IOC Report
LocalPlayback.exe

loading gif

Files

File Path
Type
Category
Malicious
LocalPlayback.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Config.Msi\6c4c8e.rbs
data
dropped
C:\Config.Msi\6c4c92.rbs
data
dropped
C:\Config.Msi\6c4c96.rbs
data
dropped
C:\Config.Msi\6c4c9a.rbs
data
dropped
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\0x0409.ini (copy)
Unicode text, UTF-16, little-endian text, with very long lines (308), with CRLF line terminators
dropped
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\0x0804.ini (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\0x0814D.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\0x0817D.tmp
Unicode text, UTF-16, little-endian text, with very long lines (308), with CRLF line terminators
dropped
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\ISS80A0.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
dropped
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\ISSetup.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
dropped
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\dat7B00.tmp
InstallShield CAB
dropped
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\dat7B01.tmp
InstallShield CAB
dropped
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\data1.cab (copy)
InstallShield CAB
dropped
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\data1.hdr (copy)
InstallShield CAB
dropped
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\lay7AEF.tmp
data
dropped
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\layout.bin (copy)
data
dropped
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\set7FB5.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\set81BD.tmp
data
dropped
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\set8289.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\setup.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\setup.ilg (copy)
Composite Document File V2 Document, Cannot read section info
dropped
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\setup.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\InstallShield Installation Information\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\setup.inx (copy)
data
dropped
C:\Program Files (x86)\LocalPlayback\Ana83C2.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\AnalyzeData.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\Aud83F2.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\AudioRender.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\D3D8452.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\D3D84EF.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\D3DCompiler_43.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\D3DX9_43.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\Eag859C.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\EagleEyeRender.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCC8669.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCCore.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCN86B8.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCN86E8.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDK.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\Ana9465.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\AnalyzeData.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\Aud9485.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\AudioIntercom.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\DsS94A6.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\DsSdk.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCA9581.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCA95A2.tmp
current ar archive
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCAlarm.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCAlarm.lib (copy)
current ar archive
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCC95A3.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCCoreDevCfg.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCD95D2.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCDisplay.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCG95F3.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCG9632.tmp
current ar archive
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCGeneralCfgMgr.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCGeneralCfgMgr.lib (copy)
current ar archive
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCI9643.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCIndustry.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCP9663.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCP9683.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCP96B3.tmp
current ar archive
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCPlayBack.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCPreview.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCPreview.lib (copy)
current ar archive
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCV96C4.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\HCVoiceTalk.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\Ope9753.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\OpenAL32.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\Str9774.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\StreamTransClient.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\Sys9794.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\SystemTransform.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\lib96F4.tmp
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\libiconv2.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\msv9724.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetSDKCom\msvcr90.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HCNetUtils.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HDF8747.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HDFileSDK.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HWD8787.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\HWDecode.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\Loc8846.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\Loc8895.tmp
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (311), with CRLF line terminators
dropped
C:\Program Files (x86)\LocalPlayback\Loc88B5.tmp
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Program Files (x86)\LocalPlayback\LocC2F3.tmp
PDF document, version 1.5, 13 pages (zip deflate encoded)
dropped
C:\Program Files (x86)\LocalPlayback\Local Playback User Manual.pdf (copy)
PDF document, version 1.5, 13 pages (zip deflate encoded)
dropped
C:\Program Files (x86)\LocalPlayback\LocalPlayback.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\LocalPlayback.ism.771 (copy)
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (311), with CRLF line terminators
dropped
C:\Program Files (x86)\LocalPlayback\LocalXml.zip (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Program Files (x86)\LocalPlayback\MP_8904.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\MP_8925.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\MP_Render.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\MP_VIE.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\Netural\Cn\,0.>(7.(K..pdf (copy)
PDF document, version 1.5, 17 pages
dropped
C:\Program Files (x86)\LocalPlayback\Netural\Cn\???A80F.tmp
PDF document, version 1.5, 17 pages
dropped
C:\Program Files (x86)\LocalPlayback\Netural\En\LocA83F.tmp
PDF document, version 1.5, 13 pages
dropped
C:\Program Files (x86)\LocalPlayback\Netural\En\Local Playback User Manual.pdf (copy)
PDF document, version 1.5, 13 pages
dropped
C:\Program Files (x86)\LocalPlayback\Ope89B2.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\OpenAL32.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\Pla89D3.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\PlayCtrl.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\Qt58AAE.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\Qt58B6B.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\Qt58C27.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\Qt58C67.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\Qt58C87.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\Qt58D82.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\Qt5Core.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\Qt5Gui.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\Qt5Network.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\Qt5PrintSupport.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\Qt5Widgets.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\Qt5Xml.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\Set8DB2.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\LocalPlayback\Set8DB3.tmp
XML 1.0 document, ASCII text
dropped
C:\Program Files (x86)\LocalPlayback\SetC2E3.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\LocalPlayback\Settings.xml (copy)
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\LocalPlayback\Setup.xml (copy)
XML 1.0 document, ASCII text
dropped
C:\Program Files (x86)\LocalPlayback\Standard\Cn\,0.>(7.(K..pdf (copy)
PDF document, version 1.5, 16 pages
dropped
C:\Program Files (x86)\LocalPlayback\Standard\Cn\???A900.tmp
PDF document, version 1.5, 16 pages
dropped
C:\Program Files (x86)\LocalPlayback\Standard\En\LocA92F.tmp
PDF document, version 1.5, 13 pages (zip deflate encoded)
dropped
C:\Program Files (x86)\LocalPlayback\Standard\En\Local Playback User Manual.pdf (copy)
PDF document, version 1.5, 13 pages (zip deflate encoded)
dropped
C:\Program Files (x86)\LocalPlayback\Sup8DC4.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\SuperRender.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\Too8DD4.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\Too8EB0.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\Too8F2E.tmp
current ar archive
dropped
C:\Program Files (x86)\LocalPlayback\ToolGuiToolkit.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\ToolShareModule.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\ToolShareModule.lib (copy)
current ar archive
dropped
C:\Program Files (x86)\LocalPlayback\Upg8FDB.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\Upg901A.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\LocalPlayback\Upgrade.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\Upgrade.xml (copy)
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\LocalPlayback\YUV9415.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\YUVProcess.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\cal8412.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\calib.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\gdi85CC.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\gdiplus.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\hpr.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\hpr8777.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\ico87D7.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\iconv.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qdd97B4.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qdd97C5.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qdd97D5.tmp
MSVC program database ver 7.00, 4096*387 bytes
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qdds.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qddsd.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qddsd.pdb (copy)
MSVC program database ver 7.00, 4096*387 bytes
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qgi9815.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qgi9826.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qgi9836.tmp
MSVC program database ver 7.00, 4096*365 bytes
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qgif.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qgifd.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qgifd.pdb (copy)
MSVC program database ver 7.00, 4096*365 bytes
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qic9885.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qic9896.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qic98B6.tmp
MSVC program database ver 7.00, 4096*379 bytes
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qic98F6.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qic9916.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qic9927.tmp
MSVC program database ver 7.00, 4096*389 bytes
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qicns.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qicnsd.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qicnsd.pdb (copy)
MSVC program database ver 7.00, 4096*379 bytes
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qico.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qicod.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qicod.pdb (copy)
MSVC program database ver 7.00, 4096*389 bytes
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qjp9985.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qjp99A6.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qjp99E5.tmp
MSVC program database ver 7.00, 4096*529 bytes
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qjpeg.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qjpegd.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qjpegd.pdb (copy)
MSVC program database ver 7.00, 4096*529 bytes
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qsv9A34.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qsv9A54.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qsv9A84.tmp
MSVC program database ver 7.00, 4096*401 bytes
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qsvg.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qsvgd.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qsvgd.pdb (copy)
MSVC program database ver 7.00, 4096*401 bytes
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qtg9B02.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qtg9B13.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qtg9B24.tmp
MSVC program database ver 7.00, 4096*379 bytes
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qtga.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qtgad.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qtgad.pdb (copy)
MSVC program database ver 7.00, 4096*379 bytes
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qti9B63.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qti9B93.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qti9BB3.tmp
MSVC program database ver 7.00, 4096*583 bytes
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qtiff.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qtiffd.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qtiffd.pdb (copy)
MSVC program database ver 7.00, 4096*583 bytes
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qwb9C22.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qwb9C32.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qwb9C43.tmp
MSVC program database ver 7.00, 4096*353 bytes
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qwbmp.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qwbmpd.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qwbmpd.pdb (copy)
MSVC program database ver 7.00, 4096*353 bytes
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qwe9CA2.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qwe9CB2.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qwe9CE2.tmp
MSVC program database ver 7.00, 4096*639 bytes
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qwebp.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qwebpd.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\imageformats\qwebpd.pdb (copy)
MSVC program database ver 7.00, 4096*639 bytes
dropped
C:\Program Files (x86)\LocalPlayback\lib8816.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\libxml2.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\platforms\qmi9E6A.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\platforms\qmi9E7A.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\platforms\qmi9F08.tmp
MSVC program database ver 7.00, 4096*701 bytes
dropped
C:\Program Files (x86)\LocalPlayback\platforms\qminimal.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\platforms\qminimald.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\platforms\qminimald.pdb (copy)
MSVC program database ver 7.00, 4096*701 bytes
dropped
C:\Program Files (x86)\LocalPlayback\platforms\qofA0BE.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\platforms\qofA0FE.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\platforms\qofA16C.tmp
MSVC program database ver 7.00, 4096*1307 bytes
dropped
C:\Program Files (x86)\LocalPlayback\platforms\qoffscreen.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\platforms\qoffscreend.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\platforms\qoffscreend.pdb (copy)
MSVC program database ver 7.00, 4096*1307 bytes
dropped
C:\Program Files (x86)\LocalPlayback\platforms\qwiA296.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\platforms\qwiA2F5.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\platforms\qwiA344.tmp
MSVC program database ver 7.00, 4096*3135 bytes
dropped
C:\Program Files (x86)\LocalPlayback\platforms\qwindows.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\platforms\qwindowsd.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\platforms\qwindowsd.pdb (copy)
MSVC program database ver 7.00, 4096*3135 bytes
dropped
C:\Program Files (x86)\LocalPlayback\plugins\skins\ComA87F.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\plugins\skins\ComA8AE.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\plugins\skins\CommonSkin.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\plugins\skins\CommonSkin_D.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\plugins\styles\ComA8DE.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\plugins\styles\ComA8DF.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\plugins\styles\CommonStyle.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\plugins\styles\CommonStyle_D.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqA549.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqA579.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqA5B8.tmp
MSVC program database ver 7.00, 4096*807 bytes
dropped
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqA636.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqA647.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqA657.tmp
MSVC program database ver 7.00, 4096*483 bytes
dropped
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqA6B6.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqA6D6.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqA6E7.tmp
MSVC program database ver 7.00, 4096*423 bytes
dropped
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqlite.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqlited.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqlited.pdb (copy)
MSVC program database ver 7.00, 4096*807 bytes
dropped
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqlmysql.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqlmysqld.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqlmysqld.pdb (copy)
MSVC program database ver 7.00, 4096*483 bytes
dropped
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqlpsql.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqlpsqld.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\sqldrivers\qsqlpsqld.pdb (copy)
MSVC program database ver 7.00, 4096*423 bytes
dropped
C:\Program Files (x86)\LocalPlayback\translations\LocA736.tmp
Qt Translation file
dropped
C:\Program Files (x86)\LocalPlayback\translations\LocA747.tmp
XML 1.0 document, ASCII text
dropped
C:\Program Files (x86)\LocalPlayback\translations\LocA757.tmp
Qt Translation file
dropped
C:\Program Files (x86)\LocalPlayback\translations\LocA768.tmp
XML 1.0 document, ASCII text
dropped
C:\Program Files (x86)\LocalPlayback\translations\LocalPlayBack_en.ts (copy)
XML 1.0 document, ASCII text
dropped
C:\Program Files (x86)\LocalPlayback\translations\LocalPlayBack_zh.ts (copy)
XML 1.0 document, ASCII text
dropped
C:\Program Files (x86)\LocalPlayback\translations\LocalPlayback_en.qm (copy)
Qt Translation file
dropped
C:\Program Files (x86)\LocalPlayback\translations\LocalPlayback_zh.qm (copy)
Qt Translation file
dropped
C:\Program Files (x86)\LocalPlayback\translations\TooA7A9.tmp
Qt Translation file
dropped
C:\Program Files (x86)\LocalPlayback\translations\TooA7AA.tmp
XML 1.0 document, ASCII text
dropped
C:\Program Files (x86)\LocalPlayback\translations\TooA7BB.tmp
Qt Translation file
dropped
C:\Program Files (x86)\LocalPlayback\translations\TooA7BC.tmp
XML 1.0 document, Unicode text, UTF-8 text
dropped
C:\Program Files (x86)\LocalPlayback\translations\TooA7CD.tmp
Qt Translation file
dropped
C:\Program Files (x86)\LocalPlayback\translations\TooA7CE.tmp
XML 1.0 document, ASCII text
dropped
C:\Program Files (x86)\LocalPlayback\translations\TooA7DE.tmp
Qt Translation file
dropped
C:\Program Files (x86)\LocalPlayback\translations\TooA7DF.tmp
XML 1.0 document, Unicode text, UTF-8 text
dropped
C:\Program Files (x86)\LocalPlayback\translations\ToolGuiToolkit_en.qm (copy)
Qt Translation file
dropped
C:\Program Files (x86)\LocalPlayback\translations\ToolGuiToolkit_en.ts (copy)
XML 1.0 document, ASCII text
dropped
C:\Program Files (x86)\LocalPlayback\translations\ToolGuiToolkit_zh.qm (copy)
Qt Translation file
dropped
C:\Program Files (x86)\LocalPlayback\translations\ToolGuiToolkit_zh.ts (copy)
XML 1.0 document, Unicode text, UTF-8 text
dropped
C:\Program Files (x86)\LocalPlayback\translations\ToolShareModule_en.qm (copy)
Qt Translation file
dropped
C:\Program Files (x86)\LocalPlayback\translations\ToolShareModule_en.ts (copy)
XML 1.0 document, ASCII text
dropped
C:\Program Files (x86)\LocalPlayback\translations\ToolShareModule_zh.qm (copy)
Qt Translation file
dropped
C:\Program Files (x86)\LocalPlayback\translations\ToolShareModule_zh.ts (copy)
XML 1.0 document, Unicode text, UTF-8 text
dropped
C:\Program Files (x86)\LocalPlayback\translations\qt_A788.tmp
Qt Translation file
dropped
C:\Program Files (x86)\LocalPlayback\translations\qt_A789.tmp
Qt Translation file
dropped
C:\Program Files (x86)\LocalPlayback\translations\qt_en.qm (copy)
Qt Translation file
dropped
C:\Program Files (x86)\LocalPlayback\translations\qt_zh_CN.qm (copy)
Qt Translation file
dropped
C:\Program Files (x86)\LocalPlayback\vcr902B.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\vcr92EB.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\vcredist_x64_2013.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\vcredist_x86.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\zli9454.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\LocalPlayback\zlib1.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LocalPlayback\Local Playback User Manual.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Thu Oct 24 11:56:22 2024, mtime=Thu Oct 24 11:56:22 2024, atime=Fri Nov 2 14:23:02 2018, length=1163462, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LocalPlayback\LocalPlayback.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Thu Oct 24 11:56:07 2024, mtime=Thu Oct 24 11:56:07 2024, atime=Fri Nov 2 14:29:04 2018, length=1877776, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LocalPlayback\Uninstall LocalPlayback.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Icon number=0, Archive, ctime=Thu Oct 24 11:56:05 2024, mtime=Thu Oct 24 11:56:05 2024, atime=Fri Nov 2 14:29:06 2018, length=1191936, window=hide
modified
C:\ProgramData\Package Cache\{1b103cea-f037-4504-81de-956057b442c3}\state.rsm
data
dropped
C:\ProgramData\Package Cache\{1b103cea-f037-4504-81de-956057b442c3}\vcredist_x64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Package Cache\{f65db027-aff3-4070-886a-0d87064aabb1}\state.rsm
data
dropped
C:\ProgramData\Package Cache\{f65db027-aff3-4070-886a-0d87064aabb1}\vcredist_x86.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\corecomp.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\dotnetinstaller.exe (copy)
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\dotnetinstaller.exe.config (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\DIFxData.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\FontData.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\Setup.xml (copy)
XML 1.0 document, ASCII text
dropped
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\StringTable_0x0409.ips (copy)
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\_isres_0x0409.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\default.pal (copy)
RIFF (little-endian) data, palette, 1168 bytes, data size 1028, 256 entries, extra bytes 0x6f66666c
dropped
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\isrt.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
dropped
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\license.rtf (copy)
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1054
dropped
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\setup.inx (copy)
data
dropped
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\vcredist_x64_2013.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\vcredist_x86.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\Public\Desktop\LocalPlayback.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Thu Oct 24 11:56:07 2024, mtime=Thu Oct 24 11:56:22 2024, atime=Fri Nov 2 14:29:04 2018, length=1877776, window=hide
dropped
C:\Users\user\AppData\Local\Temp\8823.tmp
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\dd_vcredist_amd64_20241024085557.log
ASCII text, with very long lines (366), with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\dd_vcredist_amd64_20241024085557_0_vcRuntimeMinimum_x64.log
Unicode text, UTF-16, little-endian text, with very long lines (588), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\dd_vcredist_amd64_20241024085557_1_vcRuntimeAdditional_x64.log
Unicode text, UTF-16, little-endian text, with very long lines (588), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20241024085549.log
ASCII text, with very long lines (361), with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20241024085549_0_vcRuntimeMinimum_x86.log
Unicode text, UTF-16, little-endian text, with very long lines (588), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20241024085549_1_vcRuntimeAdditional_x86.log
Unicode text, UTF-16, little-endian text, with very long lines (588), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\dd_vcredist_x86_20241024085603.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\{1b103cea-f037-4504-81de-956057b442c3}\.ba1\BootstrapperApplicationData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (561), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{1b103cea-f037-4504-81de-956057b442c3}\.ba1\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{1b103cea-f037-4504-81de-956057b442c3}\.ba1\logo.png
PNG image data, 64 x 64, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\{1b103cea-f037-4504-81de-956057b442c3}\.ba1\thm.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{1b103cea-f037-4504-81de-956057b442c3}\.ba1\thm.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{1b103cea-f037-4504-81de-956057b442c3}\.ba1\wixstdba.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{1b103cea-f037-4504-81de-956057b442c3}\.be\vcredist_x64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{1b103cea-f037-4504-81de-956057b442c3}\cab2C04DDC374BD96EB5C8EB8208F2C7C92
Microsoft Cabinet archive data, 5572128 bytes, 14 files, at 0x44 +A "F_CENTRAL_mfc120_x64" +A "F_CENTRAL_mfc120chs_x64", flags 0x4, number 1, extra bytes 20 in head, 369 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\Local\Temp\{1b103cea-f037-4504-81de-956057b442c3}\cab5046A8AB272BF37297BB7928664C9503
Microsoft Cabinet archive data, 1018378 bytes, 5 files, at 0x44 +A "F_CENTRAL_msvcp120_x64" +A "F_CENTRAL_msvcr120_x64", flags 0x4, number 1, extra bytes 20 in head, 80 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\Local\Temp\{1b103cea-f037-4504-81de-956057b442c3}\vcRuntimeAdditional_x64
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2013 x64 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 x64 Additional Runtime - 12.0.21005., Template: x64;1033, Revision Number: {0990E7AB-85D7-456A-B8F8-1E1E56A29571}, Create Time/Date: Sat Oct 5 11:36:18 2013, Last Saved Time/Date: Sat Oct 5 11:36:18 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.7.1623.0), Security: 2
dropped
C:\Users\user\AppData\Local\Temp\{1b103cea-f037-4504-81de-956057b442c3}\vcRuntimeMinimum_x64
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2013 x64 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 x64 Minimum Runtime - 12.0.21005., Template: x64;1033, Revision Number: {FE26E34E-F44B-4B4D-A2C9-878D87759F44}, Create Time/Date: Sat Oct 5 11:36:26 2013, Last Saved Time/Date: Sat Oct 5 11:36:26 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.7.1623.0), Security: 2
dropped
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISB8A8F.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\cor8A2E.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\dot8A6E.tmp
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\dot8A7E.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\DIF8A2D.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\Fon8A1D.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\Set8864.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\Setup.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\Str8AA0.tmp
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\_is8AD2.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\def8AC1.tmp
RIFF (little-endian) data, palette, 1168 bytes, data size 1028, 256 entries, extra bytes 0x6f66666c
dropped
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\isr8AA1.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
dropped
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\lic8854.tmp
Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1054
dropped
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\set8843.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\vcr8865.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\vcr8951.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{BF172FD2-5CBE-4AB8-9EBD-2755BF244CA6}\0x0409.ini
Unicode text, UTF-16, little-endian text, with very long lines (308), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{BF172FD2-5CBE-4AB8-9EBD-2755BF244CA6}\0x0804.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{BF172FD2-5CBE-4AB8-9EBD-2755BF244CA6}\Disk1\0x0409.ini
Unicode text, UTF-16, little-endian text, with very long lines (308), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{BF172FD2-5CBE-4AB8-9EBD-2755BF244CA6}\Disk1\0x0804.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{BF172FD2-5CBE-4AB8-9EBD-2755BF244CA6}\Disk1\ISSetup.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
dropped
C:\Users\user\AppData\Local\Temp\{BF172FD2-5CBE-4AB8-9EBD-2755BF244CA6}\Disk1\data1.cab
InstallShield CAB
dropped
C:\Users\user\AppData\Local\Temp\{BF172FD2-5CBE-4AB8-9EBD-2755BF244CA6}\Disk1\data1.hdr
InstallShield CAB
dropped
C:\Users\user\AppData\Local\Temp\{BF172FD2-5CBE-4AB8-9EBD-2755BF244CA6}\Disk1\layout.bin
data
dropped
C:\Users\user\AppData\Local\Temp\{BF172FD2-5CBE-4AB8-9EBD-2755BF244CA6}\Disk1\setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{BF172FD2-5CBE-4AB8-9EBD-2755BF244CA6}\Disk1\setup.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{BF172FD2-5CBE-4AB8-9EBD-2755BF244CA6}\Disk1\setup.inx
data
dropped
C:\Users\user\AppData\Local\Temp\{BF172FD2-5CBE-4AB8-9EBD-2755BF244CA6}\setup.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\.ba1\BootstrapperApplicationData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (560), with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\.ba1\license.rtf
Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\.ba1\logo.png
PNG image data, 64 x 64, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\.ba1\thm.wxl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\.ba1\thm.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\.ba1\wixstdba.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\.be\vcredist_x86.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\cab54A5CABBE7274D8A22EB58060AAB7623
Microsoft Cabinet archive data, many, 980926 bytes, 5 files, at 0x44 +A "F_CENTRAL_msvcp120_x86" +A "F_CENTRAL_msvcr120_x86", flags 0x4, number 1, extra bytes 20 in head, 66 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\cabB3E1576D1FEFBB979E13B1A5379E0B16
Microsoft Cabinet archive data, 4916768 bytes, 14 files, at 0x44 +A "F_CENTRAL_mfc120_x86" +A "F_CENTRAL_mfc120chs_x86", flags 0x4, number 1, extra bytes 20 in head, 296 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\vcRuntimeAdditional_x86
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2013 x86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005., Template: Intel;1033, Revision Number: {5703FD24-BF2D-4D14-AB2F-E415A0361E63}, Create Time/Date: Sat Oct 5 11:36:30 2013, Last Saved Time/Date: Sat Oct 5 11:36:30 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.7.1623.0), Security: 2
dropped
C:\Users\user\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\vcRuntimeMinimum_x86
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2013 x86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005., Template: Intel;1033, Revision Number: {E9934153-EAB1-4DA6-AA72-86C8BB1EDF2C}, Create Time/Date: Sat Oct 5 11:36:36 2013, Last Saved Time/Date: Sat Oct 5 11:36:36 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.7.1623.0), Security: 2
dropped
C:\Windows\Installer\6c4c8c.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2013 x86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005., Template: Intel;1033, Revision Number: {E9934153-EAB1-4DA6-AA72-86C8BB1EDF2C}, Create Time/Date: Sat Oct 5 11:36:36 2013, Last Saved Time/Date: Sat Oct 5 11:36:36 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.7.1623.0), Security: 2
dropped
C:\Windows\Installer\6c4c8f.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2013 x86 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005., Template: Intel;1033, Revision Number: {E9934153-EAB1-4DA6-AA72-86C8BB1EDF2C}, Create Time/Date: Sat Oct 5 11:36:36 2013, Last Saved Time/Date: Sat Oct 5 11:36:36 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.7.1623.0), Security: 2
dropped
C:\Windows\Installer\6c4c90.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2013 x86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005., Template: Intel;1033, Revision Number: {5703FD24-BF2D-4D14-AB2F-E415A0361E63}, Create Time/Date: Sat Oct 5 11:36:30 2013, Last Saved Time/Date: Sat Oct 5 11:36:30 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.7.1623.0), Security: 2
dropped
C:\Windows\Installer\6c4c93.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2013 x86 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005., Template: Intel;1033, Revision Number: {5703FD24-BF2D-4D14-AB2F-E415A0361E63}, Create Time/Date: Sat Oct 5 11:36:30 2013, Last Saved Time/Date: Sat Oct 5 11:36:30 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.7.1623.0), Security: 2
dropped
C:\Windows\Installer\6c4c94.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2013 x64 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 x64 Minimum Runtime - 12.0.21005., Template: x64;1033, Revision Number: {FE26E34E-F44B-4B4D-A2C9-878D87759F44}, Create Time/Date: Sat Oct 5 11:36:26 2013, Last Saved Time/Date: Sat Oct 5 11:36:26 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.7.1623.0), Security: 2
dropped
C:\Windows\Installer\6c4c97.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2013 x64 Minimum Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 x64 Minimum Runtime - 12.0.21005., Template: x64;1033, Revision Number: {FE26E34E-F44B-4B4D-A2C9-878D87759F44}, Create Time/Date: Sat Oct 5 11:36:26 2013, Last Saved Time/Date: Sat Oct 5 11:36:26 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.7.1623.0), Security: 2
dropped
C:\Windows\Installer\6c4c98.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2013 x64 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 x64 Additional Runtime - 12.0.21005., Template: x64;1033, Revision Number: {0990E7AB-85D7-456A-B8F8-1E1E56A29571}, Create Time/Date: Sat Oct 5 11:36:18 2013, Last Saved Time/Date: Sat Oct 5 11:36:18 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.7.1623.0), Security: 2
dropped
C:\Windows\Installer\6c4c9b.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Visual C++ 2013 x64 Additional Runtime, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 x64 Additional Runtime - 12.0.21005., Template: x64;1033, Revision Number: {0990E7AB-85D7-456A-B8F8-1E1E56A29571}, Create Time/Date: Sat Oct 5 11:36:18 2013, Last Saved Time/Date: Sat Oct 5 11:36:18 2013, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.7.1623.0), Security: 2
dropped
C:\Windows\Installer\MSI4E9F.tmp
data
dropped
C:\Windows\Installer\MSI53FF.tmp
data
dropped
C:\Windows\Installer\MSI6BFD.tmp
data
dropped
C:\Windows\Installer\MSI7005.tmp
data
dropped
C:\Windows\Installer\SourceHash{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\SourceHash{929FBD26-9020-399B-9A7A-751D61F0B942}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\SourceHash{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\SourceHash{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
modified
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\SysWOW64\mfc120chs.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc120cht.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc120deu.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc120enu.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc120esn.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc120fra.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc120ita.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc120jpn.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc120kor.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\mfc120rus.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\vcamp120.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\SysWOW64\vcomp120.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\System32\mfc120chs.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc120cht.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc120deu.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc120enu.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc120esn.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc120fra.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc120ita.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc120jpn.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc120kor.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\mfc120rus.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Windows\System32\vcamp120.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\System32\vcomp120.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Temp\~DF000369B7BB1DD334.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF0B2410DF9F7DD12C.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF0DB6E3F7990A05D9.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF10071166B599346F.TMP
data
dropped
C:\Windows\Temp\~DF11191F65FA51981A.TMP
data
dropped
C:\Windows\Temp\~DF169ADE7E6BE4F80C.TMP
data
dropped
C:\Windows\Temp\~DF1716C4667B531A4B.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF18AF089E9E5D6D31.TMP
data
dropped
C:\Windows\Temp\~DF19ACBD4DD4DF1121.TMP
data
dropped
C:\Windows\Temp\~DF1A0FF75DC1117746.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF1A139A91E83B931A.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF2432138DF0145C0F.TMP
data
dropped
C:\Windows\Temp\~DF2BC60ABEB47811EC.TMP
data
dropped
C:\Windows\Temp\~DF2ED80F8E0B5F360B.TMP
data
dropped
C:\Windows\Temp\~DF3F6B0D23C3FC00E1.TMP
data
dropped
C:\Windows\Temp\~DF42F9C4F0203B0018.TMP
data
dropped
C:\Windows\Temp\~DF4F906C13DE5C216E.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF536340503EFC7231.TMP
data
dropped
C:\Windows\Temp\~DF60705592BCC68C90.TMP
data
dropped
C:\Windows\Temp\~DF6303E8343006DCDB.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF64227C3C94EA9FE2.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF7414FE3A4A137E10.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF76FF6C876C0BFD74.TMP
data
dropped
C:\Windows\Temp\~DF81ECD322F8600CAE.TMP
data
dropped
C:\Windows\Temp\~DF838D95FF5FB04A90.TMP
data
dropped
C:\Windows\Temp\~DF8E36FD6CB8A575BE.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF90FF957E69F6F381.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF96FDBFF93CCD201D.TMP
data
dropped
C:\Windows\Temp\~DF973B7E94CBE79E86.TMP
data
dropped
C:\Windows\Temp\~DF99B886D60B172568.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFA05BF038CE6D6269.TMP
data
dropped
C:\Windows\Temp\~DFA9AA057EB6B64714.TMP
data
dropped
C:\Windows\Temp\~DFB437754F3BABA584.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFB82E0EFE2FC85EEF.TMP
data
dropped
C:\Windows\Temp\~DFB9934FBE80B3F0CD.TMP
data
dropped
C:\Windows\Temp\~DFBA3DB368CD8DA69E.TMP
data
dropped
C:\Windows\Temp\~DFC2A31685B11C92E5.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFC31C196470DB2464.TMP
data
dropped
C:\Windows\Temp\~DFC34936F97E5E09E5.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFC585B2E7668878CD.TMP
data
dropped
C:\Windows\Temp\~DFD33D888942A41EC2.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFD5101CE646CC83AA.TMP
data
dropped
C:\Windows\Temp\~DFE1DC9EE30FB3F35C.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFE23309FEAC57690D.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFEE14A837D8DC3E62.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFEF4EE7FC4F89C8E6.TMP
data
dropped
C:\Windows\Temp\~DFF68D72E0B4DBD16D.TMP
data
dropped
C:\Windows\Temp\~DFFE0F8D2EA7A0DB91.TMP
data
dropped
There are 446 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LocalPlayback.exe
"C:\Users\user\Desktop\LocalPlayback.exe"
malicious
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0F60EF52-B8AE-4C65-B672-4ECBA9C7EF64}
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{DEBE9773-6CCB-402A-A045-44F23FC2C3BA}
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{E46B7176-3FFC-40C6-B559-180C9F23E714}
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{E5BF0CED-81A6-4ECC-9E75-24C1C03367D2}
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{83415305-25EC-4DB0-8231-2F0B7AC0579F}
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe
C:\Users\user~1\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{3309AE38-3356-4998-B51D-DDEA1CA316CD}
C:\Windows\System32\SrTasks.exe
C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\vcredist_x86.exe
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\vcredist_x86.exe /q
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\vcredist_x86.exe
"C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\vcredist_x86.exe" /q -burn.unelevated BurnPipe.{DBEA4BDC-32D1-4571-8C40-9D2304124BE9} {91C7A57E-FB61-4624-AACC-1188F529C9A7} 8120
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\vcredist_x64_2013.exe
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\vcredist_x64_2013.exe /q
C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\vcredist_x64_2013.exe
"C:\Users\user\AppData\Local\Temp\{77F7B223-84F4-43AE-9469-CC107488BB8B}\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}\vcredist_x64_2013.exe" /q -burn.unelevated BurnPipe.{0942DD9A-AF4A-432E-BD2D-A92FFBEDB9E9} {F3730AF5-9EE5-4B54-A568-50E8BA9679B4} 1876
C:\ProgramData\Package Cache\{f65db027-aff3-4070-886a-0d87064aabb1}\vcredist_x86.exe
"C:\ProgramData\Package Cache\{f65db027-aff3-4070-886a-0d87064aabb1}\vcredist_x86.exe" /burn.runonce
C:\ProgramData\Package Cache\{f65db027-aff3-4070-886a-0d87064aabb1}\vcredist_x86.exe
"C:\ProgramData\Package Cache\{f65db027-aff3-4070-886a-0d87064aabb1}\vcredist_x86.exe"
C:\Program Files (x86)\LocalPlayback\LocalPlayback.exe
"C:\Program Files (x86)\LocalPlayback\LocalPlayback.exe"
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.phreedom.org/md5)
unknown
http://=0x%04x.iniMS
unknown
http://www.phreedom.org/md5)08:27
unknown
http://wixtoolset.org/schemas/thmutil/2010
unknown
http://ns.adobe.co
unknown
http://ocsp.thawte.com0
unknown
http://www.company.comt
unknown
http://qt-project.org/xml/features/report-whitespace-only-CharData
unknown
http://www.hikvision.comX
unknown
http://xml.org/sax/features/namespaces
unknown
http://deviis4.installshield.com/NetNirvana/m
unknown
http://hikdownload.hik-connect.com/4200/tool/windows/LocalPlayback/v/standard/en/LocalPlayback
unknown
http://xml.org/sax/features/namespaceshttp://xml.org/sax/features/namespace-prefixeshttp://trolltech
unknown
http://deviis4.installshield.com/NetNirvana/
unknown
http://xml.org/sax/features/namespace-prefixes
unknown
http://www.installshield.com/isetup/ProErrorCentral.asp?ErrorCode=%d
unknown
http://bugreports.qt.io/
unknown
http://hikdownload.hik-connect.com/4200/tool/windows/LocalPlayback/v/standard/en/LocalPlayback.exeF
unknown
http://www.hikvision.comCT
unknown
http://wixtoolset.org/schemas/thmutil/2010cessR
unknown
http://www.hikvision.comER
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://www.hikvision.comal
unknown
http://www.hikvision.com
unknown
http://www.hikvision.com4
unknown
http://qt-project.org/xml/features/report-start-end-entity
unknown
http://wixtoolset.org/schemas/thmutil/2010o
unknown
http://trolltech.com/xml/features/report-start-end-entity
unknown
http://www.hikvision.coml=%ld
unknown
http://www.company.com
unknown
http://trolltech.com/xml/features/report-whitespace-only-CharData
unknown
http://bugreports.qt.io/finishedServerMicrosoft-IIS/4.Microsoft-IIS/5.Netscape-Enterprise/3.WebLogic
unknown
http://hikdownload.hik-connect.com/4200/tool/windows/LocalPlayback/v/standard/en/LocalPlayback.exe
unknown
http://hikdownload.hik-connect.com.pngloseView.pngr.Q
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
hikdownload.hik-connect.com
49.51.129.211

IPs

IP
Domain
Country
Malicious
49.51.129.211
hikdownload.hik-connect.com
China

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
AoACAPIError
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup_Last
AoACAPIResult
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
FirstRun
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
LastIndex
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
NestingLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
StartNesting
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore
SRInitDone
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
SrCreateRp (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
SrCreateRp (Leave)
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
LogFile
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
ProductGuid
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
RegOwner
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6674BCC5-BC57-446B-B83B-FA53501E0FDC}
LogMode
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
RPSessionInterval
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
LastIndex
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
NestingLevel
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
StartNesting
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
NestingLevel
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppGetSnapshots (Leave)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Enter)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
SppEnumGroups (Leave)
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
BundleCachePath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
BundleUpgradeCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
BundleAddonCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
BundleDetectCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
BundlePatchCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
BundleVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
BundleProviderKey
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
BundleTag
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
EngineVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
NoElevateOnModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{f65db027-aff3-4070-886a-0d87064aabb1}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{f65db027-aff3-4070-886a-0d87064aabb1}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{f65db027-aff3-4070-886a-0d87064aabb1}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
Resume
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
{f65db027-aff3-4070-886a-0d87064aabb1}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
BundleResumeCommandLine
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
Installed
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f65db027-aff3-4070-886a-0d87064aabb1}
Resume
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6c4c8e.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6c4c8e.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7CAA08EF3739B543C898104D5339838F
21EE4A31AE32173319EEFE3BD6FDFFE3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\749C53802D6D25E4FA4120130DE488AE
21EE4A31AE32173319EEFE3BD6FDFFE3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB
21EE4A31AE32173319EEFE3BD6FDFFE3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6
21EE4A31AE32173319EEFE3BD6FDFFE3
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\vcamp120.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\345CD80E7ADAB6646B92EC09D89DDB3E
21EE4A31AE32173319EEFE3BD6FDFFE3
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\vcomp120.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3D4577A1B447A9342B48DBA7C142CFAF
21EE4A31AE32173319EEFE3BD6FDFFE3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\64D33A20AABB1EA31BF893B0436FD952
21EE4A31AE32173319EEFE3BD6FDFFE3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C3CC85108644EEB3AA9E1CC5CB146DD7
21EE4A31AE32173319EEFE3BD6FDFFE3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7C7CA8F6AFF2E883CBEF81E616CA4B73
21EE4A31AE32173319EEFE3BD6FDFFE3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F9D06247446DB3242B4D2019AEB48AEB\21EE4A31AE32173319EEFE3BD6FDFFE3
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\749C53802D6D25E4FA4120130DE488AE\21EE4A31AE32173319EEFE3BD6FDFFE3
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\749C53802D6D25E4FA4120130DE488AE\21EE4A31AE32173319EEFE3BD6FDFFE3
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\749C53802D6D25E4FA4120130DE488AE\21EE4A31AE32173319EEFE3BD6FDFFE3
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\749C53802D6D25E4FA4120130DE488AE\21EE4A31AE32173319EEFE3BD6FDFFE3
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\749C53802D6D25E4FA4120130DE488AE\21EE4A31AE32173319EEFE3BD6FDFFE3
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\749C53802D6D25E4FA4120130DE488AE\21EE4A31AE32173319EEFE3BD6FDFFE3
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\749C53802D6D25E4FA4120130DE488AE\21EE4A31AE32173319EEFE3BD6FDFFE3
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\749C53802D6D25E4FA4120130DE488AE\21EE4A31AE32173319EEFE3BD6FDFFE3
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\749C53802D6D25E4FA4120130DE488AE\21EE4A31AE32173319EEFE3BD6FDFFE3
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\749C53802D6D25E4FA4120130DE488AE\21EE4A31AE32173319EEFE3BD6FDFFE3
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02B38B369BA194F40B2B449827C49AC6\21EE4A31AE32173319EEFE3BD6FDFFE3
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v12
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v12
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v12
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x86
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x86
Installed
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x86
Major
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x86
Minor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x86
Bld
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x86
Rbld
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0
SP
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0
SPIndex
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
Install
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
InstallerType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
SPName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
UpdateVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\1FB5F95B8C762083E895C25E153AF95C
21EE4A31AE32173319EEFE3BD6FDFFE3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{13A4EE12-23EA-3371-91EE-EFB36DDFFF3E}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\21EE4A31AE32173319EEFE3BD6FDFFE3
VC_Runtime_Minimum
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\Features
VC_Runtime_Minimum
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\21EE4A31AE32173319EEFE3BD6FDFFE3
Provider
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\Features
Provider
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\21EE4A31AE32173319EEFE3BD6FDFFE3
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\Features
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\1FB5F95B8C762083E895C25E153AF95C
21EE4A31AE32173319EEFE3BD6FDFFE3
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\SourceList\Media
DiskPrompt
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\21EE4A31AE32173319EEFE3BD6FDFFE3\SourceList
LastUsedSource
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6c4c92.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6c4c92.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\12A184D1F34C9B830B1D0E09DFD26234
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2C3624DA4AD00048A0EB48E4EA6A9C3
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29C5E17263532824A9FB44A9198B2C7D
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc120cht.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1B4424E8F8F60AE4CAA643D67EFC970A
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc120chs.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\04227BBBA6F818A44ABA7B7FEFE2496C
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc120enu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7309AD69569C54C42AC77E268345112F
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc120deu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6FAD7EE0916644F428B74920FE352AD4
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc120esn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4C3045C250CA36498FBCA0172083495
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc120fra.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D0AFBC2DFFBF964C966EB1DAC5BB10A
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc120ita.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C3601DD9224EF594A96BA741F92B285B
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc120jpn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F2132BA00EBB72C42A7026C487984B6D
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc120kor.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\109A3AD6210E2E248B91AD3F87EBB4FE
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc120rus.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E03DDD0940D9F144893096F40883A78E
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\64D33A20AABB1EA31BF893B0436FD952
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6764CC2991A26973DAE5976895576F3F
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\13FB0C7B0049A443FAE4A93AA7FAB407
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\43963AE7637FF804DB402A7A010E7437\22BEFC8F7E2A1793E9ADB411DEFE1C58
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9DC64B5B6249F104C9B3468670FE0EB0\22BEFC8F7E2A1793E9ADB411DEFE1C58
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2C3624DA4AD00048A0EB48E4EA6A9C3\22BEFC8F7E2A1793E9ADB411DEFE1C58
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2C3624DA4AD00048A0EB48E4EA6A9C3\22BEFC8F7E2A1793E9ADB411DEFE1C58
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2C3624DA4AD00048A0EB48E4EA6A9C3\22BEFC8F7E2A1793E9ADB411DEFE1C58
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2C3624DA4AD00048A0EB48E4EA6A9C3\22BEFC8F7E2A1793E9ADB411DEFE1C58
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2C3624DA4AD00048A0EB48E4EA6A9C3\22BEFC8F7E2A1793E9ADB411DEFE1C58
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2C3624DA4AD00048A0EB48E4EA6A9C3\22BEFC8F7E2A1793E9ADB411DEFE1C58
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2C3624DA4AD00048A0EB48E4EA6A9C3\22BEFC8F7E2A1793E9ADB411DEFE1C58
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2C3624DA4AD00048A0EB48E4EA6A9C3\22BEFC8F7E2A1793E9ADB411DEFE1C58
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2C3624DA4AD00048A0EB48E4EA6A9C3\22BEFC8F7E2A1793E9ADB411DEFE1C58
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2C3624DA4AD00048A0EB48E4EA6A9C3\22BEFC8F7E2A1793E9ADB411DEFE1C58
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29C5E17263532824A9FB44A9198B2C7D\22BEFC8F7E2A1793E9ADB411DEFE1C58
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29C5E17263532824A9FB44A9198B2C7D\22BEFC8F7E2A1793E9ADB411DEFE1C58
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29C5E17263532824A9FB44A9198B2C7D\22BEFC8F7E2A1793E9ADB411DEFE1C58
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29C5E17263532824A9FB44A9198B2C7D\22BEFC8F7E2A1793E9ADB411DEFE1C58
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29C5E17263532824A9FB44A9198B2C7D\22BEFC8F7E2A1793E9ADB411DEFE1C58
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29C5E17263532824A9FB44A9198B2C7D\22BEFC8F7E2A1793E9ADB411DEFE1C58
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29C5E17263532824A9FB44A9198B2C7D\22BEFC8F7E2A1793E9ADB411DEFE1C58
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29C5E17263532824A9FB44A9198B2C7D\22BEFC8F7E2A1793E9ADB411DEFE1C58
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29C5E17263532824A9FB44A9198B2C7D\22BEFC8F7E2A1793E9ADB411DEFE1C58
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29C5E17263532824A9FB44A9198B2C7D\22BEFC8F7E2A1793E9ADB411DEFE1C58
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v12
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v12
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_x86,v12
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
Install
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
InstallerType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
SP
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
SPIndex
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
SPName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
UpdateVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\B696E639D8C084A389FD43F4AEE41193
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{F8CFEB22-A2E7-3971-9EDA-4B11EDEFC185}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\22BEFC8F7E2A1793E9ADB411DEFE1C58
VC_Runtime_Additional
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\Features
VC_Runtime_Additional
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\22BEFC8F7E2A1793E9ADB411DEFE1C58
Provider
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\Features
Provider
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\22BEFC8F7E2A1793E9ADB411DEFE1C58
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\Features
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\B696E639D8C084A389FD43F4AEE41193
22BEFC8F7E2A1793E9ADB411DEFE1C58
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\SourceList\Media
DiskPrompt
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\22BEFC8F7E2A1793E9ADB411DEFE1C58\SourceList
LastUsedSource
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6c4c96.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6c4c96.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1924F1CBA0F6BE8389E42C5E5538F71E
6E8D947A316B3EB3F8F540C548BE2AB9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78
6E8D947A316B3EB3F8F540C548BE2AB9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3
6E8D947A316B3EB3F8F540C548BE2AB9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3
6E8D947A316B3EB3F8F540C548BE2AB9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\vcamp120.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F6A327C410298D44EB570EB8D501F458
6E8D947A316B3EB3F8F540C548BE2AB9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\vcomp120.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1A8F0AFED61F44E4E84EC28DE6D1214F
6E8D947A316B3EB3F8F540C548BE2AB9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BE7FA62661CD24830B127381013A5C10
6E8D947A316B3EB3F8F540C548BE2AB9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\651B38B7BBE8F03319CAA27790912C9C
6E8D947A316B3EB3F8F540C548BE2AB9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E1A20017605E45A3CAE5DF61A6FC01C0
6E8D947A316B3EB3F8F540C548BE2AB9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B426C075C75D1DC40931B1088C0090B3\6E8D947A316B3EB3F8F540C548BE2AB9
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\84029B5E95851FA4EADA9BE7FB000B78\6E8D947A316B3EB3F8F540C548BE2AB9
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F4368E41AEA81DC4CA84EBFBAD8125A3\6E8D947A316B3EB3F8F540C548BE2AB9
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x64
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x64
Installed
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x64
Major
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x64
Minor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x64
Bld
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\VisualStudio\12.0\VC\Runtimes\x64
Rbld
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_amd64,v12
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_amd64,v12
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_amd64,v12
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0
SP
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0
SPIndex
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
Install
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
InstallerType
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
SP
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
SPIndex
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
SPName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeMinimum
UpdateVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
SystemComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\0FC00402C7EDE723A94E0F3FD809588F
6E8D947A316B3EB3F8F540C548BE2AB9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A749D8E6-B613-3BE3-8F5F-045C84EBA29B}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\6E8D947A316B3EB3F8F540C548BE2AB9
VC_Runtime_Minimum
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\Features
VC_Runtime_Minimum
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\6E8D947A316B3EB3F8F540C548BE2AB9
Provider
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\Features
Provider
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\6E8D947A316B3EB3F8F540C548BE2AB9
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\Features
Servicing_Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\6E8D947A316B3EB3F8F540C548BE2AB9\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\0FC00402C7EDE723A94E0F3FD809588F
6E8D947A316B3EB3F8F540C548BE2AB9
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9\SourceList\Media
DiskPrompt
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\6E8D947A316B3EB3F8F540C548BE2AB9\SourceList
LastUsedSource
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6c4c9a.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6c4c9a.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\4ED6E1912B7E9EC34BB8520DFF3F8DE8
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2A50ACECC2D5F343B4B56106C7CD5B8
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfc120cht.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\52939EBA3FB6849409FFE1D41FB52B1D
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfc120chs.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\212F32761495F3A40A7C6D06026C9774
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfc120enu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AC418779B85FEBA4AB8BD656FFE16834
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfc120deu.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B03A28739FC91464B88D752E8191270D
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfc120esn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1DF56FED5BB223A4E8C8E26B82D26C1C
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfc120fra.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2A74805657EBC1D41A288A18C61CD783
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfc120ita.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\11D968317BDA58F44A517EE687079497
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfc120jpn.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F284FEF8CCFFEDE4F9B8C16375F652D9
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfc120kor.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\22FD453CD051C3946BA422364104DD50
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfc120rus.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D73E0AF5467CC934798AAF6082026BA5
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BE7FA62661CD24830B127381013A5C10
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\485D7CCFE75F6DE38BC516CCE4521DD9
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D482454A6C77E73CBF71CFDCCB1C88F
62DBF9290209B993A9A757D1160F9B24
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7E87007EB52DC1244A51A04B2750F327\62DBF9290209B993A9A757D1160F9B24
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
PatchGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
MediaCabinet
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
ComponentVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
ProductVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
PatchSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
PatchAttributes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
PatchSequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
SharedComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\505AE2D7978A17E468233FEDB976C96E\62DBF9290209B993A9A757D1160F9B24
IsFullFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D82947F171AAC8647A7DA637A0D82BB5\62DBF9290209B993A9A757D1160F9B24
File
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B2A50ACECC2D5F343B4B56106C7CD5B8\62DBF9290209B993A9A757D1160F9B24
File
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_amd64,v12
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_amd64,v12
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_amd64,v12
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
Install
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
InstallerType
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
SP
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
SPIndex
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
SPName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DevDiv\VC\Servicing\12.0\RuntimeAdditional
UpdateVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcr120.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\msvcp120.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\vccorlib120.dll
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc120.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfc120u.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfcm120.dll
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\SharedDlls
C:\Windows\system32\mfcm120u.dll
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\msvcr120.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\msvcp120.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\vccorlib120.dll
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfc120.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfc120u.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfcm120.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Windows\system32\mfcm120u.dll
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
BundleCachePath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
BundleUpgradeCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
BundleAddonCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
BundleDetectCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
BundlePatchCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
BundleVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
BundleProviderKey
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
BundleTag
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
EngineVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
NoElevateOnModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{1b103cea-f037-4504-81de-956057b442c3}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{1b103cea-f037-4504-81de-956057b442c3}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Dependencies\{1b103cea-f037-4504-81de-956057b442c3}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
Resume
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
{1b103cea-f037-4504-81de-956057b442c3}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
BundleResumeCommandLine
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\20\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
Installed
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1b103cea-f037-4504-81de-956057b442c3}
Resume
There are 716 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6AD8C000
unkown
page readonly
326B000
trusted library allocation
page read and write
6AD54000
unkown
page readonly
1E889551000
heap
page read and write
4864000
heap
page read and write
2B82000
heap
page read and write
1E889551000
heap
page read and write
353F000
heap
page read and write
6C8FF000
unkown
page readonly
2BAC000
heap
page read and write
1E88B403000
trusted library allocation
page read and write
F75000
heap
page read and write
BC5B4FF000
stack
page read and write
45D1000
heap
page read and write
5C3F000
heap
page read and write
45CA000
heap
page read and write
2BC0000
heap
page read and write
2DBE000
heap
page read and write
1E889505000
heap
page read and write
1E88B404000
trusted library allocation
page read and write
F6F000
heap
page read and write
840000
heap
page read and write
1E889644000
trusted library allocation
page read and write
1E88B3FD000
trusted library allocation
page read and write
1E88B3FC000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
7F8000
heap
page read and write
6BC61000
unkown
page execute read
1E889644000
trusted library allocation
page read and write
2F8D000
trusted library allocation
page read and write
2CA0000
heap
page read and write
821000
heap
page read and write
82C000
heap
page read and write
953000
heap
page read and write
306E000
stack
page read and write
664000
heap
page read and write
3269000
trusted library allocation
page read and write
401E000
stack
page read and write
5E10000
trusted library allocation
page read and write
1E889640000
trusted library allocation
page read and write
1E88B400000
trusted library allocation
page read and write
64F000
heap
page read and write
30955FE000
stack
page read and write
32EF000
heap
page read and write
D65000
unkown
page readonly
1E7F87E0000
heap
page read and write
80D000
heap
page read and write
1E88B3FC000
trusted library allocation
page read and write
1E88B3FB000
trusted library allocation
page read and write
83C000
heap
page read and write
1E88B200000
heap
page read and write
3E10000
trusted library allocation
page read and write
4603000
heap
page read and write
1C1B3146000
heap
page read and write
217F98E2000
heap
page read and write
5CB0000
heap
page read and write
5A38000
heap
page read and write
393E000
heap
page read and write
217FB3D0000
heap
page read and write
81A000
heap
page read and write
64B000
heap
page read and write
976000
heap
page read and write
1E88B406000
trusted library allocation
page read and write
1E889551000
heap
page read and write
F24000
heap
page read and write
1E889551000
heap
page read and write
1E88B406000
trusted library allocation
page read and write
2BAE000
heap
page read and write
6AEBF000
unkown
page read and write
1E88B406000
trusted library allocation
page read and write
1E88B405000
trusted library allocation
page read and write
5ACF000
heap
page read and write
93A000
heap
page read and write
F24000
heap
page read and write
5C10000
heap
page read and write
45B5000
heap
page read and write
1E889550000
heap
page read and write
5105000
heap
page read and write
3204000
heap
page read and write
839000
heap
page read and write
1E88B406000
trusted library allocation
page read and write
1E88B403000
trusted library allocation
page read and write
399B000
heap
page read and write
1E88B3FB000
trusted library allocation
page read and write
64F000
heap
page read and write
6BB31000
unkown
page execute read
1E88B404000
trusted library allocation
page read and write
466F000
heap
page read and write
3F1F000
stack
page read and write
D20000
heap
page read and write
700D0000
unkown
page readonly
F44000
heap
page read and write
2DEF000
heap
page read and write
844000
heap
page read and write
479E000
stack
page read and write
6B450000
unkown
page readonly
6AC4B000
unkown
page write copy
6AE90000
unkown
page readonly
82C000
heap
page read and write
1E889551000
heap
page read and write
8F2000
heap
page read and write
F44000
heap
page read and write
666000
heap
page read and write
1E88B3FA000
trusted library allocation
page read and write
439E000
stack
page read and write
3B1000
unkown
page execute read
847000
heap
page read and write
82E000
heap
page read and write
902000
heap
page read and write
4976000
heap
page read and write
1E889715000
heap
page read and write
19F64F9000
stack
page read and write
6B3D2000
unkown
page read and write
1E889640000
trusted library allocation
page read and write
948000
heap
page read and write
894000
heap
page read and write
3ADF000
heap
page read and write
1E889511000
heap
page read and write
5B9A000
heap
page read and write
5CAF000
heap
page read and write
1E889551000
heap
page read and write
9E1000
heap
page read and write
2B84000
heap
page read and write
6B404000
unkown
page read and write
1E889541000
heap
page read and write
7FF75D260000
unkown
page readonly
1E7F87E5000
heap
page read and write
404000
unkown
page read and write
F4F000
heap
page read and write
3EA000
unkown
page readonly
6ACC1000
unkown
page execute read
63F000
heap
page read and write
2B9C000
heap
page read and write
880000
heap
page read and write
3EA000
unkown
page readonly
1CC5E7E0000
heap
page read and write
3010000
heap
page read and write
8FD000
heap
page read and write
1E88B3FF000
trusted library allocation
page read and write
7004B000
unkown
page readonly
99000
stack
page read and write
1CC5CF45000
heap
page read and write
82A000
heap
page read and write
1E88B3FE000
trusted library allocation
page read and write
1E88B405000
trusted library allocation
page read and write
1522000
trusted library allocation
page read and write
3261000
trusted library allocation
page read and write
F11000
unkown
page execute read
811000
heap
page read and write
45E9000
heap
page read and write
353F000
heap
page read and write
6C0000
heap
page read and write
4AD000
unkown
page readonly
1E88B3FC000
trusted library allocation
page read and write
8FE000
stack
page read and write
1E88B404000
trusted library allocation
page read and write
1E88B400000
trusted library allocation
page read and write
2D92000
heap
page read and write
1568000
heap
page read and write
1E88B406000
trusted library allocation
page read and write
52FD000
heap
page read and write
2363832E000
heap
page read and write
5CA2000
heap
page read and write
1F7861B8000
heap
page read and write
6BCD5000
unkown
page readonly
2ADB000
trusted library allocation
page read and write
1E88B3FA000
trusted library allocation
page read and write
82E000
heap
page read and write
675000
heap
page read and write
35A0000
heap
page read and write
5C16000
heap
page read and write
5CB1000
heap
page read and write
F4E000
heap
page read and write
F4E000
heap
page read and write
5C1D000
heap
page read and write
D12000
unkown
page execute read
833000
heap
page read and write
5A7C000
heap
page read and write
120F000
unkown
page readonly
2B84000
heap
page read and write
1272000
unkown
page read and write
1CC5E990000
heap
page read and write
2D2E000
heap
page read and write
5AB000
stack
page read and write
822000
heap
page read and write
1E88B3F2000
trusted library allocation
page read and write
6FF59000
unkown
page readonly
3900000
heap
page read and write
1E88B403000
trusted library allocation
page read and write
6C1B4000
unkown
page readonly
1CC5CF20000
heap
page read and write
3463000
heap
page read and write
3569000
heap
page read and write
98C000
heap
page read and write
1E88B3FF000
trusted library allocation
page read and write
D63000
unkown
page write copy
2B2C000
stack
page read and write
10ED000
stack
page read and write
96C000
heap
page read and write
F8E000
heap
page read and write
7FF75D277000
unkown
page readonly
1E88B3FB000
trusted library allocation
page read and write
2680000
heap
page read and write
1E889551000
heap
page read and write
4640000
heap
page read and write
83B000
heap
page read and write
8B8000
heap
page read and write
6ACB1000
unkown
page execute read
5A2C000
heap
page read and write
6B22A000
unkown
page write copy
F88000
heap
page read and write
9CD000
heap
page read and write
825000
heap
page read and write
2C12000
heap
page read and write
1E889640000
trusted library allocation
page read and write
F11000
unkown
page execute read
1520000
trusted library allocation
page read and write
80B000
heap
page read and write
5A92000
heap
page read and write
7FD000
stack
page read and write
15BC000
heap
page read and write
23638240000
heap
page read and write
2B50000
heap
page read and write
1E8894F7000
heap
page read and write
7F6000
heap
page read and write
675000
heap
page read and write
2190000
trusted library allocation
page read and write
6AC65000
unkown
page read and write
3260000
trusted library allocation
page read and write
1E88B402000
trusted library allocation
page read and write
1E889644000
trusted library allocation
page read and write
9BD000
heap
page read and write
824000
heap
page read and write
82A000
heap
page read and write
F10000
unkown
page readonly
1E889505000
heap
page read and write
85A000
heap
page read and write
2BF1000
heap
page read and write
390C000
heap
page read and write
34CD000
heap
page read and write
5ACF000
heap
page read and write
1E88953F000
heap
page read and write
1E88B401000
trusted library allocation
page read and write
5AC9000
heap
page read and write
7F8000
heap
page read and write
1E88B3FA000
trusted library allocation
page read and write
4868000
heap
page read and write
46A000
unkown
page readonly
1E88B405000
trusted library allocation
page read and write
326E000
trusted library allocation
page read and write
3A91000
heap
page read and write
5C27000
heap
page read and write
2D0C000
heap
page read and write
45B8000
heap
page read and write
46A000
unkown
page readonly
1E8894F7000
heap
page read and write
43DE000
stack
page read and write
F75000
heap
page read and write
E7E000
stack
page read and write
5C4B000
heap
page read and write
6B3B1000
unkown
page execute read
2B83000
heap
page read and write
82C000
heap
page read and write
5BD4000
heap
page read and write
3921000
trusted library allocation
page read and write
1200000
unkown
page readonly
2BF1000
heap
page read and write
217F98E1000
heap
page read and write
7FF75D261000
unkown
page execute read
217F98D3000
heap
page read and write
1E88B3FD000
trusted library allocation
page read and write
3E26000
heap
page read and write
37FB000
heap
page read and write
94A000
heap
page read and write
456C000
heap
page read and write
1E88B3FB000
trusted library allocation
page read and write
838000
heap
page read and write
5A7C000
heap
page read and write
83B000
heap
page read and write
23638336000
heap
page read and write
5AA9000
heap
page read and write
2C6D000
heap
page read and write
4600000
heap
page read and write
884000
heap
page read and write
2DDE000
heap
page read and write
2E54000
heap
page read and write
2BA0000
heap
page read and write
82C000
heap
page read and write
5A59000
heap
page read and write
6ACB7000
unkown
page read and write
1CC5CF44000
heap
page read and write
3485000
heap
page read and write
5C48000
heap
page read and write
8BE000
heap
page read and write
1E88B404000
trusted library allocation
page read and write
811000
heap
page read and write
859000
heap
page read and write
887000
heap
page read and write
1E8894F7000
heap
page read and write
82C000
heap
page read and write
1E889513000
heap
page read and write
5C4B000
heap
page read and write
2F88000
trusted library allocation
page read and write
5C50000
heap
page read and write
5B9A000
heap
page read and write
19C000
stack
page read and write
EF6000
heap
page read and write
1E88B3FE000
trusted library allocation
page read and write
63F000
heap
page read and write
2C58000
heap
page read and write
904000
heap
page read and write
1E88B3FD000
trusted library allocation
page read and write
3474000
heap
page read and write
6BB11000
unkown
page read and write
98E000
heap
page read and write
5C10000
heap
page read and write
5C6D000
heap
page read and write
892000
heap
page read and write
1E889644000
trusted library allocation
page read and write
1E88B400000
trusted library allocation
page read and write
2F8C000
trusted library allocation
page read and write
FC9DCFE000
stack
page read and write
1E88B3FB000
trusted library allocation
page read and write
1E889551000
heap
page read and write
608000
heap
page read and write
12E1000
unkown
page readonly
83B000
heap
page read and write
3020000
heap
page read and write
6B190000
unkown
page readonly
6AC2A000
unkown
page readonly
2F50000
heap
page read and write
5BBB000
heap
page read and write
2E0E000
heap
page read and write
4AD000
unkown
page readonly
32A0000
heap
page read and write
8BE000
heap
page read and write
2DF6000
heap
page read and write
1E88B3FC000
trusted library allocation
page read and write
2B90000
heap
page read and write
6B42D000
unkown
page readonly
3260000
trusted library allocation
page read and write
1E88B402000
trusted library allocation
page read and write
3B0000
unkown
page readonly
4657000
heap
page read and write
F15000
heap
page read and write
83C000
heap
page read and write
5E0000
heap
page read and write
F00000
heap
page read and write
2B7D000
heap
page read and write
465A000
heap
page read and write
1E88B402000
trusted library allocation
page read and write
7FF75D277000
unkown
page readonly
2230000
heap
page read and write
F6A000
unkown
page readonly
652000
heap
page read and write
950000
heap
page read and write
8AC000
heap
page read and write
37DA000
heap
page read and write
1E88B3FB000
trusted library allocation
page read and write
1E7F6DD0000
heap
page read and write
F03000
heap
page read and write
1E889640000
trusted library allocation
page read and write
81F000
heap
page read and write
1E88B3FD000
trusted library allocation
page read and write
1E88B3FF000
trusted library allocation
page read and write
8A0000
heap
page read and write
885000
heap
page read and write
379E000
stack
page read and write
82C000
heap
page read and write
1E88B3FB000
trusted library allocation
page read and write
2F87000
trusted library allocation
page read and write
920000
trusted library allocation
page read and write
1E88B3FB000
trusted library allocation
page read and write
2E6C000
heap
page read and write
99B000
stack
page read and write
1E889551000
heap
page read and write
6AE93000
unkown
page readonly
158E000
heap
page read and write
326A000
trusted library allocation
page read and write
6AEC3000
unkown
page readonly
5A7F000
heap
page read and write
1E88954C000
heap
page read and write
82E000
heap
page read and write
1E889640000
trusted library allocation
page read and write
6AC61000
unkown
page execute read
6ADC0000
unkown
page read and write
5A2C000
heap
page read and write
939000
heap
page read and write
650000
heap
page read and write
1E88B400000
trusted library allocation
page read and write
45B0000
heap
page read and write
2B00000
heap
page read and write
5B9A000
heap
page read and write
3536000
heap
page read and write
AE9000
heap
page read and write
157D000
heap
page read and write
4810000
trusted library section
page read and write
82C000
heap
page read and write
2C24000
heap
page read and write
6AC60000
unkown
page readonly
F44000
heap
page read and write
5BBD000
heap
page read and write
65C000
heap
page read and write
5AEA000
heap
page read and write
1930000
heap
page read and write
391E000
trusted library allocation
page read and write
23638336000
heap
page read and write
675000
heap
page read and write
1E88B3FD000
trusted library allocation
page read and write
970000
heap
page read and write
1E88B405000
trusted library allocation
page read and write
5100000
heap
page read and write
6B228000
unkown
page read and write
3485000
heap
page read and write
940000
heap
page read and write
BC5B7FE000
stack
page read and write
644000
heap
page read and write
1E88B3FA000
trusted library allocation
page read and write
1E889644000
trusted library allocation
page read and write
1F787AA5000
heap
page read and write
6BC57000
unkown
page readonly
10000000
unkown
page readonly
86F000
heap
page read and write
1205000
unkown
page read and write
45CE000
stack
page read and write
5A7C000
heap
page read and write
5B31000
heap
page read and write
6ADD0000
unkown
page readonly
85A000
heap
page read and write
1E889562000
heap
page read and write
15BC000
heap
page read and write
1E88B406000
trusted library allocation
page read and write
350D000
heap
page read and write
3907000
heap
page read and write
6ACE3000
unkown
page readonly
1F7861A6000
heap
page read and write
82C000
heap
page read and write
1E88B3FF000
trusted library allocation
page read and write
810000
heap
page read and write
458F000
stack
page read and write
4F60000
trusted library allocation
page read and write
1E88B3FA000
trusted library allocation
page read and write
1E8896C0000
heap
page read and write
841000
heap
page read and write
5BEC000
heap
page read and write
89C000
heap
page read and write
5FF0000
heap
page read and write
3264000
trusted library allocation
page read and write
1E88B404000
trusted library allocation
page read and write
1E7F6E60000
heap
page read and write
8BE000
heap
page read and write
836000
heap
page read and write
F44000
heap
page read and write
1C1B3166000
heap
page read and write
1E889513000
heap
page read and write
2D95000
heap
page read and write
F9E000
heap
page read and write
1E88B400000
trusted library allocation
page read and write
1E8894F6000
heap
page read and write
2C71000
heap
page read and write
F39000
heap
page read and write
873000
heap
page read and write
217FB300000
heap
page read and write
80B000
heap
page read and write
663000
heap
page read and write
FC9D7FF000
stack
page read and write
5B1F000
heap
page read and write
840000
heap
page read and write
840000
heap
page read and write
847000
heap
page read and write
70041000
unkown
page execute read
2BD0000
heap
page read and write
82F000
heap
page read and write
82C000
heap
page read and write
3E2F000
heap
page read and write
2BAA000
heap
page read and write
2374000
heap
page read and write
1E88B3FE000
trusted library allocation
page read and write
841000
heap
page read and write
1E889640000
trusted library allocation
page read and write
199000
stack
page read and write
1577000
heap
page read and write
1E88B3FA000
trusted library allocation
page read and write
1E88B3FB000
trusted library allocation
page read and write
2D15000
heap
page read and write
1E889511000
heap
page read and write
7FF75D286000
unkown
page write copy
6AD4A000
unkown
page readonly
1CC5CF26000
heap
page read and write
824000
heap
page read and write
81D000
heap
page read and write
23638160000
heap
page read and write
948000
heap
page read and write
7FF75D260000
unkown
page readonly
5348000
heap
page read and write
1E88B3F0000
trusted library allocation
page read and write
3D10000
heap
page read and write
1E88B401000
trusted library allocation
page read and write
3502000
heap
page read and write
5A6B000
heap
page read and write
1E88B405000
trusted library allocation
page read and write
F64000
unkown
page read and write
69A000
heap
page read and write
5B15000
heap
page read and write
2B20000
heap
page read and write
1E88B40D000
trusted library allocation
page read and write
1E88B402000
trusted library allocation
page read and write
1577000
heap
page read and write
2A87000
trusted library allocation
page read and write
2ADA000
trusted library allocation
page read and write
837000
heap
page read and write
6BCCB000
unkown
page readonly
83F000
heap
page read and write
120B000
unkown
page read and write
59E000
stack
page read and write
DE3000
unkown
page readonly
2D9F000
heap
page read and write
5A7D000
heap
page read and write
5C1D000
heap
page read and write
1E88B401000
trusted library allocation
page read and write
1E889551000
heap
page read and write
15D2000
heap
page read and write
6D0000
heap
page read and write
840000
heap
page read and write
45A1000
heap
page read and write
1336000
heap
page read and write
812000
heap
page read and write
1E88B3FF000
trusted library allocation
page read and write
2B70000
trusted library allocation
page read and write
7FF75D286000
unkown
page read and write
83B000
heap
page read and write
FEC000
stack
page read and write
6600000
trusted library allocation
page read and write
3B1F000
stack
page read and write
1E88B404000
trusted library allocation
page read and write
5C48000
heap
page read and write
913000
heap
page read and write
1E88B3FC000
trusted library allocation
page read and write
6ABF3000
unkown
page readonly
1CC5CF21000
heap
page read and write
874000
heap
page read and write
7FB000
heap
page read and write
BC5B3FE000
stack
page read and write
1C1B3120000
heap
page read and write
1EB000
stack
page read and write
CB1EEFB000
stack
page read and write
1E88B400000
trusted library allocation
page read and write
1E88953F000
heap
page read and write
82E000
heap
page read and write
5ADA000
heap
page read and write
64F000
heap
page read and write
2C17000
heap
page read and write
F65000
heap
page read and write
65C000
heap
page read and write
83B000
heap
page read and write
C30000
unkown
page readonly
1E88B3FF000
trusted library allocation
page read and write
1E889644000
trusted library allocation
page read and write
880000
heap
page read and write
7FF75D261000
unkown
page execute read
6600000
trusted library allocation
page read and write
2C23000
heap
page read and write
2DBF000
heap
page read and write
3B1000
unkown
page execute read
5C2F000
heap
page read and write
5A42000
heap
page read and write
30954FE000
stack
page read and write
822000
heap
page read and write
898000
heap
page read and write
1E88B3FD000
trusted library allocation
page read and write
456D000
heap
page read and write
34A7000
heap
page read and write
809000
heap
page read and write
1E88B40B000
trusted library allocation
page read and write
5A4A000
heap
page read and write
1267000
unkown
page readonly
45A0000
heap
page read and write
3810000
heap
page read and write
1E889640000
trusted library allocation
page read and write
1E88B3FD000
trusted library allocation
page read and write
1540000
heap
page read and write
1E88B403000
trusted library allocation
page read and write
1E8894F7000
heap
page read and write
1E88B401000
trusted library allocation
page read and write
3549000
heap
page read and write
61F0000
heap
page read and write
2BF3000
heap
page read and write
5C68000
heap
page read and write
1E88B402000
trusted library allocation
page read and write
3960000
heap
page read and write
2DAD000
heap
page read and write
1E88B403000
trusted library allocation
page read and write
3E2A000
heap
page read and write
1E88B402000
trusted library allocation
page read and write
2C6E000
heap
page read and write
1E88B3FE000
trusted library allocation
page read and write
1F786140000
heap
page read and write
5CA2000
heap
page read and write
45D0000
heap
page read and write
409E000
stack
page read and write
5360000
heap
page read and write
809000
heap
page read and write
1E88B40E000
trusted library allocation
page read and write
2DF6000
heap
page read and write
1E88B3FA000
trusted library allocation
page read and write
675000
heap
page read and write
1E8894F7000
heap
page read and write
674000
heap
page read and write
2BC7000
heap
page read and write
18A0000
unkown
page read and write
456E000
heap
page read and write
1CC5CF43000
heap
page read and write
913000
heap
page read and write
3916000
trusted library allocation
page read and write
3EA000
unkown
page readonly
4563000
heap
page read and write
19F66FF000
stack
page read and write
183E000
stack
page read and write
3505000
heap
page read and write
217F9904000
heap
page read and write
5C50000
heap
page read and write
7FF75D260000
unkown
page readonly
1E88B403000
trusted library allocation
page read and write
81D000
heap
page read and write
84B000
heap
page read and write
1E88B402000
trusted library allocation
page read and write
913000
heap
page read and write
D23000
heap
page read and write
3549000
heap
page read and write
1E889644000
trusted library allocation
page read and write
641000
heap
page read and write
102CA000
unkown
page readonly
2C00000
heap
page read and write
1E88B404000
trusted library allocation
page read and write
2D9B000
heap
page read and write
5C3F000
heap
page read and write
7FF75D28B000
unkown
page readonly
F64000
unkown
page write copy
2AD2000
trusted library allocation
page read and write
3EA000
unkown
page readonly
583E000
stack
page read and write
69A000
heap
page read and write
1E88B405000
trusted library allocation
page read and write
6ACE0000
unkown
page readonly
1E88B3FF000
trusted library allocation
page read and write
2BBF000
heap
page read and write
15E3000
heap
page read and write
7FF75D28B000
unkown
page readonly
27E0000
heap
page read and write
1E889640000
trusted library allocation
page read and write
6ACB0000
unkown
page readonly
7FF75D277000
unkown
page readonly
2C58000
heap
page read and write
7FF75D260000
unkown
page readonly
82C000
heap
page read and write
1E88B3FB000
trusted library allocation
page read and write
1E88B3FA000
trusted library allocation
page read and write
F13000
heap
page read and write
459E000
heap
page read and write
7F9000
heap
page read and write
81C000
heap
page read and write
3BD4000
heap
page read and write
1E88B3FF000
trusted library allocation
page read and write
1E8894F6000
heap
page read and write
2C2B000
heap
page read and write
82C000
heap
page read and write
6AD44000
unkown
page readonly
83B000
heap
page read and write
5C50000
heap
page read and write
34CD000
heap
page read and write
666000
heap
page read and write
2ADC000
trusted library allocation
page read and write
7FF75D286000
unkown
page write copy
1E88B401000
trusted library allocation
page read and write
15BC000
heap
page read and write
1E889511000
heap
page read and write
6ACC9000
unkown
page readonly
6B22B000
unkown
page read and write
45D1000
heap
page read and write
3ABB000
heap
page read and write
2B13000
heap
page read and write
6B524000
unkown
page read and write
2C50000
trusted library allocation
page read and write
1E88B405000
trusted library allocation
page read and write
940000
heap
page read and write
1E88B406000
trusted library allocation
page read and write
1E88B3FA000
trusted library allocation
page read and write
1E88B3FE000
trusted library allocation
page read and write
6AD61000
unkown
page readonly
831000
heap
page read and write
1E88B3FA000
trusted library allocation
page read and write
2192000
trusted library allocation
page read and write
3094D8C000
stack
page read and write
1E88B404000
trusted library allocation
page read and write
11EE000
stack
page read and write
2C79000
heap
page read and write
33C000
stack
page read and write
1E88B401000
trusted library allocation
page read and write
A5E000
heap
page read and write
62A000
heap
page read and write
3D20000
heap
page read and write
217FB3D5000
heap
page read and write
534A000
heap
page read and write
2BC0000
trusted library allocation
page read and write
81A000
heap
page read and write
1E88B404000
trusted library allocation
page read and write
6C8F8000
unkown
page readonly
1E88B404000
trusted library allocation
page read and write
874000
heap
page read and write
1CC5CF30000
heap
page read and write
1F7861C7000
heap
page read and write
7FF75D28B000
unkown
page readonly
1E88B404000
trusted library allocation
page read and write
5C6D000
heap
page read and write
5ACF000
heap
page read and write
45A2000
heap
page read and write
4860000
heap
page read and write
3013000
heap
page read and write
1E88B401000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
3484000
heap
page read and write
23638300000
heap
page read and write
1E8895C0000
heap
page read and write
7F6000
heap
page read and write
5A38000
heap
page read and write
1E88B401000
trusted library allocation
page read and write
885000
heap
page read and write
1E8894F6000
heap
page read and write
23638270000
heap
page read and write
217F98F2000
heap
page read and write
448E000
stack
page read and write
7FC000
heap
page read and write
1E889511000
heap
page read and write
A87E37E000
stack
page read and write
1E88B406000
trusted library allocation
page read and write
61E000
heap
page read and write
E3E000
stack
page read and write
11F0000
unkown
page readonly
F44000
heap
page read and write
2C1B000
heap
page read and write
1E88B405000
trusted library allocation
page read and write
1E88B3FA000
trusted library allocation
page read and write
7EF000
heap
page read and write
1E8894F7000
heap
page read and write
7004A000
unkown
page read and write
ABB000
heap
page read and write
7FF75D28B000
unkown
page readonly
1E889513000
heap
page read and write
45B9000
heap
page read and write
1E88B3FB000
trusted library allocation
page read and write
7FF75D260000
unkown
page readonly
36A0000
heap
page read and write
5C68000
heap
page read and write
2670000
heap
page read and write
44A000
unkown
page readonly
1E88B3FC000
trusted library allocation
page read and write
4569000
heap
page read and write
6600000
trusted library allocation
page read and write
F44000
heap
page read and write
2ADD000
trusted library allocation
page read and write
5C6D000
heap
page read and write
15B7000
heap
page read and write
1E8894F7000
heap
page read and write
1E8894F7000
heap
page read and write
1E88B402000
trusted library allocation
page read and write
3A2A000
heap
page read and write
2A89000
trusted library allocation
page read and write
F75000
heap
page read and write
1E88B3FB000
trusted library allocation
page read and write
5A28000
heap
page read and write
2B82000
heap
page read and write
62E000
heap
page read and write
1C1B3178000
heap
page read and write
93F000
stack
page read and write
83D000
heap
page read and write
1E889644000
trusted library allocation
page read and write
2AE3000
trusted library allocation
page read and write
1CC5CF32000
heap
page read and write
2F81000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
C3D000
unkown
page execute read
86D000
heap
page read and write
8B1000
heap
page read and write
1E889644000
trusted library allocation
page read and write
1E88B3FE000
trusted library allocation
page read and write
5C0E000
heap
page read and write
9A0000
heap
page read and write
362E000
stack
page read and write
824000
heap
page read and write
822000
heap
page read and write
1C1B4B40000
heap
page read and write
FFE000
stack
page read and write
6B44F000
unkown
page read and write
834000
heap
page read and write
1E88B3FA000
trusted library allocation
page read and write
1E88B401000
trusted library allocation
page read and write
A87DEBA000
stack
page read and write
86C000
heap
page read and write
1E889644000
trusted library allocation
page read and write
92F000
stack
page read and write
445E000
stack
page read and write
19F65FE000
stack
page read and write
5C3F000
heap
page read and write
641000
heap
page read and write
2DB7000
heap
page read and write
464F000
heap
page read and write
7FF75D261000
unkown
page execute read
2B48000
heap
page read and write
6AD50000
unkown
page readonly
21A0000
direct allocation
page execute and read and write
2E60000
trusted library allocation
page read and write
5CAA000
heap
page read and write
5CA2000
heap
page read and write
1E88953F000
heap
page read and write
7FF75D286000
unkown
page write copy
1E88B405000
trusted library allocation
page read and write
3452000
heap
page read and write
936000
heap
page read and write
8CE000
heap
page read and write
1E88B400000
trusted library allocation
page read and write
666000
heap
page read and write
197A000
heap
page read and write
2C8B000
heap
page read and write
1E88B3FD000
trusted library allocation
page read and write
1E88B406000
trusted library allocation
page read and write
1E88B3FF000
trusted library allocation
page read and write
45C5000
heap
page read and write
6C8FE000
unkown
page read and write
2BAE000
stack
page read and write
1E88B3FA000
trusted library allocation
page read and write
808000
heap
page read and write
1E8894F7000
heap
page read and write
839000
heap
page read and write
6C7FA000
unkown
page readonly
1E88B403000
trusted library allocation
page read and write
1F786180000
heap
page read and write
836000
heap
page read and write
3E1F000
stack
page read and write
391F000
stack
page read and write
32A0000
heap
page read and write
1E889640000
trusted library allocation
page read and write
2CA8000
heap
page read and write
87D000
heap
page read and write
6AC66000
unkown
page readonly
840000
heap
page read and write
840000
heap
page read and write
1E88B3FE000
trusted library allocation
page read and write
155F000
heap
page read and write
6610000
heap
page read and write
1E8896A0000
heap
page read and write
1E88B3FD000
trusted library allocation
page read and write
831000
heap
page read and write
2CEF000
heap
page read and write
10326000
unkown
page read and write
80D000
heap
page read and write
8AD000
heap
page read and write
2BB0000
heap
page read and write
38AB000
heap
page read and write
217F98E7000
heap
page read and write
1E889511000
heap
page read and write
480E000
stack
page read and write
82C000
heap
page read and write
5C48000
heap
page read and write
6ACB8000
unkown
page readonly
1E889644000
trusted library allocation
page read and write
81E000
heap
page read and write
2DA1000
heap
page read and write
391C000
heap
page read and write
5BAA000
heap
page read and write
1E88B3FF000
trusted library allocation
page read and write
5C50000
heap
page read and write
1202000
unkown
page read and write
5BB3000
heap
page read and write
809000
heap
page read and write
18C000
stack
page read and write
6B8F5000
unkown
page readonly
2E30000
heap
page read and write
80D000
heap
page read and write
508000
unkown
page readonly
62D000
heap
page read and write
FAE000
heap
page read and write
429E000
stack
page read and write
1E88B400000
trusted library allocation
page read and write
1F7861AE000
heap
page read and write
41DE000
stack
page read and write
3922000
trusted library allocation
page read and write
30EC000
stack
page read and write
7FF75D286000
unkown
page write copy
3B0D000
heap
page read and write
83F000
heap
page read and write
7FF75D277000
unkown
page readonly
2ACE000
stack
page read and write
3569000
heap
page read and write
2C44000
heap
page read and write
82E000
heap
page read and write
2870000
heap
page read and write
2C23000
heap
page read and write
827000
heap
page read and write
410000
unkown
page readonly
1F7861BB000
heap
page read and write
1E88B400000
trusted library allocation
page read and write
195000
stack
page read and write
15BC000
heap
page read and write
6B3F9000
unkown
page readonly
5C10000
heap
page read and write
2DBE000
heap
page read and write
5C1D000
heap
page read and write
3910000
trusted library allocation
page read and write
D2A000
heap
page read and write
4E6000
heap
page read and write
5C68000
heap
page read and write
2C27000
heap
page read and write
2BE3000
heap
page read and write
1E889513000
heap
page read and write
2AE2000
trusted library allocation
page read and write
3E2E000
heap
page read and write
6BCE0000
unkown
page readonly
1F7861C9000
heap
page read and write
217F9902000
heap
page read and write
1E88B3FB000
trusted library allocation
page read and write
7FF75D28A000
unkown
page read and write
2DA5000
heap
page read and write
30F0000
heap
page read and write
2BC0000
heap
page read and write
8B1000
heap
page read and write
82C000
heap
page read and write
2920000
heap
page read and write
87D000
heap
page read and write
358A000
heap
page read and write
4F60000
trusted library allocation
page read and write
46A000
unkown
page readonly
3C1F000
stack
page read and write
5C10000
heap
page read and write
1E88B406000
trusted library allocation
page read and write
34CD000
heap
page read and write
6C351000
unkown
page execute read
2D60000
heap
page read and write
1E8894F7000
heap
page read and write
3532000
heap
page read and write
2DBE000
heap
page read and write
7F6000
heap
page read and write
8B2000
heap
page read and write
2B00000
heap
page read and write
D62000
unkown
page write copy
4638000
heap
page read and write
2A30000
heap
page read and write
1E88B40F000
trusted library allocation
page read and write
2DAD000
heap
page read and write
7F6000
heap
page read and write
102A0000
unkown
page readonly
1567000
heap
page read and write
1E88B3FD000
trusted library allocation
page read and write
1970000
heap
page read and write
64A000
heap
page read and write
2AE1000
trusted library allocation
page read and write
2C6E000
heap
page read and write
1E88B400000
trusted library allocation
page read and write
1E88B3FD000
trusted library allocation
page read and write
2DF6000
heap
page read and write
1E88B3FD000
trusted library allocation
page read and write
1E88B3FC000
trusted library allocation
page read and write
1E7F6EA3000
heap
page read and write
830000
heap
page read and write
82C000
heap
page read and write
666000
heap
page read and write
1E88B3FA000
trusted library allocation
page read and write
1E889543000
heap
page read and write
1E8894F7000
heap
page read and write
80B000
heap
page read and write
3B1B000
heap
page read and write
2BBC000
heap
page read and write
641000
heap
page read and write
7FF75D286000
unkown
page read and write
2B9D000
heap
page read and write
467B000
heap
page read and write
45E8000
heap
page read and write
822000
heap
page read and write
1E889543000
heap
page read and write
1E88B3F7000
trusted library allocation
page read and write
1E889505000
heap
page read and write
1E88B0E4000
heap
page read and write
1E88B3FE000
trusted library allocation
page read and write
5AA0000
heap
page read and write
1E88B3FE000
trusted library allocation
page read and write
1E88B406000
trusted library allocation
page read and write
886000
heap
page read and write
2B84000
heap
page read and write
6AC4D000
unkown
page readonly
1E88B3FD000
trusted library allocation
page read and write
890000
heap
page read and write
2BC8000
heap
page read and write
37DE000
stack
page read and write
7FF75D28B000
unkown
page readonly
1E889644000
trusted library allocation
page read and write
6C8E1000
unkown
page execute read
1E88B403000
trusted library allocation
page read and write
934000
heap
page read and write
835000
heap
page read and write
6B528000
unkown
page readonly
824000
heap
page read and write
87E000
stack
page read and write
80B000
heap
page read and write
81A000
heap
page read and write
5C68000
heap
page read and write
6ABDE000
unkown
page read and write
467E000
heap
page read and write
15C5000
heap
page read and write
6C915000
unkown
page readonly
1E88B403000
trusted library allocation
page read and write
1E8894C8000
heap
page read and write
F84000
heap
page read and write
1E889505000
heap
page read and write
A50000
heap
page read and write
1E88B402000
trusted library allocation
page read and write
1E889543000
heap
page read and write
1F7861CB000
heap
page read and write
5B18000
heap
page read and write
6BED1000
unkown
page readonly
5A49000
heap
page read and write
F6A000
unkown
page readonly
F13000
heap
page read and write
2DAD000
heap
page read and write
1E88B3FB000
trusted library allocation
page read and write
1E88B3FB000
trusted library allocation
page read and write
1E88953F000
heap
page read and write
3EA0000
trusted library allocation
page read and write
40A000
unkown
page readonly
B8E000
stack
page read and write
7FF75D261000
unkown
page execute read
1C1B3165000
heap
page read and write
91F000
stack
page read and write
1CC5E7E5000
heap
page read and write
6B398000
unkown
page read and write
6AC70000
unkown
page readonly
404000
unkown
page write copy
530000
heap
page read and write
1E88B405000
trusted library allocation
page read and write
2B40000
heap
page read and write
1E88B3FC000
trusted library allocation
page read and write
2DAE000
heap
page read and write
1E88B3FA000
trusted library allocation
page read and write
217F98F0000
heap
page read and write
1F7861BB000
heap
page read and write
D61000
unkown
page readonly
7CB000
heap
page read and write
3E24000
heap
page read and write
872000
heap
page read and write
1E88B3FC000
trusted library allocation
page read and write
855000
heap
page read and write
D2A000
unkown
page execute read
F88000
heap
page read and write
1E88B3FD000
trusted library allocation
page read and write
8BE000
heap
page read and write
2DAD000
heap
page read and write
6C305000
unkown
page read and write
82C000
heap
page read and write
1E88B401000
trusted library allocation
page read and write
158E000
heap
page read and write
B48000
heap
page read and write
2C2E000
stack
page read and write
40A000
unkown
page readonly
884000
heap
page read and write
980000
heap
page read and write
2D4E000
heap
page read and write
1E8893C0000
heap
page read and write
1340000
heap
page read and write
1C1B314C000
heap
page read and write
1E88B400000
trusted library allocation
page read and write
7FF75D277000
unkown
page readonly
6C30C000
unkown
page readonly
81A000
heap
page read and write
1E88953F000
heap
page read and write
2A81000
trusted library allocation
page read and write
2DDE000
heap
page read and write
2A84000
trusted library allocation
page read and write
1E88B406000
trusted library allocation
page read and write
1E889644000
trusted library allocation
page read and write
83C000
heap
page read and write
3510000
heap
page read and write
7FF75D28B000
unkown
page readonly
F6A000
unkown
page readonly
82C000
heap
page read and write
1E88B0EF000
heap
page read and write
5C46000
heap
page read and write
83E000
heap
page read and write
2D9E000
stack
page read and write
F4B000
heap
page read and write
3D00000
heap
page read and write
10001000
unkown
page execute read
675000
heap
page read and write
2BAB000
heap
page read and write
D64000
unkown
page read and write
1E889644000
trusted library allocation
page read and write
2A8A000
trusted library allocation
page read and write
2B36000
heap
page read and write
1E88B401000
trusted library allocation
page read and write
1E88B405000
trusted library allocation
page read and write
F35000
heap
page read and write
1C1B314C000
heap
page read and write
A5A000
heap
page read and write
1E88B3FA000
trusted library allocation
page read and write
ED0000
heap
page read and write
1E88B404000
trusted library allocation
page read and write
D20000
heap
page read and write
1E88B405000
trusted library allocation
page read and write
37E2000
heap
page read and write
5CAF000
heap
page read and write
28B0000
heap
page read and write
1E889640000
trusted library allocation
page read and write
1E88B3FB000
trusted library allocation
page read and write
1E88B3FE000
trusted library allocation
page read and write
1209000
unkown
page read and write
F56000
heap
page read and write
4E0000
heap
page read and write
1E88B3FC000
trusted library allocation
page read and write
1E889644000
trusted library allocation
page read and write
42D0000
trusted library allocation
page read and write
3D1F000
stack
page read and write
1F7861B8000
heap
page read and write
6201000
trusted library allocation
page read and write
3267000
trusted library allocation
page read and write
825000
heap
page read and write
6B227000
unkown
page write copy
848000
heap
page read and write
EF3000
heap
page read and write
217F9906000
heap
page read and write
5C16000
heap
page read and write
1E88B3FC000
trusted library allocation
page read and write
7FF75D28A000
unkown
page read and write
157F000
heap
page read and write
81B000
heap
page read and write
1E88B3FF000
trusted library allocation
page read and write
5C97000
heap
page read and write
2C6E000
heap
page read and write
2F85000
trusted library allocation
page read and write
5A49000
heap
page read and write
F44000
heap
page read and write
6AD58000
unkown
page readonly
5AD1000
heap
page read and write
82C000
heap
page read and write
2CF4000
heap
page read and write
812000
heap
page read and write
992000
heap
page read and write
464000
unkown
page write copy
2E49000
heap
page read and write
6B3D6000
unkown
page readonly
1E88B406000
trusted library allocation
page read and write
8B5000
heap
page read and write
217F98C9000
heap
page read and write
8A2000
heap
page read and write
7E2000
heap
page read and write
2DF6000
heap
page read and write
6BC60000
unkown
page readonly
1E8894F7000
heap
page read and write
1F7861B8000
heap
page read and write
2980000
heap
page read and write
5C3A000
heap
page read and write
40DB000
stack
page read and write
2C60000
heap
page read and write
5B31000
heap
page read and write
2F83000
trusted library allocation
page read and write
1E88AEC0000
heap
page read and write
82F000
heap
page read and write
2D92000
heap
page read and write
495E000
heap
page read and write
839000
heap
page read and write
83F000
heap
page read and write
3532000
heap
page read and write
929000
heap
page read and write
FC9DBFE000
stack
page read and write
847000
heap
page read and write
3E93000
heap
page read and write
5B9A000
heap
page read and write
1E88B405000
trusted library allocation
page read and write
1E88B3FA000
trusted library allocation
page read and write
5AA9000
heap
page read and write
2DBA000
heap
page read and write
4810000
trusted library allocation
page read and write
1E88B3FC000
trusted library allocation
page read and write
85F000
heap
page read and write
155B000
heap
page read and write
6BB42000
unkown
page readonly
82E000
heap
page read and write
A91000
heap
page read and write
81C000
heap
page read and write
6ABF0000
unkown
page readonly
1CC5CF31000
heap
page read and write
995000
heap
page read and write
156E000
heap
page read and write
8BA000
heap
page read and write
32A1000
heap
page read and write
6BCCF000
unkown
page read and write
1E88B3FA000
trusted library allocation
page read and write
1E889511000
heap
page read and write
1E889551000
heap
page read and write
3B68000
heap
page read and write
86F000
heap
page read and write
1E889710000
heap
page read and write
29CC000
stack
page read and write
3533000
heap
page read and write
82F000
heap
page read and write
1E88B3FD000
trusted library allocation
page read and write
82C000
heap
page read and write
6AB90000
unkown
page readonly
2F82000
trusted library allocation
page read and write
2D69000
heap
page read and write
3485000
heap
page read and write
641000
heap
page read and write
2BAA000
heap
page read and write
F4D000
heap
page read and write
1E889551000
heap
page read and write
2D70000
heap
page read and write
6BB12000
unkown
page readonly
27D0000
heap
page read and write
2DAD000
heap
page read and write
411000
unkown
page execute read
540000
trusted library allocation
page read and write
649000
heap
page read and write
45A3000
heap
page read and write
4C90000
direct allocation
page execute and read and write
82C000
heap
page read and write
1569000
heap
page read and write
63F000
heap
page read and write
1E88B3E0000
heap
page read and write
1F787A20000
heap
page read and write
1E88B402000
trusted library allocation
page read and write
80B000
heap
page read and write
1E88B401000
trusted library allocation
page read and write
1E88B3FB000
trusted library allocation
page read and write
217F97F0000
heap
page read and write
1E88953F000
heap
page read and write
28D0000
heap
page read and write
1E88B403000
trusted library allocation
page read and write
23638309000
heap
page read and write
1E889551000
heap
page read and write
1E88B402000
trusted library allocation
page read and write
900000
unkown
page read and write
1E8894FE000
heap
page read and write
1E88B400000
trusted library allocation
page read and write
1E7F8770000
heap
page read and write
6202000
trusted library allocation
page read and write
1E88B405000
trusted library allocation
page read and write
2BC0000
heap
page read and write
1E88B3FF000
trusted library allocation
page read and write
3208000
heap
page read and write
2C70000
trusted library section
page read and write
1E88B3FB000
trusted library allocation
page read and write
5C27000
heap
page read and write
5A57000
heap
page read and write
44DE000
stack
page read and write
1CC5CE10000
heap
page read and write
6BE0A000
unkown
page readonly
886000
heap
page read and write
400000
unkown
page readonly
7FF75D277000
unkown
page readonly
7F7000
heap
page read and write
1E889505000
heap
page read and write
1C1B30F0000
heap
page read and write
1E889640000
trusted library allocation
page read and write
1F786060000
heap
page read and write
1E88B403000
trusted library allocation
page read and write
30950FF000
stack
page read and write
3A1F000
stack
page read and write
976000
heap
page read and write
5B52000
heap
page read and write
2CF0000
heap
page read and write
14C0000
heap
page read and write
81E000
heap
page read and write
1E7F6EA3000
heap
page read and write
2BE1000
heap
page read and write
3915000
trusted library allocation
page read and write
620000
heap
page read and write
929000
heap
page read and write
847000
heap
page read and write
1E88B3FF000
trusted library allocation
page read and write
15BC000
heap
page read and write
81C000
heap
page read and write
65C000
heap
page read and write
6B3C9000
unkown
page readonly
1E889644000
trusted library allocation
page read and write
835000
heap
page read and write
1E889513000
heap
page read and write
6BB0C000
unkown
page read and write
5B89000
heap
page read and write
1CC5CF30000
heap
page read and write
2CC3000
heap
page read and write
25D0000
trusted library allocation
page read and write
159A000
heap
page read and write
622000
heap
page read and write
7FF75D28A000
unkown
page read and write
2C18000
heap
page read and write
2BEF000
heap
page read and write
650000
heap
page read and write
1E88B3FB000
trusted library allocation
page read and write
51EC000
stack
page read and write
1CC5CF00000
heap
page read and write
2AD0000
trusted library allocation
page read and write
187E000
stack
page read and write
675000
heap
page read and write
40A000
unkown
page readonly
1E88B402000
trusted library allocation
page read and write
1F786189000
heap
page read and write
2BBA000
heap
page read and write
1E88B403000
trusted library allocation
page read and write
5E5000
heap
page read and write
1E889640000
trusted library allocation
page read and write
F79000
heap
page read and write
3200000
heap
page read and write
2D10000
heap
page read and write
4F0000
heap
page read and write
2880000
heap
page read and write
1E88B400000
trusted library allocation
page read and write
22E0000
heap
page read and write
2BC9000
heap
page read and write
1E88B400000
trusted library allocation
page read and write
1E88B3FC000
trusted library allocation
page read and write
5C3A000
heap
page read and write
1E88B406000
trusted library allocation
page read and write
2E7E000
heap
page read and write
7F6000
heap
page read and write
1E88B400000
trusted library allocation
page read and write
2B5C000
heap
page read and write
410000
unkown
page readonly
A04000
heap
page read and write
1E88B3FB000
trusted library allocation
page read and write
5C1D000
heap
page read and write
66C000
heap
page read and write
8C8000
stack
page read and write
5C1D000
heap
page read and write
5AC9000
heap
page read and write
4689000
heap
page read and write
3569000
heap
page read and write
1E889511000
heap
page read and write
44A000
unkown
page readonly
1E88B3FB000
trusted library allocation
page read and write
F44000
heap
page read and write
1CC5D000000
heap
page read and write
21D0000
heap
page read and write
A21000
heap
page read and write
1330000
heap
page read and write
8BE000
heap
page read and write
3262000
trusted library allocation
page read and write
18B0000
heap
page read and write
F10000
unkown
page readonly
809000
heap
page read and write
1F7861A6000
heap
page read and write
2DB0000
heap
page read and write
2F54000
heap
page read and write
2CB3000
heap
page read and write
7FB000
heap
page read and write
80B000
heap
page read and write
3918000
trusted library allocation
page read and write
9A6000
heap
page read and write
1E88B3FF000
trusted library allocation
page read and write
3549000
heap
page read and write
874000
heap
page read and write
3569000
heap
page read and write
662000
heap
page read and write
8B5000
heap
page read and write
5C3A000
heap
page read and write
F8B000
heap
page read and write
82C000
heap
page read and write
6974FC000
stack
page read and write
2BCD000
heap
page read and write
1E7F6EA1000
heap
page read and write
1E88B3F3000
trusted library allocation
page read and write
888000
heap
page read and write
1F7861BB000
heap
page read and write
6AC4A000
unkown
page read and write
1E88953F000
heap
page read and write
2BC7000
heap
page read and write
1E889511000
heap
page read and write
2D91000
heap
page read and write
82C000
heap
page read and write
410000
unkown
page readonly
7FF75D28B000
unkown
page readonly
1E88B3FA000
trusted library allocation
page read and write
94C000
heap
page read and write
644000
heap
page read and write
CB1EFFF000
stack
page read and write
4672000
heap
page read and write
1E889640000
trusted library allocation
page read and write
2B82000
heap
page read and write
1E88B3FD000
trusted library allocation
page read and write
1E88B403000
trusted library allocation
page read and write
1E88B403000
trusted library allocation
page read and write
23638330000
heap
page read and write
5A97000
heap
page read and write
5912000
heap
page read and write
F44000
heap
page read and write
1E88B404000
trusted library allocation
page read and write
847000
heap
page read and write
6ACA6000
unkown
page readonly
33A1000
heap
page read and write
1E88B3FA000
trusted library allocation
page read and write
5A6A000
heap
page read and write
835000
heap
page read and write
236382A0000
heap
page read and write
4E0000
heap
page read and write
1577000
heap
page read and write
6B3B0000
unkown
page readonly
1E88B403000
trusted library allocation
page read and write
7FF75D277000
unkown
page readonly
1E88B400000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
7F7000
heap
page read and write
1E88B3FC000
trusted library allocation
page read and write
6AC63000
unkown
page readonly
1E88B404000
trusted library allocation
page read and write
7FF75D286000
unkown
page read and write
7FF75D260000
unkown
page readonly
2C9C000
heap
page read and write
39A0000
heap
page read and write
4815000
trusted library section
page read and write
1900000
heap
page read and write
81D000
heap
page read and write
2BC0000
trusted library allocation
page read and write
82E000
heap
page read and write
976000
heap
page read and write
2FA0000
direct allocation
page execute and read and write
1E88B400000
trusted library allocation
page read and write
15E3000
heap
page read and write
824000
heap
page read and write
6C306000
unkown
page write copy
5C41000
heap
page read and write
435B000
stack
page read and write
939000
heap
page read and write
2CFB000
heap
page read and write
236382A5000
heap
page read and write
5A39000
heap
page read and write
2BE8000
heap
page read and write
1E88B402000
trusted library allocation
page read and write
1E88B406000
trusted library allocation
page read and write
391A000
trusted library allocation
page read and write
6ABF5000
unkown
page read and write
1E889551000
heap
page read and write
5C44000
heap
page read and write
2B7F000
heap
page read and write
1E889513000
heap
page read and write
2C80000
heap
page read and write
53E000
stack
page read and write
1E88B3FE000
trusted library allocation
page read and write
3770000
heap
page read and write
6BB0F000
unkown
page read and write
2C4D000
heap
page read and write
3913000
trusted library allocation
page read and write
675000
heap
page read and write
1CC5CF26000
heap
page read and write
2D70000
heap
page read and write
46CF000
stack
page read and write
847000
heap
page read and write
6ADD1000
unkown
page execute read
808000
heap
page read and write
2AD0000
trusted library allocation
page read and write
1E88B407000
trusted library allocation
page read and write
7FF75D260000
unkown
page readonly
1E8894F7000
heap
page read and write
1E88B3FA000
trusted library allocation
page read and write
6FF48000
unkown
page readonly
5CA7000
heap
page read and write
1E889640000
trusted library allocation
page read and write
45C6000
heap
page read and write
1E7F6E00000
heap
page read and write
264C000
heap
page read and write
5A10000
heap
page read and write
46A000
unkown
page readonly
5345000
heap
page read and write
23638325000
heap
page read and write
9BF000
heap
page read and write
2CA0000
heap
page read and write
4562000
heap
page read and write
1E889644000
trusted library allocation
page read and write
2AD4000
trusted library allocation
page read and write
4810000
trusted library allocation
page read and write
82C000
heap
page read and write
3F0000
heap
page read and write
62F000
heap
page read and write
6ABF6000
unkown
page readonly
F0C000
heap
page read and write
5A31000
heap
page read and write
82C000
heap
page read and write
BC5B6FE000
stack
page read and write
1E88B3FC000
trusted library allocation
page read and write
5C3A000
heap
page read and write
1E889640000
trusted library allocation
page read and write
83F000
heap
page read and write
7F6000
heap
page read and write
7DF000
heap
page read and write
4DB000
unkown
page readonly
809000
heap
page read and write
1E88B403000
trusted library allocation
page read and write
2D15000
heap
page read and write
FAE000
heap
page read and write
934000
heap
page read and write
2990000
heap
page read and write
1F7861A0000
heap
page read and write
82C000
heap
page read and write
ACA000
heap
page read and write
45AE000
heap
page read and write
CB1F3FE000
stack
page read and write
5C97000
heap
page read and write
1E8894E7000
heap
page read and write
6FF5C000
unkown
page read and write
6C910000
unkown
page readonly
5BCA000
heap
page read and write
5C6D000
heap
page read and write
2D2E000
heap
page read and write
1E8894F7000
heap
page read and write
3110000
heap
page read and write
15BC000
heap
page read and write
F75000
heap
page read and write
5C6D000
heap
page read and write
7FF75D261000
unkown
page execute read
5A4A000
heap
page read and write
F3C000
heap
page read and write
82C000
heap
page read and write
6FF40000
unkown
page readonly
400F000
stack
page read and write
2BA5000
heap
page read and write
2BC8000
heap
page read and write
23638336000
heap
page read and write
820000
heap
page read and write
1E88B3FF000
trusted library allocation
page read and write
2F84000
trusted library allocation
page read and write
1E889551000
heap
page read and write
809000
heap
page read and write
159B000
heap
page read and write
217F9906000
heap
page read and write
3B0000
unkown
page readonly
81E000
heap
page read and write
7FF75D277000
unkown
page readonly
5C4D000
heap
page read and write
1E889640000
trusted library allocation
page read and write
F4A000
unkown
page readonly
5AFD000
heap
page read and write
2610000
unkown
page read and write
842000
heap
page read and write
8C0000
heap
page read and write
4635000
heap
page read and write
2C64000
heap
page read and write
4913000
heap
page read and write
1E88B403000
trusted library allocation
page read and write
F15000
heap
page read and write
81E000
heap
page read and write
83B000
heap
page read and write
934000
heap
page read and write
904000
heap
page read and write
1E88B407000
trusted library allocation
page read and write
19F6AFE000
stack
page read and write
1C1B316B000
heap
page read and write
45E8000
heap
page read and write
83E000
stack
page read and write
865000
heap
page read and write
811000
heap
page read and write
81B000
heap
page read and write
1E88B403000
trusted library allocation
page read and write
2B40000
heap
page read and write
2A70000
heap
page read and write
7FF75D261000
unkown
page execute read
1E88B0D0000
heap
page read and write
63F000
heap
page read and write
1E889644000
trusted library allocation
page read and write
D65000
unkown
page readonly
874000
heap
page read and write
1E889640000
trusted library allocation
page read and write
5B1F000
heap
page read and write
826000
heap
page read and write
1035F000
unkown
page write copy
7F6000
heap
page read and write
D2A000
unkown
page execute read
5AA9000
heap
page read and write
2D36000
heap
page read and write
D12000
unkown
page execute read
2B30000
unkown
page read and write
992000
heap
page read and write
860000
heap
page read and write
2BE1000
heap
page read and write
86F000
heap
page read and write
2B46000
heap
page read and write
5C2F000
heap
page read and write
81A000
heap
page read and write
1E88B406000
trusted library allocation
page read and write
2B84000
heap
page read and write
298C000
stack
page read and write
6ACC0000
unkown
page readonly
1E88B3FC000
trusted library allocation
page read and write
3481000
heap
page read and write
82E000
heap
page read and write
2C9C000
heap
page read and write
5A7C000
heap
page read and write
5C16000
heap
page read and write
1E889551000
heap
page read and write
30951FF000
stack
page read and write
1E88B402000
trusted library allocation
page read and write
1E88B404000
trusted library allocation
page read and write
2190000
trusted library allocation
page read and write
2D2E000
heap
page read and write
1E8894E2000
heap
page read and write
C3D000
unkown
page execute read
1F7861CB000
heap
page read and write
1E88B3FC000
trusted library allocation
page read and write
2920000
direct allocation
page execute and read and write
1E7F6E85000
heap
page read and write
1E88B3FA000
trusted library allocation
page read and write
1E88B406000
trusted library allocation
page read and write
923000
heap
page read and write
6ADC1000
unkown
page readonly
1E889511000
heap
page read and write
5ACF000
heap
page read and write
1F7861B0000
heap
page read and write
2640000
heap
page read and write
7FF75D28A000
unkown
page read and write
1E88953F000
heap
page read and write
1E88B3FD000
trusted library allocation
page read and write
5362000
heap
page read and write
158E000
heap
page read and write
11CF000
stack
page read and write
700D1000
unkown
page execute read
3914000
trusted library allocation
page read and write
1E889550000
heap
page read and write
70047000
unkown
page readonly
1E88B403000
trusted library allocation
page read and write
FC9D6FC000
stack
page read and write
664000
heap
page read and write
1CC5CF09000
heap
page read and write
2F8E000
trusted library allocation
page read and write
1E88B406000
trusted library allocation
page read and write
F3C000
heap
page read and write
5B81000
heap
page read and write
1E88B406000
trusted library allocation
page read and write
1E8894F7000
heap
page read and write
EC0000
heap
page read and write
6ABE1000
unkown
page readonly
3BD4000
heap
page read and write
6BCBF000
unkown
page readonly
5A28000
heap
page read and write
2B82000
heap
page read and write
1E88B3F8000
trusted library allocation
page read and write
6B3E1000
unkown
page execute read
6B411000
unkown
page execute read
1560000
heap
page read and write
217F98C0000
heap
page read and write
1E88B402000
trusted library allocation
page read and write
1E88B404000
trusted library allocation
page read and write
2C10000
heap
page read and write
950000
heap
page read and write
D7F000
unkown
page readonly
45AD000
heap
page read and write
6AC4C000
unkown
page read and write
1E88B400000
trusted library allocation
page read and write
34B6000
heap
page read and write
464C000
heap
page read and write
1E88B406000
trusted library allocation
page read and write
1E88953F000
heap
page read and write
1E8894F7000
heap
page read and write
1E88B3FD000
trusted library allocation
page read and write
1E88B408000
trusted library allocation
page read and write
1E889670000
heap
page read and write
15D3000
heap
page read and write
837000
heap
page read and write
2AD1000
trusted library allocation
page read and write
8BE000
stack
page read and write
3268000
trusted library allocation
page read and write
1E889551000
heap
page read and write
674000
heap
page read and write
1E88B3FA000
trusted library allocation
page read and write
6BCE1000
unkown
page execute read
EC0000
heap
page read and write
882000
heap
page read and write
972000
heap
page read and write
2B70000
trusted library allocation
page read and write
2A83000
trusted library allocation
page read and write
D62000
unkown
page read and write
622000
heap
page read and write
2F40000
heap
page read and write
6B39A000
unkown
page readonly
5C44000
heap
page read and write
82E000
heap
page read and write
F4A000
unkown
page readonly
1E88B401000
trusted library allocation
page read and write
1569000
heap
page read and write
45B2000
heap
page read and write
6C8D0000
unkown
page readonly
6C8F3000
unkown
page execute read
82F000
heap
page read and write
962000
heap
page read and write
1E88B401000
trusted library allocation
page read and write
675000
heap
page read and write
2BA9000
heap
page read and write
2D2E000
heap
page read and write
1E88B402000
trusted library allocation
page read and write
5C3D000
heap
page read and write
2E07000
heap
page read and write
809000
heap
page read and write
976000
heap
page read and write
6C919000
unkown
page readonly
1E88B3FB000
trusted library allocation
page read and write
5A98000
heap
page read and write
6BFF000
stack
page read and write
3F9C000
stack
page read and write
81A000
heap
page read and write
A87DFBF000
stack
page read and write
1E889640000
trusted library allocation
page read and write
1E889640000
trusted library allocation
page read and write
5BE2000
heap
page read and write
2B83000
heap
page read and write
2C9C000
heap
page read and write
1C1B316B000
heap
page read and write
3AB2000
heap
page read and write
5C68000
heap
page read and write
12DC000
unkown
page read and write
D66000
heap
page read and write
1E889640000
trusted library allocation
page read and write
F64000
unkown
page write copy
30AC000
stack
page read and write
890000
heap
page read and write
2D2E000
heap
page read and write
1E889644000
trusted library allocation
page read and write
2BB7000
heap
page read and write
5E10000
trusted library allocation
page read and write
7F1000
heap
page read and write
1F787AA0000
heap
page read and write
2C50000
trusted library allocation
page read and write
10CF000
stack
page read and write
822000
heap
page read and write
2CA3000
heap
page read and write
7F6000
heap
page read and write
1E88B3FA000
trusted library allocation
page read and write
1E88B3FD000
trusted library allocation
page read and write
1E7F6EA0000
heap
page read and write
15E3000
heap
page read and write
1E88B3FD000
trusted library allocation
page read and write
44A000
unkown
page readonly
6B4F0000
unkown
page readonly
15B6000
heap
page read and write
6BB30000
unkown
page readonly
3917000
heap
page read and write
FAE000
heap
page read and write
940000
heap
page read and write
641000
heap
page read and write
34B6000
heap
page read and write
1E8894F7000
heap
page read and write
1E889644000
trusted library allocation
page read and write
5B03000
heap
page read and write
2B10000
heap
page read and write
1E88B401000
trusted library allocation
page read and write
1E88B3FC000
trusted library allocation
page read and write
1E7F6E80000
heap
page read and write
217F98E7000
heap
page read and write
93A000
heap
page read and write
1E889644000
trusted library allocation
page read and write
1E889640000
trusted library allocation
page read and write
F54000
heap
page read and write
45B9000
heap
page read and write
2B70000
trusted library allocation
page read and write
1E889505000
heap
page read and write
93A000
heap
page read and write
1C1B3146000
heap
page read and write
CB1F4FE000
stack
page read and write
2DDE000
heap
page read and write
972000
heap
page read and write
5C97000
heap
page read and write
2DBB000
heap
page read and write
1E88B3F4000
trusted library allocation
page read and write
1E88B3FF000
trusted library allocation
page read and write
1E88B3FF000
trusted library allocation
page read and write
5B20000
heap
page read and write
2B84000
heap
page read and write
3B1000
unkown
page execute read
1E889513000
heap
page read and write
7FF75D277000
unkown
page readonly
F11000
unkown
page execute read
6FF45000
unkown
page readonly
1C1B3010000
heap
page read and write
23638320000
heap
page read and write
353F000
heap
page read and write
6FB000
stack
page read and write
1E88B3FA000
trusted library allocation
page read and write
3923000
trusted library allocation
page read and write
7FF75D261000
unkown
page execute read
1E88B400000
trusted library allocation
page read and write
2AC0000
heap
page read and write
1E88B402000
trusted library allocation
page read and write
1E889640000
trusted library allocation
page read and write
2C70000
heap
page read and write
822000
heap
page read and write
470E000
stack
page read and write
2F3E000
stack
page read and write
1E88B3FB000
trusted library allocation
page read and write
6ACAC000
unkown
page readonly
1E88B3FF000
trusted library allocation
page read and write
1E88B405000
trusted library allocation
page read and write
6C30A000
unkown
page read and write
2C60000
trusted library section
page read and write
821000
heap
page read and write
1C1B3179000
heap
page read and write
2DBA000
heap
page read and write
2C50000
trusted library section
page read and write
671000
heap
page read and write
2BD0000
heap
page read and write
1E889644000
trusted library allocation
page read and write
5E10000
trusted library allocation
page read and write
5BD5000
heap
page read and write
9FD000
heap
page read and write
1E8894F7000
heap
page read and write
3893000
heap
page read and write
288C000
heap
page read and write
666000
heap
page read and write
1E889505000
heap
page read and write
839000
heap
page read and write
326C000
trusted library allocation
page read and write
952000
heap
page read and write
9F9000
heap
page read and write
8EB000
heap
page read and write
83B000
heap
page read and write
1E889543000
heap
page read and write
1E88B403000
trusted library allocation
page read and write
2BD4000
heap
page read and write
689000
heap
page read and write
F44000
heap
page read and write
5C16000
heap
page read and write
F64000
unkown
page read and write
28C0000
heap
page read and write
1E88B401000
trusted library allocation
page read and write
A87E3FF000
stack
page read and write
1E88B3FD000
trusted library allocation
page read and write
1E88B405000
trusted library allocation
page read and write
2DB3000
heap
page read and write
1E889644000
trusted library allocation
page read and write
5C3F000
heap
page read and write
1E88B3FF000
trusted library allocation
page read and write
1E889551000
heap
page read and write
980000
heap
page read and write
2D4E000
heap
page read and write
1E7F6CF0000
heap
page read and write
D2C000
unkown
page readonly
400000
heap
page read and write
459B000
heap
page read and write
7FF75D28B000
unkown
page readonly
930000
heap
page read and write
19F68FE000
stack
page read and write
1E88B3FC000
trusted library allocation
page read and write
1E88B400000
trusted library allocation
page read and write
2BAF000
heap
page read and write
7FF75D28A000
unkown
page read and write
5C3B000
heap
page read and write
1E88B3FE000
trusted library allocation
page read and write
7FF75D261000
unkown
page execute read
82C000
heap
page read and write
6C8CD000
unkown
page read and write
1E88B3FF000
trusted library allocation
page read and write
1E88B0E0000
heap
page read and write
898000
heap
page read and write
6B205000
unkown
page readonly
4686000
heap
page read and write
84F000
heap
page read and write
948000
heap
page read and write
5AC9000
heap
page read and write
44A000
unkown
page readonly
6B410000
unkown
page readonly
1E88B400000
trusted library allocation
page read and write
6FF47000
unkown
page read and write
F0C000
heap
page read and write
34B6000
heap
page read and write
3310000
heap
page read and write
2C4C000
heap
page read and write
45CD000
heap
page read and write
1CC5CF46000
heap
page read and write
F80000
heap
page read and write
2A85000
trusted library allocation
page read and write
2E39000
heap
page read and write
DF0000
heap
page read and write
835000
heap
page read and write
2A40000
heap
page read and write
15B9000
heap
page read and write
1E8894D8000
heap
page read and write
2B70000
trusted library allocation
page read and write
9A3000
heap
page read and write
5B1F000
heap
page read and write
102E2000
unkown
page readonly
2A9E000
stack
page read and write
5C4D000
heap
page read and write
30953FE000
stack
page read and write
217F9800000
heap
page read and write
1E889551000
heap
page read and write
1E88B3FC000
trusted library allocation
page read and write
2B83000
heap
page read and write
83B000
heap
page read and write
4C0000
heap
page read and write
2E68000
heap
page read and write
811000
heap
page read and write
1E88B3FF000
trusted library allocation
page read and write
1221000
unkown
page execute read
2BEA000
heap
page read and write
1E8894F8000
heap
page read and write
5A57000
heap
page read and write
358A000
heap
page read and write
650000
heap
page read and write
847000
heap
page read and write
1E88B402000
trusted library allocation
page read and write
F11000
unkown
page execute read
1E8894F5000
heap
page read and write
1E8894E7000
heap
page read and write
8D2000
trusted library allocation
page read and write
2AF0000
heap
page read and write
1E88B3FE000
trusted library allocation
page read and write
1E88B3F6000
trusted library allocation
page read and write
1E88B3FF000
trusted library allocation
page read and write
1E889644000
trusted library allocation
page read and write
700EF000
unkown
page readonly
3520000
trusted library allocation
page read and write
F44000
heap
page read and write
21F0000
heap
page read and write
3AB9000
heap
page read and write
10367000
unkown
page readonly
EFD000
stack
page read and write
1CC5CF30000
heap
page read and write
839000
heap
page read and write
1E88B3FB000
trusted library allocation
page read and write
1E88B3FE000
trusted library allocation
page read and write
1E88B3FE000
trusted library allocation
page read and write
6AB91000
unkown
page execute read
6BA75000
unkown
page readonly
902000
heap
page read and write
899000
heap
page read and write
F6A000
unkown
page readonly
1E889551000
heap
page read and write
1E88B403000
trusted library allocation
page read and write
1E88B400000
trusted library allocation
page read and write
F44000
heap
page read and write
1E8894F8000
heap
page read and write
1E88B401000
trusted library allocation
page read and write
3263000
trusted library allocation
page read and write
3710000
heap
page read and write
880000
heap
page read and write
1E88B3FA000
trusted library allocation
page read and write
979000
heap
page read and write
1E88B3FC000
trusted library allocation
page read and write
5A88000
heap
page read and write
1E88B404000
trusted library allocation
page read and write
2BB0000
heap
page read and write
6BF01000
unkown
page execute read
1E88B3FC000
trusted library allocation
page read and write
81F000
heap
page read and write
FAE000
heap
page read and write
1E8894F6000
heap
page read and write
1E88B3FD000
trusted library allocation
page read and write
464000
unkown
page read and write
664000
heap
page read and write
2ADF000
trusted library allocation
page read and write
411F000
stack
page read and write
2A8B000
trusted library allocation
page read and write
2A8C000
trusted library allocation
page read and write
5910000
heap
page read and write
992000
heap
page read and write
401000
unkown
page execute read
1E889640000
trusted library allocation
page read and write
920000
heap
page read and write
6AC71000
unkown
page execute read
2D74000
heap
page read and write
F44000
heap
page read and write
822000
heap
page read and write
2B70000
heap
page read and write
F24000
heap
page read and write
5B28000
heap
page read and write
988000
heap
page read and write
33A0000
heap
page read and write
1E88B403000
trusted library allocation
page read and write
841000
heap
page read and write
6976FF000
stack
page read and write
8FC000
heap
page read and write
825000
heap
page read and write
AD8000
heap
page read and write
326D000
trusted library allocation
page read and write
1E88B405000
trusted library allocation
page read and write
1E88B3FC000
trusted library allocation
page read and write
2370000
heap
page read and write
976000
heap
page read and write
6975FF000
stack
page read and write
1E7F6E69000
heap
page read and write
5C4D000
heap
page read and write
2F8A000
trusted library allocation
page read and write
49B0000
trusted library allocation
page read and write
4990000
heap
page read and write
B48000
heap
page read and write
2B10000
heap
page read and write
C31000
unkown
page execute read
81A000
heap
page read and write
5C27000
heap
page read and write
2A8E000
trusted library allocation
page read and write
6B461000
unkown
page execute read
173E000
stack
page read and write
1E889551000
heap
page read and write
518000
unkown
page readonly
869000
heap
page read and write
1E8894F7000
heap
page read and write
5C16000
heap
page read and write
1E88B404000
trusted library allocation
page read and write
3B1000
unkown
page execute read
6BB0E000
unkown
page write copy
1E88B40A000
trusted library allocation
page read and write
5ACF000
heap
page read and write
674000
heap
page read and write
5AFC000
heap
page read and write
850000
heap
page read and write
6FF5D000
unkown
page readonly
822000
heap
page read and write
45E7000
heap
page read and write
5C48000
heap
page read and write
102D2000
unkown
page readonly
2AD8000
trusted library allocation
page read and write
394F000
heap
page read and write
7FF75D286000
unkown
page write copy
6ABF1000
unkown
page execute read
3B64000
heap
page read and write
6ACB5000
unkown
page readonly
6BF00000
unkown
page readonly
4643000
heap
page read and write
902000
heap
page read and write
2B70000
trusted library allocation
page read and write
1E88B3FE000
trusted library allocation
page read and write
2C9C000
heap
page read and write
2B70000
trusted library allocation
page read and write
7F6000
heap
page read and write
4351000
heap
page read and write
80A000
heap
page read and write
34BC000
heap
page read and write
6B6B1000
unkown
page execute read
391D000
trusted library allocation
page read and write
2AE0000
heap
page read and write
2BC1000
heap
page read and write
464000
unkown
page write copy
2F89000
trusted library allocation
page read and write
15A6000
heap
page read and write
5C2F000
heap
page read and write
C30000
unkown
page readonly
822000
heap
page read and write
1E889644000
trusted library allocation
page read and write
23639D90000
heap
page read and write
1E88B400000
trusted library allocation
page read and write
1E889513000
heap
page read and write
50E0000
heap
page read and write
99D000
heap
page read and write
674000
heap
page read and write
5BD4000
heap
page read and write
1E88B404000
trusted library allocation
page read and write
3536000
heap
page read and write
15B1000
heap
page read and write
2AE3000
heap
page read and write
2AF4000
heap
page read and write
81A000
heap
page read and write
C31000
unkown
page execute read
1F787BE0000
heap
page read and write
157D000
heap
page read and write
1E88954D000
heap
page read and write
9BD000
heap
page read and write
1C1B4B45000
heap
page read and write
8E4000
heap
page read and write
8B1000
heap
page read and write
1E88B3FD000
trusted library allocation
page read and write
3911000
trusted library allocation
page read and write
1E88B3FD000
trusted library allocation
page read and write
1E88B403000
trusted library allocation
page read and write
630000
heap
page read and write
3589000
heap
page read and write
950000
heap
page read and write
4AB000
stack
page read and write
1E88B3FF000
trusted library allocation
page read and write
823000
heap
page read and write
1E88B402000
trusted library allocation
page read and write
62F000
heap
page read and write
4D6000
unkown
page read and write
F4A000
unkown
page readonly
217F98F2000
heap
page read and write
15BC000
heap
page read and write
342C000
heap
page read and write
2AB0000
heap
page read and write
FAE000
heap
page read and write
1E88B3FB000
trusted library allocation
page read and write
BC5B8FE000
stack
page read and write
2A88000
trusted library allocation
page read and write
1976000
heap
page read and write
157D000
heap
page read and write
902000
heap
page read and write
4F60000
trusted library allocation
page read and write
2800000
heap
page read and write
508000
unkown
page readonly
2D15000
heap
page read and write
3B0000
unkown
page readonly
6B191000
unkown
page execute read
2BA9000
heap
page read and write
857000
heap
page read and write
DE6000
heap
page read and write
D61000
unkown
page readonly
5C1D000
heap
page read and write
1E88B3F9000
trusted library allocation
page read and write
404000
unkown
page write copy
5B31000
heap
page read and write
3442000
heap
page read and write
1E8894F7000
heap
page read and write
674000
heap
page read and write
2DBD000
heap
page read and write
95E000
stack
page read and write
5C41000
heap
page read and write
628000
heap
page read and write
85E000
heap
page read and write
B08000
heap
page read and write
1E889644000
trusted library allocation
page read and write
886000
heap
page read and write
3569000
heap
page read and write
1E88B404000
trusted library allocation
page read and write
1CC5E7C0000
heap
page read and write
2BC3000
heap
page read and write
1E88B3FF000
trusted library allocation
page read and write
3A0000
heap
page read and write
3474000
heap
page read and write
839000
heap
page read and write
2AC0000
heap
page read and write
1E889513000
heap
page read and write
610000
heap
page read and write
2B40000
heap
page read and write
1E88B402000
trusted library allocation
page read and write
1E88B3FE000
trusted library allocation
page read and write
4450000
trusted library allocation
page read and write
6ACAB000
unkown
page read and write
8B5000
heap
page read and write
3B0000
unkown
page readonly
456D000
heap
page read and write
6204000
trusted library allocation
page read and write
4667000
heap
page read and write
ABB000
heap
page read and write
6C7F3000
unkown
page write copy
5A49000
heap
page read and write
5ACF000
heap
page read and write
80B000
heap
page read and write
83F000
heap
page read and write
1E88B3FC000
trusted library allocation
page read and write
1E88954F000
heap
page read and write
D60000
heap
page read and write
82C000
heap
page read and write
6ACDC000
unkown
page readonly
3266000
trusted library allocation
page read and write
D69000
heap
page read and write
1E889505000
heap
page read and write
809000
heap
page read and write
2BF2000
heap
page read and write
6BEC3000
unkown
page write copy
7C0000
heap
page read and write
4810000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
1E88B402000
trusted library allocation
page read and write
2B83000
heap
page read and write
2F8B000
trusted library allocation
page read and write
1E88B406000
trusted library allocation
page read and write
1E88B3FD000
trusted library allocation
page read and write
1E88953F000
heap
page read and write
831000
heap
page read and write
353B000
heap
page read and write
1E7F6EA2000
heap
page read and write
1E88B409000
trusted library allocation
page read and write
1E88B405000
trusted library allocation
page read and write
2DB4000
heap
page read and write
1E88B405000
trusted library allocation
page read and write
6C8CA000
unkown
page readonly
1E88B3FE000
trusted library allocation
page read and write
217F9906000
heap
page read and write
1E88953F000
heap
page read and write
19F69FE000
stack
page read and write
1E88B401000
trusted library allocation
page read and write
893000
heap
page read and write
2BC8000
heap
page read and write
1C1B3140000
heap
page read and write
1E88B3FE000
trusted library allocation
page read and write
26F0000
heap
page read and write
6C7F6000
unkown
page read and write
936000
heap
page read and write
809000
heap
page read and write
5ADA000
heap
page read and write
950000
heap
page read and write
1E8894F8000
heap
page read and write
1E88B404000
trusted library allocation
page read and write
1E889551000
heap
page read and write
2CDB000
heap
page read and write
1E88B220000
heap
page read and write
1E88B404000
trusted library allocation
page read and write
2DAC000
heap
page read and write
1E88B3FC000
trusted library allocation
page read and write
862000
heap
page read and write
86F000
heap
page read and write
825000
heap
page read and write
3487000
heap
page read and write
1E88B3FE000
trusted library allocation
page read and write
2D4E000
stack
page read and write
158E000
heap
page read and write
410000
unkown
page readonly
9AD000
heap
page read and write
93A000
heap
page read and write
A3D000
stack
page read and write
1E88B402000
trusted library allocation
page read and write
82E000
heap
page read and write
1E889551000
heap
page read and write
7FF75D261000
unkown
page execute read
2CAA000
heap
page read and write
3920000
trusted library allocation
page read and write
6ADBD000
unkown
page readonly
7FF75D261000
unkown
page execute read
1E8894F7000
heap
page read and write
CB1F0FF000
stack
page read and write
5C27000
heap
page read and write
2930000
heap
page read and write
6203000
trusted library allocation
page read and write
3F0F000
stack
page read and write
1E88B401000
trusted library allocation
page read and write
6B6B0000
unkown
page readonly
2B20000
heap
page read and write
6C61F000
unkown
page readonly
D2C000
unkown
page readonly
822000
heap
page read and write
81D000
heap
page read and write
2BC0000
heap
page read and write
3917000
trusted library allocation
page read and write
1E88B3F1000
trusted library allocation
page read and write
1E88B406000
trusted library allocation
page read and write
809000
heap
page read and write
3532000
heap
page read and write
3691000
heap
page read and write
70040000
unkown
page readonly
5110000
trusted library allocation
page read and write
1E88B405000
trusted library allocation
page read and write
321F000
stack
page read and write
D00000
heap
page read and write
1E88B3F5000
trusted library allocation
page read and write
807000
heap
page read and write
401000
unkown
page execute read
6B22D000
unkown
page read and write
1E88B3FE000
trusted library allocation
page read and write
391C000
trusted library allocation
page read and write
3380000
heap
page read and write
1E8894F8000
heap
page read and write
2BA9000
heap
page read and write
1E88B402000
trusted library allocation
page read and write
2BA1000
heap
page read and write
2E54000
heap
page read and write
809000
heap
page read and write
980000
heap
page read and write
4340000
heap
page read and write
1E88B400000
trusted library allocation
page read and write
2AD3000
trusted library allocation
page read and write
217F9830000
heap
page read and write
147E000
stack
page read and write
1E889513000
heap
page read and write
5BD4000
heap
page read and write
5CA2000
heap
page read and write
5B71000
heap
page read and write
7FF75D277000
unkown
page readonly
6B24E000
unkown
page read and write
7FF75D28B000
unkown
page readonly
8D0000
trusted library allocation
page read and write
948000
heap
page read and write
580000
heap
page read and write
81F000
stack
page read and write
7F7000
heap
page read and write
2BA9000
heap
page read and write
2C2E000
heap
page read and write
404000
unkown
page read and write
5A50000
heap
page read and write
3D2B000
heap
page read and write
1E8894F6000
heap
page read and write
6C918000
unkown
page read and write
5ACF000
heap
page read and write
7EF000
heap
page read and write
2DDF000
heap
page read and write
1E889640000
trusted library allocation
page read and write
9C5000
heap
page read and write
2BAD000
heap
page read and write
1E88B401000
trusted library allocation
page read and write
6BCBC000
unkown
page execute read
5BDD000
heap
page read and write
52FA000
heap
page read and write
666000
heap
page read and write
80D000
heap
page read and write
1E88B0A0000
heap
page read and write
12FB000
stack
page read and write
7FF75D28A000
unkown
page read and write
1E889644000
trusted library allocation
page read and write
391B000
trusted library allocation
page read and write
2DB4000
heap
page read and write
1E88B3FE000
trusted library allocation
page read and write
6205000
trusted library allocation
page read and write
1E889640000
trusted library allocation
page read and write
2A8D000
trusted library allocation
page read and write
922000
heap
page read and write
1E88B3FA000
trusted library allocation
page read and write
2DA5000
heap
page read and write
8E2000
heap
page read and write
2D2F000
heap
page read and write
2C86000
heap
page read and write
86F000
heap
page read and write
1E889551000
heap
page read and write
950000
heap
page read and write
2E50000
heap
page read and write
2A86000
trusted library allocation
page read and write
6ABE3000
unkown
page readonly
D26000
heap
page read and write
1E88B3FB000
trusted library allocation
page read and write
1E88B401000
trusted library allocation
page read and write
936000
heap
page read and write
DE0000
heap
page read and write
6B405000
unkown
page readonly
5A7E000
heap
page read and write
1E88B3FF000
trusted library allocation
page read and write
6AC00000
unkown
page readonly
2DFE000
stack
page read and write
2A82000
trusted library allocation
page read and write
81A000
heap
page read and write
7FF75D286000
unkown
page read and write
8BC000
heap
page read and write
A87DF3E000
stack
page read and write
1E8894F7000
heap
page read and write
5C3A000
heap
page read and write
2AE0000
trusted library allocation
page read and write
1E88B404000
trusted library allocation
page read and write
1E889551000
heap
page read and write
7FF75D260000
unkown
page readonly
421B000
stack
page read and write
1E889511000
heap
page read and write
5E10000
trusted library allocation
page read and write
822000
heap
page read and write
6C350000
unkown
page readonly
6BECF000
unkown
page read and write
2B82000
heap
page read and write
1E889511000
heap
page read and write
1E88B401000
trusted library allocation
page read and write
6C7F0000
unkown
page read and write
1E88B405000
trusted library allocation
page read and write
846000
heap
page read and write
1E88B3FF000
trusted library allocation
page read and write
15AE000
heap
page read and write
2CE8000
heap
page read and write
9CD000
heap
page read and write
2CC5000
stack
page read and write
81A000
heap
page read and write
3E90000
heap
page read and write
5C41000
heap
page read and write
1206000
unkown
page write copy
800000
heap
page read and write
6C8E0000
unkown
page readonly
7FF75D28B000
unkown
page readonly
839000
stack
page read and write
1E88B3FD000
trusted library allocation
page read and write
7FF75D286000
unkown
page write copy
1E88B3FB000
trusted library allocation
page read and write
4750000
heap
page read and write
1E889644000
trusted library allocation
page read and write
839000
heap
page read and write
1E88B3FE000
trusted library allocation
page read and write
910000
heap
page read and write
5A92000
heap
page read and write
844000
heap
page read and write
1E88B405000
trusted library allocation
page read and write
400000
unkown
page readonly
5C3A000
heap
page read and write
49A0000
heap
page read and write
822000
heap
page read and write
156A000
heap
page read and write
82C000
heap
page read and write
1F7861A1000
heap
page read and write
81A000
heap
page read and write
7FF75D260000
unkown
page readonly
1E889513000
heap
page read and write
5BE4000
heap
page read and write
F44000
heap
page read and write
82F000
heap
page read and write
1203000
unkown
page write copy
823000
heap
page read and write
1E88B3FE000
trusted library allocation
page read and write
5A31000
heap
page read and write
52FF000
heap
page read and write
3919000
trusted library allocation
page read and write
6C8F6000
unkown
page execute read
1E889551000
heap
page read and write
6200000
trusted library allocation
page read and write
2F86000
trusted library allocation
page read and write
82C000
heap
page read and write
7FF75D260000
unkown
page readonly
2B75000
heap
page read and write
954000
heap
page read and write
5C41000
heap
page read and write
7FF75D277000
unkown
page readonly
1E88B3FA000
trusted library allocation
page read and write
D7F000
unkown
page readonly
1E88B400000
trusted library allocation
page read and write
EFC000
heap
page read and write
2DAD000
heap
page read and write
2AE0000
heap
page read and write
1E889644000
trusted library allocation
page read and write
82C000
heap
page read and write
2D1C000
heap
page read and write
F4A000
unkown
page readonly
1E889511000
heap
page read and write
863000
heap
page read and write
5A92000
heap
page read and write
1E88B406000
trusted library allocation
page read and write
3486000
heap
page read and write
1E88B401000
trusted library allocation
page read and write
1E88B400000
trusted library allocation
page read and write
82C000
heap
page read and write
5FD000
stack
page read and write
F3C000
heap
page read and write
15BD000
heap
page read and write
F10000
unkown
page readonly
940000
heap
page read and write
1E889505000
heap
page read and write
2620000
heap
page read and write
2AD5000
trusted library allocation
page read and write
15A5000
heap
page read and write
6B460000
unkown
page readonly
1E889551000
heap
page read and write
664000
heap
page read and write
5C10000
heap
page read and write
988000
heap
page read and write
1E889640000
trusted library allocation
page read and write
4DB000
unkown
page readonly
7FF75D277000
unkown
page readonly
6C8C0000
unkown
page readonly
5C0D000
heap
page read and write
1E889640000
trusted library allocation
page read and write
460B000
heap
page read and write
890000
heap
page read and write
518000
unkown
page readonly
E30000
heap
page read and write
21C0000
unkown
page read and write
3B5A000
stack
page read and write
86A000
heap
page read and write
4664000
heap
page read and write
9C0000
heap
page read and write
1E88B404000
trusted library allocation
page read and write
1E889505000
heap
page read and write
535D000
heap
page read and write
1910000
heap
page read and write
700EC000
unkown
page read and write
52ED000
stack
page read and write
6B3E0000
unkown
page readonly
2DDE000
heap
page read and write
4566000
heap
page read and write
6CFF000
stack
page read and write
2D4E000
heap
page read and write
5A4A000
heap
page read and write
6BECD000
unkown
page write copy
6FF50000
unkown
page readonly
11F1000
unkown
page execute read
972000
heap
page read and write
FAE000
heap
page read and write
700E5000
unkown
page readonly
1E889644000
trusted library allocation
page read and write
5C3F000
heap
page read and write
7FF75D260000
unkown
page readonly
1E889640000
trusted library allocation
page read and write
1E88B403000
trusted library allocation
page read and write
8A4000
heap
page read and write
1E88B403000
trusted library allocation
page read and write
1E88B3FC000
trusted library allocation
page read and write
1E8894A0000
heap
page read and write
847000
heap
page read and write
3532000
heap
page read and write
1E889551000
heap
page read and write
6BCD2000
unkown
page read and write
1C1B4CC0000
heap
page read and write
2C50000
trusted library allocation
page read and write
7F6000
heap
page read and write
857000
heap
page read and write
45E4000
heap
page read and write
7F8000
heap
page read and write
6FF51000
unkown
page execute read
1E88B401000
trusted library allocation
page read and write
464000
unkown
page read and write
431F000
stack
page read and write
5B31000
heap
page read and write
9F0000
heap
page read and write
1E88B403000
trusted library allocation
page read and write
82E000
heap
page read and write
1E88B402000
trusted library allocation
page read and write
631000
heap
page read and write
1E8894C0000
heap
page read and write
7FF75D261000
unkown
page execute read
1E88B3FE000
trusted library allocation
page read and write
15D2000
heap
page read and write
F13000
heap
page read and write
460E000
heap
page read and write
5C27000
heap
page read and write
459E000
stack
page read and write
6BB49000
unkown
page read and write
6AD5D000
unkown
page readonly
1E88B400000
trusted library allocation
page read and write
8BA000
heap
page read and write
3569000
heap
page read and write
421F000
stack
page read and write
972000
heap
page read and write
6AC01000
unkown
page execute read
6C8C1000
unkown
page execute read
996000
heap
page read and write
1520000
trusted library allocation
page read and write
2E61000
heap
page read and write
7FF75D261000
unkown
page execute read
1E88B402000
trusted library allocation
page read and write
EDE000
heap
page read and write
822000
heap
page read and write
820000
heap
page read and write
DE3000
unkown
page readonly
3912000
trusted library allocation
page read and write
65F000
heap
page read and write
45A2000
heap
page read and write
7EF000
heap
page read and write
1E889551000
heap
page read and write
972000
heap
page read and write
1E889505000
heap
page read and write
2C48000
heap
page read and write
411000
unkown
page execute read
5A57000
heap
page read and write
1E88B3FD000
trusted library allocation
page read and write
411000
unkown
page execute read
1E88B3FF000
trusted library allocation
page read and write
82C000
heap
page read and write
837000
heap
page read and write
5C41000
heap
page read and write
674000
heap
page read and write
8A5000
heap
page read and write
7FF75D286000
unkown
page read and write
2A80000
trusted library allocation
page read and write
155C000
heap
page read and write
A87E2FE000
stack
page read and write
1E8894F7000
heap
page read and write
832000
heap
page read and write
81C000
heap
page read and write
82C000
heap
page read and write
45BA000
heap
page read and write
1E889513000
heap
page read and write
1E88B403000
trusted library allocation
page read and write
1E889640000
trusted library allocation
page read and write
1E88B3FE000
trusted library allocation
page read and write
1E88B405000
trusted library allocation
page read and write
1E88B3FC000
trusted library allocation
page read and write
2AD9000
trusted library allocation
page read and write
1220000
unkown
page readonly
929000
heap
page read and write
822000
heap
page read and write
2B6E000
stack
page read and write
F8A000
heap
page read and write
2F80000
trusted library allocation
page read and write
BC5B2F9000
stack
page read and write
1E88B3FC000
trusted library allocation
page read and write
CB1F2FE000
stack
page read and write
1576000
heap
page read and write
392D000
heap
page read and write
9A6000
heap
page read and write
822000
heap
page read and write
80C000
heap
page read and write
23638336000
heap
page read and write
5C97000
heap
page read and write
5EE0000
heap
page read and write
2E6C000
heap
page read and write
2BE1000
heap
page read and write
2D15000
heap
page read and write
6ABCC000
unkown
page readonly
102DC000
unkown
page readonly
835000
heap
page read and write
7F7000
heap
page read and write
83C000
heap
page read and write
156B000
heap
page read and write
3489000
heap
page read and write
1E88B401000
trusted library allocation
page read and write
9BF000
heap
page read and write
40A000
unkown
page readonly
45D2000
heap
page read and write
4D6000
unkown
page write copy
2C80000
heap
page read and write
2AE0000
trusted library allocation
page read and write
F92000
heap
page read and write
82C000
heap
page read and write
600000
heap
page read and write
2C17000
heap
page read and write
1E88B405000
trusted library allocation
page read and write
18C0000
heap
page read and write
7FF75D286000
unkown
page read and write
1E7F6E85000
heap
page read and write
9DE000
stack
page read and write
65E000
heap
page read and write
2CFB000
heap
page read and write
FAF000
heap
page read and write
5A7C000
heap
page read and write
5C46000
heap
page read and write
1E88953F000
heap
page read and write
7FF75D260000
unkown
page readonly
2E58000
heap
page read and write
1E7F6E8E000
heap
page read and write
82C000
heap
page read and write
990000
heap
page read and write
358A000
heap
page read and write
3B60000
heap
page read and write
1E88B404000
trusted library allocation
page read and write
2B30000
heap
page read and write
5C2F000
heap
page read and write
2B10000
heap
page read and write
157D000
heap
page read and write
2C16000
heap
page read and write
8B5000
heap
page read and write
5C2F000
heap
page read and write
1E7F6E90000
heap
page read and write
666000
heap
page read and write
1E88B404000
trusted library allocation
page read and write
1E88B402000
trusted library allocation
page read and write
F10000
unkown
page readonly
5BA6000
heap
page read and write
1E88B402000
trusted library allocation
page read and write
102E7000
unkown
page readonly
3320000
trusted library allocation
page read and write
6C911000
unkown
page execute read
391F000
trusted library allocation
page read and write
5BF9000
heap
page read and write
1E88B3FD000
trusted library allocation
page read and write
2AD7000
trusted library allocation
page read and write
4810000
trusted library allocation
page read and write
9F1000
heap
page read and write
668000
heap
page read and write
5C2F000
heap
page read and write
839000
heap
page read and write
7FF75D28B000
unkown
page readonly
1E88B40C000
trusted library allocation
page read and write
157F000
heap
page read and write
898000
heap
page read and write
1E88B401000
trusted library allocation
page read and write
5C46000
heap
page read and write
217F98F2000
heap
page read and write
4D0000
heap
page read and write
697AFE000
stack
page read and write
AD8000
heap
page read and write
81D000
heap
page read and write
1E88B406000
trusted library allocation
page read and write
8D0000
trusted library allocation
page read and write
3AF7000
heap
page read and write
2DCF000
heap
page read and write
839000
heap
page read and write
80F000
heap
page read and write
8B5000
heap
page read and write
C8E000
stack
page read and write
9F5000
heap
page read and write
EC000
stack
page read and write
6FF41000
unkown
page execute read
3265000
trusted library allocation
page read and write
830000
heap
page read and write
825000
heap
page read and write
5A42000
heap
page read and write
3532000
heap
page read and write
1CC5CF46000
heap
page read and write
2ADE000
trusted library allocation
page read and write
6BECC000
unkown
page read and write
1E88B406000
trusted library allocation
page read and write
2DB4000
heap
page read and write
1E889562000
heap
page read and write
1360000
heap
page read and write
5B7E000
heap
page read and write
1E88953F000
heap
page read and write
F47000
heap
page read and write
7FF75D28B000
unkown
page readonly
1E88B405000
trusted library allocation
page read and write
9C000
stack
page read and write
CFB000
stack
page read and write
867000
heap
page read and write
5B15000
heap
page read and write
1E88B401000
trusted library allocation
page read and write
6AE77000
unkown
page readonly
45E1000
heap
page read and write
81A000
heap
page read and write
5C27000
heap
page read and write
3889000
heap
page read and write
14BD000
stack
page read and write
1E88B3FE000
trusted library allocation
page read and write
2CA5000
heap
page read and write
1E889640000
trusted library allocation
page read and write
411000
unkown
page execute read
1E88B404000
trusted library allocation
page read and write
1E88B405000
trusted library allocation
page read and write
1E88B3FB000
trusted library allocation
page read and write
F44000
heap
page read and write
2BC0000
trusted library allocation
page read and write
10310000
unkown
page write copy
2D36000
heap
page read and write
There are 2677 hidden memdumps, click here to show them.