readonly
4421000
trusted library allocation
page read and write
6884000
trusted library allocation
page read and write
5B48000
unkown
page readonly
44B6000
trusted library allocation
page read and write
60BE000
unkown
page readonly
34B4000
trusted library allocation
page read and write
207EFC74000
heap
page read and write
693B000
unkown
page readonly
5DA0000
heap
page read and write
57B1000
trusted library allocation
page read and write
4DFD000
trusted library allocation
page read and write
207805EB000
trusted library allocation
page read and write
69B3000
unkown
page readonly
3BCB000
trusted library allocation
page read and write
1A40000
trusted library allocation
page read and write
6123000
unkown
page readonly
6AB0000
unkown
page readonly
7027000
unkown
page readonly
44F8000
trusted library allocation
page read and write
E2493F8000
stack
page read and write
5165000
unkown
page readonly
707D000
unkown
page readonly
69AB000
unkown
page readonly
207EBA30000
heap
page execute and read and write
6AAC000
unkown
page readonly
5470000
trusted library allocation
page read and write
71B000
heap
page read and write
6B25000
unkown
page readonly
450C000
trusted library allocation
page read and write
7107000
unkown
page readonly
44F2000
trusted library allocation
page read and write
6957000
unkown
page readonly
351A000
trusted library allocation
page read and write
5890000
heap
page read and write
6000000
unkown
page readonly
4E80000
trusted library allocation
page read and write
20780553000
trusted library allocation
page read and write
60B4000
unkown
page readonly
66D7000
unkown
page readonly
700F000
unkown
page readonly
8B2000
unkown
page readonly
7085000
unkown
page readonly
207EB9A0000
heap
page read and write
60DA000
unkown
page readonly
7EA9000
heap
page read and write
6A07000
unkown
page readonly
6945000
unkown
page readonly
3085000
trusted library allocation
page execute and read and write
207EFD2A000
heap
page read and write
3A6F000
trusted library allocation
page read and write
21853C95000
heap
page read and write
6A33000
unkown
page readonly
E14B000
stack
page read and write
2C39000
trusted library allocation
page read and write
3B65000
trusted library allocation
page read and write
6072000
unkown
page readonly
207EB970000
heap
page read and write
611D000
unkown
page readonly
3492000
trusted library allocation
page read and write
67B6000
unkown
page readonly
213B1850000
heap
page read and write
699B000
unkown
page readonly
7EAB000
heap
page read and write
7097000
unkown
page readonly
86A1000
heap
page read and write
83EA000
heap
page read and write
60E2000
unkown
page readonly
7EE9000
heap
page read and write
B910000
heap
page read and write
640C000
heap
page read and write
7FFEC7B00000
trusted library allocation
page read and write
14C6000
heap
page read and write
207F1A17000
heap
page read and write
207F19E9000
heap
page read and write
7125000
unkown
page readonly
6760000
unkown
page readonly
7CD0000
heap
page read and write
441F000
trusted library allocation
page read and write
693F000
unkown
page readonly
44B2000
trusted library allocation
page read and write
6004000
unkown
page readonly
60D0000
unkown
page readonly
207EFC6A000
heap
page read and write
3AFB000
trusted library allocation
page read and write
860F000
heap
page read and write
910000
heap
page read and write
6983000
unkown
page readonly
70DF000
unkown
page readonly
4430000
trusted library allocation
page read and write
6026000
unkown
page readonly
6A4D000
unkown
page readonly
5FB8000
unkown
page readonly
60AA000
unkown
page readonly
7093000
unkown
page readonly
7115000
unkown
page readonly
62B0000
heap
page read and write
F02000
trusted library allocation
page read and write
4502000
trusted library allocation
page read and write
4436000
trusted library allocation
page read and write
67A2000
unkown
page readonly
619E000
unkown
page readonly
70E7000
unkown
page readonly
615B000
unkown
page readonly
5830000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page execute and read and write
3082000
trusted library allocation
page read and write
615F000
unkown
page readonly
7083000
unkown
page readonly
207900B1000
trusted library allocation
page read and write
70E3000
unkown
page readonly
44A8000
trusted library allocation
page read and write
4496000
trusted library allocation
page read and write
4413000
trusted library allocation
page read and write
7E8B000
heap
page read and write
6748000
unkown
page readonly
712D000
unkown
page readonly
5D60000
trusted library allocation
page execute and read and write
72A000
heap
page read and write
C52000
unkown
page readonly
5B2E000
unkown
page readonly
3AE7000
trusted library allocation
page read and write
6BAA000
unkown
page readonly
2078001B000
trusted library allocation
page read and write
B95217C000
stack
page read and write
710B000
unkown
page readonly
5B3E000
unkown
page readonly
87B4000
heap
page read and write
7018000
unkown
page readonly
4492000
trusted library allocation
page read and write
207EE116000
heap
page read and write
3B07000
trusted library allocation
page read and write
21853C90000
heap
page read and write
6159000
unkown
page readonly
712B000
unkown
page readonly
207EDB50000
heap
page read and write
70A1000
unkown
page readonly
7137000
unkown
page readonly
70F3000
unkown
page readonly
6A39000
unkown
page readonly
207EE0F0000
heap
page read and write
7135000
unkown
page readonly
6730000
trusted library allocation
page read and write
44F6000
trusted library allocation
page read and write
7FFEC78C2000
trusted library allocation
page read and write
6084000
unkown
page readonly
28D6000
trusted library allocation
page read and write
DC7E000
heap
page read and write
8655000
heap
page read and write
AA88000
heap
page read and write
67B2000
unkown
page readonly
6995000
unkown
page readonly
730000
heap
page read and write
6AA4000
unkown
page readonly
CDD000
trusted library allocation
page execute and read and write
6C50000
heap
page read and write
207EB9E0000
trusted library section
page readonly
6A25000
unkown
page readonly
E248DFE000
stack
page read and write
7F15000
heap
page read and write
446D000
trusted library allocation
page read and write
5FF4000
unkown
page readonly
7F0D000
heap
page read and write
448E000
trusted library allocation
page read and write
5298000
trusted library allocation
page read and write
B7C0000
trusted library allocation
page execute and read and write
2AD1000
trusted library allocation
page read and write
317C000
heap
page read and write
6A85000
unkown
page readonly
6A83000
unkown
page readonly
70E9000
unkown
page readonly
5B32000
unkown
page readonly
5FBE000
unkown
page readonly
3B1D000
trusted library allocation
page read and write
4950000
heap
page read and write
8645000
heap
page read and write
7F1D000
heap
page read and write
EC960FF000
stack
page read and write
240E000
stack
page read and write
F70000
heap
page read and write
8AF000
unkown
page write copy
B9524FF000
stack
page read and write
8AA0000
trusted library allocation
page read and write
4441000
trusted library allocation
page read and write
695000
heap
page read and write
713B000
unkown
page readonly
207EFD73000
heap
page read and write
7880000
trusted library allocation
page execute and read and write
8CF0000
trusted library allocation
page execute and read and write
6510000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
44E0000
trusted library allocation
page read and write
207ED22D000
heap
page read and write
20780273000
trusted library allocation
page read and write
5D0000
heap
page read and write
4514000
trusted library allocation
page read and write
6A77000
unkown
page readonly
7FFEC7A50000
trusted library allocation
page read and write
70EB000
unkown
page readonly
675A000
unkown
page readonly
131B000
heap
page read and write
6B40000
unkown
page readonly
69B1000
unkown
page readonly
7FFEC7ACF000
trusted library allocation
page read and write
7FFEC796C000
trusted library allocation
page execute and read and write
14B7000
trusted library allocation
page read and write
E249638000
stack
page read and write
5474000
trusted library allocation
page read and write
675E000
unkown
page readonly
7EFD000
heap
page read and write
7117000
unkown
page readonly
66D9000
unkown
page readonly
312C000
stack
page read and write
8675000
heap
page read and write
450A000
trusted library allocation
page read and write
44D6000
trusted library allocation
page read and write
69A1000
unkown
page readonly
20780242000
trusted library allocation
page read and write
70D9000
unkown
page readonly
6997000
unkown
page readonly
6758000
unkown
page readonly
207EDB8F000
heap
page read and write
865D000
heap
page read and write
5450000
trusted library allocation
page execute and read and write
5928000
heap
page read and write
69F7000
unkown
page readonly
3B45000
trusted library allocation
page read and write
6A1B000
unkown
page readonly
207EF5F0000
heap
page read and write
714B000
unkown
page readonly
7EF1000
heap
page read and write
3BB7000
trusted library allocation
page read and write
64D0000
trusted library allocation
page read and write
5D80000
trusted library allocation
page read and write
5179000
unkown
page readonly
5DA0000
heap
page read and write
66CD000
unkown
page readonly
B95247F000
stack
page read and write
4524000
trusted library allocation
page read and write
21853A38000
heap
page read and write
6217000
unkown
page readonly
66DC000
stack
page read and write
79E0000
trusted library allocation
page execute and read and write
7141000
unkown
page readonly
70FB000
unkown
page readonly
64A9000
heap
page read and write
44FE000
trusted library allocation
page read and write
207EB783000
heap
page read and write
2BA000
stack
page read and write
6A5B000
unkown
page readonly
6B51000
unkown
page readonly
6B2D000
unkown
page readonly
207EB785000
heap
page read and write
2303000
heap
page read and write
442A000
trusted library allocation
page read and write
600E000
unkown
page readonly
2078021E000
trusted library allocation
page read and write
6500000
trusted library allocation
page read and write
6062000
unkown
page readonly
6943000
unkown
page readonly
6044000
unkown
page readonly
863D000
heap
page read and write
448A000
trusted library allocation
page read and write
60B8000
unkown
page readonly
8C80000
trusted library allocation
page execute and read and write
2AAB000
trusted library allocation
page read and write
58EB000
heap
page read and write
3B55000
trusted library allocation
page read and write
69D3000
unkown
page readonly
670A000
unkown
page readonly
8657000
heap
page read and write
5B04000
unkown
page readonly
207EFD38000
heap
page read and write
606A000
unkown
page readonly
21853A30000
heap
page read and write
34F8000
trusted library allocation
page read and write
5480000
trusted library allocation
page read and write
7F1F000
heap
page read and write
8659000
heap
page read and write
3BC9000
trusted library allocation
page read and write
7820000
trusted library section
page read and write
3BB2000
trusted library allocation
page read and write
6B21000
unkown
page readonly
3AF1000
trusted library allocation
page read and write
2AF3000
trusted library allocation
page read and write
678C000
unkown
page readonly
519B000
unkown
page readonly
83C2000
heap
page read and write
79C0000
trusted library allocation
page read and write
6AC2000
unkown
page readonly
250E000
stack
page read and write
708F000
unkown
page readonly
3AD9000
trusted library allocation
page read and write
6A29000
unkown
page readonly
3AF3000
trusted library allocation
page read and write
87AA000
heap
page read and write
207EB73B000
heap
page read and write
3A82000
trusted library allocation
page read and write
DDA000
unkown
page readonly
3B67000
trusted library allocation
page read and write
2AE2000
trusted library allocation
page read and write
6756000
unkown
page readonly
6774000
unkown
page readonly
6131000
unkown
page readonly
6A0F000
unkown
page readonly
6A63000
unkown
page readonly
8613000
heap
page read and write
6A41000
unkown
page readonly
7149000
unkown
page readonly
685E000
stack
page read and write
5167000
unkown
page readonly
3B4F000
trusted library allocation
page read and write
66F5000
heap
page read and write
7FFEC7AC6000
trusted library allocation
page read and write
F0B000
trusted library allocation
page execute and read and write
87B7000
heap
page read and write
8671000
heap
page read and write
6A5D000
unkown
page readonly
4528000
trusted library allocation
page read and write
3B29000
trusted library allocation
page read and write
6A17000
unkown
page readonly
67AC000
unkown
page readonly
7F07000
heap
page read and write
2B5B000
trusted library allocation
page read and write
6238000
unkown
page readonly
44EE000
trusted library allocation
page read and write
F20000
trusted library allocation
page read and write
CE6000
trusted library allocation
page execute and read and write
1A3D000
trusted library allocation
page execute and read and write
34E7000
trusted library allocation
page read and write
7ED7000
heap
page read and write
213B19D0000
heap
page read and write
44CE000
trusted library allocation
page read and write
69A5000
unkown
page readonly
207EFD0B000
heap
page read and write
6489000
heap
page read and write
207EFD0F000
heap
page read and write
207EB650000
heap
page read and write
864B000
heap
page read and write
6570000
trusted library allocation
page execute and read and write
5E00000
trusted library allocation
page execute and read and write
6A71000
unkown
page readonly
B9521FE000
stack
page read and write
6736000
unkown
page readonly
3BB000
stack
page read and write
6768000
unkown
page readonly
448C000
trusted library allocation
page read and write
7EB5000
heap
page read and write
7F03000
heap
page read and write
7F0B000
heap
page read and write
8B0F000
trusted library allocation
page read and write
673A000
unkown
page readonly
207ED3D0000
heap
page execute and read and write
67A0000
unkown
page readonly
3A7B000
trusted library allocation
page read and write
60C6000
unkown
page readonly
3B6D000
trusted library allocation
page read and write
6058000
unkown
page readonly
21853990000
heap
page read and write
44B4000
trusted library allocation
page read and write
8390000
trusted library allocation
page read and write
863B000
heap
page read and write
60CE000
unkown
page readonly
2E58000
trusted library allocation
page read and write
207EFC00000
heap
page read and write
3AA6000
trusted library allocation
page read and write
452C000
trusted library allocation
page read and write
6A0D000
unkown
page readonly
677A000
unkown
page readonly
F07000
trusted library allocation
page execute and read and write
6B0000
heap
page read and write
6AEA000
unkown
page readonly
438F000
trusted library allocation
page read and write
207EB975000
heap
page read and write
346C000
trusted library allocation
page read and write
8AF0000
trusted library allocation
page execute and read and write
6ED2000
unkown
page readonly
3ACF000
trusted library allocation
page read and write
6E4000
heap
page read and write
3A5E000
trusted library allocation
page read and write
702000
heap
page read and write
70E5000
unkown
page readonly
7FFEC7966000
trusted library allocation
page read and write
6AD7000
unkown
page readonly
7EAF000
heap
page read and write
7ED9000
heap
page read and write
6098000
unkown
page readonly
845B000
heap
page read and write
7C00000
trusted library allocation
page read and write
70DB000
unkown
page readonly
5AE2000
unkown
page readonly
5F12000
unkown
page readonly
71CC000
heap
page read and write
866F000
heap
page read and write
DCEC000
heap
page read and write
66E0000
trusted library allocation
page execute and read and write
713D000
unkown
page readonly
DBD7000
heap
page read and write
6A7F000
unkown
page readonly
6121000
unkown
page readonly
8695000
heap
page read and write
66BC000
unkown
page readonly
6776000
unkown
page readonly
64EC000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
4577000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
60A6000
unkown
page readonly
698F000
unkown
page readonly
207EB789000
heap
page read and write
346A000
trusted library allocation
page read and write
3B5F000
trusted library allocation
page read and write
6BDE000
unkown
page readonly
207EE141000
heap
page read and write
85B9000
heap
page read and write
33BD000
trusted library allocation
page read and write
6941000
unkown
page readonly
6A2F000
unkown
page readonly
7EE5000
heap
page read and write
674C000
unkown
page readonly
213AFDC0000
heap
page read and write
5B10000
unkown
page readonly
8635000
heap
page read and write
69AD000
unkown
page readonly
64F6000
trusted library allocation
page read and write
518F000
unkown
page readonly
B7E2000
trusted library allocation
page read and write
518D000
unkown
page readonly
5B3C000
unkown
page readonly
207EFCA7000
heap
page read and write
5FBC000
unkown
page readonly
C6E000
stack
page read and write
866B000
heap
page read and write
7151000
unkown
page readonly
CA2000
unkown
page readonly
70ED000
unkown
page readonly
D61B000
stack
page read and write
708D000
unkown
page readonly
7F30000
trusted library allocation
page execute and read and write
601A000
unkown
page readonly
6B73000
unkown
page readonly
677E000
unkown
page readonly
862B000
heap
page read and write
697F000
unkown
page readonly
294C000
trusted library allocation
page read and write
E24967E000
stack
page read and write
3B4D000
trusted library allocation
page read and write
6A75000
unkown
page readonly
605A000
unkown
page readonly
EC95FFE000
stack
page read and write
5FEC000
unkown
page readonly
5FE6000
unkown
page readonly
8A90000
trusted library allocation
page read and write
5C6E000
stack
page read and write
6BA6000
unkown
page readonly
608E000
unkown
page readonly
3B43000
trusted library allocation
page read and write
207F1A1B000
heap
page read and write
44CC000
trusted library allocation
page read and write
452E000
trusted library allocation
page read and write
679C000
unkown
page readonly
207EFC79000
heap
page read and write
5FD6000
unkown
page readonly
44DE000
trusted library allocation
page read and write
710D000
unkown
page readonly
6A31000
unkown
page readonly
69C9000
unkown
page readonly
5AE0000
unkown
page readonly
6B62000
unkown
page readonly
207EDB15000
heap
page read and write
3B6F000
trusted library allocation
page read and write
7EB1000
heap
page read and write
5C0000
heap
page read and write
6020000
unkown
page readonly
6AAE000
unkown
page readonly
7F1B000
heap
page read and write
6FA000
heap
page read and write
7EF9000
heap
page read and write
207EB6E0000
trusted library allocation
page read and write
5171000
unkown
page readonly
8360000
heap
page read and write
8590000
heap
page read and write
3F5000
heap
page read and write
6A3D000
unkown
page readonly
FD0000
heap
page read and write
207EFD22000
heap
page read and write
7F01000
heap
page read and write
675C000
unkown
page readonly
2936000
trusted library allocation
page read and write
207EBA33000
heap
page execute and read and write
3A71000
trusted library allocation
page read and write
865B000
heap
page read and write
5187000
unkown
page readonly
E5B000
unkown
page readonly
34A3000
trusted library allocation
page read and write
6A73000
unkown
page readonly
AA80000
heap
page read and write
DBFD000
heap
page read and write
8B93000
trusted library allocation
page read and write
4432000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
5FCC000
unkown
page readonly
5B28000
unkown
page readonly
5B22000
unkown
page readonly
6975000
unkown
page readonly
CB8000
trusted library allocation
page read and write
3B05000
trusted library allocation
page read and write
8B90000
trusted library allocation
page execute and read and write
446F000
trusted library allocation
page read and write
207EFD7F000
heap
page read and write
8AE0000
trusted library allocation
page execute and read and write
5181000
unkown
page readonly
213B1900000
heap
page read and write
612F000
unkown
page readonly
861F000
heap
page read and write
6080000
unkown
page readonly
5161000
unkown
page readonly
863F000
heap
page read and write
4510000
trusted library allocation
page read and write
7EED000
heap
page read and write
54A0000
heap
page read and write
4518000
trusted library allocation
page read and write
9FB000
heap
page read and write
70D7000
unkown
page readonly
3AF9000
trusted library allocation
page read and write
4589000
trusted library allocation
page read and write
69A9000
unkown
page readonly
207EE15E000
heap
page read and write
60D4000
unkown
page readonly
207EFCF9000
heap
page read and write
66B8000
unkown
page readonly
E24987F000
stack
page read and write
60C2000
unkown
page readonly
6685000
unkown
page readonly
5191000
unkown
page readonly
7EEF000
heap
page read and write
7155000
unkown
page readonly
977000
heap
page read and write
207F1A08000
heap
page read and write
4471000
trusted library allocation
page read and write
207EDB18000
heap
page read and write
207EE174000
heap
page read and write
7EDB000
heap
page read and write
3AD1000
trusted library allocation
page read and write
84D9000
stack
page read and write
6056000
unkown
page readonly
4BEE000
stack
page read and write
6740000
trusted library allocation
page read and write
607E000
unkown
page readonly
CC4000
trusted library allocation
page read and write
6A4F000
unkown
page readonly
60B2000
unkown
page readonly
5D8E000
trusted library allocation
page read and write
5163000
unkown
page readonly
6790000
unkown
page readonly
207EBA70000
heap
page read and write
21853980000
heap
page read and write
5B20000
unkown
page readonly
CFE0000
heap
page read and write
207EBA10000
heap
page execute and read and write
7133000
unkown
page readonly
207F1A2F000
heap
page read and write
D719000
stack
page read and write
8631000
heap
page read and write
8790000
heap
page read and write
66F8000
unkown
page readonly
5FE4000
unkown
page readonly
5B34000
unkown
page readonly
6E10000
trusted library allocation
page read and write
5FF2000
unkown
page readonly
CC3000
trusted library allocation
page execute and read and write
705E000
unkown
page readonly
6E00000
trusted library allocation
page read and write
6AE8000
unkown
page readonly
60AE000
unkown
page readonly
694F000
unkown
page readonly
6A23000
unkown
page readonly
4E20000
trusted library allocation
page read and write
7FFEC78D0000
trusted library allocation
page read and write
6096000
unkown
page readonly
607A000
unkown
page readonly
4500000
trusted library allocation
page read and write
61F3000
unkown
page readonly
6788000
unkown
page readonly
8B2000
unkown
page readonly
7066000
unkown
page readonly
60F6000
unkown
page readonly
207EF1F0000
trusted library allocation
page read and write
F6E000
stack
page read and write
6086000
unkown
page readonly
66F0000
heap
page read and write
A90000
heap
page read and write
6710000
unkown
page readonly
8BB0000
heap
page read and write
452A000
trusted library allocation
page read and write
867D000
heap
page read and write
83CF000
heap
page read and write
6A59000
unkown
page readonly
6C60000
heap
page read and write
131E000
heap
page read and write
67B8000
unkown
page readonly
67B4000
unkown
page readonly
57F0000
trusted library allocation
page read and write
71ED000
heap
page read and write
66CF000
unkown
page readonly
6215000
unkown
page readonly
69E5000
unkown
page readonly
44C2000
trusted library allocation
page read and write
207EFC58000
heap
page read and write
6050000
unkown
page readonly
213B1855000
heap
page read and write
8370000
trusted library allocation
page execute and read and write
8B70000
trusted library allocation
page execute and read and write
5E40000
heap
page read and write
66DB000
unkown
page readonly
52EF000
stack
page read and write
6710000
trusted library allocation
page execute and read and write
3B11000
trusted library allocation
page read and write
601C000
unkown
page readonly
B54C000
stack
page read and write
1A43000
trusted library allocation
page read and write
4465000
trusted library allocation
page read and write
DCA7000
heap
page read and write
87A5000
heap
page read and write
60E0000
unkown
page readonly
3B0D000
trusted library allocation
page read and write
66A7000
unkown
page readonly
51BE000
unkown
page readonly
8BA0000
heap
page read and write
5FF8000
unkown
page readonly
60F0000
unkown
page readonly
CD0000
trusted library allocation
page read and write
918000
heap
page read and write
6094000
unkown
page readonly
213AFEB5000
heap
page read and write
69F3000
unkown
page readonly
44D0000
trusted library allocation
page read and write
3280000
heap
page execute and read and write
6A67000
unkown
page readonly
77E0000
trusted library allocation
page execute and read and write
4475000
trusted library allocation
page read and write
3A57000
trusted library allocation
page read and write
6022000
unkown
page readonly
6689000
unkown
page readonly
6422000
heap
page read and write
58CD000
heap
page read and write
14C0000
heap
page read and write
867B000
heap
page read and write
8611000
heap
page read and write
61AF000
unkown
page readonly
207EF212000
trusted library allocation
page read and write
6060000
unkown
page readonly
207EFD03000
heap
page read and write
6ABE000
unkown
page readonly
3B25000
trusted library allocation
page read and write
630000
heap
page read and write
34D6000
trusted library allocation
page read and write
7143000
unkown
page readonly
8667000
heap
page read and write
6092000
unkown
page readonly
207900BE000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
69D5000
unkown
page readonly
7064000
unkown
page readonly
DBA8000
heap
page read and write
60CC000
unkown
page readonly
69F9000
unkown
page readonly
4498000
trusted library allocation
page read and write
3087000
trusted library allocation
page execute and read and write
5FFE000
unkown
page readonly
9460000
trusted library allocation
page execute and read and write
864D000
heap
page read and write
EC95E7B000
stack
page read and write
6A35000
unkown
page readonly
66D3000
unkown
page readonly
70C7000
unkown
page readonly
7E8F000
heap
page read and write
7157000
unkown
page readonly
60E8000
unkown
page readonly
442E000
trusted library allocation
page read and write
5903000
heap
page read and write
87B2000
heap
page read and write
600A000
unkown
page readonly
5D88000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
207EE168000
heap
page read and write
6A43000
unkown
page readonly
51A9000
unkown
page readonly
7EB9000
heap
page read and write
7EC9000
heap
page read and write
E3E000
unkown
page read and write
7FFEC78C0000
trusted library allocation
page read and write
61D1000
unkown
page readonly
63F7000
heap
page read and write
7EE000
stack
page read and write
66EC000
unkown
page readonly
CF7000
heap
page read and write
69E1000
unkown
page readonly
70F1000
unkown
page readonly
606C000
unkown
page readonly
213AFE90000
heap
page read and write
66FA000
unkown
page readonly
3ADF000
trusted library allocation
page read and write
DCD7000
heap
page read and write
44AC000
trusted library allocation
page read and write
5B1E000
unkown
page readonly
20790001000
trusted library allocation
page read and write
66FC000
unkown
page readonly
207EDB81000
heap
page read and write
CBD0000
trusted library allocation
page read and write
207EB75C000
heap
page read and write
53F0000
trusted library allocation
page read and write
39D5000
trusted library allocation
page read and write
679E000
unkown
page readonly
6BF3000
unkown
page readonly
6709000
trusted library allocation
page read and write
207EBA40000
heap
page read and write
207EE11E000
heap
page read and write
5FB0000
unkown
page readonly
8B8C000
trusted library allocation
page read and write
58A0000
heap
page read and write
44C6000
trusted library allocation
page read and write
67C2000
unkown
page readonly
8681000
heap
page read and write
3A4F000
trusted library allocation
page read and write
7EE3000
heap
page read and write
207801C2000
trusted library allocation
page read and write
616E000
unkown
page readonly
44BC000
trusted library allocation
page read and write
6750000
trusted library allocation
page read and write
4FB5000
heap
page read and write
6999000
unkown
page readonly
7E85000
heap
page read and write
617F000
unkown
page readonly
6766000
unkown
page readonly
4F5F000
heap
page read and write
866D000
heap
page read and write
28C0000
heap
page execute and read and write
678E000
unkown
page readonly
4ECE000
stack
page read and write
207EDB6F000
heap
page read and write
6F7000
heap
page read and write
70EF000
unkown
page readonly
77D0000
trusted library allocation
page execute and read and write
D2D9000
stack
page read and write
707000
heap
page read and write
7FFEC7AA0000
trusted library allocation
page execute and read and write
4FBE000
heap
page read and write
207EFC8B000
heap
page read and write
868F000
heap
page read and write
6A03000
unkown
page readonly
8397000
heap
page read and write
3B09000
trusted library allocation
page read and write
868B000
heap
page read and write
3481000
trusted library allocation
page read and write
7123000
unkown
page readonly
6273000
unkown
page readonly
44E4000
trusted library allocation
page read and write
7119000
unkown
page readonly
6951000
unkown
page readonly
44D2000
trusted library allocation
page read and write
20780573000
trusted library allocation
page read and write
458B000
trusted library allocation
page read and write
FB0000
heap
page read and write
69CD000
unkown
page readonly
7060000
unkown
page readonly
69FF000
unkown
page readonly
5185000
unkown
page readonly
6B23000
unkown
page readonly
8580000
trusted library allocation
page execute and read and write
3AB4000
trusted library allocation
page read and write
625E000
unkown
page readonly
207900AF000
trusted library allocation
page read and write
7ECD000
heap
page read and write
51A1000
unkown
page readonly
207EFD9D000
heap
page read and write
6082000
unkown
page readonly
7E93000
heap
page read and write
5B3A000
unkown
page readonly
4506000
trusted library allocation
page read and write
3AD5000
trusted library allocation
page read and write
7FFEC7960000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
60CA000
unkown
page readonly
440E000
trusted library allocation
page read and write
8677000
heap
page read and write
5880000
trusted library allocation
page read and write
6E20000
trusted library allocation
page execute and read and write
87A8000
heap
page read and write
1310000
heap
page read and write
451E000
trusted library allocation
page read and write
60BA000
unkown
page readonly
6006000
unkown
page readonly
733000
heap
page read and write
60EE000
unkown
page readonly
78C0000
trusted library allocation
page read and write
3B5D000
trusted library allocation
page read and write
1A4D000
trusted library allocation
page execute and read and write
60EC000
unkown
page readonly
67AA000
unkown
page readonly
6971000
unkown
page readonly
7087000
unkown
page readonly
4FFC000
heap
page read and write
39CD000
trusted library allocation
page read and write
517D000
unkown
page readonly
3B6B000
trusted library allocation
page read and write
87C0000
heap
page read and write
207F1A2B000
heap
page read and write
7FFEC7A70000
trusted library allocation
page read and write
7F21000
heap
page read and write
7160000
heap
page read and write
714F000
unkown
page readonly
8AF000
unkown
page read and write
67BE000
unkown
page readonly
60DE000
unkown
page readonly
709B000
unkown
page readonly
6792000
unkown
page readonly
207EDF10000
heap
page read and write
7FFEC78DD000
trusted library allocation
page execute and read and write
207EFCCD000
heap
page read and write
49EE000
stack
page read and write
3B1F000
trusted library allocation
page read and write
611B000
unkown
page readonly
6068000
unkown
page readonly
44F4000
trusted library allocation
page read and write
3AE5000
trusted library allocation
page read and write
AAA4000
heap
page read and write
5FE8000
unkown
page readonly
645A000
heap
page read and write
207900B9000
trusted library allocation
page read and write
38D1000
trusted library allocation
page read and write
7147000
unkown
page readonly
51D0000
trusted library allocation
page read and write
6742000
unkown
page readonly
6680000
unkown
page readonly
85BF000
heap
page read and write
207EDB58000
heap
page read and write
48D8000
trusted library allocation
page read and write
3B13000
trusted library allocation
page read and write
EC95EFE000
stack
page read and write
2C30000
trusted library allocation
page read and write
4CEE000
stack
page read and write
7ED5000
heap
page read and write
6B2F000
unkown
page readonly
6A1F000
unkown
page readonly
70F9000
unkown
page readonly
7FFEC78DB000
trusted library allocation
page execute and read and write
699F000
unkown
page readonly
6D60000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
948000
heap
page read and write
CC0000
trusted library allocation
page read and write
87AD000
heap
page read and write
7ED3000
heap
page read and write
6115000
unkown
page readonly
E24997A000
stack
page read and write
6B2B000
unkown
page readonly
8651000
heap
page read and write
44EA000
trusted library allocation
page read and write
6AC6000
unkown
page readonly
44BA000
trusted library allocation
page read and write
66FE000
unkown
page readonly
5D90000
trusted library allocation
page read and write
645D000
heap
page read and write
5FFA000
unkown
page readonly
6794000
unkown
page readonly
3AFD000
trusted library allocation
page read and write
6680000
heap
page execute and read and write
3AC7000
trusted library allocation
page read and write
673E000
unkown
page readonly
6860000
trusted library allocation
page read and write
6A09000
unkown
page readonly
D46C000
stack
page read and write
6752000
unkown
page readonly
6AC4000
unkown
page readonly
6A51000
unkown
page readonly
450E000
trusted library allocation
page read and write
542D000
stack
page read and write
7FFEC78B0000
trusted library allocation
page read and write
3A60000
trusted library allocation
page read and write
6A7B000
unkown
page readonly
5AD0000
heap
page execute and read and write
8641000
heap
page read and write
54B0000
trusted library allocation
page read and write
6746000
trusted library allocation
page read and write
6A01000
unkown
page readonly
5FC4000
unkown
page readonly
3B33000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
867F000
heap
page read and write
679A000
unkown
page readonly
868D000
heap
page read and write
207EF614000
heap
page read and write
7ED1000
heap
page read and write
1312000
heap
page read and write
D36B000
stack
page read and write
5B1A000
unkown
page readonly
207EB79A000
heap
page read and write
5183000
unkown
page readonly
5B4C000
unkown
page readonly
207EFC7B000
heap
page read and write
6048000
unkown
page readonly
51E3000
heap
page execute and read and write
723000
heap
page read and write
207EB749000
heap
page read and write
8421000
heap
page read and write
710F000
unkown
page readonly
5B38000
unkown
page readonly
86A9000
heap
page read and write
14B0000
trusted library allocation
page read and write
6772000
unkown
page readonly
FB0000
trusted library allocation
page execute and read and write
5D40000
trusted library allocation
page execute and read and write
53F9000
trusted library allocation
page read and write
5B36000
unkown
page readonly
7EF3000
heap
page read and write
3ACB000
trusted library allocation
page read and write
6F0000
heap
page read and write
7145000
unkown
page readonly
51A7000
unkown
page readonly
66F0000
unkown
page readonly
3AAE000
trusted library allocation
page read and write
134B000
heap
page read and write
6A2B000
unkown
page readonly
6040000
unkown
page readonly
6748000
trusted library allocation
page read and write
E248CF3000
stack
page read and write
8683000
heap
page read and write
69E9000
unkown
page readonly
441A000
trusted library allocation
page read and write
5DC3000
trusted library allocation
page read and write
5490000
heap
page read and write
695D000
unkown
page readonly
5A7E000
stack
page read and write
207EB670000
heap
page read and write
446B000
trusted library allocation
page read and write
4522000
trusted library allocation
page read and write
8D20000
trusted library allocation
page execute and read and write
66BA000
unkown
page readonly
67B0000
unkown
page readonly
6078000
unkown
page readonly
57BD000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
DC84000
heap
page read and write
5FC0000
unkown
page readonly
60A0000
unkown
page readonly
E249A7D000
stack
page read and write
207EE18F000
heap
page read and write
5E0C000
trusted library allocation
page read and write
612D000
unkown
page readonly
DD5000
unkown
page readonly
5B44000
unkown
page readonly
207EE100000
heap
page read and write
4A6D000
stack
page read and write
517B000
unkown
page readonly
E2492FE000
stack
page read and write
696F000
unkown
page readonly
44A4000
trusted library allocation
page read and write
8693000
heap
page read and write
6A6D000
unkown
page readonly
6BDA000
unkown
page readonly
87C8000
heap
page read and write
7EA3000
heap
page read and write
697D000
unkown
page readonly
67C4000
unkown
page readonly
6979000
unkown
page readonly
60D8000
unkown
page readonly
3B3D000
trusted library allocation
page read and write
A96000
heap
page read and write
5FDC000
unkown
page readonly
6C04000
unkown
page readonly
695F000
unkown
page readonly
6AEC000
unkown
page readonly
66D5000
unkown
page readonly
8B96000
trusted library allocation
page read and write
6198000
unkown
page readonly
60F2000
unkown
page readonly
2914000
trusted library allocation
page read and write
6880000
trusted library allocation
page read and write
There are 1944 hidden memdumps, click here to show them.